首页 > 最新文献

2023 IEEE 9th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
New approaches to data plane programmability for software datapaths in the NFV infrastructure NFV基础设施中软件数据路径数据平面可编程性的新方法
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175404
Tomasz Osiński, H. Tarasiuk
In this paper, we summarize the accomplished PhD work on data plane programmability for software datapaths in a virtualized network infrastructure. In particular, we explain our motivation, the up-to-date state of the art, and propose two new solutions for programmable software datapaths, namely P4rt-OVS and NIKSS. Finally, we present research outcomes and future work directions.
在本文中,我们总结了在虚拟化网络基础设施中软件数据路径的数据平面可编程性方面已完成的博士工作。特别地,我们解释了我们的动机,最新的艺术状态,并提出了两种新的可编程软件数据路径解决方案,即P4rt-OVS和NIKSS。最后,提出了研究成果和今后的工作方向。
{"title":"New approaches to data plane programmability for software datapaths in the NFV infrastructure","authors":"Tomasz Osiński, H. Tarasiuk","doi":"10.1109/NetSoft57336.2023.10175404","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175404","url":null,"abstract":"In this paper, we summarize the accomplished PhD work on data plane programmability for software datapaths in a virtualized network infrastructure. In particular, we explain our motivation, the up-to-date state of the art, and propose two new solutions for programmable software datapaths, namely P4rt-OVS and NIKSS. Finally, we present research outcomes and future work directions.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Neural Networks driven Stochastic Resource Optimization for Metaverse Data Marketplace 量子神经网络驱动的元宇宙数据市场随机资源优化
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175433
Mahzabeen Emu, Salimur Choudhury, K. Salomaa
Metaverse can unleash the potentials of Internet of Sense (IoS) communication by intertwining objects and environment between physical world and parallel virtual world. In order to digitally experience smell or taste and navigate effortlessly in virtual reality, optimal resource allocation to strengthen sensing data based infrastructure system is a critical research challenge. The Metaverse Infrastructure Service Providers (MISPs) tap into data marketplace and subscribe to resources in advance for fulfilling the needs of data consumers and users. The demand of the data based services being uncertain, non-optimal subscription schemes may lead to unwanted resource wastage or shortage. Thus, we propose a Stochastic Integer Programming (SIP) model with two phase reservation and on-demand plans for optimal resource allocation in data marketplace. Further along this line, we strive to predict the demand by leveraging Quantum Neural Networks (QNN) that is able to learn with fewer historical data in comparison to classical machine/deep learning paradigms. Extensive simulation results justify that QNN as a supporting model can significantly reduce the computational complexities of SIP formulation. This research can contribute to reduce Metaverse resource fabrication costs, upgrade the profit margin for MISPs by increasing data based service sales revenue, provide real-time resource management decisions, and overall make real impacts in the virtual world.
虚拟世界通过将物理世界与平行虚拟世界之间的物体和环境交织在一起,释放出感知互联网(Internet of Sense, IoS)通信的潜力。为了在虚拟现实中轻松实现数字化的嗅觉或味觉体验和导航,加强基于感知数据的基础设施系统的资源优化配置是一个关键的研究挑战。Metaverse基础设施服务提供商(misp)利用数据市场并提前订阅资源,以满足数据消费者和用户的需求。基于数据的业务需求具有不确定性,非最优订阅方案可能导致不必要的资源浪费或短缺。因此,我们提出了一种具有两阶段保留和按需计划的随机整数规划(SIP)模型,用于数据市场中资源的最优分配。进一步沿着这条线,我们努力通过利用量子神经网络(QNN)来预测需求,与经典的机器/深度学习范式相比,量子神经网络能够使用更少的历史数据进行学习。大量的仿真结果证明,QNN作为支持模型可以显著降低SIP公式的计算复杂度。本研究有助于降低虚拟世界资源制造成本,通过增加基于数据的服务销售收入来提升misp的利润率,提供实时资源管理决策,并在虚拟世界中产生实际影响。
{"title":"Quantum Neural Networks driven Stochastic Resource Optimization for Metaverse Data Marketplace","authors":"Mahzabeen Emu, Salimur Choudhury, K. Salomaa","doi":"10.1109/NetSoft57336.2023.10175433","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175433","url":null,"abstract":"Metaverse can unleash the potentials of Internet of Sense (IoS) communication by intertwining objects and environment between physical world and parallel virtual world. In order to digitally experience smell or taste and navigate effortlessly in virtual reality, optimal resource allocation to strengthen sensing data based infrastructure system is a critical research challenge. The Metaverse Infrastructure Service Providers (MISPs) tap into data marketplace and subscribe to resources in advance for fulfilling the needs of data consumers and users. The demand of the data based services being uncertain, non-optimal subscription schemes may lead to unwanted resource wastage or shortage. Thus, we propose a Stochastic Integer Programming (SIP) model with two phase reservation and on-demand plans for optimal resource allocation in data marketplace. Further along this line, we strive to predict the demand by leveraging Quantum Neural Networks (QNN) that is able to learn with fewer historical data in comparison to classical machine/deep learning paradigms. Extensive simulation results justify that QNN as a supporting model can significantly reduce the computational complexities of SIP formulation. This research can contribute to reduce Metaverse resource fabrication costs, upgrade the profit margin for MISPs by increasing data based service sales revenue, provide real-time resource management decisions, and overall make real impacts in the virtual world.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1037 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo of QoEyes: Towards Virtual Reality Streaming QoE Estimation Entirely in the Data Plane QoEyes演示:完全在数据平面上实现虚拟现实流QoE估计
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175493
F. Vogt, F. R. Cesen, Ariel Góes De Castro, M. C. Luizelli, Christian Esteve Rothenberg, Gergely Pongrácz
Recent advances in VR technology have created new user experiences (e.g., online events, gaming). However, ensuring the user experience is still a challenge. Mostly because Quality of Experience (QoE) measurement is limited to the user or control plane, causing high latencies for different scenarios (e.g., 5G networks and beyond). To address this challenge, we present QoEyes, an in-network QoE estimation technique based on Inter-Packet-Gap (IPG) measured in programmable devices. Our results show that a strong estimate of the user’s QoE can be provided by measuring the IPG on the data plane. Additionally, in this demonstration, we show this QoE estimate and other related metrics in real time, using a Grafana dashboard running in our monitoring server.
最近VR技术的进步创造了新的用户体验(例如,在线活动,游戏)。然而,确保用户体验仍然是一个挑战。主要是因为体验质量(QoE)测量仅限于用户或控制平面,导致不同场景(例如5G网络及更高版本)的高延迟。为了解决这一挑战,我们提出了QoEyes,一种基于可编程设备中测量的Inter-Packet-Gap (IPG)的网络内QoE估计技术。我们的研究结果表明,可以通过测量数据平面上的IPG来提供对用户QoE的强有力的估计。此外,在本演示中,我们使用在监控服务器上运行的Grafana仪表板实时显示此QoE估计和其他相关指标。
{"title":"Demo of QoEyes: Towards Virtual Reality Streaming QoE Estimation Entirely in the Data Plane","authors":"F. Vogt, F. R. Cesen, Ariel Góes De Castro, M. C. Luizelli, Christian Esteve Rothenberg, Gergely Pongrácz","doi":"10.1109/NetSoft57336.2023.10175493","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175493","url":null,"abstract":"Recent advances in VR technology have created new user experiences (e.g., online events, gaming). However, ensuring the user experience is still a challenge. Mostly because Quality of Experience (QoE) measurement is limited to the user or control plane, causing high latencies for different scenarios (e.g., 5G networks and beyond). To address this challenge, we present QoEyes, an in-network QoE estimation technique based on Inter-Packet-Gap (IPG) measured in programmable devices. Our results show that a strong estimate of the user’s QoE can be provided by measuring the IPG on the data plane. Additionally, in this demonstration, we show this QoE estimate and other related metrics in real time, using a Grafana dashboard running in our monitoring server.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Leakages of Docker Containers: Characterization and Mitigation Strategies Docker容器的信息泄漏:特征和缓解策略
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175435
M. Zuppelli, M. Repetto, L. Caviglione, E. Cambiaso
Compared to classic virtual machines, containers offer lightweight and dynamic execution environments. Hence, they are core building blocks for the development of future softwarized networks and cloud-native applications. However, containers still pose many security challenges, which are less understood compared to other virtualization paradigms. An important aspect often neglected concerns techniques enabling containers to leak data outside their execution perimeters, e.g., to exfiltrate sensitive information or coordinate attacks. In this paper we investigate security impacts of covert communications based on the looser isolation of memory statistics information. Our characterization indicates that the investigation of system calls should be considered a prime tool to reveal the presence of collusive attack schemes. We also elaborate on two mitigation techniques: the first entails prevention via “hardening” configurations of containers, while the second implements a run-time disruption mechanism.
与传统的虚拟机相比,容器提供了轻量级的动态执行环境。因此,它们是未来软件网络和云原生应用程序开发的核心构建块。然而,容器仍然带来了许多安全挑战,与其他虚拟化范例相比,人们对这些挑战知之甚少。一个经常被忽视的重要方面是使容器能够在其执行边界之外泄漏数据的技术,例如,泄露敏感信息或协调攻击。本文研究了基于内存统计信息松散隔离的隐蔽通信对安全的影响。我们的特征表明,对系统调用的调查应被视为揭示共谋攻击方案存在的主要工具。我们还详细介绍了两种缓解技术:第一种需要通过“强化”容器配置进行预防,而第二种实现了运行时中断机制。
{"title":"Information Leakages of Docker Containers: Characterization and Mitigation Strategies","authors":"M. Zuppelli, M. Repetto, L. Caviglione, E. Cambiaso","doi":"10.1109/NetSoft57336.2023.10175435","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175435","url":null,"abstract":"Compared to classic virtual machines, containers offer lightweight and dynamic execution environments. Hence, they are core building blocks for the development of future softwarized networks and cloud-native applications. However, containers still pose many security challenges, which are less understood compared to other virtualization paradigms. An important aspect often neglected concerns techniques enabling containers to leak data outside their execution perimeters, e.g., to exfiltrate sensitive information or coordinate attacks. In this paper we investigate security impacts of covert communications based on the looser isolation of memory statistics information. Our characterization indicates that the investigation of system calls should be considered a prime tool to reveal the presence of collusive attack schemes. We also elaborate on two mitigation techniques: the first entails prevention via “hardening” configurations of containers, while the second implements a run-time disruption mechanism.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Vulnerability Testing and Detection Digital Twin Framework for 5G Systems 5G系统自动漏洞测试与检测数字孪生框架
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175496
Danielle Dauphinais, Michael Zylka, Harris Spahic, Farhan Shaik, Jing-Bing Yang, Isabella Cruz, Jakob Gibson, Ying Wang
Efficient and precise detection of vulnerabilities in 5G protocols and implementations is crucial for ensuring the security of its application in critical infrastructures. However, with the rapid evolution of 5G standards and the trend towards softwarization and virtualization, this remains a challenge. In this paper, we present an automated Fuzz Testing Digital Twin Framework that facilitates systematic vulnerability detection and assessment of unintended emergent behavior, while allowing for efficient fuzzing path navigation. Our framework utilizes assembly-level fuzzing as an acceleration engine and is demonstrated on the flagship 5G software stack: srsRAN. The introduced digital twin solution enables the simulation, verification, and connection to 5G testing and attack models in real-world scenarios. By identifying and analyzing vulnerabilities on the digital twin platform, we significantly improve the security and resilience of 5G systems, mitigate the risks of zero-day vulnerabilities, and provide comprehensive testing environments for current and newly released 5G systems.
高效、精确地检测5G协议和实施中的漏洞,对于确保其在关键基础设施中的应用安全至关重要。然而,随着5G标准的快速发展以及软件化和虚拟化的趋势,这仍然是一个挑战。在本文中,我们提出了一个自动化模糊测试数字孪生框架,该框架促进了系统的漏洞检测和意外紧急行为的评估,同时允许有效的模糊路径导航。我们的框架利用装配级模糊测试作为加速引擎,并在旗舰5G软件堆栈:srsRAN上进行了演示。引入的数字孪生解决方案可以实现对现实场景中5G测试和攻击模型的模拟、验证和连接。通过识别和分析数字孪生平台上的漏洞,显著提高5G系统的安全性和弹性,降低零日漏洞的风险,为现有和新发布的5G系统提供全面的测试环境。
{"title":"Automated Vulnerability Testing and Detection Digital Twin Framework for 5G Systems","authors":"Danielle Dauphinais, Michael Zylka, Harris Spahic, Farhan Shaik, Jing-Bing Yang, Isabella Cruz, Jakob Gibson, Ying Wang","doi":"10.1109/NetSoft57336.2023.10175496","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175496","url":null,"abstract":"Efficient and precise detection of vulnerabilities in 5G protocols and implementations is crucial for ensuring the security of its application in critical infrastructures. However, with the rapid evolution of 5G standards and the trend towards softwarization and virtualization, this remains a challenge. In this paper, we present an automated Fuzz Testing Digital Twin Framework that facilitates systematic vulnerability detection and assessment of unintended emergent behavior, while allowing for efficient fuzzing path navigation. Our framework utilizes assembly-level fuzzing as an acceleration engine and is demonstrated on the flagship 5G software stack: srsRAN. The introduced digital twin solution enables the simulation, verification, and connection to 5G testing and attack models in real-world scenarios. By identifying and analyzing vulnerabilities on the digital twin platform, we significantly improve the security and resilience of 5G systems, mitigate the risks of zero-day vulnerabilities, and provide comprehensive testing environments for current and newly released 5G systems.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tutorials 教程
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175401
José Santos
Containers have revolutionized application deployment and life-cycle management in current cloud platforms. Applications have evolved from single monoliths to complex graphs of loosely-coupled microservices aiming to improve deployment flexibility and operational efficiency. However, the efficient orchestration of containerized applications is challenging due to their complex inter-dependencies. Further, recent applications are becoming even more delay-sensitive, demanding lower latency between dependent microservices. Scheduling policies in popular container orchestration platforms mainly aim to increase the resource efficiency of the infrastructure, insufficient for these latency-sensitive applications. Application domains such as the Internet of Things (IoT) and multi-tier web services would benefit from network-aware policies that consider network latency and bandwidth in the scheduling process. This tutorial provides an overview of application scenarios and methodologies to address the efficient orchestration of containerized applications. After that, the tutorial provides a practical vision of network-aware scheduling via the developed Diktyo framework for the popular Kubernetes (K8s) platform. Diktyo determines the placement of dependent microservices in long-running applications focused on reducing the application’s end-to-end latency and guaranteeing bandwidth reservations. The tutorial includes a live-demo showing the benefits of the Diktyo framework by deploying typical containerized applications. The framework has been open-sourced and already accepted in the K8s scheduling community repository as an alternative scheduler. We want to showcase to attendees how they could apply Diktyo to deploy their applications with network awareness in a K8s cluster. Lastly, a selected set of lessons learned within this dedicated area of container management is presented, and future trends in container scheduling are outlined. José Santos (Ghent University imec, IDLab, Gent, Belgium). José Santos obtained his M.Sc. degree in Electrical and Computers Engineering in July 2015 from the University of Porto, Portugal. Recently, he completed his doctoral studies at Ghent University in April 2022. He is currently a Postdoctoral Researcher in the Internet Technology and Data Science Lab (IDLab) Research Group at Ghent University imec, Belgium. His research interests include Cloud Computing, the Internet of Things (IoT), SoftwareDefined Networking (SDN), Container Scheduling and Auto-scaling, Service Function Chaining, and Reinforcement Learning. His work xiv 20 23 IE EE 9 th In te rn at io na l C on fe re nc e on N et w or k So ftw ar iz at io n (N et So ft) | 97 9835 03 -9 98 06/ 23 /$ 31 .0 0 © 20 23 IE EE | D O I: 10 .1 10 9/ N et So ft5 73 36 .2 02 3. 10 17 54 01 Authorized licensed use limited to the terms of the applicable license agreement with IEEE. Restrictions apply. 9th IEEE International Conference on Network Softwarization 19 – 23 June 2023 // M
虚拟化和软件化将影响这些工业网络,因为它们具有DC和蜂窝网络。我们预计,可编程性和软件模块的链接将为物联网和工业网络提供新的方法和服务。本教程深入介绍了融合工业物联网网络框架的设计和实现。该框架称为操作和控制网络(OCN),支持工业过程中自动化和软件化所需的所有基本要素。我们将OCN形式化为基于从操作技术(OT)框架派生的一组基本原则的广义模型。OCN的目标是将当前工业网络的围墙花园开放给开放协议,两个融合的趋势激发了本教程:机器对机器通信(包括物联网网络)的大规模增长以及网络协议和管理工具的软件化。实际上,随着工业网络扩展到全球范围,迫切需要敏捷开放的可互操作协议来部署在目前封闭的工业网络花园中。云原生网络协议是必要的,它挑战了当前专有和隔离控制系统中的当前网络架构。虚拟化和软件化将影响这些工业网络,因为它们具有DC和蜂窝网络。我们预计,可编程性和软件模块的链接将为物联网和工业网络提供新的方法和服务。本教程深入介绍了融合工业物联网网络框架的设计和实现。该框架称为操作和控制网络(OCN),支持工业过程中自动化和软件化所需的所有基本要素。我们将OCN形式化为基于从操作技术(OT)框架派生的一组基本原则的广义模型。OCN的目标是将当前工业网络的围墙花园开放给开放协议和网络
{"title":"Tutorials","authors":"José Santos","doi":"10.1109/NetSoft57336.2023.10175401","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175401","url":null,"abstract":"Containers have revolutionized application deployment and life-cycle management in current cloud platforms. Applications have evolved from single monoliths to complex graphs of loosely-coupled microservices aiming to improve deployment flexibility and operational efficiency. However, the efficient orchestration of containerized applications is challenging due to their complex inter-dependencies. Further, recent applications are becoming even more delay-sensitive, demanding lower latency between dependent microservices. Scheduling policies in popular container orchestration platforms mainly aim to increase the resource efficiency of the infrastructure, insufficient for these latency-sensitive applications. Application domains such as the Internet of Things (IoT) and multi-tier web services would benefit from network-aware policies that consider network latency and bandwidth in the scheduling process. This tutorial provides an overview of application scenarios and methodologies to address the efficient orchestration of containerized applications. After that, the tutorial provides a practical vision of network-aware scheduling via the developed Diktyo framework for the popular Kubernetes (K8s) platform. Diktyo determines the placement of dependent microservices in long-running applications focused on reducing the application’s end-to-end latency and guaranteeing bandwidth reservations. The tutorial includes a live-demo showing the benefits of the Diktyo framework by deploying typical containerized applications. The framework has been open-sourced and already accepted in the K8s scheduling community repository as an alternative scheduler. We want to showcase to attendees how they could apply Diktyo to deploy their applications with network awareness in a K8s cluster. Lastly, a selected set of lessons learned within this dedicated area of container management is presented, and future trends in container scheduling are outlined. José Santos (Ghent University imec, IDLab, Gent, Belgium). José Santos obtained his M.Sc. degree in Electrical and Computers Engineering in July 2015 from the University of Porto, Portugal. Recently, he completed his doctoral studies at Ghent University in April 2022. He is currently a Postdoctoral Researcher in the Internet Technology and Data Science Lab (IDLab) Research Group at Ghent University imec, Belgium. His research interests include Cloud Computing, the Internet of Things (IoT), SoftwareDefined Networking (SDN), Container Scheduling and Auto-scaling, Service Function Chaining, and Reinforcement Learning. His work xiv 20 23 IE EE 9 th In te rn at io na l C on fe re nc e on N et w or k So ftw ar iz at io n (N et So ft) | 97 9835 03 -9 98 06/ 23 /$ 31 .0 0 © 20 23 IE EE | D O I: 10 .1 10 9/ N et So ft5 73 36 .2 02 3. 10 17 54 01 Authorized licensed use limited to the terms of the applicable license agreement with IEEE. Restrictions apply. 9th IEEE International Conference on Network Softwarization 19 – 23 June 2023 // M","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Preliminary Study on the Power Consumption of Virtualized Edge 5G Core Networks 虚拟化边缘5G核心网功耗初步研究
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175489
Arturo Bellin, Marco Centenaro, F. Granelli
Other than pure performance and cybersecurity, a value that is becoming increasingly important for a mobile network is its power consumption. In fact, the transition from legacy network deployments tightly coupled with the underlying hardware towards fully virtualized ones yields distinct options based on the adopted virtualization technology, each of which deserve appropriate evaluation in terms of energy efficiency. In this paper, we aim at providing a preliminary assessment of the realistic power consumption of a fifth-generation core network deployed in a network edge environment leveraging bare metal, containers, and virtual machines. The results are based on a testbed consisting of commercial off-the-shelf hardware and open-source software, and show that the deployment based on virtual machines is the first one that saturates the power consumption, thus reducing the maximum achievable throughput. These preliminary insights show the feasibility of a real-time power monitoring system that can condition the dynamic policies applied by the 5G network orchestrator.
除了纯粹的性能和网络安全,对移动网络来说,越来越重要的一个价值是它的功耗。事实上,从与底层硬件紧密耦合的传统网络部署向完全虚拟化的网络部署的过渡会产生基于所采用的虚拟化技术的不同选择,每种选择都值得在能源效率方面进行适当的评估。在本文中,我们的目标是提供在利用裸机、容器和虚拟机的网络边缘环境中部署的第五代核心网络的实际功耗的初步评估。结果基于商用现成硬件和开源软件组成的测试平台,并表明基于虚拟机的部署是第一个使功耗饱和的部署,从而降低了可实现的最大吞吐量。这些初步的见解显示了实时电力监控系统的可行性,该系统可以调节5G网络编排器应用的动态策略。
{"title":"A Preliminary Study on the Power Consumption of Virtualized Edge 5G Core Networks","authors":"Arturo Bellin, Marco Centenaro, F. Granelli","doi":"10.1109/NetSoft57336.2023.10175489","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175489","url":null,"abstract":"Other than pure performance and cybersecurity, a value that is becoming increasingly important for a mobile network is its power consumption. In fact, the transition from legacy network deployments tightly coupled with the underlying hardware towards fully virtualized ones yields distinct options based on the adopted virtualization technology, each of which deserve appropriate evaluation in terms of energy efficiency. In this paper, we aim at providing a preliminary assessment of the realistic power consumption of a fifth-generation core network deployed in a network edge environment leveraging bare metal, containers, and virtual machines. The results are based on a testbed consisting of commercial off-the-shelf hardware and open-source software, and show that the deployment based on virtual machines is the first one that saturates the power consumption, thus reducing the maximum achievable throughput. These preliminary insights show the feasibility of a real-time power monitoring system that can condition the dynamic policies applied by the 5G network orchestrator.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132953096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Energy Efficient Functional Split and Baseband Function Placement for 5G RAN 面向5G无线局域网的节能功能拆分与基带功能布局
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175402
Nabhasmita Sen, Antony Franklin A
The energy efficiency of 5G and beyond 5G(B5G) networks is critical for reducing the high operational expenditure (OPEX) of mobile network operators. In 5G RAN, functional split enables the disaggregation of baseband functions, which significantly increases energy efficiency but induces various challenges in the placement of baseband functions. Various recent works have focused on addressing these challenges; however, most of the solutions do not consider the delay and data rate requirements of different slices as well as different functional splits. In this work, we aim to develop an energy-efficient baseband function placement strategy that jointly considers different functional splits and network slice-specific requirements. We formulate an Integer Linear Program (ILP) based optimization model to minimize the energy consumption in the network by selecting appropriate functional split and baseband function placement options for RAN slices. We show that our proposed model outperforms the baseline strategies in providing energy efficient baseband function placement solution. To tackle the computational complexity of ILP, we also design a polynomial time heuristic algorithm that can be applied in large-scale scenarios.
5G及以上5G(B5G)网络的能源效率对于降低移动网络运营商的高运营支出(OPEX)至关重要。在5G RAN中,功能分裂可以实现基带功能的分解,这大大提高了能源效率,但在基带功能的放置方面带来了各种挑战。最近的各种工作都集中在解决这些挑战;但是,大多数解决方案没有考虑不同切片以及不同功能分割的延迟和数据速率要求。在这项工作中,我们的目标是开发一种节能的基带功能放置策略,该策略可以共同考虑不同的功能分裂和网络切片特定要求。我们制定了一个基于整数线性规划(ILP)的优化模型,通过为RAN切片选择适当的功能分裂和基带功能放置选项来最小化网络中的能量消耗。我们表明,我们提出的模型在提供节能基带功能放置解决方案方面优于基线策略。为了解决ILP的计算复杂性,我们还设计了一个可以应用于大规模场景的多项式时间启发式算法。
{"title":"Towards Energy Efficient Functional Split and Baseband Function Placement for 5G RAN","authors":"Nabhasmita Sen, Antony Franklin A","doi":"10.1109/NetSoft57336.2023.10175402","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175402","url":null,"abstract":"The energy efficiency of 5G and beyond 5G(B5G) networks is critical for reducing the high operational expenditure (OPEX) of mobile network operators. In 5G RAN, functional split enables the disaggregation of baseband functions, which significantly increases energy efficiency but induces various challenges in the placement of baseband functions. Various recent works have focused on addressing these challenges; however, most of the solutions do not consider the delay and data rate requirements of different slices as well as different functional splits. In this work, we aim to develop an energy-efficient baseband function placement strategy that jointly considers different functional splits and network slice-specific requirements. We formulate an Integer Linear Program (ILP) based optimization model to minimize the energy consumption in the network by selecting appropriate functional split and baseband function placement options for RAN slices. We show that our proposed model outperforms the baseline strategies in providing energy efficient baseband function placement solution. To tackle the computational complexity of ILP, we also design a polynomial time heuristic algorithm that can be applied in large-scale scenarios.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
By-default Security Orchestration on distributed Edge/Cloud Computing Framework 分布式边缘/云计算框架上的默认安全编排
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175478
J. Murcia, José Francisco Pérez Zarca, Alejandro Molina Zarca, A. Gómez-Skarmeta
Next generation networks and the strength of the distributed computing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. This paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant with the security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources1. We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.1https://www.cisa.gov/known-exploited-vulnerabilities-catalog
下一代网络和分布式计算范式(边缘/云)的力量正在改变服务的供应方式,主要是当解决方案侧重于不同实体或组织提供的资源的协作和聚合时,这对于满足最苛刻的计算和存储服务需求至关重要。然而,它也带来了诸如基础设施和技术异质性等挑战,这些挑战直接影响基础设施管理,特别是通常倾向于退居其次的安全性。本文提供了一种默认的安全编排方法来缓解分布式边缘/云计算框架中上述挑战。我们使用基于意图/基于策略的编排范式来处理异构性,允许用户在不需要了解底层分布式基础设施的情况下安全地请求服务部署。默认情况下,安全编排将决定如何提供所请求的服务,确保它们符合用户提供的安全需求和系统从本地和可靠的外部来源收集的安全需求1。我们提供基于设计和用例的工作流,以主动和被动的方式管理默认的安全编排。在未来,预计将在FLUIDOS EU项目范围内执行拟议方法的实施和验证。1https://www.cisa.gov/known-exploited-vulnerabilities-catalog
{"title":"By-default Security Orchestration on distributed Edge/Cloud Computing Framework","authors":"J. Murcia, José Francisco Pérez Zarca, Alejandro Molina Zarca, A. Gómez-Skarmeta","doi":"10.1109/NetSoft57336.2023.10175478","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175478","url":null,"abstract":"Next generation networks and the strength of the distributed computing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. This paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant with the security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources1. We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.1https://www.cisa.gov/known-exploited-vulnerabilities-catalog","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Disaggregated Resilient 5G Radio Access Network: A Proof of Concept 迈向可分解的弹性5G无线接入网络:概念验证
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175418
A. Bhattacharyya, Shunmugapriya Ramanathan, A. Fumagalli, K. Kondepu
Smart living applications represent a significant group of 5G vertical use cases. For the most part, these use cases require mobile network connectivity and service high-availability. Simply put, two essential requirements for these applications are short connection time and uninterrupted user data service. Coupled with the expectation of supporting billions of connected devices, these requirements can be achieved by exploiting New Generation Radio Access Network (NG-RAN) architectures. One such emerging architecture is Cloud Radio Access Network (C-RAN), whose Next Generation NodeB (gNB) functions are physically decoupled into distinct entities, such as Radio Unit (RU), Distributed Unit (DU), and Central Unit (CU). The CUs are connected to 5G Core Network (CN) and are likely to be virtualized and distributed across multiple (micro and macro) data centers. The virtualized CUs (vCUs) are further decoupled into virtualized CU Control-Plane (vCU-CP) and virtualized CU User-Plane (vCU-UP) to increase flexibility and scalability. As these 5G RAN entities are virtualized, various resiliency schemes, such as container migration, must be considered to overcome possible congestion in or malfunction of the hosting server.In this paper, two distinct cloud-native RAN resiliency scenarios are evaluated while live-migrating gNB-vCU-CP with the objective of maintaining User Equipment (UE) connection time short and user data service uninterrupted in support of smart living and other advanced applications.
智能生活应用代表了一组重要的5G垂直用例。在大多数情况下,这些用例需要移动网络连接和服务高可用性。简单地说,这些应用程序的两个基本要求是短连接时间和不间断的用户数据服务。再加上支持数十亿台连接设备的期望,这些要求可以通过利用新一代无线接入网(NG-RAN)架构来实现。云无线接入网(C-RAN)就是这样一种新兴架构,其下一代NodeB (gNB)功能在物理上解耦为不同的实体,如无线电单元(RU)、分布式单元(DU)和中央单元(CU)。cu连接到5G核心网(CN),可能被虚拟化并分布在多个(微观和宏观)数据中心。vcu (virtual CU)进一步解耦为vCU-CP (virtual CU Control-Plane)和vCU-UP (virtual CU User-Plane),提高了灵活性和可扩展性。由于这些5G RAN实体是虚拟化的,因此必须考虑各种弹性方案,例如容器迁移,以克服托管服务器中可能出现的拥塞或故障。本文在实时迁移gNB-vCU-CP时,评估了两种不同的云原生RAN弹性方案,目的是保持用户设备(UE)连接时间短,用户数据服务不中断,以支持智能生活和其他高级应用。
{"title":"Towards Disaggregated Resilient 5G Radio Access Network: A Proof of Concept","authors":"A. Bhattacharyya, Shunmugapriya Ramanathan, A. Fumagalli, K. Kondepu","doi":"10.1109/NetSoft57336.2023.10175418","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175418","url":null,"abstract":"Smart living applications represent a significant group of 5G vertical use cases. For the most part, these use cases require mobile network connectivity and service high-availability. Simply put, two essential requirements for these applications are short connection time and uninterrupted user data service. Coupled with the expectation of supporting billions of connected devices, these requirements can be achieved by exploiting New Generation Radio Access Network (NG-RAN) architectures. One such emerging architecture is Cloud Radio Access Network (C-RAN), whose Next Generation NodeB (gNB) functions are physically decoupled into distinct entities, such as Radio Unit (RU), Distributed Unit (DU), and Central Unit (CU). The CUs are connected to 5G Core Network (CN) and are likely to be virtualized and distributed across multiple (micro and macro) data centers. The virtualized CUs (vCUs) are further decoupled into virtualized CU Control-Plane (vCU-CP) and virtualized CU User-Plane (vCU-UP) to increase flexibility and scalability. As these 5G RAN entities are virtualized, various resiliency schemes, such as container migration, must be considered to overcome possible congestion in or malfunction of the hosting server.In this paper, two distinct cloud-native RAN resiliency scenarios are evaluated while live-migrating gNB-vCU-CP with the objective of maintaining User Equipment (UE) connection time short and user data service uninterrupted in support of smart living and other advanced applications.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1