Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175404
Tomasz Osiński, H. Tarasiuk
In this paper, we summarize the accomplished PhD work on data plane programmability for software datapaths in a virtualized network infrastructure. In particular, we explain our motivation, the up-to-date state of the art, and propose two new solutions for programmable software datapaths, namely P4rt-OVS and NIKSS. Finally, we present research outcomes and future work directions.
{"title":"New approaches to data plane programmability for software datapaths in the NFV infrastructure","authors":"Tomasz Osiński, H. Tarasiuk","doi":"10.1109/NetSoft57336.2023.10175404","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175404","url":null,"abstract":"In this paper, we summarize the accomplished PhD work on data plane programmability for software datapaths in a virtualized network infrastructure. In particular, we explain our motivation, the up-to-date state of the art, and propose two new solutions for programmable software datapaths, namely P4rt-OVS and NIKSS. Finally, we present research outcomes and future work directions.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175433
Mahzabeen Emu, Salimur Choudhury, K. Salomaa
Metaverse can unleash the potentials of Internet of Sense (IoS) communication by intertwining objects and environment between physical world and parallel virtual world. In order to digitally experience smell or taste and navigate effortlessly in virtual reality, optimal resource allocation to strengthen sensing data based infrastructure system is a critical research challenge. The Metaverse Infrastructure Service Providers (MISPs) tap into data marketplace and subscribe to resources in advance for fulfilling the needs of data consumers and users. The demand of the data based services being uncertain, non-optimal subscription schemes may lead to unwanted resource wastage or shortage. Thus, we propose a Stochastic Integer Programming (SIP) model with two phase reservation and on-demand plans for optimal resource allocation in data marketplace. Further along this line, we strive to predict the demand by leveraging Quantum Neural Networks (QNN) that is able to learn with fewer historical data in comparison to classical machine/deep learning paradigms. Extensive simulation results justify that QNN as a supporting model can significantly reduce the computational complexities of SIP formulation. This research can contribute to reduce Metaverse resource fabrication costs, upgrade the profit margin for MISPs by increasing data based service sales revenue, provide real-time resource management decisions, and overall make real impacts in the virtual world.
虚拟世界通过将物理世界与平行虚拟世界之间的物体和环境交织在一起,释放出感知互联网(Internet of Sense, IoS)通信的潜力。为了在虚拟现实中轻松实现数字化的嗅觉或味觉体验和导航,加强基于感知数据的基础设施系统的资源优化配置是一个关键的研究挑战。Metaverse基础设施服务提供商(misp)利用数据市场并提前订阅资源,以满足数据消费者和用户的需求。基于数据的业务需求具有不确定性,非最优订阅方案可能导致不必要的资源浪费或短缺。因此,我们提出了一种具有两阶段保留和按需计划的随机整数规划(SIP)模型,用于数据市场中资源的最优分配。进一步沿着这条线,我们努力通过利用量子神经网络(QNN)来预测需求,与经典的机器/深度学习范式相比,量子神经网络能够使用更少的历史数据进行学习。大量的仿真结果证明,QNN作为支持模型可以显著降低SIP公式的计算复杂度。本研究有助于降低虚拟世界资源制造成本,通过增加基于数据的服务销售收入来提升misp的利润率,提供实时资源管理决策,并在虚拟世界中产生实际影响。
{"title":"Quantum Neural Networks driven Stochastic Resource Optimization for Metaverse Data Marketplace","authors":"Mahzabeen Emu, Salimur Choudhury, K. Salomaa","doi":"10.1109/NetSoft57336.2023.10175433","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175433","url":null,"abstract":"Metaverse can unleash the potentials of Internet of Sense (IoS) communication by intertwining objects and environment between physical world and parallel virtual world. In order to digitally experience smell or taste and navigate effortlessly in virtual reality, optimal resource allocation to strengthen sensing data based infrastructure system is a critical research challenge. The Metaverse Infrastructure Service Providers (MISPs) tap into data marketplace and subscribe to resources in advance for fulfilling the needs of data consumers and users. The demand of the data based services being uncertain, non-optimal subscription schemes may lead to unwanted resource wastage or shortage. Thus, we propose a Stochastic Integer Programming (SIP) model with two phase reservation and on-demand plans for optimal resource allocation in data marketplace. Further along this line, we strive to predict the demand by leveraging Quantum Neural Networks (QNN) that is able to learn with fewer historical data in comparison to classical machine/deep learning paradigms. Extensive simulation results justify that QNN as a supporting model can significantly reduce the computational complexities of SIP formulation. This research can contribute to reduce Metaverse resource fabrication costs, upgrade the profit margin for MISPs by increasing data based service sales revenue, provide real-time resource management decisions, and overall make real impacts in the virtual world.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1037 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175493
F. Vogt, F. R. Cesen, Ariel Góes De Castro, M. C. Luizelli, Christian Esteve Rothenberg, Gergely Pongrácz
Recent advances in VR technology have created new user experiences (e.g., online events, gaming). However, ensuring the user experience is still a challenge. Mostly because Quality of Experience (QoE) measurement is limited to the user or control plane, causing high latencies for different scenarios (e.g., 5G networks and beyond). To address this challenge, we present QoEyes, an in-network QoE estimation technique based on Inter-Packet-Gap (IPG) measured in programmable devices. Our results show that a strong estimate of the user’s QoE can be provided by measuring the IPG on the data plane. Additionally, in this demonstration, we show this QoE estimate and other related metrics in real time, using a Grafana dashboard running in our monitoring server.
{"title":"Demo of QoEyes: Towards Virtual Reality Streaming QoE Estimation Entirely in the Data Plane","authors":"F. Vogt, F. R. Cesen, Ariel Góes De Castro, M. C. Luizelli, Christian Esteve Rothenberg, Gergely Pongrácz","doi":"10.1109/NetSoft57336.2023.10175493","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175493","url":null,"abstract":"Recent advances in VR technology have created new user experiences (e.g., online events, gaming). However, ensuring the user experience is still a challenge. Mostly because Quality of Experience (QoE) measurement is limited to the user or control plane, causing high latencies for different scenarios (e.g., 5G networks and beyond). To address this challenge, we present QoEyes, an in-network QoE estimation technique based on Inter-Packet-Gap (IPG) measured in programmable devices. Our results show that a strong estimate of the user’s QoE can be provided by measuring the IPG on the data plane. Additionally, in this demonstration, we show this QoE estimate and other related metrics in real time, using a Grafana dashboard running in our monitoring server.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175435
M. Zuppelli, M. Repetto, L. Caviglione, E. Cambiaso
Compared to classic virtual machines, containers offer lightweight and dynamic execution environments. Hence, they are core building blocks for the development of future softwarized networks and cloud-native applications. However, containers still pose many security challenges, which are less understood compared to other virtualization paradigms. An important aspect often neglected concerns techniques enabling containers to leak data outside their execution perimeters, e.g., to exfiltrate sensitive information or coordinate attacks. In this paper we investigate security impacts of covert communications based on the looser isolation of memory statistics information. Our characterization indicates that the investigation of system calls should be considered a prime tool to reveal the presence of collusive attack schemes. We also elaborate on two mitigation techniques: the first entails prevention via “hardening” configurations of containers, while the second implements a run-time disruption mechanism.
{"title":"Information Leakages of Docker Containers: Characterization and Mitigation Strategies","authors":"M. Zuppelli, M. Repetto, L. Caviglione, E. Cambiaso","doi":"10.1109/NetSoft57336.2023.10175435","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175435","url":null,"abstract":"Compared to classic virtual machines, containers offer lightweight and dynamic execution environments. Hence, they are core building blocks for the development of future softwarized networks and cloud-native applications. However, containers still pose many security challenges, which are less understood compared to other virtualization paradigms. An important aspect often neglected concerns techniques enabling containers to leak data outside their execution perimeters, e.g., to exfiltrate sensitive information or coordinate attacks. In this paper we investigate security impacts of covert communications based on the looser isolation of memory statistics information. Our characterization indicates that the investigation of system calls should be considered a prime tool to reveal the presence of collusive attack schemes. We also elaborate on two mitigation techniques: the first entails prevention via “hardening” configurations of containers, while the second implements a run-time disruption mechanism.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175496
Danielle Dauphinais, Michael Zylka, Harris Spahic, Farhan Shaik, Jing-Bing Yang, Isabella Cruz, Jakob Gibson, Ying Wang
Efficient and precise detection of vulnerabilities in 5G protocols and implementations is crucial for ensuring the security of its application in critical infrastructures. However, with the rapid evolution of 5G standards and the trend towards softwarization and virtualization, this remains a challenge. In this paper, we present an automated Fuzz Testing Digital Twin Framework that facilitates systematic vulnerability detection and assessment of unintended emergent behavior, while allowing for efficient fuzzing path navigation. Our framework utilizes assembly-level fuzzing as an acceleration engine and is demonstrated on the flagship 5G software stack: srsRAN. The introduced digital twin solution enables the simulation, verification, and connection to 5G testing and attack models in real-world scenarios. By identifying and analyzing vulnerabilities on the digital twin platform, we significantly improve the security and resilience of 5G systems, mitigate the risks of zero-day vulnerabilities, and provide comprehensive testing environments for current and newly released 5G systems.
{"title":"Automated Vulnerability Testing and Detection Digital Twin Framework for 5G Systems","authors":"Danielle Dauphinais, Michael Zylka, Harris Spahic, Farhan Shaik, Jing-Bing Yang, Isabella Cruz, Jakob Gibson, Ying Wang","doi":"10.1109/NetSoft57336.2023.10175496","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175496","url":null,"abstract":"Efficient and precise detection of vulnerabilities in 5G protocols and implementations is crucial for ensuring the security of its application in critical infrastructures. However, with the rapid evolution of 5G standards and the trend towards softwarization and virtualization, this remains a challenge. In this paper, we present an automated Fuzz Testing Digital Twin Framework that facilitates systematic vulnerability detection and assessment of unintended emergent behavior, while allowing for efficient fuzzing path navigation. Our framework utilizes assembly-level fuzzing as an acceleration engine and is demonstrated on the flagship 5G software stack: srsRAN. The introduced digital twin solution enables the simulation, verification, and connection to 5G testing and attack models in real-world scenarios. By identifying and analyzing vulnerabilities on the digital twin platform, we significantly improve the security and resilience of 5G systems, mitigate the risks of zero-day vulnerabilities, and provide comprehensive testing environments for current and newly released 5G systems.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175489
Arturo Bellin, Marco Centenaro, F. Granelli
Other than pure performance and cybersecurity, a value that is becoming increasingly important for a mobile network is its power consumption. In fact, the transition from legacy network deployments tightly coupled with the underlying hardware towards fully virtualized ones yields distinct options based on the adopted virtualization technology, each of which deserve appropriate evaluation in terms of energy efficiency. In this paper, we aim at providing a preliminary assessment of the realistic power consumption of a fifth-generation core network deployed in a network edge environment leveraging bare metal, containers, and virtual machines. The results are based on a testbed consisting of commercial off-the-shelf hardware and open-source software, and show that the deployment based on virtual machines is the first one that saturates the power consumption, thus reducing the maximum achievable throughput. These preliminary insights show the feasibility of a real-time power monitoring system that can condition the dynamic policies applied by the 5G network orchestrator.
{"title":"A Preliminary Study on the Power Consumption of Virtualized Edge 5G Core Networks","authors":"Arturo Bellin, Marco Centenaro, F. Granelli","doi":"10.1109/NetSoft57336.2023.10175489","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175489","url":null,"abstract":"Other than pure performance and cybersecurity, a value that is becoming increasingly important for a mobile network is its power consumption. In fact, the transition from legacy network deployments tightly coupled with the underlying hardware towards fully virtualized ones yields distinct options based on the adopted virtualization technology, each of which deserve appropriate evaluation in terms of energy efficiency. In this paper, we aim at providing a preliminary assessment of the realistic power consumption of a fifth-generation core network deployed in a network edge environment leveraging bare metal, containers, and virtual machines. The results are based on a testbed consisting of commercial off-the-shelf hardware and open-source software, and show that the deployment based on virtual machines is the first one that saturates the power consumption, thus reducing the maximum achievable throughput. These preliminary insights show the feasibility of a real-time power monitoring system that can condition the dynamic policies applied by the 5G network orchestrator.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132953096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175402
Nabhasmita Sen, Antony Franklin A
The energy efficiency of 5G and beyond 5G(B5G) networks is critical for reducing the high operational expenditure (OPEX) of mobile network operators. In 5G RAN, functional split enables the disaggregation of baseband functions, which significantly increases energy efficiency but induces various challenges in the placement of baseband functions. Various recent works have focused on addressing these challenges; however, most of the solutions do not consider the delay and data rate requirements of different slices as well as different functional splits. In this work, we aim to develop an energy-efficient baseband function placement strategy that jointly considers different functional splits and network slice-specific requirements. We formulate an Integer Linear Program (ILP) based optimization model to minimize the energy consumption in the network by selecting appropriate functional split and baseband function placement options for RAN slices. We show that our proposed model outperforms the baseline strategies in providing energy efficient baseband function placement solution. To tackle the computational complexity of ILP, we also design a polynomial time heuristic algorithm that can be applied in large-scale scenarios.
{"title":"Towards Energy Efficient Functional Split and Baseband Function Placement for 5G RAN","authors":"Nabhasmita Sen, Antony Franklin A","doi":"10.1109/NetSoft57336.2023.10175402","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175402","url":null,"abstract":"The energy efficiency of 5G and beyond 5G(B5G) networks is critical for reducing the high operational expenditure (OPEX) of mobile network operators. In 5G RAN, functional split enables the disaggregation of baseband functions, which significantly increases energy efficiency but induces various challenges in the placement of baseband functions. Various recent works have focused on addressing these challenges; however, most of the solutions do not consider the delay and data rate requirements of different slices as well as different functional splits. In this work, we aim to develop an energy-efficient baseband function placement strategy that jointly considers different functional splits and network slice-specific requirements. We formulate an Integer Linear Program (ILP) based optimization model to minimize the energy consumption in the network by selecting appropriate functional split and baseband function placement options for RAN slices. We show that our proposed model outperforms the baseline strategies in providing energy efficient baseband function placement solution. To tackle the computational complexity of ILP, we also design a polynomial time heuristic algorithm that can be applied in large-scale scenarios.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175478
J. Murcia, José Francisco Pérez Zarca, Alejandro Molina Zarca, A. Gómez-Skarmeta
Next generation networks and the strength of the distributed computing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. This paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant with the security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources1. We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.1https://www.cisa.gov/known-exploited-vulnerabilities-catalog
{"title":"By-default Security Orchestration on distributed Edge/Cloud Computing Framework","authors":"J. Murcia, José Francisco Pérez Zarca, Alejandro Molina Zarca, A. Gómez-Skarmeta","doi":"10.1109/NetSoft57336.2023.10175478","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175478","url":null,"abstract":"Next generation networks and the strength of the distributed computing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. This paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant with the security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources1. We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.1https://www.cisa.gov/known-exploited-vulnerabilities-catalog","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175418
A. Bhattacharyya, Shunmugapriya Ramanathan, A. Fumagalli, K. Kondepu
Smart living applications represent a significant group of 5G vertical use cases. For the most part, these use cases require mobile network connectivity and service high-availability. Simply put, two essential requirements for these applications are short connection time and uninterrupted user data service. Coupled with the expectation of supporting billions of connected devices, these requirements can be achieved by exploiting New Generation Radio Access Network (NG-RAN) architectures. One such emerging architecture is Cloud Radio Access Network (C-RAN), whose Next Generation NodeB (gNB) functions are physically decoupled into distinct entities, such as Radio Unit (RU), Distributed Unit (DU), and Central Unit (CU). The CUs are connected to 5G Core Network (CN) and are likely to be virtualized and distributed across multiple (micro and macro) data centers. The virtualized CUs (vCUs) are further decoupled into virtualized CU Control-Plane (vCU-CP) and virtualized CU User-Plane (vCU-UP) to increase flexibility and scalability. As these 5G RAN entities are virtualized, various resiliency schemes, such as container migration, must be considered to overcome possible congestion in or malfunction of the hosting server.In this paper, two distinct cloud-native RAN resiliency scenarios are evaluated while live-migrating gNB-vCU-CP with the objective of maintaining User Equipment (UE) connection time short and user data service uninterrupted in support of smart living and other advanced applications.
智能生活应用代表了一组重要的5G垂直用例。在大多数情况下,这些用例需要移动网络连接和服务高可用性。简单地说,这些应用程序的两个基本要求是短连接时间和不间断的用户数据服务。再加上支持数十亿台连接设备的期望,这些要求可以通过利用新一代无线接入网(NG-RAN)架构来实现。云无线接入网(C-RAN)就是这样一种新兴架构,其下一代NodeB (gNB)功能在物理上解耦为不同的实体,如无线电单元(RU)、分布式单元(DU)和中央单元(CU)。cu连接到5G核心网(CN),可能被虚拟化并分布在多个(微观和宏观)数据中心。vcu (virtual CU)进一步解耦为vCU-CP (virtual CU Control-Plane)和vCU-UP (virtual CU User-Plane),提高了灵活性和可扩展性。由于这些5G RAN实体是虚拟化的,因此必须考虑各种弹性方案,例如容器迁移,以克服托管服务器中可能出现的拥塞或故障。本文在实时迁移gNB-vCU-CP时,评估了两种不同的云原生RAN弹性方案,目的是保持用户设备(UE)连接时间短,用户数据服务不中断,以支持智能生活和其他高级应用。
{"title":"Towards Disaggregated Resilient 5G Radio Access Network: A Proof of Concept","authors":"A. Bhattacharyya, Shunmugapriya Ramanathan, A. Fumagalli, K. Kondepu","doi":"10.1109/NetSoft57336.2023.10175418","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175418","url":null,"abstract":"Smart living applications represent a significant group of 5G vertical use cases. For the most part, these use cases require mobile network connectivity and service high-availability. Simply put, two essential requirements for these applications are short connection time and uninterrupted user data service. Coupled with the expectation of supporting billions of connected devices, these requirements can be achieved by exploiting New Generation Radio Access Network (NG-RAN) architectures. One such emerging architecture is Cloud Radio Access Network (C-RAN), whose Next Generation NodeB (gNB) functions are physically decoupled into distinct entities, such as Radio Unit (RU), Distributed Unit (DU), and Central Unit (CU). The CUs are connected to 5G Core Network (CN) and are likely to be virtualized and distributed across multiple (micro and macro) data centers. The virtualized CUs (vCUs) are further decoupled into virtualized CU Control-Plane (vCU-CP) and virtualized CU User-Plane (vCU-UP) to increase flexibility and scalability. As these 5G RAN entities are virtualized, various resiliency schemes, such as container migration, must be considered to overcome possible congestion in or malfunction of the hosting server.In this paper, two distinct cloud-native RAN resiliency scenarios are evaluated while live-migrating gNB-vCU-CP with the objective of maintaining User Equipment (UE) connection time short and user data service uninterrupted in support of smart living and other advanced applications.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}