Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175485
Hao Jiang, Hyunseok Chang, S. Mukherjee, J. Merwe
State-disaggregated Network Function Virtualization (NFV) architectures decouple NF states from packet processing logic to achieve elasticity and resilience in stateful NFs. However, the existing state disaggregation approaches suffer from either poor NF performance due to frequent remote state access or potential inconsistencies in state updates when multiple NF instances concurrently access shared states. Moreover, they do not properly support state rejuvenation/expiration which is required for resource scalability of stateful NF operations. This paper presents a new state-disaggregated NFV system called RESCue that addresses these problems. RESCue handles remote state access differently for shared and private states. For efficient and consistent access of shared states, it leverages a lightweight custom control message protocol between NFs and a centralized state server. For private state access, it adopts a remote-paging-based interface to avoid introducing expensive blocking remote access within the critical path of NF packet processing. Finally, it utilizes non-blocking operations for state rejuvenation/expiration handling to minimize its performance overhead. Our evaluation of a RESCue prototype shows that it can handle NF scaling and failure recovery well, while supporting consistent state updates and state rejuvenation/expiration without compromising performance.
NFV (state - aggregated Network Function Virtualization)架构将NFV状态与数据包处理逻辑解耦,从而在有状态NFs中实现弹性和弹性。然而,现有的状态分解方法要么由于频繁的远程状态访问而导致NF性能较差,要么当多个NF实例并发访问共享状态时,状态更新可能不一致。此外,它们不能很好地支持状态恢复/过期,而这是有状态NF操作的资源可扩展性所必需的。本文提出了一种新的状态分解NFV系统,称为RESCue,以解决这些问题。RESCue以不同的方式处理共享状态和私有状态的远程状态访问。为了高效和一致地访问共享状态,它利用NFs和集中式状态服务器之间的轻量级自定义控制消息协议。对于私有状态访问,采用基于远程分页的接口,避免了在NF报文处理的关键路径上引入昂贵的阻塞远程访问。最后,它利用非阻塞操作进行状态恢复/过期处理,以最小化其性能开销。我们对RESCue原型的评估表明,它可以很好地处理NF缩放和故障恢复,同时支持一致的状态更新和状态恢复/过期,而不会影响性能。
{"title":"RESCue: A State-Disaggregated NFV System with Resilience, Elasticity, and State Consistency","authors":"Hao Jiang, Hyunseok Chang, S. Mukherjee, J. Merwe","doi":"10.1109/NetSoft57336.2023.10175485","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175485","url":null,"abstract":"State-disaggregated Network Function Virtualization (NFV) architectures decouple NF states from packet processing logic to achieve elasticity and resilience in stateful NFs. However, the existing state disaggregation approaches suffer from either poor NF performance due to frequent remote state access or potential inconsistencies in state updates when multiple NF instances concurrently access shared states. Moreover, they do not properly support state rejuvenation/expiration which is required for resource scalability of stateful NF operations. This paper presents a new state-disaggregated NFV system called RESCue that addresses these problems. RESCue handles remote state access differently for shared and private states. For efficient and consistent access of shared states, it leverages a lightweight custom control message protocol between NFs and a centralized state server. For private state access, it adopts a remote-paging-based interface to avoid introducing expensive blocking remote access within the critical path of NF packet processing. Finally, it utilizes non-blocking operations for state rejuvenation/expiration handling to minimize its performance overhead. Our evaluation of a RESCue prototype shows that it can handle NF scaling and failure recovery well, while supporting consistent state updates and state rejuvenation/expiration without compromising performance.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130674117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175471
S. Sardellitti, Marco Polverini, S. Barbarossa, A. Cianfrani, P. Lorenzo, M. Listanti
In band Network Telemetry (INT) is a technique aiming at collecting telemetry information by inserting it inside the data packets, instead of relying on classical centralized monitoring elements that periodically query the network devices. The main drawback of INT is represented by the introduced per-packet overhead, that could negatively affect some traffic flows, especially those having stringent QoS requirements. To deal with the increase in the packet length caused by INT, in this paper we introduce the Sampling and Recovering paradigm to overcome the classical Collect Everything approach where all the INT data must be gathered. The proposed approach hinges on signal processing strategies to sample and recover sparse flow signals. The key idea is to reduce the number of INT data to collect and exploit signal reconstruction algorithms to obtain the unseen samples. The preliminary performance evaluation shows that the 18% of INT data are enough to get an accurate reconstruction of the overall network situation, while allowing for 90% of overhead reduction with respect to the Collect Everything case.
{"title":"In Band Network Telemetry Overhead Reduction Based on Data Flows Sampling and Recovering","authors":"S. Sardellitti, Marco Polverini, S. Barbarossa, A. Cianfrani, P. Lorenzo, M. Listanti","doi":"10.1109/NetSoft57336.2023.10175471","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175471","url":null,"abstract":"In band Network Telemetry (INT) is a technique aiming at collecting telemetry information by inserting it inside the data packets, instead of relying on classical centralized monitoring elements that periodically query the network devices. The main drawback of INT is represented by the introduced per-packet overhead, that could negatively affect some traffic flows, especially those having stringent QoS requirements. To deal with the increase in the packet length caused by INT, in this paper we introduce the Sampling and Recovering paradigm to overcome the classical Collect Everything approach where all the INT data must be gathered. The proposed approach hinges on signal processing strategies to sample and recover sparse flow signals. The key idea is to reduce the number of INT data to collect and exploit signal reconstruction algorithms to obtain the unseen samples. The preliminary performance evaluation shows that the 18% of INT data are enough to get an accurate reconstruction of the overall network situation, while allowing for 90% of overhead reduction with respect to the Collect Everything case.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117017141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175502
Rodrigo Ferraz Azevedo, L. B. D. Paula, F. Verdi
Cloud Network Slicing (CNS) is a concept that describes a mechanism to provide computing, networking, and storage as a virtual slice entity, enabling new approaches to applications and structuring resources at the edge of the network. In this paper, the architecture defined in the NECOS Project is adopted, and the functions for creating CNS in resource-constrained edge devices were designed and implemented. The implementation was evaluated on Single Board Computers (SBCs), using lightweight virtualization solutions (microservices) and the results achieved show that it is possible to instantiate CNSs on that hardware, however, also show some limitations of multiple slice support on resource-constrained devices.
{"title":"Design and Implementation of a Slice as a Service Architecture on the Edge Cloud with Resource Constraints","authors":"Rodrigo Ferraz Azevedo, L. B. D. Paula, F. Verdi","doi":"10.1109/NetSoft57336.2023.10175502","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175502","url":null,"abstract":"Cloud Network Slicing (CNS) is a concept that describes a mechanism to provide computing, networking, and storage as a virtual slice entity, enabling new approaches to applications and structuring resources at the edge of the network. In this paper, the architecture defined in the NECOS Project is adopted, and the functions for creating CNS in resource-constrained edge devices were designed and implemented. The implementation was evaluated on Single Board Computers (SBCs), using lightweight virtualization solutions (microservices) and the results achieved show that it is possible to instantiate CNSs on that hardware, however, also show some limitations of multiple slice support on resource-constrained devices.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175454
Alex Randles, D. O’Sullivan, J. Keeney, Liam Fallon
Autonomic network management approaches have not been widely adopted, mainly due to significant unsolved challenges. Challenges include technical complexity, lack of consistent models and knowledge bases describing the system, and the difficulty of evolving management methods and processes. Autonomic approaches often operate a closed control loop. Such loops enable dynamicity and are often intent driven, where system goals and requirements are declared, then automatically accomplished and maintained. These loops continuously monitor and analyze large amounts of information to infer knowledge about the system.Representing the knowledge as semantic graphs is well suited to automated inference, enabling hidden relationships, strategies and understanding to be identified. When applied in an autonomic network management system this automatic discovery of additional knowledge can be used in several ways to inform and improve intent driven closed control loops.This paper describes the design and evaluation of an ontology to represent and help interpret, validate and apply high level goals or ‘intents’ as part of a closed control loop. This approach enables these intents to be enforced, satisfied and maintained. The ontology forms part of a framework which generates graph-based data from network monitoring information collected in a commonly used network/cloud monitoring service (Prometheus). The ontology also models intents relative to the monitoring knowledge. Furthermore, the model has the capabilities to allow the monitored network to adapt, then helps plan how to continuously satisfy and maintain the intent. Finally, the ontology and framework are applied in a real-life use case, which relates to Quality of Service (QoS) assurance for a 5G Telecoms Network Slice. The use case is designed to motivate and demonstrate the usefulness of the approach.
{"title":"Ontology Driven Closed Control Loop Automation","authors":"Alex Randles, D. O’Sullivan, J. Keeney, Liam Fallon","doi":"10.1109/NetSoft57336.2023.10175454","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175454","url":null,"abstract":"Autonomic network management approaches have not been widely adopted, mainly due to significant unsolved challenges. Challenges include technical complexity, lack of consistent models and knowledge bases describing the system, and the difficulty of evolving management methods and processes. Autonomic approaches often operate a closed control loop. Such loops enable dynamicity and are often intent driven, where system goals and requirements are declared, then automatically accomplished and maintained. These loops continuously monitor and analyze large amounts of information to infer knowledge about the system.Representing the knowledge as semantic graphs is well suited to automated inference, enabling hidden relationships, strategies and understanding to be identified. When applied in an autonomic network management system this automatic discovery of additional knowledge can be used in several ways to inform and improve intent driven closed control loops.This paper describes the design and evaluation of an ontology to represent and help interpret, validate and apply high level goals or ‘intents’ as part of a closed control loop. This approach enables these intents to be enforced, satisfied and maintained. The ontology forms part of a framework which generates graph-based data from network monitoring information collected in a commonly used network/cloud monitoring service (Prometheus). The ontology also models intents relative to the monitoring knowledge. Furthermore, the model has the capabilities to allow the monitored network to adapt, then helps plan how to continuously satisfy and maintain the intent. Finally, the ontology and framework are applied in a real-life use case, which relates to Quality of Service (QoS) assurance for a 5G Telecoms Network Slice. The use case is designed to motivate and demonstrate the usefulness of the approach.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115572701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175434
Pablo Picazo-Martínez, Carlos Barroso-Fernández, Jorge Martín-Pérez
In this demonstration, FoReCo is introduced as a solution for recovering lost control commands in remotely controlled robots. Visitors are given the opportunity to remotely control a robotic arm using a joystick, with the added challenge of experiencing packet losses in the wireless medium. The lost control commands cause the robotic arm’s trajectory to become distorted. To combat this issue, FoReCo is implemented and utilizes an ML model that has been trained on a real-world dataset to recover the lost control commands. The demonstration illustrates how FoReCo recovers the lost commands, resulting in the robotic arm operating smoothly despite the presence of wireless medium losses.
{"title":"Demo: FoReCo – a forecast-based recovery mechanism for real-time remote control of robotic manipulators","authors":"Pablo Picazo-Martínez, Carlos Barroso-Fernández, Jorge Martín-Pérez","doi":"10.1109/NetSoft57336.2023.10175434","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175434","url":null,"abstract":"In this demonstration, FoReCo is introduced as a solution for recovering lost control commands in remotely controlled robots. Visitors are given the opportunity to remotely control a robotic arm using a joystick, with the added challenge of experiencing packet losses in the wireless medium. The lost control commands cause the robotic arm’s trajectory to become distorted. To combat this issue, FoReCo is implemented and utilizes an ML model that has been trained on a real-world dataset to recover the lost control commands. The demonstration illustrates how FoReCo recovers the lost commands, resulting in the robotic arm operating smoothly despite the presence of wireless medium losses.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/NetSoft57336.2023.10175477
Daichi Takeya, Ryota Kawashima, Hiroki Nakayama, Tsunemasa Hayashi, H. Matsuo
One big challenge in cloud-native network functions (CNFs) is the poor performance of packet forwarding. In this paper, we comprehensively analyze CPU cache usage in regard to the interprocess communication (vhost-user) as well as the packet I/O framework (DPDK). We cover four high-end CPUs, and examine 141 implementation/configuration patterns on an EIVU (Essential Implementation of Vhost-User) platform to clarify how the patterns affect the cache behaviors. The result pinpoints the roadblocks in a generalized form; cache invalidations stemming from three design/implementation factors are the major bottle-necks in vhost-user/DPDK, and shows potential of 100+ Mpps container networking for future software-centric environment.
{"title":"Understanding Roadblocks in Virtual Network I/O: A Comprehensive Analysis of CPU Cache Usage","authors":"Daichi Takeya, Ryota Kawashima, Hiroki Nakayama, Tsunemasa Hayashi, H. Matsuo","doi":"10.1109/NetSoft57336.2023.10175477","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175477","url":null,"abstract":"One big challenge in cloud-native network functions (CNFs) is the poor performance of packet forwarding. In this paper, we comprehensively analyze CPU cache usage in regard to the interprocess communication (vhost-user) as well as the packet I/O framework (DPDK). We cover four high-end CPUs, and examine 141 implementation/configuration patterns on an EIVU (Essential Implementation of Vhost-User) platform to clarify how the patterns affect the cache behaviors. The result pinpoints the roadblocks in a generalized form; cache invalidations stemming from three design/implementation factors are the major bottle-necks in vhost-user/DPDK, and shows potential of 100+ Mpps container networking for future software-centric environment.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122222333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}