首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks 基于sdn的时间敏感网络的延迟感知拓扑发现
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844085
Sanaz Mohammadi, D. Colle, W. Tavernier
Time-Sensitive Networking (TSN) is a set of standards currently being defined by the IEEE 802.1 Time-Sensitive Networking Task Group [1] for Real-Time behavior in the network. Software-Defined Networking (SDN) provides a good solution for implementing TSN networks due to its characteristics such as run-time flexibility, benefits in management, cost efficiency, and performance. For achieving Real-Time behavior in TSN networks, the high-priority traffic should be scheduled precisely to fulfill its timing requirements. For this purpose, in SDN-based implementation, the control plane must have a good knowledge of the network topology and the delay in the network to be able to schedule the traffic. In this paper, we propose a topology discovery mechanism for the Central Network Controller (CNC) in TSNs based on the Link Layer Discovery Protocol (LLDP) able to discover accurate link latency characteristics as required for time-aware scheduling without relying on external time synchronization protocols such as PTP. We evaluate its feasibility and assess its performance in terms of required bandwidth and achieved accuracy.
时间敏感网络(TSN)是IEEE 802.1时间敏感网络任务组[1]目前为网络中的实时行为定义的一组标准。软件定义网络(SDN)以其运行时灵活、管理优势、成本效益和性能等特点,为实现TSN网络提供了良好的解决方案。为了在TSN网络中实现实时行为,需要对高优先级流量进行精确调度,以满足其时间要求。为此,在基于sdn的实现中,控制平面必须很好地了解网络拓扑结构和网络时延,才能对流量进行调度。在本文中,我们提出了一种基于链路层发现协议(LLDP)的tsn中心网络控制器(CNC)拓扑发现机制,该机制能够发现时间感知调度所需的准确链路延迟特征,而不依赖于外部时间同步协议(如PTP)。我们评估了其可行性,并从所需带宽和实现精度方面评估了其性能。
{"title":"Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks","authors":"Sanaz Mohammadi, D. Colle, W. Tavernier","doi":"10.1109/NetSoft54395.2022.9844085","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844085","url":null,"abstract":"Time-Sensitive Networking (TSN) is a set of standards currently being defined by the IEEE 802.1 Time-Sensitive Networking Task Group [1] for Real-Time behavior in the network. Software-Defined Networking (SDN) provides a good solution for implementing TSN networks due to its characteristics such as run-time flexibility, benefits in management, cost efficiency, and performance. For achieving Real-Time behavior in TSN networks, the high-priority traffic should be scheduled precisely to fulfill its timing requirements. For this purpose, in SDN-based implementation, the control plane must have a good knowledge of the network topology and the delay in the network to be able to schedule the traffic. In this paper, we propose a topology discovery mechanism for the Central Network Controller (CNC) in TSNs based on the Link Layer Discovery Protocol (LLDP) able to discover accurate link latency characteristics as required for time-aware scheduling without relying on external time synchronization protocols such as PTP. We evaluate its feasibility and assess its performance in terms of required bandwidth and achieved accuracy.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive Clustering of Base Stations in 5GC-RAN using Cellular Traffic Prediction 基于蜂窝业务量预测的5GC-RAN中基站主动聚类
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844048
Mehul Sharma, Ujjwal Pawar, A. Franklin, T. B. Reddy
The rapid growth in mobile network traffic and dynamic user mobility patterns have propelled network operators toward the Cloud-Radio Access Network (C-RAN) to reduce operational costs and improve service quality. C-RAN handles the traffic and mobility issues in a centralized manner by segregating the central units (CUs) from the distributed units (DUs) in a shared CU pool. The ability of C-RAN to map multiple DUs to the same CU allows optimal coverage with high multiplexing gains, using the least number of CUs. However, dynamically mapping DUs to CUs is not trivial since the network traffic and mobility patterns are difficult to predict. This paper presents a two-phase framework for an optimal city-wide C-RAN network. In the first phase, we propose to use the ConvLSTM model, which simultaneously learns the hidden spatial and temporal dependencies in a real-world dataset and makes accurate traffic forecasts for a future duration of time. In the second phase, we use the predicted traffic from the first phase to develop a proactive optimal DU-CU clustering scheme that is cost-effective and meets quality objectives. We first formulate an optimization problem, and later, to reduce the computational complexity of the optimization, we propose a lightweight heuristic algorithm. Finally, we evaluate the performance of our prediction model and the mapping scheme using a two-month real-world mobile network dataset of Milan, Italy. Based on simulation results of phase one, we observe the ConvLSTM model, when deployed in a C-RAN architecture, outperforms existing state-of-the-art prediction models with up to 26% better RMSE (Root Mean Square Error) and up to 36% better MAPE (Mean Absolute Percentage Error) values. Similarly, in phase two, our simulation results show that compared to reactive threshold-based clustering, proactive clustering can reduce the average number of active CU servers by up to 18% every 10 minutes without overloading.
移动网络流量的快速增长和动态用户移动模式推动网络运营商向云-无线接入网(C-RAN)发展,以降低运营成本和提高服务质量。C-RAN通过将共享CU池中的中央单元(central unit)和分布式单元(distributed unit)隔离,以集中的方式处理流量和移动性问题。C-RAN将多个du映射到同一CU的能力允许使用最少数量的CU,以高复用增益实现最佳覆盖。然而,动态地将du映射到cu并非易事,因为网络流量和移动模式很难预测。本文提出了一种两阶段的最优全市C-RAN网络框架。在第一阶段,我们建议使用ConvLSTM模型,该模型同时学习真实数据集中隐藏的空间和时间依赖性,并对未来一段时间内的流量进行准确的预测。在第二阶段,我们使用第一阶段的预测流量来开发一种具有成本效益且满足质量目标的主动优化DU-CU集群方案。我们首先制定了一个优化问题,然后,为了降低优化的计算复杂度,我们提出了一个轻量级的启发式算法。最后,我们使用意大利米兰两个月的真实移动网络数据集评估了我们的预测模型和映射方案的性能。基于第一阶段的仿真结果,我们观察到,当部署在C-RAN架构中时,ConvLSTM模型优于现有的最先进的预测模型,RMSE(均方根误差)提高了26%,MAPE(平均绝对百分比误差)提高了36%。类似地,在第二阶段,我们的模拟结果表明,与基于响应性阈值的集群相比,主动集群每10分钟可以将活动CU服务器的平均数量减少18%,而不会出现过载。
{"title":"Proactive Clustering of Base Stations in 5GC-RAN using Cellular Traffic Prediction","authors":"Mehul Sharma, Ujjwal Pawar, A. Franklin, T. B. Reddy","doi":"10.1109/NetSoft54395.2022.9844048","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844048","url":null,"abstract":"The rapid growth in mobile network traffic and dynamic user mobility patterns have propelled network operators toward the Cloud-Radio Access Network (C-RAN) to reduce operational costs and improve service quality. C-RAN handles the traffic and mobility issues in a centralized manner by segregating the central units (CUs) from the distributed units (DUs) in a shared CU pool. The ability of C-RAN to map multiple DUs to the same CU allows optimal coverage with high multiplexing gains, using the least number of CUs. However, dynamically mapping DUs to CUs is not trivial since the network traffic and mobility patterns are difficult to predict. This paper presents a two-phase framework for an optimal city-wide C-RAN network. In the first phase, we propose to use the ConvLSTM model, which simultaneously learns the hidden spatial and temporal dependencies in a real-world dataset and makes accurate traffic forecasts for a future duration of time. In the second phase, we use the predicted traffic from the first phase to develop a proactive optimal DU-CU clustering scheme that is cost-effective and meets quality objectives. We first formulate an optimization problem, and later, to reduce the computational complexity of the optimization, we propose a lightweight heuristic algorithm. Finally, we evaluate the performance of our prediction model and the mapping scheme using a two-month real-world mobile network dataset of Milan, Italy. Based on simulation results of phase one, we observe the ConvLSTM model, when deployed in a C-RAN architecture, outperforms existing state-of-the-art prediction models with up to 26% better RMSE (Root Mean Square Error) and up to 36% better MAPE (Mean Absolute Percentage Error) values. Similarly, in phase two, our simulation results show that compared to reactive threshold-based clustering, proactive clustering can reduce the average number of active CU servers by up to 18% every 10 minutes without overloading.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128011821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting Segment Routing and SDN Features for Green Traffic Engineering 利用分段路由和SDN特性实现绿色交通工程
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844091
Chung-Horng Lung, Hesham Elbakoury
Energy efficiency for network devices becomes an important topic, as they consume a significantly amount of energy. Various techniques have been proposed to address energy-aware traffic engineering (TE), including Segment Routing (SR) and Software-defined Networking (SDN), which provide lower operational complexity and higher flexibility. However, existing approaches have not exploited some evolving SR and SDN features for efficient TE, e.g., path computation, sub-50 msec protection, and local/global segments. Consequently, those approaches result in higher complexity or extra overhead. This paper provides a holistic view of green TE using evolving SDN and SR-specific features without adding much additional computational tasks, and also considers SR segment processing overhead for energy efficiency. The proposed approach can simplify green TE by reusing SR features and improve energy efficiency and robustness.
由于网络设备消耗大量的能源,其能源效率成为一个重要的话题。已经提出了各种技术来解决能源感知流量工程(TE),包括段路由(SR)和软件定义网络(SDN),它们提供了更低的操作复杂性和更高的灵活性。然而,现有的方法并没有利用一些不断发展的SR和SDN特性来实现高效的TE,例如路径计算、低于50毫秒的保护和本地/全局段。因此,这些方法会导致更高的复杂性或额外的开销。本文提供了绿色TE的整体视图,使用不断发展的SDN和SR特定功能,而不增加太多额外的计算任务,并且还考虑了SR段处理开销以提高能源效率。该方法可以通过重用SR特征来简化绿色TE,并提高能源效率和鲁棒性。
{"title":"Exploiting Segment Routing and SDN Features for Green Traffic Engineering","authors":"Chung-Horng Lung, Hesham Elbakoury","doi":"10.1109/NetSoft54395.2022.9844091","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844091","url":null,"abstract":"Energy efficiency for network devices becomes an important topic, as they consume a significantly amount of energy. Various techniques have been proposed to address energy-aware traffic engineering (TE), including Segment Routing (SR) and Software-defined Networking (SDN), which provide lower operational complexity and higher flexibility. However, existing approaches have not exploited some evolving SR and SDN features for efficient TE, e.g., path computation, sub-50 msec protection, and local/global segments. Consequently, those approaches result in higher complexity or extra overhead. This paper provides a holistic view of green TE using evolving SDN and SR-specific features without adding much additional computational tasks, and also considers SR segment processing overhead for energy efficiency. The proposed approach can simplify green TE by reusing SR features and improve energy efficiency and robustness.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130913763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the data handling pipeline of the ASTRID framework 评估ASTRID框架的数据处理管道
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844122
M. Repetto, G. Lamanna
Effective attack detection and security analytics rely on the availability of timely and fine-grained information about the evolving context of the protected environment. The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing engines for analysis and correlation. Many Security Information and Event Management (SIEM) tools work according to the “funnel” principle: gather as much data as possible and then filter it to keep the relevant information. However, this might lead to unacceptable overhead, especially when monitoring containerized environments. As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker.
有效的攻击检测和安全分析依赖于有关受保护环境不断变化的上下文的及时和细粒度信息的可用性。数据处理过程包括从异构源收集数据,在传输之前进行本地聚合和转换操作,最后收集并交付给多个处理引擎进行分析和关联。许多安全信息和事件管理(SIEM)工具根据“漏斗”原则工作:收集尽可能多的数据,然后对其进行过滤以保留相关信息。然而,这可能导致不可接受的开销,特别是在监视容器化环境时。因此,作为ASTRID活动的一部分,我们对数据处理管道的资源消耗进行了实验性调查,从嵌入式代理开始,一直到传递到上下文代理。
{"title":"Evaluation of the data handling pipeline of the ASTRID framework","authors":"M. Repetto, G. Lamanna","doi":"10.1109/NetSoft54395.2022.9844122","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844122","url":null,"abstract":"Effective attack detection and security analytics rely on the availability of timely and fine-grained information about the evolving context of the protected environment. The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing engines for analysis and correlation. Many Security Information and Event Management (SIEM) tools work according to the “funnel” principle: gather as much data as possible and then filter it to keep the relevant information. However, this might lead to unacceptable overhead, especially when monitoring containerized environments. As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132855420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach 电网动态风险评估与认证:一种协作方法
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844034
Athanasios Liatifis, Pedro Ruzafa Alcazar, Panagiotis I. Radoglou-Grammatikis, Dimitrios Papamartzivanos, S. Menesidou, T. Krousarlis, Molinuevo Martin Alberto, Iñaki Angulo, Antonios Sarigiannidis, T. Lagkas, V. Argyriou, A. Gómez-Skarmeta, P. Sarigiannidis
The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures. Large-scale cyber attacks, such as Indostroyer and DragonFly have already demonstrated the weaknesses of the current electrical grid with disastrous consequences. Based on the aforementioned remarks, both academia and industry have already designed various cybersecurity standards, such as IEC 62351. However, dynamic risk assessment and certification remain crucial aspects, given the sensitive nature of the electrical grid. On the one hand, dynamic risk assessment intends to re-compute the risk value of the affected assets and their relationships in a dynamic manner based on the relevant security events and alarms. On the other hand, based on the certification process, new approach for the dynamic management of the security need to be defined in order to provide adaptive reaction to new threats. This paper presents a combined approach, showing how both aspects can be applied in a collaborative manner in the smart electrical grid.
典型电网的数字化带来了有价值的服务,如普适性控制、远程监控和自我修复。然而,考虑到能源部门与其他关键基础设施之间的相互依存关系,尽管有好处,但网络安全和隐私问题可能会导致毁灭性的影响,甚至是致命的事故。大规模的网络攻击,如Indostroyer和DragonFly,已经证明了当前电网的弱点,并带来了灾难性的后果。基于上述言论,学术界和工业界已经设计了各种网络安全标准,如IEC 62351。然而,考虑到电网的敏感性,动态风险评估和认证仍然是至关重要的方面。动态风险评估一方面是基于相关的安全事件和报警,以动态的方式重新计算受影响资产及其关系的风险值。另一方面,基于认证过程,需要定义安全动态管理的新方法,以便对新的威胁提供自适应的反应。本文提出了一种结合的方法,展示了如何在智能电网中以协作的方式应用这两个方面。
{"title":"Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach","authors":"Athanasios Liatifis, Pedro Ruzafa Alcazar, Panagiotis I. Radoglou-Grammatikis, Dimitrios Papamartzivanos, S. Menesidou, T. Krousarlis, Molinuevo Martin Alberto, Iñaki Angulo, Antonios Sarigiannidis, T. Lagkas, V. Argyriou, A. Gómez-Skarmeta, P. Sarigiannidis","doi":"10.1109/NetSoft54395.2022.9844034","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844034","url":null,"abstract":"The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures. Large-scale cyber attacks, such as Indostroyer and DragonFly have already demonstrated the weaknesses of the current electrical grid with disastrous consequences. Based on the aforementioned remarks, both academia and industry have already designed various cybersecurity standards, such as IEC 62351. However, dynamic risk assessment and certification remain crucial aspects, given the sensitive nature of the electrical grid. On the one hand, dynamic risk assessment intends to re-compute the risk value of the affected assets and their relationships in a dynamic manner based on the relevant security events and alarms. On the other hand, based on the certification process, new approach for the dynamic management of the security need to be defined in order to provide adaptive reaction to new threats. This paper presents a combined approach, showing how both aspects can be applied in a collaborative manner in the smart electrical grid.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Closed-Looped Automation for Service Assurance with the DxAgent 用DxAgent实现服务保证的闭环自动化
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844116
Korian Edeline, Thomas Carlisi, J. Iurman, B. Claise, B. Donnet
Recently, Intent-Based Networking (IBN) has known an increasing interest from both the industry and research communities. IBN comes with the advantage of easily expressing the desired state of a network. In parallel, service assurance, through observability, has been becoming more prevalent to maximize the business continuity. In that spirit, Service Assurance in Intent-based Networking (Sain), is under standardization at the IETF and proposes a general framework towards closed-loop automation for service assurance. This paper introduces the Diagnostic Agent (DxAgent), an open-source Sain implementation whose purpose is to determine symptoms and health levels of the different subservices of a network service. As such, the DxAgent appears as a first step towards closed-loop automation for service assurance. This paper describes the DxAgent implementation and demonstrates its efficiency through use cases.
最近,基于意图的网络(IBN)引起了工业界和研究界越来越多的兴趣。IBN的优点是可以很容易地表示期望的网络状态。与此同时,通过可观察性,服务保证也变得越来越普遍,以最大限度地提高业务连续性。本着这种精神,基于意图的网络中的服务保证(Sain)正在IETF进行标准化,并提出了一个实现服务保证闭环自动化的通用框架。本文介绍了诊断代理(DxAgent),这是一种开源的Sain实现,其目的是确定网络服务的不同子服务的症状和健康水平。因此,DxAgent是实现服务保证闭环自动化的第一步。本文描述了DxAgent的实现,并通过用例展示了它的效率。
{"title":"Towards a Closed-Looped Automation for Service Assurance with the DxAgent","authors":"Korian Edeline, Thomas Carlisi, J. Iurman, B. Claise, B. Donnet","doi":"10.1109/NetSoft54395.2022.9844116","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844116","url":null,"abstract":"Recently, Intent-Based Networking (IBN) has known an increasing interest from both the industry and research communities. IBN comes with the advantage of easily expressing the desired state of a network. In parallel, service assurance, through observability, has been becoming more prevalent to maximize the business continuity. In that spirit, Service Assurance in Intent-based Networking (Sain), is under standardization at the IETF and proposes a general framework towards closed-loop automation for service assurance. This paper introduces the Diagnostic Agent (DxAgent), an open-source Sain implementation whose purpose is to determine symptoms and health levels of the different subservices of a network service. As such, the DxAgent appears as a first step towards closed-loop automation for service assurance. This paper describes the DxAgent implementation and demonstrates its efficiency through use cases.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115393753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NETREACT: Distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing Pipelines 基于分组处理管道的传感器数据流分布式事件检测
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844106
Csaba Györgyi, Károly Kecskeméti, Hiba Mallouhi, Péter Vörös, S. Laki
A new phenomenon called in-network computing has recently emerged with the aim of offloading calculations beyond the traditional task of packet forwarding to network switches. One of the most studied in-network computing applications is processing of sensor data streams. Existing works such as FastReact focus on solving this problem using flexible SmartNICs. In this paper, we propose NETREACT: an improved ASIC-oriented design for distributed event detection in sensor data streams to achieve a disaggregated processing pipeline. In contrast to existing approaches, NETREACT distributes the event detection task among a set of switches while leveraging the capabilities of the Intel Tofino platform in terms of boosting throughput and reducing latency. The proposed event-rule disaggregation method has the advantage of overcoming the hardware resource constraints and improving the overall network performance.
最近出现了一种叫做网络内计算的新现象,其目的是将数据包转发的传统计算任务转移到网络交换机上。网络计算中研究最多的应用之一是传感器数据流的处理。现有的工作,如FastReact专注于使用灵活的smartnic来解决这个问题。在本文中,我们提出了NETREACT:一种改进的面向asic的设计,用于传感器数据流中的分布式事件检测,以实现分解处理管道。与现有方法相比,NETREACT在一组交换机之间分配事件检测任务,同时利用英特尔Tofino平台在提高吞吐量和减少延迟方面的功能。所提出的事件规则分解方法克服了硬件资源的限制,提高了网络的整体性能。
{"title":"NETREACT: Distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing Pipelines","authors":"Csaba Györgyi, Károly Kecskeméti, Hiba Mallouhi, Péter Vörös, S. Laki","doi":"10.1109/NetSoft54395.2022.9844106","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844106","url":null,"abstract":"A new phenomenon called in-network computing has recently emerged with the aim of offloading calculations beyond the traditional task of packet forwarding to network switches. One of the most studied in-network computing applications is processing of sensor data streams. Existing works such as FastReact focus on solving this problem using flexible SmartNICs. In this paper, we propose NETREACT: an improved ASIC-oriented design for distributed event detection in sensor data streams to achieve a disaggregated processing pipeline. In contrast to existing approaches, NETREACT distributes the event detection task among a set of switches while leveraging the capabilities of the Intel Tofino platform in terms of boosting throughput and reducing latency. The proposed event-rule disaggregation method has the advantage of overcoming the hardware resource constraints and improving the overall network performance.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
At the Edge? Wait no More: Immediate Placement of Time-Critical SFCs with VNF Sharing 在边缘?不再等待:使用VNF共享立即放置时间紧迫的sfc
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844068
Amir Mohamad, H. Hassanein
The increasing demand on real-time and time-critical applications such as augmented reality, virtual reality, collision avoidance and industrial IoT, is fuelled by the low-latency promised by next-generation mobile networks (5G). Time-critical applications and services are real-time software whose failure could result in catastrophic consequences such as fatalities, damage to property, even financial losses. Edge computing is the main enabler of 5G ultra-low latency use cases. Edge resources are limited compared to the abundant cloud computing resources. As such, provisioning time-critical applications at the edge is more challenging and demanding. Even though virtual network function (VNF) sharing improves the utilization of the service providers’ resources, service requests -including time-critical ones- can still be rejected due to insufficient resources. This paper proposes IPTSV, an immediate placement scheme for time-critical services with VNF sharing. The proposed scheme prioritizes time-critical premium (Pr) services over best-effort (BE) services. In cases when no resources are available for Pr services, a preemption mechanism preempts resources for the Pr service, by deporting one or more deployed BE services. The experimental results show that IPTSV can reduce the Pr services rejection rate to $sim 0%$, while minimizing the disturbance that BE services might witness such as prolonged waiting and turnaround times.
下一代移动网络(5G)承诺的低延迟推动了对增强现实、虚拟现实、防撞和工业物联网等实时和时间关键型应用日益增长的需求。时间关键型应用程序和服务是实时软件,其故障可能导致灾难性后果,如死亡、财产损坏,甚至经济损失。边缘计算是5G超低延迟用例的主要推动者。与丰富的云计算资源相比,边缘资源是有限的。因此,在边缘配置时间关键型应用程序更具挑战性和要求。尽管虚拟网络功能(VNF)共享提高了服务提供商的资源利用率,但服务请求(包括时间关键型请求)仍然可能因资源不足而被拒绝。本文提出了一种基于VNF共享的时间关键型业务的即时布局方案IPTSV。建议的方案优先考虑时间紧迫的收费服务,而不是最努力的服务。在没有资源可用于Pr服务的情况下,抢占机制通过导出一个或多个已部署的BE服务来抢占Pr服务的资源。实验结果表明,IPTSV可以将Pr业务的拒接率降低到0 %,同时最大限度地减少BE业务可能出现的等待时间和周转时间延长等干扰。
{"title":"At the Edge? Wait no More: Immediate Placement of Time-Critical SFCs with VNF Sharing","authors":"Amir Mohamad, H. Hassanein","doi":"10.1109/NetSoft54395.2022.9844068","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844068","url":null,"abstract":"The increasing demand on real-time and time-critical applications such as augmented reality, virtual reality, collision avoidance and industrial IoT, is fuelled by the low-latency promised by next-generation mobile networks (5G). Time-critical applications and services are real-time software whose failure could result in catastrophic consequences such as fatalities, damage to property, even financial losses. Edge computing is the main enabler of 5G ultra-low latency use cases. Edge resources are limited compared to the abundant cloud computing resources. As such, provisioning time-critical applications at the edge is more challenging and demanding. Even though virtual network function (VNF) sharing improves the utilization of the service providers’ resources, service requests -including time-critical ones- can still be rejected due to insufficient resources. This paper proposes IPTSV, an immediate placement scheme for time-critical services with VNF sharing. The proposed scheme prioritizes time-critical premium (Pr) services over best-effort (BE) services. In cases when no resources are available for Pr services, a preemption mechanism preempts resources for the Pr service, by deporting one or more deployed BE services. The experimental results show that IPTSV can reduce the Pr services rejection rate to $sim 0%$, while minimizing the disturbance that BE services might witness such as prolonged waiting and turnaround times.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An application of Netspot to Detect Anomalies in IoT Netspot在物联网异常检测中的应用
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844059
Tom Tuunainen, Olli Isohanni, Mitha Rachel Jose
In the world of Internet of Things (IoT) the increase in number of devices and their applications are increasingly diversified. In order to improve the overall security in IoT we need to emphasize the aspects of network traffic security. One way to monitor the network traffic is to detect network anomalies. In this study, we will examine the application of netspot to find the anomalies in IoT network traffic. Netspot is an implementation of the Streaming Peaks Over Threshold (SPOT) algorithm and this study proved that the anomalies can be identified through statistics that netspot calculates and monitor from the traffic of a low network activity. We examined that the tested solution is efficient and it can be used in environments that have moderate computing resources. After analyzing with SPOT algorithm, the result is purely statistical and it is minimal. This study also demonstrates some issues that have arisen when netspot is initialized in a network with low activities.
在物联网(IoT)世界中,设备数量的增加及其应用日益多样化。为了提高物联网的整体安全性,我们需要强调网络流量安全方面的问题。监控网络流量的一种方法是检测网络异常。在本研究中,我们将研究netspot的应用,以发现物联网网络流量中的异常情况。Netspot是流峰值超过阈值(SPOT)算法的实现,本研究证明,通过统计Netspot计算和监控低网络活动的流量,可以识别异常。我们检查了测试的解决方案是高效的,并且可以在具有中等计算资源的环境中使用。经过SPOT算法的分析,结果是纯统计的,并且是最小的。本研究还展示了在低活动网络中初始化netspot时出现的一些问题。
{"title":"An application of Netspot to Detect Anomalies in IoT","authors":"Tom Tuunainen, Olli Isohanni, Mitha Rachel Jose","doi":"10.1109/NetSoft54395.2022.9844059","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844059","url":null,"abstract":"In the world of Internet of Things (IoT) the increase in number of devices and their applications are increasingly diversified. In order to improve the overall security in IoT we need to emphasize the aspects of network traffic security. One way to monitor the network traffic is to detect network anomalies. In this study, we will examine the application of netspot to find the anomalies in IoT network traffic. Netspot is an implementation of the Streaming Peaks Over Threshold (SPOT) algorithm and this study proved that the anomalies can be identified through statistics that netspot calculates and monitor from the traffic of a low network activity. We examined that the tested solution is efficient and it can be used in environments that have moderate computing resources. After analyzing with SPOT algorithm, the result is purely statistical and it is minimal. This study also demonstrates some issues that have arisen when netspot is initialized in a network with low activities.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Caching SFC Proxy Based on eBPF 基于eBPF的缓存SFC代理
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844051
Marco Häberle, Benjamin Steinert, Michael Weiss, M. Menth
Service Functions (SFs) are intermediate processing nodes on the path of IP packets. With SF chaining (SFC), packets can be steered to multiple physical or virtual SFs in a specific order. SFC-unaware SFs can be used flexibly but they do not support SFC-specific encapsulation of packets. Therefore, an SFC proxy needs to remove the encapsulation of a packet before processing by an SFC-unaware SF, and to add it again afterwards. Such an SFC proxy typically runs on a server hosting virtual network functions (VNFs) that serve as SFs. Simple SFC proxies adapt a flow-specific static header stack. That is, each VNF requires an own SFC proxy, and the proxy cannot be extended to support per-packet metadata in the SFC encapsulation. The caching SFC proxy presented in this work caches packet-specific headers while packets are processed by a VNF, i.e., packet-specific header information is preserved. We present concept, use cases, and an eBPF-based implementation of the caching SFC proxy. In addition, we evaluate the performance of a prototype.
sf (Service function)是IP报文路径上的中间处理节点。通过SF链(SFC),数据包可以按照特定的顺序被引导到多个物理或虚拟SF。不支持sfc的SFs可以灵活使用,但不支持sfc特定的数据包封装。因此,在不支持SFC的SF处理报文之前,SFC代理需要先去掉报文的封装,然后再添加。这种SFC代理通常运行在托管充当SFs的虚拟网络功能(VNFs)的服务器上。简单的SFC代理适应特定于流的静态报头堆栈。也就是说,每个VNF需要一个自己的SFC代理,并且代理不能扩展到支持SFC封装中的逐包元数据。本工作中提出的缓存SFC代理在VNF处理数据包时缓存特定于数据包的报头,即保留特定于数据包的报头信息。我们提出了缓存SFC代理的概念、用例和基于ebpf的实现。此外,我们还评估了原型的性能。
{"title":"A Caching SFC Proxy Based on eBPF","authors":"Marco Häberle, Benjamin Steinert, Michael Weiss, M. Menth","doi":"10.1109/NetSoft54395.2022.9844051","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844051","url":null,"abstract":"Service Functions (SFs) are intermediate processing nodes on the path of IP packets. With SF chaining (SFC), packets can be steered to multiple physical or virtual SFs in a specific order. SFC-unaware SFs can be used flexibly but they do not support SFC-specific encapsulation of packets. Therefore, an SFC proxy needs to remove the encapsulation of a packet before processing by an SFC-unaware SF, and to add it again afterwards. Such an SFC proxy typically runs on a server hosting virtual network functions (VNFs) that serve as SFs. Simple SFC proxies adapt a flow-specific static header stack. That is, each VNF requires an own SFC proxy, and the proxy cannot be extended to support per-packet metadata in the SFC encapsulation. The caching SFC proxy presented in this work caches packet-specific headers while packets are processed by a VNF, i.e., packet-specific header information is preserved. We present concept, use cases, and an eBPF-based implementation of the caching SFC proxy. In addition, we evaluate the performance of a prototype.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1