首页 > 最新文献

2023 IEEE 9th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Performance costs for IPv6-based mobility management on the top of Kubernetes Kubernetes之上基于ipv6的移动性管理的性能成本
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175456
Ákos Leiter, Pál Böõsy, Milán Kis, L. Bokor
The next-generation mobile networks are expected to provide advanced services, which require the network to be more scalable and resilient. A possible approach to solve this would be a cloud-native network, upon which containerized network functions could be deployed: this is why Kubernetes is gaining attention among network software vendors and service providers. Kubernetes has become the de-facto industry standard for orchestrating containerized resources at real-life scales. However, Kubernetes ’s abilities might seem to be limited. Currently, it lacks the toolset for advanced L2/L3 level networking, which would be essential, for example, in the case of IPv6-based mobility management. Furthermore, many types of software architectures can be envisioned on the top of Kubernetes which may have different impacts on performance. This paper examines different microservice approaches in the context of Mobile IPv6 and Proxy Mobile IPv6, including their service automation capabilities. We evaluate them from functional and performance perspectives and provide statements about their usability in mobile networks.
下一代移动网络预计将提供先进的服务,这就要求网络具有更高的可扩展性和弹性。解决这个问题的一个可能的方法是一个云原生网络,在这个网络上可以部署容器化的网络功能:这就是为什么Kubernetes越来越受到网络软件供应商和服务提供商的关注。Kubernetes已经成为在实际规模上编排容器化资源的事实上的行业标准。然而,Kubernetes的能力似乎是有限的。目前,它缺乏用于高级L2/L3级网络的工具集,例如,在基于ipv6的移动管理的情况下,这将是必不可少的。此外,可以在Kubernetes之上设想许多类型的软件架构,这些架构可能会对性能产生不同的影响。本文研究了移动IPv6和代理移动IPv6背景下的不同微服务方法,包括它们的服务自动化功能。我们从功能和性能的角度对它们进行评估,并提供关于它们在移动网络中的可用性的陈述。
{"title":"Performance costs for IPv6-based mobility management on the top of Kubernetes","authors":"Ákos Leiter, Pál Böõsy, Milán Kis, L. Bokor","doi":"10.1109/NetSoft57336.2023.10175456","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175456","url":null,"abstract":"The next-generation mobile networks are expected to provide advanced services, which require the network to be more scalable and resilient. A possible approach to solve this would be a cloud-native network, upon which containerized network functions could be deployed: this is why Kubernetes is gaining attention among network software vendors and service providers. Kubernetes has become the de-facto industry standard for orchestrating containerized resources at real-life scales. However, Kubernetes ’s abilities might seem to be limited. Currently, it lacks the toolset for advanced L2/L3 level networking, which would be essential, for example, in the case of IPv6-based mobility management. Furthermore, many types of software architectures can be envisioned on the top of Kubernetes which may have different impacts on performance. This paper examines different microservice approaches in the context of Mobile IPv6 and Proxy Mobile IPv6, including their service automation capabilities. We evaluate them from functional and performance perspectives and provide statements about their usability in mobile networks.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-situ Proof-of-Transit for Path-Aware Programmable Networks 路径感知可编程网络的原位传输证明
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175482
E. S. Borges, Vitor Berger Bonella, Abraão Jesus Dos Santos, Gabriel Tetzner Menegueti, C. Dominicini, M. Martinello
This paper presents a scalable and efficient solution for secure network design that involves the selection and verification of network paths. The proposed approach addresses the challenge of extending compliance policies to cover path-aware programmable networks by decoupling the routing/forwarding mechanisms from the Proof-of-Transit (PoT) implementation. Thus, two concepts are bounded: i) a source routing mechanism based on a fixed routeID representing a unique identifier per path, which serves as a key for the PoT lookup table; ii) the “in situ” that allows to collect telemetry information in the packet while the packet traverses a path. The former enables path selection with policy at the edge, while the later allows to perform path verification without extra probe-traffic. A P4 programmable language prototype demonstrates the effectiveness of this approach to protect against deviation attacks with low overhead. The results show a significant reduction in network’s forwarding state for fat-tree topologies depending on the workload per path (flows/path).
本文提出了一种可扩展的、高效的安全网络设计方案,包括网络路径的选择和验证。提出的方法通过将路由/转发机制与传输证明(PoT)实现解耦,解决了扩展遵从性策略以覆盖路径感知可编程网络的挑战。因此,有两个概念是有界限的:i)基于固定routeID的源路由机制,该机制表示每个路径的唯一标识符,该标识符作为PoT查找表的键;Ii)在数据包穿越路径时,允许在数据包中收集遥测信息的“原位”。前者允许在边缘使用策略进行路径选择,而后者允许在没有额外探针流量的情况下执行路径验证。一个P4可编程语言原型证明了这种方法在低开销下防止偏差攻击的有效性。结果显示,根据每条路径(流量/路径)的工作负载,胖树拓扑的网络转发状态显著降低。
{"title":"In-situ Proof-of-Transit for Path-Aware Programmable Networks","authors":"E. S. Borges, Vitor Berger Bonella, Abraão Jesus Dos Santos, Gabriel Tetzner Menegueti, C. Dominicini, M. Martinello","doi":"10.1109/NetSoft57336.2023.10175482","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175482","url":null,"abstract":"This paper presents a scalable and efficient solution for secure network design that involves the selection and verification of network paths. The proposed approach addresses the challenge of extending compliance policies to cover path-aware programmable networks by decoupling the routing/forwarding mechanisms from the Proof-of-Transit (PoT) implementation. Thus, two concepts are bounded: i) a source routing mechanism based on a fixed routeID representing a unique identifier per path, which serves as a key for the PoT lookup table; ii) the “in situ” that allows to collect telemetry information in the packet while the packet traverses a path. The former enables path selection with policy at the edge, while the later allows to perform path verification without extra probe-traffic. A P4 programmable language prototype demonstrates the effectiveness of this approach to protect against deviation attacks with low overhead. The results show a significant reduction in network’s forwarding state for fat-tree topologies depending on the workload per path (flows/path).","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Cross Network Slice Disruptions in a Zero-Trust and Multi-Tenant Future 5G Networks 在零信任和多租户未来5G网络中防止跨网络切片中断
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175424
Shwetha Vittal, Unnati Dixit, Siddhesh Pratim Sovitkar, K. Sowjanya, A. Franklin
As network slicing is the chief enabler for future Beyond 5G(B5G) and 6G networks, multiple tenants interoperate cost-effectively to provide a variety of slice services on a common physical infrastructure. However, this opens the doors to cross-slice disruptions with Man-in-the-Middle (MITM) attack which ultimately disrupts the slice services in the data plane. In this paper, we address such possible cross-network slice disruptions in a zero-trust and multi-tenant based 5G network by proposing different design techniques namely, secure communication and Artificial Intelligence (AI)-based anomaly detection to prevent them. Our experiments on a 5G testbed prototype show that in the secure communication method, Attribute-Based Encryption (ABE) provides higher security benefits in confidentiality and implicit authorization. However, symmetric encryption and integrity protection prevent cross-slice disruptions with less communication overhead, but with a weaker security level. On the other hand, with online learning and noise tolerance capabilities, AI-based Hierarchical Temporal Memory (HTM) can proactively detect the occurrences of the identified cross-slice disruptions.
由于网络切片是未来超5G(B5G)和6G网络的主要推动者,因此多个租户可以经济高效地进行互操作,在公共物理基础设施上提供各种切片服务。然而,这为中间人(MITM)攻击的交叉切片中断打开了大门,最终破坏了数据平面中的切片服务。在本文中,我们通过提出不同的设计技术,即安全通信和基于人工智能(AI)的异常检测来防止零信任和基于多租户的5G网络中可能出现的跨网络切片中断。我们在5G测试平台原型上的实验表明,在安全通信方式中,基于属性的加密(ABE)在保密性和隐式授权方面提供了更高的安全优势。然而,对称加密和完整性保护以较少的通信开销防止了横片中断,但安全性较弱。另一方面,通过在线学习和噪声容忍能力,基于人工智能的分层时间记忆(HTM)可以主动检测已识别的横片中断的发生。
{"title":"Preventing Cross Network Slice Disruptions in a Zero-Trust and Multi-Tenant Future 5G Networks","authors":"Shwetha Vittal, Unnati Dixit, Siddhesh Pratim Sovitkar, K. Sowjanya, A. Franklin","doi":"10.1109/NetSoft57336.2023.10175424","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175424","url":null,"abstract":"As network slicing is the chief enabler for future Beyond 5G(B5G) and 6G networks, multiple tenants interoperate cost-effectively to provide a variety of slice services on a common physical infrastructure. However, this opens the doors to cross-slice disruptions with Man-in-the-Middle (MITM) attack which ultimately disrupts the slice services in the data plane. In this paper, we address such possible cross-network slice disruptions in a zero-trust and multi-tenant based 5G network by proposing different design techniques namely, secure communication and Artificial Intelligence (AI)-based anomaly detection to prevent them. Our experiments on a 5G testbed prototype show that in the secure communication method, Attribute-Based Encryption (ABE) provides higher security benefits in confidentiality and implicit authorization. However, symmetric encryption and integrity protection prevent cross-slice disruptions with less communication overhead, but with a weaker security level. On the other hand, with online learning and noise tolerance capabilities, AI-based Hierarchical Temporal Memory (HTM) can proactively detect the occurrences of the identified cross-slice disruptions.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126318966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting XR Services QoE with ML: Insights from In-band Encrypted QoS Features in 360-VR 用ML预测XR服务的QoS: 360-VR带内加密QoS特性的见解
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175481
Md. Tariqul Islam, Christian Esteve Rothenberg, P. Gomes
The growing popularity of eXtended Reality (XR) is being driven by technological advancements and the demand for advanced immersive digital experiences, including the vision around the metaverse. Within the XR realm, 360-degree immersive video streaming is essential for Virtual Reality (VR) adventures and experiences. The use of E2E encryption for content delivery in 360-VR streaming poses challenges for network operators, making it difficult to manage their networks and assess potential Quality of Experience (QoE) impairments, specifically in 5G and beyond networks. Therefore, we propose a Machine Learning (ML) approach for inferring 360-VR video QoE metrics from network-level encrypted traffic. Our solution uses packet-level information for feature engineering, which serves as input for the ML model to predict target QoE estimators. We evaluate our solution using real 4G and 5G drive test traces with encrypted VR traffic using HTTPS and QUIC protocols. The experimental results show that the trained ML model yields reasonable accuracy with minimal residual error in predicting target VR QoE for both HTTPS and QUIC. Network operators can use such a model to passively monitor the real-time QoE of encrypted VR video sessions and optimize network performance.
技术进步和对先进沉浸式数字体验(包括围绕虚拟世界的愿景)的需求推动了扩展现实(XR)的日益普及。在XR领域,360度沉浸式视频流对于虚拟现实(VR)冒险和体验至关重要。在360-VR流媒体中使用端到端加密进行内容传输给网络运营商带来了挑战,使其难以管理其网络并评估潜在的体验质量(QoE)缺陷,特别是在5G及以上网络中。因此,我们提出了一种机器学习(ML)方法,用于从网络级加密流量中推断360-VR视频QoE指标。我们的解决方案使用包级信息进行特征工程,它作为ML模型的输入来预测目标QoE估计器。我们通过使用HTTPS和QUIC协议加密的VR流量,使用真实的4G和5G驱动测试痕迹来评估我们的解决方案。实验结果表明,训练后的ML模型在预测HTTPS和QUIC的目标VR QoE时都具有合理的精度和最小的残差。网络运营商可以利用该模型被动监控加密VR视频会话的实时QoE,优化网络性能。
{"title":"Predicting XR Services QoE with ML: Insights from In-band Encrypted QoS Features in 360-VR","authors":"Md. Tariqul Islam, Christian Esteve Rothenberg, P. Gomes","doi":"10.1109/NetSoft57336.2023.10175481","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175481","url":null,"abstract":"The growing popularity of eXtended Reality (XR) is being driven by technological advancements and the demand for advanced immersive digital experiences, including the vision around the metaverse. Within the XR realm, 360-degree immersive video streaming is essential for Virtual Reality (VR) adventures and experiences. The use of E2E encryption for content delivery in 360-VR streaming poses challenges for network operators, making it difficult to manage their networks and assess potential Quality of Experience (QoE) impairments, specifically in 5G and beyond networks. Therefore, we propose a Machine Learning (ML) approach for inferring 360-VR video QoE metrics from network-level encrypted traffic. Our solution uses packet-level information for feature engineering, which serves as input for the ML model to predict target QoE estimators. We evaluate our solution using real 4G and 5G drive test traces with encrypted VR traffic using HTTPS and QUIC protocols. The experimental results show that the trained ML model yields reasonable accuracy with minimal residual error in predicting target VR QoE for both HTTPS and QUIC. Network operators can use such a model to passively monitor the real-time QoE of encrypted VR video sessions and optimize network performance.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Network Slicing under Demand Uncertainty: A Stochastic Programming Approach 需求不确定性下的移动网络切片:一种随机规划方法
Pub Date : 2023-04-27 DOI: 10.1109/NetSoft57336.2023.10175453
Anousheh Gholami, Nariman Torkzaban, J. Baras
Constant temporospatial variations in the user demand complicate the end-to-end (E2E) network slice (NS) resource provisioning beyond the limits of the existing best-effort schemes that are only effective under accurate demand forecasts for all NSs. This paper proposes a practical two-time-scale resource allocation framework for E2E network slicing under demand uncertainty. At each macro-scale instance, we assume that only the spatial probability distribution of the NS demands is available. We formulate the NSs resource allocation problem as a stochastic mixed integer program (SMIP) with the objective of minimizing the total CN and RAN resource costs. At each microscale instance, given the exact NSs demand profiles known at operation time, a linear program is solved to jointly minimize the unsupported traffic and RAN cost. We verify the effectiveness of our resource allocation scheme through numerical experiments.
用户需求的不断时空变化使端到端网络片(NS)资源供应复杂化,超出了现有的最佳努力方案的限制,这些方案只有在对所有网络片的准确需求预测下才有效。提出了一种实用的需求不确定情况下端到端网络切片双时间尺度资源分配框架。在每个宏观尺度实例中,我们假设只有NS需求的空间概率分布是可用的。我们将NSs资源分配问题表述为一个随机混合整数规划(SMIP),其目标是最小化CN和RAN的总资源成本。在每个微尺度实例中,给定运行时确切的NSs需求曲线,求解线性程序以共同最小化不支持的流量和RAN成本。通过数值实验验证了资源分配方案的有效性。
{"title":"Mobile Network Slicing under Demand Uncertainty: A Stochastic Programming Approach","authors":"Anousheh Gholami, Nariman Torkzaban, J. Baras","doi":"10.1109/NetSoft57336.2023.10175453","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175453","url":null,"abstract":"Constant temporospatial variations in the user demand complicate the end-to-end (E2E) network slice (NS) resource provisioning beyond the limits of the existing best-effort schemes that are only effective under accurate demand forecasts for all NSs. This paper proposes a practical two-time-scale resource allocation framework for E2E network slicing under demand uncertainty. At each macro-scale instance, we assume that only the spatial probability distribution of the NS demands is available. We formulate the NSs resource allocation problem as a stochastic mixed integer program (SMIP) with the objective of minimizing the total CN and RAN resource costs. At each microscale instance, given the exact NSs demand profiles known at operation time, a linear program is solved to jointly minimize the unsupported traffic and RAN cost. We verify the effectiveness of our resource allocation scheme through numerical experiments.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Services Function Chain Orchestration For Digital Health Twin Use Cases: Heuristic-boosted Q-Learning Approach 数字健康双用例的自适应服务功能链编排:启发式增强q -学习方法
Pub Date : 2023-04-25 DOI: 10.1109/NetSoft57336.2023.10175506
Jamila Alsayed Kassem, Li Zhong, Arie Taal, P. Grosso
Digital Twin (DT) is a prominent technology to utilise and deploy within the healthcare sector. Yet, the main challenges facing such applications are: strict health data-sharing policies, high-performance network requirements, and possible infrastructure resource limitations. In this paper, we address all the challenges by provisioning adaptive Virtual Network Functions (VNFs) to enforce security policies associated with different data-sharing scenarios. We define a Cloud-Native Network orchestrator on top of a multi-node cluster mesh infrastructure for flexible and dynamic container scheduling. The proposed framework considers the intended data-sharing use case, the policies associated, and infrastructure configurations, then provisions Service Function Chaining (SFC) and provides routing configurations accordingly with little to no human intervention. As a result, we provide an adaptive network orchestration for digital health twin use cases, that is policy-aware, requirements-aware, and resource-aware.
数字孪生(DT)是在医疗保健部门使用和部署的一项重要技术。然而,这些应用程序面临的主要挑战是:严格的健康数据共享策略、高性能网络需求以及可能的基础设施资源限制。在本文中,我们通过提供自适应虚拟网络功能(VNFs)来执行与不同数据共享场景相关的安全策略来解决所有挑战。我们在多节点集群网格基础设施之上定义了一个云原生网络编排器,以实现灵活和动态的容器调度。建议的框架考虑预期的数据共享用例、关联的策略和基础设施配置,然后提供服务功能链接(SFC),并相应地提供路由配置,几乎不需要人工干预。因此,我们为数字健康双用例提供了自适应网络编排,即策略感知、需求感知和资源感知。
{"title":"Adaptive Services Function Chain Orchestration For Digital Health Twin Use Cases: Heuristic-boosted Q-Learning Approach","authors":"Jamila Alsayed Kassem, Li Zhong, Arie Taal, P. Grosso","doi":"10.1109/NetSoft57336.2023.10175506","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175506","url":null,"abstract":"Digital Twin (DT) is a prominent technology to utilise and deploy within the healthcare sector. Yet, the main challenges facing such applications are: strict health data-sharing policies, high-performance network requirements, and possible infrastructure resource limitations. In this paper, we address all the challenges by provisioning adaptive Virtual Network Functions (VNFs) to enforce security policies associated with different data-sharing scenarios. We define a Cloud-Native Network orchestrator on top of a multi-node cluster mesh infrastructure for flexible and dynamic container scheduling. The proposed framework considers the intended data-sharing use case, the policies associated, and infrastructure configurations, then provisions Service Function Chaining (SFC) and provides routing configurations accordingly with little to no human intervention. As a result, we provide an adaptive network orchestration for digital health twin use cases, that is policy-aware, requirements-aware, and resource-aware.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116519639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global QoS Policy Optimization in SD-WAN SD-WAN的全局QoS策略优化
Pub Date : 2023-04-11 DOI: 10.1109/NetSoft57336.2023.10175407
Pham Tran Anh Quang, Jérémie Leguay, Xuan Gong, Huiying Xu
In modern SD-WAN networks, a global controller is able to steer traffic on different paths based on application requirements and global intents. However, existing solutions cannot dynamically tune the way bandwidth is shared between flows inside each network, in particular when the available capacity is uncertain due to cross traffic. In this context, we propose a global QoS (Quality of Service) policy optimization model that dynamically adjusts rate limits of applications based on their requirements to follow the evolution of network conditions. It relies on a novel cross-traffic estimator for the available bandwidth of overlay links that only exploits already available measurements. We propose a centralized local search algorithm with cross-traffic estimation and show in packet-level simulations a significant performance improvement in terms of SLA (Service Level Agreement) satisfaction. The adaptive tuning of load balancing and QoS policies based on cross-traffic estimation can improve SLA satisfaction by 40% compared to static policies.
在现代SD-WAN网络中,全局控制器能够根据应用程序需求和全局意图引导不同路径上的流量。然而,现有的解决方案不能动态地调整每个网络中的流之间共享带宽的方式,特别是当可用容量由于交叉流量而不确定时。在此背景下,我们提出了一种全局QoS (Quality of Service)策略优化模型,该模型可以根据应用的需求动态调整速率限制,以适应网络条件的演变。它依赖于一种新的交叉流量估计器,用于覆盖链路的可用带宽,该估计器仅利用已有的测量值。我们提出了一种具有交叉流量估计的集中式本地搜索算法,并在分组级模拟中显示了SLA(服务水平协议)满意度方面的显着性能改进。与静态策略相比,基于交叉流量估计的负载平衡和QoS策略的自适应调优可以将SLA满意度提高40%。
{"title":"Global QoS Policy Optimization in SD-WAN","authors":"Pham Tran Anh Quang, Jérémie Leguay, Xuan Gong, Huiying Xu","doi":"10.1109/NetSoft57336.2023.10175407","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175407","url":null,"abstract":"In modern SD-WAN networks, a global controller is able to steer traffic on different paths based on application requirements and global intents. However, existing solutions cannot dynamically tune the way bandwidth is shared between flows inside each network, in particular when the available capacity is uncertain due to cross traffic. In this context, we propose a global QoS (Quality of Service) policy optimization model that dynamically adjusts rate limits of applications based on their requirements to follow the evolution of network conditions. It relies on a novel cross-traffic estimator for the available bandwidth of overlay links that only exploits already available measurements. We propose a centralized local search algorithm with cross-traffic estimation and show in packet-level simulations a significant performance improvement in terms of SLA (Service Level Agreement) satisfaction. The adaptive tuning of load balancing and QoS policies based on cross-traffic estimation can improve SLA satisfaction by 40% compared to static policies.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Developing Resilient and Service-oriented Mission-critical Systems 面向开发弹性和面向服务的关键任务系统
Pub Date : 2023-03-31 DOI: 10.1109/NetSoft57336.2023.10175408
Doğanalp Ergenç, Cornelia Brülhart, Mathias Fischer
Mission-critical systems (MCSs) have embraced new design paradigms such as service-oriented architecture (SOA) and IEEE 802.1 Time-sensitive Networking (TSN). These approaches tackle the static and closed-loop design and configuration of MCSs to address their strict performance and resilience requirements. While SOA enables the dynamic placement of critical services over virtualized hardware, TSN provides several protocols to establish deterministic communication over standard Ethernet equipment. This paper presents a prototype utilizing SOA and TSN to design flexible and fault-tolerant MCSs. It demonstrates the benefits of dynamic service migration and time-sensitive redundancy protocols to increase the resilience of MCSs against node and link failures, respectively. Moreover, it presents additional advanced functionalities like optimal service distribution and security monitoring for new TSN protocols.
关键任务系统(mcs)已经采用了新的设计范例,例如面向服务的体系结构(SOA)和IEEE 802.1时间敏感网络(TSN)。这些方法解决了mcs的静态和闭环设计和配置,以满足其严格的性能和弹性要求。SOA支持在虚拟化硬件上动态放置关键服务,而TSN提供了几种协议,可以在标准以太网设备上建立确定性通信。本文提出了一种利用SOA和TSN设计灵活、容错的MCSs的原型。它展示了动态服务迁移和时间敏感的冗余协议分别增加mcs对节点和链路故障的弹性的好处。此外,它还为新的TSN协议提供了额外的高级功能,如最佳服务分发和安全监控。
{"title":"Towards Developing Resilient and Service-oriented Mission-critical Systems","authors":"Doğanalp Ergenç, Cornelia Brülhart, Mathias Fischer","doi":"10.1109/NetSoft57336.2023.10175408","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175408","url":null,"abstract":"Mission-critical systems (MCSs) have embraced new design paradigms such as service-oriented architecture (SOA) and IEEE 802.1 Time-sensitive Networking (TSN). These approaches tackle the static and closed-loop design and configuration of MCSs to address their strict performance and resilience requirements. While SOA enables the dynamic placement of critical services over virtualized hardware, TSN provides several protocols to establish deterministic communication over standard Ethernet equipment. This paper presents a prototype utilizing SOA and TSN to design flexible and fault-tolerant MCSs. It demonstrates the benefits of dynamic service migration and time-sensitive redundancy protocols to increase the resilience of MCSs against node and link failures, respectively. Moreover, it presents additional advanced functionalities like optimal service distribution and security monitoring for new TSN protocols.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Domain Adaptation of Reinforcement Learning Agents based on Network Service Proximity 基于网络服务邻近的强化学习代理领域自适应
Pub Date : 2023-03-02 DOI: 10.1109/NetSoft57336.2023.10175507
Kaushik Dey, Satheesh K. Perepu, P. Dasgupta, Abir Das
The dynamic and evolutionary nature of service requirements in wireless networks has motivated the telecom industry to consider intelligent self-adapting Reinforcement Learning (RL) agents for controlling the growing portfolio of network services. Infusion of many new types of services is anticipated with future adoption of 6G networks, and sometimes these services will be defined by applications that are external to the network. An RL agent trained for managing the needs of a specific service type may not be ideal for managing a different service type without domain adaptation. We provide a simple heuristic for evaluating a measure of proximity between a new service and existing services, and show that the RL agent of the most proximal service rapidly adapts to the new service type through a well defined process of domain adaptation. Our approach enables a trained source policy to adapt to new situations with changed dynamics without retraining a new policy, thereby achieving significant computing and cost-effectiveness. Such domain adaptation techniques may soon provide a foundation for more generalized RL-based service management under the face of rapidly evolving service types.
无线网络中服务需求的动态性和进化性促使电信行业考虑使用智能自适应强化学习(RL)代理来控制不断增长的网络服务组合。随着未来6G网络的采用,预计会注入许多新型服务,有时这些服务将由网络外部的应用程序定义。为管理特定服务类型的需求而训练的RL代理可能不适合管理没有域适应的不同服务类型。我们提供了一种简单的启发式方法来评估新服务与现有服务之间的接近程度,并表明最接近服务的RL代理通过定义良好的域适应过程快速适应新的服务类型。我们的方法使经过训练的源策略能够适应动态变化的新情况,而无需重新训练新策略,从而实现显著的计算和成本效益。面对快速发展的服务类型,这样的领域适应技术可能很快为更通用的基于rl的服务管理提供基础。
{"title":"Domain Adaptation of Reinforcement Learning Agents based on Network Service Proximity","authors":"Kaushik Dey, Satheesh K. Perepu, P. Dasgupta, Abir Das","doi":"10.1109/NetSoft57336.2023.10175507","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175507","url":null,"abstract":"The dynamic and evolutionary nature of service requirements in wireless networks has motivated the telecom industry to consider intelligent self-adapting Reinforcement Learning (RL) agents for controlling the growing portfolio of network services. Infusion of many new types of services is anticipated with future adoption of 6G networks, and sometimes these services will be defined by applications that are external to the network. An RL agent trained for managing the needs of a specific service type may not be ideal for managing a different service type without domain adaptation. We provide a simple heuristic for evaluating a measure of proximity between a new service and existing services, and show that the RL agent of the most proximal service rapidly adapts to the new service type through a well defined process of domain adaptation. Our approach enables a trained source policy to adapt to new situations with changed dynamics without retraining a new policy, thereby achieving significant computing and cost-effectiveness. Such domain adaptation techniques may soon provide a foundation for more generalized RL-based service management under the face of rapidly evolving service types.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116362176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Bandit Approach to Online Pricing for Heterogeneous Edge Resource Allocation 异构边缘资源分配在线定价的强盗方法
Pub Date : 2023-02-14 DOI: 10.1109/NetSoft57336.2023.10175461
Jiaming Cheng, Duong Thuy Anh Nguyen, Lele Wang, D. Nguyen, V. Bhargava
Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-armed bandit problem and develop two novel online pricing mechanisms, the Kullback-Leibler Upper Confidence Bound (KL-UCB) algorithm and the Min-Max Optimal algorithm, for heterogeneous edge resource allocation. These mechanisms operate in real-time and do not require prior knowledge of demand distribution, which can be difficult to obtain in practice. The proposed posted pricing schemes allow users to select and pay for their preferred resources, with the platform dynamically adjusting resource prices based on observed historical data. Numerical results show the advantages of the proposed mechanisms compared to several benchmark schemes derived from traditional bandit algorithms, including the Epsilon-Greedy, basic UCB, and Thompson Sampling algorithms.
边缘计算(EC)通过将云资源定位在接近最终用户的位置来提供卓越的用户体验。有效地分配边缘资源,同时最大化EC平台的利润,仍然是一个复杂的问题,特别是随着资源请求在线到达的复杂性增加。为了解决这一挑战,我们建议将该问题视为一个多臂强盗问题,并开发两种新的在线定价机制,即Kullback-Leibler上置信度界(KL-UCB)算法和Min-Max最优算法,用于异构边缘资源分配。这些机制是实时运行的,不需要事先了解需求分布,而这在实践中是很难获得的。建议发布的定价方案允许用户选择和支付他们喜欢的资源,平台根据观察到的历史数据动态调整资源价格。数值结果表明,与传统强盗算法(包括Epsilon-Greedy、基本UCB和Thompson Sampling算法)衍生的几种基准方案相比,所提出的机制具有优势。
{"title":"A Bandit Approach to Online Pricing for Heterogeneous Edge Resource Allocation","authors":"Jiaming Cheng, Duong Thuy Anh Nguyen, Lele Wang, D. Nguyen, V. Bhargava","doi":"10.1109/NetSoft57336.2023.10175461","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175461","url":null,"abstract":"Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-armed bandit problem and develop two novel online pricing mechanisms, the Kullback-Leibler Upper Confidence Bound (KL-UCB) algorithm and the Min-Max Optimal algorithm, for heterogeneous edge resource allocation. These mechanisms operate in real-time and do not require prior knowledge of demand distribution, which can be difficult to obtain in practice. The proposed posted pricing schemes allow users to select and pay for their preferred resources, with the platform dynamically adjusting resource prices based on observed historical data. Numerical results show the advantages of the proposed mechanisms compared to several benchmark schemes derived from traditional bandit algorithms, including the Epsilon-Greedy, basic UCB, and Thompson Sampling algorithms.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1