首页 > 最新文献

2022 18th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
CNSM 2022 Cover Page cnsm2022封面
Pub Date : 2022-10-31 DOI: 10.23919/cnsm55787.2022.9964972
{"title":"CNSM 2022 Cover Page","authors":"","doi":"10.23919/cnsm55787.2022.9964972","DOIUrl":"https://doi.org/10.23919/cnsm55787.2022.9964972","url":null,"abstract":"","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121729555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Open Platform for Simulating the Physical Layer of 6G Communication Systems with Multiple Intelligent Surfaces 具有多个智能表面的6G通信系统物理层模拟开放平台
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965098
Alexandros Papadopoulos, Antonios Lalas, K. Votis, Dimitrios Tyrovolas, G. Karagiannidis, S. Ioannidis, C. Liaskos
Reconfigurable Intelligent Surfaces (RIS) constitute a promising technology that could fulfill the extreme performance and capacity needs of the upcoming 6G wireless networks, by offering software-defined control over wireless propagation phenomena. Despite the existence of many theoretical models describing various aspects of RIS from the signal processing perspective (e.g., channel fading models), there is no open platform to simulate and study their actual physical-layer behavior, especially in the multi-RIS case. In this paper, we develop an open simulation platform, aimed at modeling the physical-layer electromagnetic coupling and propagation between RIS pairs. We present the platform by initially designing a basic unit cell, and then proceeding to progressively model and simulate multiple and larger RISs. The platform can be used for producing verifiable stochastic models for wireless communication in multi-RIS deployments, such as vehicle-to-everything (V2X) communications in autonomous vehicles and cybersecurity schemes, while its code is freely available to the public.
可重构智能表面(RIS)是一项很有前途的技术,通过提供对无线传播现象的软件定义控制,可以满足即将到来的6G无线网络的极限性能和容量需求。尽管存在许多从信号处理角度描述RIS各个方面的理论模型(如信道衰落模型),但没有开放的平台来模拟和研究其实际物理层行为,特别是在多RIS情况下。在本文中,我们开发了一个开放式仿真平台,旨在对RIS对之间的物理层电磁耦合和传播进行建模。我们首先设计一个基本单元单元,然后逐步建模和模拟多个和更大的RISs。该平台可用于为多ris部署中的无线通信生成可验证的随机模型,例如自动驾驶汽车中的车辆到一切(V2X)通信和网络安全方案,而其代码则免费向公众开放。
{"title":"An Open Platform for Simulating the Physical Layer of 6G Communication Systems with Multiple Intelligent Surfaces","authors":"Alexandros Papadopoulos, Antonios Lalas, K. Votis, Dimitrios Tyrovolas, G. Karagiannidis, S. Ioannidis, C. Liaskos","doi":"10.23919/CNSM55787.2022.9965098","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965098","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RIS) constitute a promising technology that could fulfill the extreme performance and capacity needs of the upcoming 6G wireless networks, by offering software-defined control over wireless propagation phenomena. Despite the existence of many theoretical models describing various aspects of RIS from the signal processing perspective (e.g., channel fading models), there is no open platform to simulate and study their actual physical-layer behavior, especially in the multi-RIS case. In this paper, we develop an open simulation platform, aimed at modeling the physical-layer electromagnetic coupling and propagation between RIS pairs. We present the platform by initially designing a basic unit cell, and then proceeding to progressively model and simulate multiple and larger RISs. The platform can be used for producing verifiable stochastic models for wireless communication in multi-RIS deployments, such as vehicle-to-everything (V2X) communications in autonomous vehicles and cybersecurity schemes, while its code is freely available to the public.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF 基于多维UGF的容器化多租户IMS性能评估
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964678
L. Simone, M. Mauro, M. Longo, R. Natella, F. Postiglione
We advance a performability assessment of a multi- tenant containerized IP Multimedia Subsystem (cIMS), i.e.: one and the same infrastructure is shared among different providers (or tenants). Specifically, we: i) model each cIMS node (a.k.a. Containerized Network Function - CNF) through the Multi-State System (MSS) formalism to capture the dimensionality of the multi-tenant arrangement, and characterize each tenant through queueing theory attributes to catch latency-dependent performance aspects; ii) afford an availability analysis of cIMS by means of an extended version of the Universal Generating Function (UGF) technique, dubbed Multidimensional UGF (MUGF); iii) solve an optimization problem to retrieve the cIMS deployment minimizing costs while guaranteeing high availability requirements. The whole assessment is supported by an experiment based on the containerized IMS platform Clearwater which we deploy to derive some realistic system parameters by means of fault injection techniques.
我们提出了一个多租户容器化IP多媒体子系统(cIMS)的性能评估,即:一个相同的基础设施在不同的提供商(或租户)之间共享。具体来说,我们:i)通过多状态系统(MSS)形式化对每个cIMS节点(又称容器化网络功能- CNF)建模,以捕获多租户安排的维度,并通过排队理论属性描述每个租户,以捕获与延迟相关的性能方面;ii)通过通用生成函数(UGF)技术的扩展版本,称为多维生成函数(MUGF),对cIMS进行可用性分析;iii)解决一个优化问题,以检索cIMS部署,最小化成本,同时保证高可用性需求。在基于Clearwater的集装箱IMS平台上,我们部署了一个实验来支持整个评估,通过故障注入技术获得了一些真实的系统参数。
{"title":"Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF","authors":"L. Simone, M. Mauro, M. Longo, R. Natella, F. Postiglione","doi":"10.23919/CNSM55787.2022.9964678","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964678","url":null,"abstract":"We advance a performability assessment of a multi- tenant containerized IP Multimedia Subsystem (cIMS), i.e.: one and the same infrastructure is shared among different providers (or tenants). Specifically, we: i) model each cIMS node (a.k.a. Containerized Network Function - CNF) through the Multi-State System (MSS) formalism to capture the dimensionality of the multi-tenant arrangement, and characterize each tenant through queueing theory attributes to catch latency-dependent performance aspects; ii) afford an availability analysis of cIMS by means of an extended version of the Universal Generating Function (UGF) technique, dubbed Multidimensional UGF (MUGF); iii) solve an optimization problem to retrieve the cIMS deployment minimizing costs while guaranteeing high availability requirements. The whole assessment is supported by an experiment based on the containerized IMS platform Clearwater which we deploy to derive some realistic system parameters by means of fault injection techniques.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129675966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VM Failure Prediction with Log Analysis using BERT-CNN Model 基于BERT-CNN模型的虚拟机故障预测与日志分析
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965187
Sukhyun Nam, Jae-Hyoung Yoo, J. W. Hong
In this study, we present a failure prediction study of VMs and VNFs in an NFV environment. For the proof of concept, we designed a machine learning model to predict the failure with log analysis and observed the cases where the failure-related logs do not exist in the failed VM, but in the server, or in other VMs operating on the same server. Therefore, in this paper, we propose a model which analyzes the logs of all the related VMs and the server and predicts the possibility that any of the VMs operating on the server will fail. To reduce the huge size of the logs collected from the server and VMs, we propose a pre-processing and tagging method that can improve the performance of our model. In addition, we designed a machine learning model using CNN with BERT, which has performed SOTA in various fields of NLP, to receive logs as input and calculate failure probabilities for the next 30 minutes. To validate the proposed model, we collected failure-related logs and normal logs from an OpenStack testbed, and the experimental result shows that the proposed model can predict the failure of VMs operating in the server with an F1 score of 0.74.
在这项研究中,我们提出了在NFV环境下vm和VNFs的故障预测研究。为了验证概念,我们设计了一个机器学习模型,通过日志分析来预测故障,并观察故障相关日志不存在于故障VM中,但存在于服务器或在同一服务器上运行的其他VM中的情况。因此,在本文中,我们提出了一个模型,该模型可以分析所有相关vm和服务器的日志,并预测在服务器上运行的任何vm失败的可能性。为了减少从服务器和虚拟机收集的大量日志,我们提出了一种预处理和标记方法,可以提高我们模型的性能。此外,我们使用CNN与BERT设计了一个机器学习模型,该模型在NLP的各个领域都进行了SOTA,以接收日志作为输入并计算未来30分钟的故障概率。为了验证所提出的模型,我们收集了OpenStack测试平台的故障相关日志和正常日志,实验结果表明,所提出的模型可以预测服务器上运行的虚拟机的故障,F1得分为0.74。
{"title":"VM Failure Prediction with Log Analysis using BERT-CNN Model","authors":"Sukhyun Nam, Jae-Hyoung Yoo, J. W. Hong","doi":"10.23919/CNSM55787.2022.9965187","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965187","url":null,"abstract":"In this study, we present a failure prediction study of VMs and VNFs in an NFV environment. For the proof of concept, we designed a machine learning model to predict the failure with log analysis and observed the cases where the failure-related logs do not exist in the failed VM, but in the server, or in other VMs operating on the same server. Therefore, in this paper, we propose a model which analyzes the logs of all the related VMs and the server and predicts the possibility that any of the VMs operating on the server will fail. To reduce the huge size of the logs collected from the server and VMs, we propose a pre-processing and tagging method that can improve the performance of our model. In addition, we designed a machine learning model using CNN with BERT, which has performed SOTA in various fields of NLP, to receive logs as input and calculate failure probabilities for the next 30 minutes. To validate the proposed model, we collected failure-related logs and normal logs from an OpenStack testbed, and the experimental result shows that the proposed model can predict the failure of VMs operating in the server with an F1 score of 0.74.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care? 互联网交换点的不对称性——ixp和cdn为什么要关注?
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964817
L. Bertholdo, Sandro L. A. Ferreira, J. Ceron, L. Granville, Ralph Holz, R. V. Rijswijk-Deij
Internet eXchange Points (IXPs) provide an infrastructure where content providers and consumers can freely exchange network traffic. The main incentive for connecting to an IXP is to decrease costs and improve the user experience by having content closer to consumers. Despite these benefits, several small Content Delivery Networks (CDNs) avoid exchanging traffic on IXPs due to the poor routing quality via IXP paths. In this paper, we investigate how traffic asymmetry affects the quality of paths. IXP asymmetry occurs when traffic is sent (or received) via a direct IXP peering but received (or sent) on an alternative path outside the IXP. We employ a new method to quantify a symmetry rate for an IXP, which we evaluate on five IXPs. Our method covers three times more ASes than alternatives, such as using RIPE ATLAS. Our results show that IXPs have 15% asymmetric paths at a distance of one AS hop, i.e., when sending traffic to a given peer on the IXP, 15% of this traffic will be responded via a transit AS that does not use the IXP path. We also identify deaf neighbors, i.e., ASes that never return traffic to the IXP. We identify egress-only paths as a major cause of asymmetries and show that this occurs only for a small number of ASes. We also quantify the impact of traffic asymmetry at IXPs in terms of latency and show that traditional traffic engineering on IXP prefixes can actually make route quality worse.
Internet交换点(ixp)提供了一种基础设施,内容提供者和使用者可以在其中自由交换网络流量。连接到IXP的主要动机是通过让内容更接近消费者来降低成本和改善用户体验。尽管有这些好处,但由于通过IXP路径的路由质量差,一些小型内容交付网络(cdn)避免在IXP上交换流量。本文研究了交通不对称对道路质量的影响。当流量通过直接IXP对等发送(或接收),但在IXP之外的替代路径上接收(或发送)时,就会发生IXP不对称。我们采用了一种新的方法来量化IXP的对称率,我们在五个IXP上进行了评估。我们的方法覆盖的ase数量是其他方法(如使用RIPE ATLAS)的三倍。我们的结果表明,IXP在一个AS跳的距离上有15%的非对称路径,也就是说,当向IXP上的给定对等体发送流量时,15%的流量将通过不使用IXP路径的传输AS响应。我们还识别失聪的邻居,即从不将流量返回到IXP的ase。我们确定仅出口路径是不对称的主要原因,并表明这种情况仅发生在少数ase中。我们还从延迟方面量化了IXP上的流量不对称的影响,并表明基于IXP前缀的传统流量工程实际上会使路由质量变差。
{"title":"On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?","authors":"L. Bertholdo, Sandro L. A. Ferreira, J. Ceron, L. Granville, Ralph Holz, R. V. Rijswijk-Deij","doi":"10.23919/CNSM55787.2022.9964817","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964817","url":null,"abstract":"Internet eXchange Points (IXPs) provide an infrastructure where content providers and consumers can freely exchange network traffic. The main incentive for connecting to an IXP is to decrease costs and improve the user experience by having content closer to consumers. Despite these benefits, several small Content Delivery Networks (CDNs) avoid exchanging traffic on IXPs due to the poor routing quality via IXP paths. In this paper, we investigate how traffic asymmetry affects the quality of paths. IXP asymmetry occurs when traffic is sent (or received) via a direct IXP peering but received (or sent) on an alternative path outside the IXP. We employ a new method to quantify a symmetry rate for an IXP, which we evaluate on five IXPs. Our method covers three times more ASes than alternatives, such as using RIPE ATLAS. Our results show that IXPs have 15% asymmetric paths at a distance of one AS hop, i.e., when sending traffic to a given peer on the IXP, 15% of this traffic will be responded via a transit AS that does not use the IXP path. We also identify deaf neighbors, i.e., ASes that never return traffic to the IXP. We identify egress-only paths as a major cause of asymmetries and show that this occurs only for a small number of ASes. We also quantify the impact of traffic asymmetry at IXPs in terms of latency and show that traditional traffic engineering on IXP prefixes can actually make route quality worse.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs 远程机器人手术:关节安置和vnf - fg的调度
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964591
Amina Hentati, Amin Ebrahimzadeh, R. Glitho, F. Belqasmi, R. Mizouni
Remote robotic surgery is one of the most interesting Tactile Internet (TI) applications. It has a huge potential to deliver healthcare services to remote locations. Moreover, it provides better precision and accuracy to diagnose and operate on patients. Remote robotic surgery requires ultra-low latency and ultra-high reliability. The aforementioned stringent requirements do not apply for all the multimodal data traffic (i.e., audio, video, and haptic) triggered during a surgery session. Hence, customizing resource allocation policies according to the different quality-of-service (QoS) requirements is crucial in order to achieve a cost-effective deployment of such system. In this paper, we focus on resource allocation in a softwarized 5G-enabled TI remote robotic surgery system through the use of Network Functions Virtualization (NFV). Specifically, this work is devoted to the joint placement and scheduling of application components in an NFV-based remote robotic surgery system, while considering haptic and video data. The problem is formulated as an integer linear program (ILP). Due to its complexity, we propose a greedy algorithm to solve the developed ILP in a computationally efficient manner. The simulation results show that our proposed algorithm is close to optimal and outperforms the benchmark solutions in terms of cost and admission rate. Furthermore, our results demonstrate that splitting application traffic to multiple VNF-forwarding graphs (VNF-FGs) with different QoS requirements achieves a significant gain in terms of cost and admission rate compared to modeling the whole application traffic with one VNF-FG having the most stringent requirements.
远程机器人手术是触觉互联网(TI)最有趣的应用之一。它具有向偏远地区提供医疗保健服务的巨大潜力。此外,它为患者的诊断和手术提供了更好的精度和准确性。远程机器人手术需要超低延迟和超高可靠性。上述严格要求并不适用于手术期间触发的所有多模式数据流量(即音频、视频和触觉)。因此,为了实现这种系统的经济有效部署,根据不同的服务质量(QoS)需求定制资源分配策略至关重要。在本文中,我们通过使用网络功能虚拟化(NFV),重点研究了软件化的5g TI远程机器人手术系统中的资源分配。具体而言,本工作致力于基于nfv的远程机器人手术系统中应用组件的关节放置和调度,同时考虑触觉和视频数据。该问题被表述为一个整数线性规划(ILP)。由于其复杂性,我们提出了一种贪婪算法,以计算效率高的方式解决所开发的ILP。仿真结果表明,本文提出的算法接近最优,并且在成本和准入率方面优于基准解决方案。此外,我们的结果表明,与使用一个具有最严格要求的VNF-FG对整个应用流量建模相比,将应用流量拆分为具有不同QoS要求的多个VNF-FG (VNF-FG)在成本和准入率方面取得了显著的收益。
{"title":"Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs","authors":"Amina Hentati, Amin Ebrahimzadeh, R. Glitho, F. Belqasmi, R. Mizouni","doi":"10.23919/CNSM55787.2022.9964591","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964591","url":null,"abstract":"Remote robotic surgery is one of the most interesting Tactile Internet (TI) applications. It has a huge potential to deliver healthcare services to remote locations. Moreover, it provides better precision and accuracy to diagnose and operate on patients. Remote robotic surgery requires ultra-low latency and ultra-high reliability. The aforementioned stringent requirements do not apply for all the multimodal data traffic (i.e., audio, video, and haptic) triggered during a surgery session. Hence, customizing resource allocation policies according to the different quality-of-service (QoS) requirements is crucial in order to achieve a cost-effective deployment of such system. In this paper, we focus on resource allocation in a softwarized 5G-enabled TI remote robotic surgery system through the use of Network Functions Virtualization (NFV). Specifically, this work is devoted to the joint placement and scheduling of application components in an NFV-based remote robotic surgery system, while considering haptic and video data. The problem is formulated as an integer linear program (ILP). Due to its complexity, we propose a greedy algorithm to solve the developed ILP in a computationally efficient manner. The simulation results show that our proposed algorithm is close to optimal and outperforms the benchmark solutions in terms of cost and admission rate. Furthermore, our results demonstrate that splitting application traffic to multiple VNF-forwarding graphs (VNF-FGs) with different QoS requirements achieves a significant gain in terms of cost and admission rate compared to modeling the whole application traffic with one VNF-FG having the most stringent requirements.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions 评估云游戏会话中异常检测的无监督机器学习解决方案
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964533
Joël Roman Ky, B. Mathieu, Abdelkader Lahmadi, R. Boutaba
Cloud gaming applications have gained great adoption on the Internet particularly benefiting from the wide availability of broadband access networks. However, they still fail to meet users’ quality requirements when accessed using cellular networks due to common wireless channel degradations. Machine Learning (ML) techniques can be leveraged to detect such anomalies during users’ cloud gaming sessions. In this respect, unsupervised ML approaches are particularly interesting since they do not require labeled datasets. In this work, we investigate these approaches to understand their performance and their robustness. Our dataset consists of game sessions played on the public Google Stadia Cloud Gaming servers. The game sessions are played using a 4G network emulation replicating the capacity variations sampled on a commercial 4G network. We compare different models ranging from traditional approaches to deep learning and we evaluate their default performance while varying the level of contamination in their training datasets. Our experiments show that Auto-Encoders models achieve the best performance without contamination while the OC-SVM and the Isolation Forest are the most robust to data contamination.
云游戏应用程序在互联网上获得了广泛的采用,特别是受益于宽带接入网络的广泛可用性。然而,当使用蜂窝网络访问时,由于常见的无线信道退化,它们仍然无法满足用户的质量要求。可以利用机器学习(ML)技术在用户的云游戏会话期间检测此类异常情况。在这方面,无监督机器学习方法特别有趣,因为它们不需要标记数据集。在这项工作中,我们研究了这些方法来了解它们的性能和鲁棒性。我们的数据集包括在公共Google Stadia Cloud Gaming服务器上玩的游戏会话。使用复制在商业4G网络上采样的容量变化的4G网络模拟来玩游戏会话。我们比较了从传统方法到深度学习的不同模型,并评估了它们的默认性能,同时改变了训练数据集中的污染水平。我们的实验表明,Auto-Encoders模型在没有污染的情况下获得了最好的性能,而OC-SVM和隔离森林对数据污染的鲁棒性最强。
{"title":"Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions","authors":"Joël Roman Ky, B. Mathieu, Abdelkader Lahmadi, R. Boutaba","doi":"10.23919/CNSM55787.2022.9964533","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964533","url":null,"abstract":"Cloud gaming applications have gained great adoption on the Internet particularly benefiting from the wide availability of broadband access networks. However, they still fail to meet users’ quality requirements when accessed using cellular networks due to common wireless channel degradations. Machine Learning (ML) techniques can be leveraged to detect such anomalies during users’ cloud gaming sessions. In this respect, unsupervised ML approaches are particularly interesting since they do not require labeled datasets. In this work, we investigate these approaches to understand their performance and their robustness. Our dataset consists of game sessions played on the public Google Stadia Cloud Gaming servers. The game sessions are played using a 4G network emulation replicating the capacity variations sampled on a commercial 4G network. We compare different models ranging from traditional approaches to deep learning and we evaluate their default performance while varying the level of contamination in their training datasets. Our experiments show that Auto-Encoders models achieve the best performance without contamination while the OC-SVM and the Isolation Forest are the most robust to data contamination.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Resource Autoscaling in Kubernetes Edge Clusters Kubernetes边缘集群中的分布式资源自动缩放
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965056
Dimitrios Spatharakis, Ioannis Dimolitsas, E. Vlahakis, Dimitrios Dechouniotis, N. Athanasopoulos, S. Papavassiliou
Maximizing the performance of modern applications requires timely resource management of the virtualized resources. However, proactively deploying resources for meeting specific application requirements subject to a dynamic workload profile of incoming requests is extremely challenging. To this end, the fundamental problems of task scheduling and resource autoscaling must be jointly addressed. This paper presents a scalable architecture compatible with the decentralized nature of Kubernetes [1], to solve both. Exploiting the stability guarantees of a novel AIMD-like task scheduling solution, we dynamically redirect the incoming requests towards the containerized application. To cope with dynamic workloads, a prediction mechanism allows us to estimate the number of incoming requests. Additionally, a Machine Learning-based (ML) Application Profiling Modeling is introduced to address the scaling, by co-designing the theoretically-computed service rates obtained from the AIMD algorithm with the current performance metrics. The proposed solution is compared with the state-of-the-art autoscaling techniques under a realistic dataset in a small edge infrastructure and the trade-off between resource utilization and QoS violations are analyzed. Our solution provides better resource utilization by reducing CPU cores by 8% with only an acceptable increase in QoS violations.
为了使现代应用程序的性能最大化,需要对虚拟化资源进行及时的资源管理。然而,根据传入请求的动态工作负载概要,主动部署资源以满足特定的应用程序需求是极具挑战性的。为此,任务调度和资源自动伸缩的基本问题必须共同解决。本文提出了一种与Kubernetes的去中心化特性兼容的可扩展架构[1],以解决这两个问题。利用一种新颖的类似aimd的任务调度解决方案的稳定性保证,我们动态地将传入的请求重定向到容器化的应用程序。为了应对动态工作负载,预测机制允许我们估计传入请求的数量。此外,引入了一种基于机器学习的应用程序分析建模,通过将AIMD算法获得的理论计算的服务率与当前性能指标共同设计,来解决可伸缩性问题。在小边缘基础设施的实际数据集下,将所提出的解决方案与最先进的自缩放技术进行了比较,并分析了资源利用率和QoS违规之间的权衡。我们的解决方案通过减少8%的CPU内核提供了更好的资源利用率,而QoS违规的增加只是可以接受的。
{"title":"Distributed Resource Autoscaling in Kubernetes Edge Clusters","authors":"Dimitrios Spatharakis, Ioannis Dimolitsas, E. Vlahakis, Dimitrios Dechouniotis, N. Athanasopoulos, S. Papavassiliou","doi":"10.23919/CNSM55787.2022.9965056","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965056","url":null,"abstract":"Maximizing the performance of modern applications requires timely resource management of the virtualized resources. However, proactively deploying resources for meeting specific application requirements subject to a dynamic workload profile of incoming requests is extremely challenging. To this end, the fundamental problems of task scheduling and resource autoscaling must be jointly addressed. This paper presents a scalable architecture compatible with the decentralized nature of Kubernetes [1], to solve both. Exploiting the stability guarantees of a novel AIMD-like task scheduling solution, we dynamically redirect the incoming requests towards the containerized application. To cope with dynamic workloads, a prediction mechanism allows us to estimate the number of incoming requests. Additionally, a Machine Learning-based (ML) Application Profiling Modeling is introduced to address the scaling, by co-designing the theoretically-computed service rates obtained from the AIMD algorithm with the current performance metrics. The proposed solution is compared with the state-of-the-art autoscaling techniques under a realistic dataset in a small edge infrastructure and the trade-off between resource utilization and QoS violations are analyzed. Our solution provides better resource utilization by reducing CPU cores by 8% with only an acceptable increase in QoS violations.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128822541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Reinforcement Learning with Graph Neural Networks for Capacitated Shortest Path Tour based Service Chaining 基于图神经网络的有能力最短路径漫游服务链深度强化学习
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965166
Takanori Hara, Masahiro Sasabe
Network functions virtualization (NFV) realizes diverse and flexible network services by executing network functions on generic hardware as virtual network functions (VNFs). A certain network service is regarded as a sequence of VNFs, called service chain. The service chaining (SC) problem aims at finding an appropriate service path from an origin node to a destination node while executing the VNFs at the intermediate nodes in the required order under resource constraints on nodes and links. The SC problem belongs to the complexity class NP-hard. In our previous work, we modeled the SC problem as an integer linear program (ILP) based on the capacitated shortest path tour problem (CSPTP) where the CSPTP is an extended version of the SPTP with the node and link capacity constraints. We also developed the Lagrangian heuristics to achieve the balance between optimality and computational complexity. In this paper, we further propose a deep reinforcement learning (DRL) framework with the graph neural network (GNN) to realize the CSPTP-based SC adaptive to changes in service demand and/or network topology. Numerical results show that (1) the proposed framework achieves almost the same optimality as the ILP for the CSPTP-based SC and (2) it also works well without retraining even when the service demand changes or the network is partly damaged.
网络功能虚拟化(Network functions virtualization, NFV)通过在通用硬件上以VNFs (virtual Network functions)的形式实现网络功能,从而实现多样化、灵活的网络服务。将某一网络业务看作VNFs的序列,称为业务链。服务链(service chains, SC)问题的目的是在节点和链路的资源约束下,在中间节点上按要求的顺序执行vnf,同时寻找一条从源节点到目标节点的合适的服务路径。SC问题属于NP-hard复杂度类。在我们之前的工作中,我们将SC问题建模为基于有能力最短路径漫游问题(CSPTP)的整数线性规划(ILP),其中CSPTP是具有节点和链路容量约束的SPTP的扩展版本。我们还开发了拉格朗日启发式,以实现最优性和计算复杂性之间的平衡。在本文中,我们进一步提出了一种基于图神经网络(GNN)的深度强化学习(DRL)框架,以实现基于csptp的自适应服务需求和/或网络拓扑变化的SC。数值结果表明:(1)对于基于csptp的SC,所提出的框架达到了与ILP几乎相同的最优性;(2)即使在服务需求发生变化或网络部分损坏时,该框架也能在不需要再训练的情况下保持良好的性能。
{"title":"Deep Reinforcement Learning with Graph Neural Networks for Capacitated Shortest Path Tour based Service Chaining","authors":"Takanori Hara, Masahiro Sasabe","doi":"10.23919/CNSM55787.2022.9965166","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965166","url":null,"abstract":"Network functions virtualization (NFV) realizes diverse and flexible network services by executing network functions on generic hardware as virtual network functions (VNFs). A certain network service is regarded as a sequence of VNFs, called service chain. The service chaining (SC) problem aims at finding an appropriate service path from an origin node to a destination node while executing the VNFs at the intermediate nodes in the required order under resource constraints on nodes and links. The SC problem belongs to the complexity class NP-hard. In our previous work, we modeled the SC problem as an integer linear program (ILP) based on the capacitated shortest path tour problem (CSPTP) where the CSPTP is an extended version of the SPTP with the node and link capacity constraints. We also developed the Lagrangian heuristics to achieve the balance between optimality and computational complexity. In this paper, we further propose a deep reinforcement learning (DRL) framework with the graph neural network (GNN) to realize the CSPTP-based SC adaptive to changes in service demand and/or network topology. Numerical results show that (1) the proposed framework achieves almost the same optimality as the ILP for the CSPTP-based SC and (2) it also works well without retraining even when the service demand changes or the network is partly damaged.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
To Embed or Not to Embed SHA in Programmable Network Interface Cards 在可编程网络接口卡中嵌入或不嵌入SHA
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964897
D. Mafioletti, M. Martinello, M. Ribeiro, M. Ruffini, Frank Slyne
Cryptographic hash functions are widely used to provide from digital time stamping to authenticity and digital signatures, mapping an extensive collection of messages into a small set of message digests and help to secure network connection and data, consequently consuming CPU resources. P4 enables data plane customisation using a high-level programming language to facilitate in-network computing development across diverse hardware targets, including Network Interface Cards (NICs). Currently, most P4 targets do not implement secure hash functions due to a lack of hardware instructions or the absence of formal functions to expose their native hardware-based implementation. Moreover, many applications and protocols cannot be instantiated using in-network computing due to stringent requirements based on these hash functions. In order to empower the security and other hash-based applications, in this paper we propose and implement a P4 shared object library for a secure hash algorithm 2 (SHA-2). Our goal is to enable SHA-2 to be used as an embedded Network Function (eNF), overcoming the lack of support in a SmartNIC architecture, in order to address the latency and throughput requirements of Service Function Chain (SFC) forwarding performance within the Network Function Virtualization (NFV) paradigm. Thus, our prototype is evaluated against kernel-level Open vSwitch (OvS) and user-space Data Plane Development Kit (DPDK) implementations. The outcomes demonstrate different tradeoffs over each platform, from the randomness added by the OS to the high cost of executing the aforesaid function using a network programmable device, leading us to highlight the best choice for each specific application.
加密散列函数广泛用于提供从数字时间戳到真实性和数字签名的各种功能,将大量消息集合映射到一小组消息摘要中,并有助于保护网络连接和数据,从而消耗CPU资源。P4支持使用高级编程语言进行数据平面定制,以促进跨各种硬件目标(包括网络接口卡(nic))的网络内计算开发。目前,大多数P4目标都没有实现安全哈希函数,这是由于缺乏硬件指令或缺乏公开其基于硬件的本地实现的正式函数。此外,由于基于这些散列函数的严格要求,许多应用程序和协议无法使用网络内计算实例化。为了增强安全性和其他基于哈希的应用程序,本文提出并实现了一个安全哈希算法2 (SHA-2)的P4共享对象库。我们的目标是使SHA-2能够用作嵌入式网络功能(eNF),克服SmartNIC架构中缺乏支持的问题,以解决网络功能虚拟化(NFV)范式中业务功能链(SFC)转发性能的延迟和吞吐量要求。因此,我们的原型是针对内核级开放虚拟交换机(OvS)和用户空间数据平面开发工具包(DPDK)实现进行评估的。结果显示了在每个平台上不同的权衡,从操作系统增加的随机性到使用网络可编程设备执行上述功能的高成本,导致我们强调每个特定应用程序的最佳选择。
{"title":"To Embed or Not to Embed SHA in Programmable Network Interface Cards","authors":"D. Mafioletti, M. Martinello, M. Ribeiro, M. Ruffini, Frank Slyne","doi":"10.23919/CNSM55787.2022.9964897","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964897","url":null,"abstract":"Cryptographic hash functions are widely used to provide from digital time stamping to authenticity and digital signatures, mapping an extensive collection of messages into a small set of message digests and help to secure network connection and data, consequently consuming CPU resources. P4 enables data plane customisation using a high-level programming language to facilitate in-network computing development across diverse hardware targets, including Network Interface Cards (NICs). Currently, most P4 targets do not implement secure hash functions due to a lack of hardware instructions or the absence of formal functions to expose their native hardware-based implementation. Moreover, many applications and protocols cannot be instantiated using in-network computing due to stringent requirements based on these hash functions. In order to empower the security and other hash-based applications, in this paper we propose and implement a P4 shared object library for a secure hash algorithm 2 (SHA-2). Our goal is to enable SHA-2 to be used as an embedded Network Function (eNF), overcoming the lack of support in a SmartNIC architecture, in order to address the latency and throughput requirements of Service Function Chain (SFC) forwarding performance within the Network Function Virtualization (NFV) paradigm. Thus, our prototype is evaluated against kernel-level Open vSwitch (OvS) and user-space Data Plane Development Kit (DPDK) implementations. The outcomes demonstrate different tradeoffs over each platform, from the randomness added by the OS to the high cost of executing the aforesaid function using a network programmable device, leading us to highlight the best choice for each specific application.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129638083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 18th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1