首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE Testbed 基于ADRENALINE测试平台的端到端NFV业务流程实验演示
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844038
L. Gifre, C. Manso, R. Casellas, R. Martínez, R. Vilalta, R. Muñoz
This demonstration will showcase the end-to-end orchestration of virtual network functions in the full-fledged ADRENALINE Testbed Cloud Platform expanding from the edge to the cloud. The Management and Orchestration (MANO) software ETSI OpenSource MANO (OSM) is used to deploy and handle a multi-site network service involving both edge and core Data Centers (DCs). Besides, the inter- and intra-DC connectivity is directly managed by a novel OSM WAN Infrastructure Manager (WIM) connector using the Transport API (TAPI) interface, thus completely abstracting the details of the underlying SDN controllers handling the programmability of the WAN network interconnecting the DCs.
此演示将展示在成熟的ADRENALINE Testbed云平台中从边缘扩展到云的虚拟网络功能的端到端编排。管理和业务流程(MANO)软件ETSI OpenSource MANO (OSM)用于部署和处理涉及边缘和核心数据中心(dc)的多站点网络服务。此外,数据中心间和数据中心内的连接由使用传输API (TAPI)接口的新型OSM广域网基础设施管理器(WIM)连接器直接管理,从而完全抽象了处理连接数据中心的广域网可编程性的底层SDN控制器的细节。
{"title":"Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE Testbed","authors":"L. Gifre, C. Manso, R. Casellas, R. Martínez, R. Vilalta, R. Muñoz","doi":"10.1109/NetSoft54395.2022.9844038","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844038","url":null,"abstract":"This demonstration will showcase the end-to-end orchestration of virtual network functions in the full-fledged ADRENALINE Testbed Cloud Platform expanding from the edge to the cloud. The Management and Orchestration (MANO) software ETSI OpenSource MANO (OSM) is used to deploy and handle a multi-site network service involving both edge and core Data Centers (DCs). Besides, the inter- and intra-DC connectivity is directly managed by a novel OSM WAN Infrastructure Manager (WIM) connector using the Transport API (TAPI) interface, thus completely abstracting the details of the underlying SDN controllers handling the programmability of the WAN network interconnecting the DCs.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Category Theory to Functional Programming: A Formal Representation of Intent 从范畴论到函数式编程:意图的形式化表示
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844061
D. Borsatti, W. Cerroni, S. Clayman
The possibility of managing network infrastructures through software-based programmable interfaces is becoming a cornerstone in the evolution of communication networks. The Intent-Based Networking (IBN) paradigm is a novel declarative approach towards network management proposed by a few Standards Developing Organizations. This paradigm offers a high-level interface for network management that abstracts the underlying network infrastructure and allows the specification of network directives using natural language. Since the IBN concept is based on a declarative approach to network management and programmability, we argue that the use of declarative programming to achieve IBN could uncover valuable insights for this new network paradigm. This paper proposes a formalization of this declarative paradigm obtained with concepts from category theory. Taking this approach to Intent, an initial implementation of this formalization is presented using Haskell, a well-known functional programming language.
通过基于软件的可编程接口管理网络基础设施的可能性正在成为通信网络发展的基石。基于意图的网络(IBN)范式是由一些标准开发组织提出的一种新的网络管理声明性方法。该范例为网络管理提供了一个高级接口,该接口抽象了底层网络基础设施,并允许使用自然语言规范网络指令。由于IBN概念是基于网络管理和可编程性的声明性方法,我们认为使用声明性编程来实现IBN可以为这种新的网络范式揭示有价值的见解。本文从范畴论的概念出发,提出了这种陈述性范式的形式化。将这种方法用于Intent,使用Haskell(一种著名的函数式编程语言)给出了这种形式化的初始实现。
{"title":"From Category Theory to Functional Programming: A Formal Representation of Intent","authors":"D. Borsatti, W. Cerroni, S. Clayman","doi":"10.1109/NetSoft54395.2022.9844061","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844061","url":null,"abstract":"The possibility of managing network infrastructures through software-based programmable interfaces is becoming a cornerstone in the evolution of communication networks. The Intent-Based Networking (IBN) paradigm is a novel declarative approach towards network management proposed by a few Standards Developing Organizations. This paradigm offers a high-level interface for network management that abstracts the underlying network infrastructure and allows the specification of network directives using natural language. Since the IBN concept is based on a declarative approach to network management and programmability, we argue that the use of declarative programming to achieve IBN could uncover valuable insights for this new network paradigm. This paper proposes a formalization of this declarative paradigm obtained with concepts from category theory. Taking this approach to Intent, an initial implementation of this formalization is presented using Haskell, a well-known functional programming language.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Passive OS Fingerprinting on Commodity Switches 商品交换机被动操作系统指纹识别
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844109
Sherry Bai, Hyojoon Kim, J. Rexford
Operating System (OS) fingerprinting allows network administrators to identify which operating systems are running on the hosts communicating over their network. This information is useful for detecting OS-specific vulnerabilities and for administering OS-related security policies that block, rate-limit, or redirect traffic. Passive fingerprinting can identify hosts’ OS types without active probes that introduce additional network load. However, existing software-based passive fingerprinting tools cannot keep up with the traffic in high-speed networks. This paper presents P40f, a tool that runs on programmable switch hardware to perform OS fingerprinting and apply security policies at line rate. Unlike p0f, P40f can fingerprint devices’ OS types and react to it (e.g., drop, rate-limit) in real time directly in the switch, without requiring any control-plane messages. P40f is a P4 implementation of an existing software tool, p0f. We present our prototype implemented with the P4 language, which compiles and runs on the Intel Tofino switch. We present experiments against packet traces from a real campus network, and make our code publicly available.
操作系统(OS)指纹识别允许网络管理员识别通过其网络通信的主机上运行的操作系统。此信息对于检测特定于操作系统的漏洞以及管理与操作系统相关的安全策略(阻止、速率限制或重定向流量)非常有用。被动指纹识别可以识别主机的操作系统类型,而不需要主动探测,这会带来额外的网络负载。然而,现有的基于软件的被动指纹识别工具无法跟上高速网络的流量。本文介绍了P40f,一个运行在可编程交换机硬件上的工具,用于执行操作系统指纹识别并以线速率应用安全策略。与p0f不同,P40f可以直接在交换机中实时识别设备的操作系统类型并对其做出反应(例如,下降,速率限制),而不需要任何控制平面消息。P40f是现有软件工具p0f的P4实现。我们展示了用P4语言实现的原型,它可以在Intel Tofino交换机上编译和运行。我们提出了针对真实校园网的数据包跟踪的实验,并公开了我们的代码。
{"title":"Passive OS Fingerprinting on Commodity Switches","authors":"Sherry Bai, Hyojoon Kim, J. Rexford","doi":"10.1109/NetSoft54395.2022.9844109","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844109","url":null,"abstract":"Operating System (OS) fingerprinting allows network administrators to identify which operating systems are running on the hosts communicating over their network. This information is useful for detecting OS-specific vulnerabilities and for administering OS-related security policies that block, rate-limit, or redirect traffic. Passive fingerprinting can identify hosts’ OS types without active probes that introduce additional network load. However, existing software-based passive fingerprinting tools cannot keep up with the traffic in high-speed networks. This paper presents P40f, a tool that runs on programmable switch hardware to perform OS fingerprinting and apply security policies at line rate. Unlike p0f, P40f can fingerprint devices’ OS types and react to it (e.g., drop, rate-limit) in real time directly in the switch, without requiring any control-plane messages. P40f is a P4 implementation of an existing software tool, p0f. We present our prototype implemented with the P4 language, which compiles and runs on the Intel Tofino switch. We present experiments against packet traces from a real campus network, and make our code publicly available.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards Software Defined Layer 4.5 Customization 面向软件定义层4.5定制
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844096
Daniel Lukaszewski, G. Xie
Protocol customizations primarily come in two forms: those driven by public extensions to open standard protocols; and dialecting and performance tuning driven by an enterprise network’s private security and performance needs. Current deployment of protocol customizations is mostly ad hoc, through manual configuration or script programs that are highly specialized to each customization. The method lacks the agility necessary to support the relatively high tempo of private customizations. Also, it is common for today’s protocol customization efforts to experience middlebox interference. In this paper, we propose a systematic framework of network-wide orchestration and continuous management of protocol customization for enterprise and data-center networks. By introducing a logically centralized orchestrator along with a layer 4.5 fine-grained device customization solution, our framework will allow operators to deploy and monitor customized flows from a single vantage point, providing timely detection of rogue devices as well as real-time coordination of middlebox traversal. Results from prototyping and experimentation confirm utility of our framework and show that the framework incurs modest processing overhead, at the levels of 3% and 1% for sample customized flows and non-customized flows, respectively.
协议自定义主要有两种形式:由开放标准协议的公共扩展驱动;以及由企业网络的私有安全和性能需求驱动的拨号和性能调优。当前协议自定义的部署大多是特别的,通过手动配置或脚本程序,这些程序对每个自定义都是高度专门化的。该方法缺乏支持相对快速的私有定制所需的敏捷性。此外,今天的协议定制工作经常会遇到中间盒干扰。在本文中,我们提出了一个系统的框架,用于企业和数据中心网络的全网编排和协议定制的持续管理。通过引入逻辑集中式编排器以及4.5层细粒度设备定制解决方案,我们的框架将允许运营商从一个有利位置部署和监控定制流,提供及时检测恶意设备以及实时协调中间盒遍历。原型和实验的结果证实了我们的框架的实用性,并表明框架会产生适度的处理开销,对于样本定制流和非定制流分别为3%和1%。
{"title":"Towards Software Defined Layer 4.5 Customization","authors":"Daniel Lukaszewski, G. Xie","doi":"10.1109/NetSoft54395.2022.9844096","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844096","url":null,"abstract":"Protocol customizations primarily come in two forms: those driven by public extensions to open standard protocols; and dialecting and performance tuning driven by an enterprise network’s private security and performance needs. Current deployment of protocol customizations is mostly ad hoc, through manual configuration or script programs that are highly specialized to each customization. The method lacks the agility necessary to support the relatively high tempo of private customizations. Also, it is common for today’s protocol customization efforts to experience middlebox interference. In this paper, we propose a systematic framework of network-wide orchestration and continuous management of protocol customization for enterprise and data-center networks. By introducing a logically centralized orchestrator along with a layer 4.5 fine-grained device customization solution, our framework will allow operators to deploy and monitor customized flows from a single vantage point, providing timely detection of rogue devices as well as real-time coordination of middlebox traversal. Results from prototyping and experimentation confirm utility of our framework and show that the framework incurs modest processing overhead, at the levels of 3% and 1% for sample customized flows and non-customized flows, respectively.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NetREC: Network-wide in-network REal-value Computation NetREC:全网范围内的网络实值计算
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844118
Matthews Jose, Kahina Lazri, J. François, O. Festor
The current generation of networks empowers the use of programmable switches whose behaviour can be defined using languages like P4. Nevertheless, these languages do not support network-wide deployment of stateful real-value functions. This paper presents NetREC, an extension of RMT programmable data planes designed to enable stateful real-value functions computation across multiple switches. NetREC first decomposes the real-value functions into a dependency graph of elementary operations that are distributed among the network. This distribution is carried out by dynamically generating and solving an integer linear program. We deploy a prototype of NetREC on a network of Tofino switches and demonstrate its capability of computing recursive real-value functions like exponential weighted moving average.
当前一代的网络支持使用可编程交换机,其行为可以使用P4等语言定义。然而,这些语言不支持在网络范围内部署有状态实值函数。NetREC是RMT可编程数据平面的扩展,旨在实现跨多个交换机的有状态实值函数计算。NetREC首先将实值函数分解为分布在网络中的基本操作的依赖图。这种分布是通过动态生成和求解一个整数线性规划来实现的。我们在Tofino交换机网络上部署了NetREC原型,并演示了其计算递归实值函数(如指数加权移动平均)的能力。
{"title":"NetREC: Network-wide in-network REal-value Computation","authors":"Matthews Jose, Kahina Lazri, J. François, O. Festor","doi":"10.1109/NetSoft54395.2022.9844118","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844118","url":null,"abstract":"The current generation of networks empowers the use of programmable switches whose behaviour can be defined using languages like P4. Nevertheless, these languages do not support network-wide deployment of stateful real-value functions. This paper presents NetREC, an extension of RMT programmable data planes designed to enable stateful real-value functions computation across multiple switches. NetREC first decomposes the real-value functions into a dependency graph of elementary operations that are distributed among the network. This distribution is carried out by dynamically generating and solving an integer linear program. We deploy a prototype of NetREC on a network of Tofino switches and demonstrate its capability of computing recursive real-value functions like exponential weighted moving average.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks 5G及以后移动网络中基于深度学习的DDoS攻击检测和缓解方法
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844053
Badre Bousalem, Vinicius F. Silva, R. Langar, Sylvain Cherrier
In this demo, we present a 5G prototype for attacks detection and mitigation in sliced networks leveraging Machine Learning (ML). Our prototype, based on OpenAirInterface, allows creating network slices on demand and managing physical resources dynamically according to the users’ behavior, while considering the inputs from a northbound Software Defined Network (SDN) application. We focus here on Distributed Denial of Service (DDoS) attacks, where one or multiple malicious users generate attacks on the 5G Core Network. Based on our developed ML module, we show that our prototype is able to detect such attacks, then automatically creates a sinkhole-type slice with a small portion of physical resources, and isolates the malicious users within this slice to mitigate the attackers’ action. We demonstrate the effectiveness of our approach by showing the decrease in the network throughput for the malicious users by a factor of 15, while maintaining a high network throughput for benign users.
在这个演示中,我们展示了一个利用机器学习(ML)在切片网络中检测和缓解攻击的5G原型。我们的原型,基于OpenAirInterface,允许按需创建网络切片,并根据用户的行为动态管理物理资源,同时考虑来自北向软件定义网络(SDN)应用程序的输入。我们在这里重点关注分布式拒绝服务(DDoS)攻击,其中一个或多个恶意用户对5G核心网产生攻击。基于我们开发的ML模块,我们展示了我们的原型能够检测到此类攻击,然后自动创建具有一小部分物理资源的天坑类型切片,并隔离该切片内的恶意用户以减轻攻击者的行动。我们通过显示恶意用户的网络吞吐量减少了15倍,同时保持良性用户的高网络吞吐量来证明我们方法的有效性。
{"title":"Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks","authors":"Badre Bousalem, Vinicius F. Silva, R. Langar, Sylvain Cherrier","doi":"10.1109/NetSoft54395.2022.9844053","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844053","url":null,"abstract":"In this demo, we present a 5G prototype for attacks detection and mitigation in sliced networks leveraging Machine Learning (ML). Our prototype, based on OpenAirInterface, allows creating network slices on demand and managing physical resources dynamically according to the users’ behavior, while considering the inputs from a northbound Software Defined Network (SDN) application. We focus here on Distributed Denial of Service (DDoS) attacks, where one or multiple malicious users generate attacks on the 5G Core Network. Based on our developed ML module, we show that our prototype is able to detect such attacks, then automatically creates a sinkhole-type slice with a small portion of physical resources, and isolates the malicious users within this slice to mitigate the attackers’ action. We demonstrate the effectiveness of our approach by showing the decrease in the network throughput for the malicious users by a factor of 15, while maintaining a high network throughput for benign users.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"55 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127221375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo: A Network Simulator for 5G Virtualized Networks 演示:5G虚拟化网络的网络模拟器
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844042
Oscar Delgado, B. Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette
Current 5G and beyond research explores how to leverage network virtualization, which allows network operators to partition the network into multiple independent slices, each of which can carry multiple types of traffic, to provide flexibility and scalability in the deployment of new network services. In this context, this paper presents the description of a network simulator, that addresses the key related 5G features, i.e., modeling of virtual network functions, network slicing, ability to change some network parameters during run-time, and a more realistic network traffic generation. During the demo, we deploy several slices with different types of traffic to demonstrate that our simulator can support applications like network management and orchestration. The evaluation results show that our simulator is a powerful tool for testing 5G networks.
当前的5G及以后的研究探索了如何利用网络虚拟化,网络虚拟化允许网络运营商将网络划分为多个独立的切片,每个切片可以承载多种类型的流量,从而在部署新的网络服务时提供灵活性和可扩展性。在此背景下,本文介绍了网络模拟器的描述,该网络模拟器解决了5G的关键相关功能,即虚拟网络功能的建模,网络切片,在运行时更改某些网络参数的能力,以及更真实的网络流量生成。在演示过程中,我们部署了几个具有不同类型流量的片段,以演示我们的模拟器可以支持网络管理和编排等应用程序。评估结果表明,我们的模拟器是测试5G网络的强大工具。
{"title":"Demo: A Network Simulator for 5G Virtualized Networks","authors":"Oscar Delgado, B. Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette","doi":"10.1109/NetSoft54395.2022.9844042","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844042","url":null,"abstract":"Current 5G and beyond research explores how to leverage network virtualization, which allows network operators to partition the network into multiple independent slices, each of which can carry multiple types of traffic, to provide flexibility and scalability in the deployment of new network services. In this context, this paper presents the description of a network simulator, that addresses the key related 5G features, i.e., modeling of virtual network functions, network slicing, ability to change some network parameters during run-time, and a more realistic network traffic generation. During the demo, we deploy several slices with different types of traffic to demonstrate that our simulator can support applications like network management and orchestration. The evaluation results show that our simulator is a powerful tool for testing 5G networks.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep learning based resource forecasting for 5G core network scaling in Kubernetes environment Kubernetes环境下基于深度学习的5G核心网扩容资源预测
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844056
Menuka Perera Jayasuriya Kuranage, L. Nuaymi, A. Bouabdallah, Thomas Ferrandiz, P. Bertin
5G networks are moving towards cloudification which gives the telecom operators the flexibility to manage their networks efficiently and cost-effectively. Scaling network functions on demand is one of the advantages of using container-based deployment in cloud environments. With the continuously changing network traffic patterns due to the emerging new 5G use cases, there is a need for novel automated network resources management approach in cloud-native environments. Considering the scale and the complexity of the 5G network, managing resources is a challenge. To address this, we propose a deep learning-based resource usage forecasting approach that provides useful insights for decision-making in containerized Network Function (CNF) scaling for the Kubernetes environment. Kubernetes is a container orchestration tool that becoming popular among Telecom operators due to its simplicity. We implemented a testbed in the Kubernetes environment to generate a dataset closer to real-world data for deep learning model training and evaluated the best-performing model for resource usage forecasting. We benchmarked our approach against another deep learning-based resource usage forecasting approach which proved our method can provide a highly accurate forecast for further horizons.
5G网络正在向云化发展,这使电信运营商能够灵活地高效、经济地管理其网络。按需扩展网络功能是在云环境中使用基于容器的部署的优势之一。随着5G新用例的出现,网络流量模式不断变化,需要在云原生环境中采用新的自动化网络资源管理方法。考虑到5G网络的规模和复杂性,资源管理是一项挑战。为了解决这个问题,我们提出了一种基于深度学习的资源使用预测方法,该方法为Kubernetes环境中容器化网络功能(CNF)扩展的决策提供了有用的见解。Kubernetes是一种容器编排工具,由于其简单性而在电信运营商中流行起来。我们在Kubernetes环境中实现了一个测试平台,以生成更接近真实世界数据的数据集,用于深度学习模型训练,并评估了用于资源使用预测的最佳表现模型。我们将我们的方法与另一种基于深度学习的资源使用预测方法进行了基准测试,证明我们的方法可以为未来的视野提供高度准确的预测。
{"title":"Deep learning based resource forecasting for 5G core network scaling in Kubernetes environment","authors":"Menuka Perera Jayasuriya Kuranage, L. Nuaymi, A. Bouabdallah, Thomas Ferrandiz, P. Bertin","doi":"10.1109/NetSoft54395.2022.9844056","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844056","url":null,"abstract":"5G networks are moving towards cloudification which gives the telecom operators the flexibility to manage their networks efficiently and cost-effectively. Scaling network functions on demand is one of the advantages of using container-based deployment in cloud environments. With the continuously changing network traffic patterns due to the emerging new 5G use cases, there is a need for novel automated network resources management approach in cloud-native environments. Considering the scale and the complexity of the 5G network, managing resources is a challenge. To address this, we propose a deep learning-based resource usage forecasting approach that provides useful insights for decision-making in containerized Network Function (CNF) scaling for the Kubernetes environment. Kubernetes is a container orchestration tool that becoming popular among Telecom operators due to its simplicity. We implemented a testbed in the Kubernetes environment to generate a dataset closer to real-world data for deep learning model training and evaluated the best-performing model for resource usage forecasting. We benchmarked our approach against another deep learning-based resource usage forecasting approach which proved our method can provide a highly accurate forecast for further horizons.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DEMO: MiddleNet: A High-Performance, Lightweight, Unified NFV & Middlebox Framework 演示:middleet:一个高性能、轻量级、统一的NFV和Middlebox框架
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844026
Ziteng Zeng, Leslie Monis, Shixiong Qi, K. Ramakrishnan
Softwarized network resident functions have been extensively used to replace purpose-built appliances. However, there is a lack of alternatives for richer network resident functionality with a seamless combination of L2/L3 Network Function Virtualization (NFV) and L4/L7 middleboxes.We propose MiddleNet, a unified L2/L3 NFV and L4/L7 middlebox framework. MiddleNet uses DPDK in L2/L3 NFV to achieve high-performance, zero-copy packet delivery. MiddleNet exploits the event-driven capabilities of extended Berkeley Packet Filter (eBPF) to build up lightweight L4/L7 middleboxes with load-proportional overheads. MiddleNet constructs complex L2/L3 NF and L4/L7 middlebox function chains with low overhead using shared memory communication. With the integration of Single Root I/O Virtualization (SR-IOV), MiddleNet supports dynamically selecting packet processing layers (L2 to L7) based on the flow. In this demo, we show MiddleNet’s operation.
软件化的网络驻留功能已被广泛用于取代专用设备。然而,缺乏将L2/L3网络功能虚拟化(NFV)和L4/L7中间盒无缝结合的更丰富的网络驻留功能的替代方案。我们提出了midlenet,一个统一的L2/L3 NFV和L4/L7中间盒框架。midlenet在L2/L3 NFV中使用DPDK实现高性能、零拷贝的报文传输。MiddleNet利用扩展Berkeley Packet Filter (eBPF)的事件驱动功能来构建轻量级的L4/L7中间件,其开销与负载成比例。midlenet使用共享内存通信构建复杂的L2/L3 NF和L4/L7中间盒功能链,具有低开销。midlenet集成了SR-IOV (Single Root I/O Virtualization),支持根据流动态选择报文处理层(L2 ~ L7)。在这个演示中,我们展示了midlenet的操作。
{"title":"DEMO: MiddleNet: A High-Performance, Lightweight, Unified NFV & Middlebox Framework","authors":"Ziteng Zeng, Leslie Monis, Shixiong Qi, K. Ramakrishnan","doi":"10.1109/NetSoft54395.2022.9844026","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844026","url":null,"abstract":"Softwarized network resident functions have been extensively used to replace purpose-built appliances. However, there is a lack of alternatives for richer network resident functionality with a seamless combination of L2/L3 Network Function Virtualization (NFV) and L4/L7 middleboxes.We propose MiddleNet, a unified L2/L3 NFV and L4/L7 middlebox framework. MiddleNet uses DPDK in L2/L3 NFV to achieve high-performance, zero-copy packet delivery. MiddleNet exploits the event-driven capabilities of extended Berkeley Packet Filter (eBPF) to build up lightweight L4/L7 middleboxes with load-proportional overheads. MiddleNet constructs complex L2/L3 NF and L4/L7 middlebox function chains with low overhead using shared memory communication. With the integration of Single Root I/O Virtualization (SR-IOV), MiddleNet supports dynamically selecting packet processing layers (L2 to L7) based on the flow. In this demo, we show MiddleNet’s operation.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Host Bypassing: Let your GPU speak Ethernet 主机旁路:让你的GPU说话以太网
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844090
Ralf Kundel, Leonard Anderweit, Jonas Markussen, C. Griwodz, Osama Abboud, Benjamin Becker, Tobias Meuser
Hardware acceleration of network functions is essential to meet the challenging Quality of Service requirements in nowadays computer networks. Graphical Processing Units (GPU) are a widely deployed technology that can also be used for computing tasks, including acceleration of network functions. In this work, we demonstrate how commodity GPUs, which do not provide any network interfaces, can be used to accelerate network functions. Our approach leverages PCIe peer-to-peer capabilities and allows the GPU to control the network interface card directly, without any assistance from the operating system or control application. The presented evaluation results demonstrate the feasibility of our approach and its performance of up to 10 Gbit/s, even for small packets.
为了满足当今计算机网络对服务质量的要求,网络功能的硬件加速是必不可少的。图形处理单元(GPU)是一种广泛部署的技术,也可以用于计算任务,包括网络功能的加速。在这项工作中,我们演示了不提供任何网络接口的商品gpu如何用于加速网络功能。我们的方法利用PCIe点对点功能,并允许GPU直接控制网络接口卡,而无需操作系统或控制应用程序的任何帮助。所提出的评估结果证明了我们的方法的可行性和高达10 Gbit/s的性能,即使是小数据包。
{"title":"Host Bypassing: Let your GPU speak Ethernet","authors":"Ralf Kundel, Leonard Anderweit, Jonas Markussen, C. Griwodz, Osama Abboud, Benjamin Becker, Tobias Meuser","doi":"10.1109/NetSoft54395.2022.9844090","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844090","url":null,"abstract":"Hardware acceleration of network functions is essential to meet the challenging Quality of Service requirements in nowadays computer networks. Graphical Processing Units (GPU) are a widely deployed technology that can also be used for computing tasks, including acceleration of network functions. In this work, we demonstrate how commodity GPUs, which do not provide any network interfaces, can be used to accelerate network functions. Our approach leverages PCIe peer-to-peer capabilities and allows the GPU to control the network interface card directly, without any assistance from the operating system or control application. The presented evaluation results demonstrate the feasibility of our approach and its performance of up to 10 Gbit/s, even for small packets.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1