首页 > 最新文献

2017 13th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Network slice embedding under traffic uncertainties — A light robust approach 流量不确定性下的网络切片嵌入——一种轻鲁棒方法
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256039
Andreas Baumgartner, T. Bauschert, Abdul A. Blzarour, Varun S. Reddy
5G networks are conceived to be highly flexible and programmable end-to-end connect-and-compute infrastructures. In that context, the concept of network slicing is of particular importance [1]. From a network infrastructure point of view, network slicing refers to the provisioning and assignment of physical substrate network resources to tenants. To enable an efficient resource allocation, suitable optimization models are required. In our previous contributions [2], we presented a model that takes into account traffic uncertainty by using the well known concept of Γ-robustness. We further extended this model to cope with general network slices and to consider also single substrate link and node failures [3]. In this paper, we present a novel model applying the concept of light robustness [4] [5] to address scalability issues of our previous models and to get a deeper insight into the tradeoff between the price of robustness and the realized robustness. We compare our model with a nominal and Γ-robust approach for different scenarios using network topology examples from SNDlib [6].
5G网络被认为是高度灵活和可编程的端到端连接和计算基础设施。在这种情况下,网络切片的概念尤为重要。从网络基础设施的角度来看,网络切片指的是为租户提供和分配物理基板网络资源。为了实现有效的资源分配,需要合适的优化模型。在我们之前的文章[2]中,我们提出了一个模型,该模型通过使用众所周知的Γ-robustness概念来考虑流量的不确定性。我们进一步扩展了该模型,以处理一般的网络切片,并考虑单衬底链路和节点故障[3]。在本文中,我们提出了一个应用轻鲁棒性b[4][5]概念的新模型,以解决我们以前模型的可扩展性问题,并更深入地了解鲁棒性价格与实现鲁棒性之间的权衡。我们使用来自SNDlib[6]的网络拓扑示例,将我们的模型与标称方法和Γ-robust方法进行比较,以适应不同的场景。
{"title":"Network slice embedding under traffic uncertainties — A light robust approach","authors":"Andreas Baumgartner, T. Bauschert, Abdul A. Blzarour, Varun S. Reddy","doi":"10.23919/CNSM.2017.8256039","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256039","url":null,"abstract":"5G networks are conceived to be highly flexible and programmable end-to-end connect-and-compute infrastructures. In that context, the concept of network slicing is of particular importance [1]. From a network infrastructure point of view, network slicing refers to the provisioning and assignment of physical substrate network resources to tenants. To enable an efficient resource allocation, suitable optimization models are required. In our previous contributions [2], we presented a model that takes into account traffic uncertainty by using the well known concept of Γ-robustness. We further extended this model to cope with general network slices and to consider also single substrate link and node failures [3]. In this paper, we present a novel model applying the concept of light robustness [4] [5] to address scalability issues of our previous models and to get a deeper insight into the tradeoff between the price of robustness and the realized robustness. We compare our model with a nominal and Γ-robust approach for different scenarios using network topology examples from SNDlib [6].","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Agent composition for 5G management and orchestration 用于5G管理和业务流程的代理组合
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255979
V. Räisänen
Virtualized execution environments in 5G network call for a linkage between network management and orchestration. Execution of 3GPP functionalities and management applications in the cloud also presents an opportunity to innovate outside of traditional paradigms. We describe a framework focusing on a virtual execution environment and utilizing agent composition to serve as a platform for realizations with particular goals — for example — in terms of coordination. The framework allows for focusing on the opportunities provided with cloud environment and microservices-based agent composition, and describing relevant aspects of orchestration, while avoiding aspects of orchestration which would bring unnecessary complexity to the analysis. The framework is planned to be used as a basis for research demonstrator later on for implementing 5G use cases.
5G网络中的虚拟化执行环境要求网络管理和业务流程之间的联动。在云中执行3GPP功能和管理应用程序也提供了在传统范例之外进行创新的机会。我们描述了一个专注于虚拟执行环境的框架,并利用代理组合作为实现特定目标(例如,在协调方面)的平台。该框架允许将重点放在云环境和基于微服务的代理组合所提供的机会上,并描述编排的相关方面,同时避免编排方面会给分析带来不必要的复杂性。计划将该框架用作以后实施5G用例的研究演示的基础。
{"title":"Agent composition for 5G management and orchestration","authors":"V. Räisänen","doi":"10.23919/CNSM.2017.8255979","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255979","url":null,"abstract":"Virtualized execution environments in 5G network call for a linkage between network management and orchestration. Execution of 3GPP functionalities and management applications in the cloud also presents an opportunity to innovate outside of traditional paradigms. We describe a framework focusing on a virtual execution environment and utilizing agent composition to serve as a platform for realizations with particular goals — for example — in terms of coordination. The framework allows for focusing on the opportunities provided with cloud environment and microservices-based agent composition, and describing relevant aspects of orchestration, while avoiding aspects of orchestration which would bring unnecessary complexity to the analysis. The framework is planned to be used as a basis for research demonstrator later on for implementing 5G use cases.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing the availability of VNFs with the availability management framework 使用可用性管理框架管理VNFs的可用性
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256032
Pradheba C. Rangarajan, F. Khendek, M. Toeroe
A Virtualized Network Function (VNF) is deployed as a cluster of VMs in the Network Functions Virtualization Infrastructure (NFVI). As in traditional telecom, VNFs are expected to provide the required functions at the requested level of availability. For this, one has to incorporate proper redundancy, and appropriate recovery and coordination mechanisms among the redundant entities. The Service Availability Forum (SA Forum) has standardized such mechanisms into a set of middleware services. Among them, the Availability Management Framework (AMF) has the responsibility of managing the availability of application services based on a configuration, called AMF configuration. We propose the use of AMF to manage the availability of the services provided by VNFs. For this, we map the AMF concepts to the Network Function Virtualization (NFV) domain and propose a method for the generation of AMF configurations for AMF managed VNFs. The approach generates an AMF configuration that meets the required level of availability of the requested service workload while aims at maximizing the resource utilization.
VNF (virtual Network Function)在NFVI (Network Functions Virtualization Infrastructure)中以虚拟机集群的形式部署。与传统电信一样,期望vnf在所需的可用性级别上提供所需的功能。为此,必须在冗余实体之间合并适当的冗余以及适当的恢复和协调机制。服务可用性论坛(SA Forum)已经将这些机制标准化为一组中间件服务。其中,可用性管理框架(AMF)负责根据称为AMF配置的配置管理应用程序服务的可用性。我们建议使用AMF来管理vnf提供的服务的可用性。为此,我们将AMF概念映射到网络功能虚拟化(NFV)领域,并提出了一种为AMF管理的vnf生成AMF配置的方法。该方法生成一个AMF配置,该配置满足所请求服务工作负载所需的可用性级别,同时旨在最大化资源利用率。
{"title":"Managing the availability of VNFs with the availability management framework","authors":"Pradheba C. Rangarajan, F. Khendek, M. Toeroe","doi":"10.23919/CNSM.2017.8256032","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256032","url":null,"abstract":"A Virtualized Network Function (VNF) is deployed as a cluster of VMs in the Network Functions Virtualization Infrastructure (NFVI). As in traditional telecom, VNFs are expected to provide the required functions at the requested level of availability. For this, one has to incorporate proper redundancy, and appropriate recovery and coordination mechanisms among the redundant entities. The Service Availability Forum (SA Forum) has standardized such mechanisms into a set of middleware services. Among them, the Availability Management Framework (AMF) has the responsibility of managing the availability of application services based on a configuration, called AMF configuration. We propose the use of AMF to manage the availability of the services provided by VNFs. For this, we map the AMF concepts to the Network Function Virtualization (NFV) domain and propose a method for the generation of AMF configurations for AMF managed VNFs. The approach generates an AMF configuration that meets the required level of availability of the requested service workload while aims at maximizing the resource utilization.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fill-in the gaps: Spatial-temporal models for missing data 填补空白:缺失数据的时空模型
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255983
Ji Xue, Bin Nie, E. Smirni
Effective workload characterization and prediction are instrumental for efficiently and proactively managing large systems. System management primarily relies on the workload information provided by underlying system tracing mechanisms that record system-related events in log files. However, such tracing mechanisms may temporarily fail due to various reasons, yielding “holes” in data traces. This missing data phenomenon significantly impedes the effectiveness of data analysis. In this paper, we study real-world data traces collected from over 80K virtual machines (VMs) hosted on 6K physical boxes in the data centers of a service provider. We discover that the usage series of VMs co-located on the same physical box exhibit strong correlation with one another, and that most VM usage series show temporal patterns. By taking advantage of the observed spatial and temporal dependencies, we propose a data-filling method to predict the missing data in the VM usage series. Detailed evaluation using trace data in the wild shows that the proposed method is sufficiently accurate as it achieves an average of 20% absolute percentage errors. We also illustrate its usefulness via a use case.
有效的工作负载表征和预测有助于有效和主动地管理大型系统。系统管理主要依赖底层系统跟踪机制提供的工作负载信息,这些机制在日志文件中记录与系统相关的事件。然而,这种跟踪机制可能会由于各种原因暂时失败,从而在数据跟踪中产生“漏洞”。这种数据缺失现象严重影响了数据分析的有效性。在本文中,我们研究了从托管在服务提供商数据中心的6K物理盒上的80K多个虚拟机(vm)收集的真实数据跟踪。我们发现位于同一物理盒上的VM的使用序列彼此之间表现出很强的相关性,并且大多数VM使用序列显示出时间模式。通过利用观察到的空间和时间依赖性,我们提出了一种数据填充方法来预测VM使用序列中的缺失数据。使用野外跟踪数据的详细评估表明,所提出的方法足够准确,因为它达到了平均20%的绝对百分比误差。我们还通过一个用例说明了它的有用性。
{"title":"Fill-in the gaps: Spatial-temporal models for missing data","authors":"Ji Xue, Bin Nie, E. Smirni","doi":"10.23919/CNSM.2017.8255983","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255983","url":null,"abstract":"Effective workload characterization and prediction are instrumental for efficiently and proactively managing large systems. System management primarily relies on the workload information provided by underlying system tracing mechanisms that record system-related events in log files. However, such tracing mechanisms may temporarily fail due to various reasons, yielding “holes” in data traces. This missing data phenomenon significantly impedes the effectiveness of data analysis. In this paper, we study real-world data traces collected from over 80K virtual machines (VMs) hosted on 6K physical boxes in the data centers of a service provider. We discover that the usage series of VMs co-located on the same physical box exhibit strong correlation with one another, and that most VM usage series show temporal patterns. By taking advantage of the observed spatial and temporal dependencies, we propose a data-filling method to predict the missing data in the VM usage series. Detailed evaluation using trace data in the wild shows that the proposed method is sufficiently accurate as it achieves an average of 20% absolute percentage errors. We also illustrate its usefulness via a use case.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A software-defined firewall bypass for congestion offloading 用于阻塞卸载的软件定义防火墙旁路
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255971
Florian Heimgaertner, Mark T. Schmidt, David Morgenstern, M. Menth
With increasing network bandwidths, stateful firewalls are likely to become communication bottlenecks in networks. To mitigate this problem, we propose to bypass selected traffic around firewalls using software-defined networking (SDN). We discuss various approaches and elaborate the following concept. A controller samples outgoing packets at the firewall using sFlow to detect congestion. In case of congestion, flows already admitted by the firewall are identified and offloaded at an appropriate rate by installing flow-specific bypass rules on an OpenFlow-capable switch. We suggest two different algorithms to select appropriate flows and provide a proof-of-concept implementation in a network testbed using the Ryu controller framework. Experimental results illustrate the system behavior at different load levels with and without offloading. We provide an analytical system model to predict the offloading performance for other system parameters than experimentally evaluated and validate the model with our experimental results. A parameter study suggests that the offloaded traffic rate may be a multiple of the firewall's capacity if the switch supports sufficient flow rules or is able to match for TCP flags.
随着网络带宽的增加,有状态防火墙很可能成为网络中的通信瓶颈。为了缓解这个问题,我们建议使用软件定义网络(SDN)绕过防火墙周围的选定流量。我们将讨论各种方法,并详细阐述以下概念。控制器使用sFlow对防火墙的出站数据包进行采样以检测拥塞。在拥塞的情况下,已经被防火墙接受的流量被识别出来,并通过在具有openflow功能的交换机上安装特定于流量的绕过规则,以适当的速率卸载。我们建议使用两种不同的算法来选择合适的流,并在使用Ryu控制器框架的网络测试平台中提供概念验证实现。实验结果说明了在卸载和不卸载时系统在不同负载水平下的行为。我们提供了一个分析系统模型来预测其他系统参数的卸载性能,而不是实验评估,并用我们的实验结果验证了模型。一项参数研究表明,如果交换机支持足够的流规则或能够匹配TCP标志,则卸载的流量速率可能是防火墙容量的倍数。
{"title":"A software-defined firewall bypass for congestion offloading","authors":"Florian Heimgaertner, Mark T. Schmidt, David Morgenstern, M. Menth","doi":"10.23919/CNSM.2017.8255971","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255971","url":null,"abstract":"With increasing network bandwidths, stateful firewalls are likely to become communication bottlenecks in networks. To mitigate this problem, we propose to bypass selected traffic around firewalls using software-defined networking (SDN). We discuss various approaches and elaborate the following concept. A controller samples outgoing packets at the firewall using sFlow to detect congestion. In case of congestion, flows already admitted by the firewall are identified and offloaded at an appropriate rate by installing flow-specific bypass rules on an OpenFlow-capable switch. We suggest two different algorithms to select appropriate flows and provide a proof-of-concept implementation in a network testbed using the Ryu controller framework. Experimental results illustrate the system behavior at different load levels with and without offloading. We provide an analytical system model to predict the offloading performance for other system parameters than experimentally evaluated and validate the model with our experimental results. A parameter study suggests that the offloaded traffic rate may be a multiple of the firewall's capacity if the switch supports sufficient flow rules or is able to match for TCP flags.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive traffic monitoring for software dataplanes 软件数据平面的自适应流量监控
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255988
Gioacchino Tangari, M. Charalambides, D. Tuncer, G. Pavlou
Network operators have recently been developing multi-Gbps traffic monitoring tools that execute on commodity hardware and are part of the packet-processing pipelines realizing software dataplanes. These solutions allow sophisticated tasks to be performed on a per-packet basis, without relying on sampling or passive trace analysis, by leveraging the processing power available on servers. Although advances in packet capture have enabled intercepting packets from network cards at high rates, bottlenecks can still arise in the monitoring process as a result of concurrent access to shared processor resources, variations of the traffic skew, and unbalanced packet-rate spikes. In this paper we present an adaptive traffic monitoring approach that copes with emerging bottlenecks by timely detecting changes in the operational conditions and reconfiguring monitoring-related operations for subsets of traffic flows. Our solution performs responsive adaptations at the time scale of milliseconds and does not require a significant amount of resources. To demonstrate the capabilities of our approach we implemented it as part of a generic packet-processing pipeline and show that lossless traffic monitoring can be achieved for a wide range of conditions.
网络运营商最近一直在开发在商用硬件上执行的多gbps流量监控工具,这些工具是实现软件数据平面的数据包处理管道的一部分。这些解决方案允许在每个数据包的基础上执行复杂的任务,而不依赖于采样或被动跟踪分析,通过利用服务器上可用的处理能力。尽管数据包捕获技术的进步使得能够以较高的速率拦截来自网卡的数据包,但是由于对共享处理器资源的并发访问、流量倾斜的变化以及不平衡的数据包速率峰值,监控过程中仍然可能出现瓶颈。在本文中,我们提出了一种自适应交通监控方法,该方法通过及时检测运行条件的变化和重新配置交通流子集的监控相关操作来应对新出现的瓶颈。我们的解决方案在毫秒级的时间尺度上执行响应性调整,并且不需要大量的资源。为了演示我们的方法的功能,我们将其作为通用数据包处理管道的一部分实现,并表明可以在广泛的条件下实现无损流量监控。
{"title":"Adaptive traffic monitoring for software dataplanes","authors":"Gioacchino Tangari, M. Charalambides, D. Tuncer, G. Pavlou","doi":"10.23919/CNSM.2017.8255988","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255988","url":null,"abstract":"Network operators have recently been developing multi-Gbps traffic monitoring tools that execute on commodity hardware and are part of the packet-processing pipelines realizing software dataplanes. These solutions allow sophisticated tasks to be performed on a per-packet basis, without relying on sampling or passive trace analysis, by leveraging the processing power available on servers. Although advances in packet capture have enabled intercepting packets from network cards at high rates, bottlenecks can still arise in the monitoring process as a result of concurrent access to shared processor resources, variations of the traffic skew, and unbalanced packet-rate spikes. In this paper we present an adaptive traffic monitoring approach that copes with emerging bottlenecks by timely detecting changes in the operational conditions and reconfiguring monitoring-related operations for subsets of traffic flows. Our solution performs responsive adaptations at the time scale of milliseconds and does not require a significant amount of resources. To demonstrate the capabilities of our approach we implemented it as part of a generic packet-processing pipeline and show that lossless traffic monitoring can be achieved for a wide range of conditions.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
vFetch: Video prefetching using pseudo subscriptions and user channel affinity in YouTube vFetch:视频预取使用伪订阅和用户通道亲和在YouTube
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256011
Christian Koch, Benedikt Lins, Amr Rizk, R. Steinmetz, D. Hausheer
Video streaming is responsible for the largest portion of traffic in fixed and mobile networks. Yet, forecasts expect this amount to grow further. Especially for mobile devices connected to cellular networks, high QoE video streaming can be a challenge as the user data volume is metered and eventually limited. Also, the connection quality may vary severely. Prefetching videos is an approach to mitigate this issue. Here, videos that the user is likely to watch in advance are prefetched on the user's smartphone, e.g., while he is connected to WiFi. However, this approach can only be efficient if only the videos that are interesting for the respective user are prefetched. This constitutes a major estimation and prediction challenge. To this end, this paper presents three contributions: First, a user study over multiple months that draws valuable insights on the user video request behavior. Second, we propose a novel privacy-preserving prefetching framework denoted vFetch that prefetches videos based, e.g., on the user's affinity of YouTube channels. Third, a trace-based evaluation and parameter study that demonstrates vFetch's efficiency with a hit rate of ∼50% for a 50 GB cache.
视频流占固定和移动网络流量的最大份额。然而,预测预计这一数字将进一步增长。特别是对于连接到蜂窝网络的移动设备,高QoE视频流可能是一个挑战,因为用户数据量是计量的,最终是有限的。此外,连接质量可能会有很大差异。预取视频是缓解这个问题的一种方法。在这里,用户可能会提前观看的视频会在用户的智能手机上预取,例如,当用户连接WiFi时。然而,这种方法只有在预取各自用户感兴趣的视频时才能有效。这构成了一个主要的估计和预测挑战。为此,本文提出了三个贡献:首先,对用户视频请求行为进行了为期数月的用户研究,得出了有价值的见解。其次,我们提出了一种新的隐私保护预取框架,称为vFetch,它基于用户对YouTube频道的亲和力来预取视频。第三,基于跟踪的评估和参数研究证明了vFetch的效率,对于50gb缓存的命中率为50%。
{"title":"vFetch: Video prefetching using pseudo subscriptions and user channel affinity in YouTube","authors":"Christian Koch, Benedikt Lins, Amr Rizk, R. Steinmetz, D. Hausheer","doi":"10.23919/CNSM.2017.8256011","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256011","url":null,"abstract":"Video streaming is responsible for the largest portion of traffic in fixed and mobile networks. Yet, forecasts expect this amount to grow further. Especially for mobile devices connected to cellular networks, high QoE video streaming can be a challenge as the user data volume is metered and eventually limited. Also, the connection quality may vary severely. Prefetching videos is an approach to mitigate this issue. Here, videos that the user is likely to watch in advance are prefetched on the user's smartphone, e.g., while he is connected to WiFi. However, this approach can only be efficient if only the videos that are interesting for the respective user are prefetched. This constitutes a major estimation and prediction challenge. To this end, this paper presents three contributions: First, a user study over multiple months that draws valuable insights on the user video request behavior. Second, we propose a novel privacy-preserving prefetching framework denoted vFetch that prefetches videos based, e.g., on the user's affinity of YouTube channels. Third, a trace-based evaluation and parameter study that demonstrates vFetch's efficiency with a hit rate of ∼50% for a 50 GB cache.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capacity optimization for ultra-reliable low-latency communication in 5G — The SON perspective 5G超可靠低延迟通信的容量优化——SON视角
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255978
Elke Roth-Mandutz, Abubaker-Matovu Waswa, A. Mitschele-Thiel
Towards 5G, the challenge to achieve high reliability and low latency asks for new directions in systems so far strongly focusing on high data rates. Schemes to achieve high reliability for low latency demanding services are link diversity to ensure reliability and resource reservation to avoid scheduling delays. However, these schemes place high demands on the scarce radio resources. In this paper we propose a self-optimized approach on the network management level to minimize the capacity impact for ultra-reliable low latency communication (URLLC) services. The idea of the new URLLC Self-Organized Network (SON) is to provide optimized sets of parameters derived from the respective service requirements and the current conditions in the network. We discuss Network Management (NM) parameters regarding their impact on URLLC and present a structure, which allows a fast selection of the appropriate parameter set. One focus is on device-to-device (D2D) communication, which has a high potential to meet both, the reliability and latency requirements. An initial study on radio resource reuse indicates a promising gain in network capacity, while D2D reuses the same resources as the cellular users in the network.
对于5G,实现高可靠性和低延迟的挑战要求迄今为止强烈关注高数据速率的系统有新的方向。对于低时延要求的业务,实现高可靠性的方案包括保证可靠性的链路分集方案和避免调度延迟的资源预留方案。然而,这些方案对稀缺的无线电资源提出了很高的要求。在本文中,我们提出了一种网络管理层面的自优化方法,以最大限度地减少对超可靠低延迟通信(URLLC)服务的容量影响。新的URLLC自组织网络(SON)的思想是根据各自的业务需求和网络中的当前条件提供优化的参数集。我们讨论了网络管理(NM)参数对URLLC的影响,并给出了一个结构,该结构允许快速选择适当的参数集。其中一个重点是设备到设备(D2D)通信,它很有可能同时满足可靠性和延迟需求。对无线资源复用的初步研究表明,在D2D复用网络中与蜂窝用户复用相同的资源时,有希望获得网络容量。
{"title":"Capacity optimization for ultra-reliable low-latency communication in 5G — The SON perspective","authors":"Elke Roth-Mandutz, Abubaker-Matovu Waswa, A. Mitschele-Thiel","doi":"10.23919/CNSM.2017.8255978","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255978","url":null,"abstract":"Towards 5G, the challenge to achieve high reliability and low latency asks for new directions in systems so far strongly focusing on high data rates. Schemes to achieve high reliability for low latency demanding services are link diversity to ensure reliability and resource reservation to avoid scheduling delays. However, these schemes place high demands on the scarce radio resources. In this paper we propose a self-optimized approach on the network management level to minimize the capacity impact for ultra-reliable low latency communication (URLLC) services. The idea of the new URLLC Self-Organized Network (SON) is to provide optimized sets of parameters derived from the respective service requirements and the current conditions in the network. We discuss Network Management (NM) parameters regarding their impact on URLLC and present a structure, which allows a fast selection of the appropriate parameter set. One focus is on device-to-device (D2D) communication, which has a high potential to meet both, the reliability and latency requirements. An initial study on radio resource reuse indicates a promising gain in network capacity, while D2D reuses the same resources as the cellular users in the network.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114936812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Scalability and reliability aware SDN controller placement strategies 可扩展性和可靠性感知的SDN控制器放置策略
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255989
Fetia Bannour, Sami Souihi, A. Mellouk
The decoupling of control and data planes in Software-Defined Networking (SDN) brings benefits in terms of logically centralized control and application programming. But, the single point of management in physically centralized SDN architectures is a potential point of failure and a bottleneck that compromises network reliability and performance. Such centralized designs may also face scalability challenges especially in networks with a large number of hosts (e.g. IoT-like networks). To avoid such concerns, SDN control architectures are usually designed as physically distributed systems. This raises practical challenges about the best approach to decentralizing the control plane while maintaining the logically centralized network view. In particular, determining the number of controllers and locating them in the network is a hard task that should be addressed appropriately. This paper proposes two novel strategies that cover different aspects of the controller placement problem with respect to performance and reliability criteria. These strategies use two types of heuristics that are compared and assessed on large-scale topologies to provide operators with guidelines on how to find their optimal controller placement that meets their specific needs.
软件定义网络(SDN)中控制平面和数据平面的解耦在逻辑集中控制和应用程序编程方面带来了好处。但是,在物理集中式SDN体系结构中,单点管理是一个潜在的故障点和瓶颈,会损害网络的可靠性和性能。这种集中式设计也可能面临可扩展性的挑战,特别是在具有大量主机的网络中(例如物联网网络)。为了避免这些问题,SDN控制体系结构通常被设计为物理分布式系统。这就提出了关于在保持逻辑上集中的网络视图的同时分散控制平面的最佳方法的实际挑战。特别是,确定控制器的数量并在网络中定位它们是一项艰巨的任务,应该适当地加以解决。本文提出了两种新颖的策略,涵盖了与性能和可靠性标准相关的控制器放置问题的不同方面。这些策略使用两种类型的启发式方法,在大规模拓扑上进行比较和评估,为操作员提供如何找到满足其特定需求的最佳控制器位置的指导。
{"title":"Scalability and reliability aware SDN controller placement strategies","authors":"Fetia Bannour, Sami Souihi, A. Mellouk","doi":"10.23919/CNSM.2017.8255989","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255989","url":null,"abstract":"The decoupling of control and data planes in Software-Defined Networking (SDN) brings benefits in terms of logically centralized control and application programming. But, the single point of management in physically centralized SDN architectures is a potential point of failure and a bottleneck that compromises network reliability and performance. Such centralized designs may also face scalability challenges especially in networks with a large number of hosts (e.g. IoT-like networks). To avoid such concerns, SDN control architectures are usually designed as physically distributed systems. This raises practical challenges about the best approach to decentralizing the control plane while maintaining the logically centralized network view. In particular, determining the number of controllers and locating them in the network is a hard task that should be addressed appropriately. This paper proposes two novel strategies that cover different aspects of the controller placement problem with respect to performance and reliability criteria. These strategies use two types of heuristics that are compared and assessed on large-scale topologies to provide operators with guidelines on how to find their optimal controller placement that meets their specific needs.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":" 108","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On demand QoS with a SDN traffic engineering management (STEM) module 基于SDN流量工程管理(STEM)模块的按需QoS
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256052
C. Morin, Géraldine Texier, Cao-Thanh Phan
Software Defined Networking (SDN) allows new approaches to provide Quality of Service (QoS). In legacy networks, strict QoS guarantees often result in bandwidth over-provisioning. Then, QoS enforcement either consumes too many resources, or is not flexible enough. We present a solution to provide QoS based on the creation of on-demand MPLS tunnels with guaranteed bandwidths across an SDN network. We introduce an SDN Traffic Engineering Management (STEM) module that interacts with the northbound applications to satisfy their requests to forward QoS-guaranteed traffic flows. STEM delegates the path selection to a Path Computation Element (PCE), and the path enforcement to an SDN controller. We rely on a stateful PCE to record the attributed resources and estimate the remaining network capacity, avoiding overloading the network with monitoring traffic. Upon STEM requests, the SDN controller enforces the QoS policy in the data plane. User flows are aggregated into MPLS tunnels and packets are labeled with a priority depending on the flow effective bandwidth. We highlight the shortfalls of several material and software OpenFlow compatible switches and detail an implementation based on a pica8 switch to overcome them. The experimental results demonstrate that this solution efficiently enforces bandwidth sharing in SDN networks.
软件定义网络(SDN)提供了提供服务质量(QoS)的新方法。在传统网络中,严格的QoS保证通常会导致带宽供应过剩。然后,QoS实施要么消耗太多资源,要么不够灵活。我们提出了一种基于创建按需MPLS隧道的解决方案,该隧道具有跨SDN网络的保证带宽。我们引入了SDN流量工程管理(STEM)模块,该模块与北向应用程序交互,以满足它们转发qos保证的流量流的请求。STEM将路径选择委托给路径计算元素(PCE),并将路径执行委托给SDN控制器。我们依靠有状态PCE来记录已归属的资源并估计剩余的网络容量,避免因监控流量而使网络过载。SDN控制器根据STEM请求在数据平面实施QoS策略。将用户流聚合到MPLS隧道中,根据流量的有效带宽对报文进行优先级标记。我们强调了几种材料和软件OpenFlow兼容开关的不足之处,并详细介绍了基于pica8开关的实现来克服它们。实验结果表明,该方案有效地实现了SDN网络的带宽共享。
{"title":"On demand QoS with a SDN traffic engineering management (STEM) module","authors":"C. Morin, Géraldine Texier, Cao-Thanh Phan","doi":"10.23919/CNSM.2017.8256052","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256052","url":null,"abstract":"Software Defined Networking (SDN) allows new approaches to provide Quality of Service (QoS). In legacy networks, strict QoS guarantees often result in bandwidth over-provisioning. Then, QoS enforcement either consumes too many resources, or is not flexible enough. We present a solution to provide QoS based on the creation of on-demand MPLS tunnels with guaranteed bandwidths across an SDN network. We introduce an SDN Traffic Engineering Management (STEM) module that interacts with the northbound applications to satisfy their requests to forward QoS-guaranteed traffic flows. STEM delegates the path selection to a Path Computation Element (PCE), and the path enforcement to an SDN controller. We rely on a stateful PCE to record the attributed resources and estimate the remaining network capacity, avoiding overloading the network with monitoring traffic. Upon STEM requests, the SDN controller enforces the QoS policy in the data plane. User flows are aggregated into MPLS tunnels and packets are labeled with a priority depending on the flow effective bandwidth. We highlight the shortfalls of several material and software OpenFlow compatible switches and detail an implementation based on a pica8 switch to overcome them. The experimental results demonstrate that this solution efficiently enforces bandwidth sharing in SDN networks.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2017 13th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1