首页 > 最新文献

2022 18th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Function Placement and Acceleration for In-Network Federated Learning Services 网络内联邦学习服务的功能配置与加速
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964625
Nour-El-Houda Yellas, B. Addis, R. Riggio, Stefano Secci
Edge intelligence combined with federated learning is considered as a way to distributed learning and inference tasks in a scalable way, by analyzing data close to where it is generated, unlike traditional cloud computing where data is offloaded to remote servers. In this paper, we address the placement of Artificial Intelligence Functions (AIF) making use of federated learning and hardware acceleration. We model the behavior of federated learning and related inference point to guide the placement decision, taking into consideration the specific constraint and the empirical behavior of a virtualized infrastructure anomaly detection use-case. Besides hardware acceleration, we consider the specific training time trend when distributing training over a network, by using empirical piece-wise linear distributions. We model the placement problem as a MILP and we propose a variant of the problem. Simulation results show the impact that hardware acceleration can have in the decision of the number of AIF to enable, while dividing by a relevant factor the distributed training time. We also show how our approach exacerbates the importance of monitoring an end-to-end learning system delay budget composed of link propagation delay and distributed training time in the location of AIFs.
边缘智能与联邦学习相结合,被认为是一种可扩展的分布式学习和推理任务的方法,通过分析接近其生成位置的数据,而不像传统云计算那样将数据卸载到远程服务器。在本文中,我们利用联邦学习和硬件加速来解决人工智能函数(AIF)的放置问题。考虑到虚拟基础设施异常检测用例的特定约束和经验行为,我们对联邦学习和相关推理点的行为进行建模,以指导放置决策。除了硬件加速外,我们还通过使用经验分段线性分布,在网络上分布训练时考虑特定的训练时间趋势。我们将定位问题建模为一个MILP,并提出了该问题的一个变体。仿真结果表明,硬件加速在决定启用的AIF数量时可以产生影响,同时除以相关因子的分布式训练时间。我们还展示了我们的方法如何加剧了监测端到端学习系统延迟预算的重要性,该延迟预算由aif位置的链路传播延迟和分布式训练时间组成。
{"title":"Function Placement and Acceleration for In-Network Federated Learning Services","authors":"Nour-El-Houda Yellas, B. Addis, R. Riggio, Stefano Secci","doi":"10.23919/CNSM55787.2022.9964625","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964625","url":null,"abstract":"Edge intelligence combined with federated learning is considered as a way to distributed learning and inference tasks in a scalable way, by analyzing data close to where it is generated, unlike traditional cloud computing where data is offloaded to remote servers. In this paper, we address the placement of Artificial Intelligence Functions (AIF) making use of federated learning and hardware acceleration. We model the behavior of federated learning and related inference point to guide the placement decision, taking into consideration the specific constraint and the empirical behavior of a virtualized infrastructure anomaly detection use-case. Besides hardware acceleration, we consider the specific training time trend when distributing training over a network, by using empirical piece-wise linear distributions. We model the placement problem as a MILP and we propose a variant of the problem. Simulation results show the impact that hardware acceleration can have in the decision of the number of AIF to enable, while dividing by a relevant factor the distributed training time. We also show how our approach exacerbates the importance of monitoring an end-to-end learning system delay budget composed of link propagation delay and distributed training time in the location of AIFs.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Find Out: How Do Your Data Packets Travel? 找出:你的数据包是如何传输的?
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965091
T. Dreibholz, Somnath Mazumdar
In today’s communication-centric world, users generate and exchange a massive amount of data. The Internet helps user data to travel from one part of the world to another, via a complex set of network systems. These systems are intelligent, heterogeneous, and non-transparent to users. This paper presents an extensive, trace-driven study of user data traffic covering five years of observations, six large ISPs, 22 different autonomous systems, and a total of 12 countries. This work aims to make users aware of how their data travels in the Internet, as the interests of ISPs majorly influence the data traffic path. Although data traffic should prefer to travel through countries that share land borders, we found that the shortest land distance between the two countries does not impact data path selection.1
在当今以通信为中心的世界中,用户生成和交换大量数据。互联网通过一套复杂的网络系统,帮助用户数据从世界的一个地方传输到另一个地方。这些系统对用户来说是智能的、异构的和不透明的。本文介绍了一项广泛的、追踪驱动的用户数据流量研究,涵盖了5年的观察,6个大型互联网服务提供商,22个不同的自治系统,总共12个国家。这项工作的目的是让用户意识到他们的数据是如何在互联网上传播的,因为互联网服务提供商的利益主要影响数据流量路径。虽然数据流量更倾向于通过共享陆地边界的国家,但我们发现,两国之间最短的陆地距离并不影响数据路径的选择
{"title":"Find Out: How Do Your Data Packets Travel?","authors":"T. Dreibholz, Somnath Mazumdar","doi":"10.23919/CNSM55787.2022.9965091","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965091","url":null,"abstract":"In today’s communication-centric world, users generate and exchange a massive amount of data. The Internet helps user data to travel from one part of the world to another, via a complex set of network systems. These systems are intelligent, heterogeneous, and non-transparent to users. This paper presents an extensive, trace-driven study of user data traffic covering five years of observations, six large ISPs, 22 different autonomous systems, and a total of 12 countries. This work aims to make users aware of how their data travels in the Internet, as the interests of ISPs majorly influence the data traffic path. Although data traffic should prefer to travel through countries that share land borders, we found that the shortest land distance between the two countries does not impact data path selection.1","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Network and End-host Policy Management for Network Slicing 网络切片的集成网络和终端主机策略管理
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964529
Alexander Rabitsch, Themis Anagnostopoulos, Karl-Johan Grinnemo, Joseph McNamara, A. Bosneag, M. Kourtis, G. Xilouris, Özgü Alay, A. Brunström
5G mobile networks introduce the concept of network slicing, the functionality of creating virtual networks on top of shared physical infrastructure. Such slices can be tailored to various vertical services. A single User Equipment (UE) may be served by multiple network slice instances simultaneously, which opens up the possibility of dynamically steering traffic in response to the specific needs of individual applications – and as a reaction to events inside the network, e.g., network failures.This paper presents the PoLicy-based Architecture for Network Slicing (PLANS). In this policy framework, the network slice management entity in the 5G core and the UE can cooperatively optimize the usage of the available network slices via policy systems installed both inside the network and on the UE. The PLANS architecture has been implemented and evaluated in a 5G testbed. For two different case studies, we show how such a system can be leveraged to provide optimized services and increased robustness against network failures. First, we consider a drone autopilot scenario, and demonstrate how PLANS can reduce network-slice recovery time by more than 90%. Second, we illustrate for a 360°video streaming scenario how PLANS can help prevent video quality degradation when a network slice becomes unavailable.
5G移动网络引入了网络切片的概念,即在共享物理基础设施之上创建虚拟网络的功能。这样的切片可以针对不同的垂直服务进行定制。单个用户设备(UE)可以同时由多个网络切片实例提供服务,这为响应单个应用程序的特定需求而动态引导流量提供了可能性,并且可以作为对网络内部事件(例如网络故障)的反应。提出了一种基于策略的网络切片体系结构(PLANS)。在该策略框架下,5G核心的网络切片管理实体和终端可以通过安装在网络内部和终端上的策略系统,共同优化可用网络切片的使用。计划架构已经在5G测试平台上实现和评估。对于两个不同的案例研究,我们将展示如何利用这样的系统来提供优化的服务并增强对网络故障的健壮性。首先,我们考虑了无人机自动驾驶场景,并演示了PLANS如何将网络切片恢复时间减少90%以上。其次,我们为360°视频流场景演示了当网络切片不可用时,PLANS如何帮助防止视频质量下降。
{"title":"Integrated Network and End-host Policy Management for Network Slicing","authors":"Alexander Rabitsch, Themis Anagnostopoulos, Karl-Johan Grinnemo, Joseph McNamara, A. Bosneag, M. Kourtis, G. Xilouris, Özgü Alay, A. Brunström","doi":"10.23919/CNSM55787.2022.9964529","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964529","url":null,"abstract":"5G mobile networks introduce the concept of network slicing, the functionality of creating virtual networks on top of shared physical infrastructure. Such slices can be tailored to various vertical services. A single User Equipment (UE) may be served by multiple network slice instances simultaneously, which opens up the possibility of dynamically steering traffic in response to the specific needs of individual applications – and as a reaction to events inside the network, e.g., network failures.This paper presents the PoLicy-based Architecture for Network Slicing (PLANS). In this policy framework, the network slice management entity in the 5G core and the UE can cooperatively optimize the usage of the available network slices via policy systems installed both inside the network and on the UE. The PLANS architecture has been implemented and evaluated in a 5G testbed. For two different case studies, we show how such a system can be leveraged to provide optimized services and increased robustness against network failures. First, we consider a drone autopilot scenario, and demonstrate how PLANS can reduce network-slice recovery time by more than 90%. Second, we illustrate for a 360°video streaming scenario how PLANS can help prevent video quality degradation when a network slice becomes unavailable.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-aware SFC Migration Scheduling Based on Encoder-Decoder RNN for Cloud-Native Platform 基于云原生平台编码器-解码器RNN的qos感知SFC迁移调度
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964715
Takahiro Hirayama, M. Jibiki, T. Miyazawa, Ved P. Kafle
Service function chaining (SFC) provides the plat-form for flexible resource management by dynamically allocating resources to virtual and/or container network functions (VNFs/CNFs). To meet the quality of service (QoS) requirements while facing increasing resource demands, the sys-tem will require the migration of the VNFs/CNFs from the current server to the others that offer sufficient resources. In this study, we formulate an integer linear programming (ILP) based optimization model to solve the function migration scheduling problem so that it meets QoS requirements of each service function (SF) chain. The remarkable points of this work are the following two points. The one is that we consider latency between VNFs/CNFs belonging to an SF chain, avoiding overhead due to their unnecessary migration and resource shortage. And the other is that we consider the case in which each VNF/CNF must be to be deployed strictly to a designated virtual machine (or container). To reduce complexity, we apply an encoder-decoder recurrent neural network (ED-RNN) as a machine learning model to the function migration scheduling problem. Performance evaluations show that the ED-RNN based approach achieves a similar performance as the ILP, while adding the benefits of very low complexity.
SFC (Service function chains)通过将资源动态分配给虚拟和/或容器网络功能(VNFs/ cnf),为灵活的资源管理提供了平台。为了满足服务质量(QoS)要求,同时面对日益增长的资源需求,系统将需要将VNFs/CNFs从当前服务器迁移到提供足够资源的其他服务器。在本研究中,我们建立了一个基于整数线性规划(ILP)的优化模型来解决功能迁移调度问题,使其满足每个业务功能链(SF)的QoS要求。这项工作的突出之处在于以下两点。一个是我们考虑了属于一个SF链的VNFs/CNFs之间的延迟,避免了由于不必要的迁移和资源短缺而造成的开销。另一种是我们考虑每个VNF/CNF必须严格部署到指定的虚拟机(或容器)的情况。为了降低复杂性,我们将编码器-解码器递归神经网络(ED-RNN)作为机器学习模型应用于函数迁移调度问题。性能评估表明,基于ED-RNN的方法实现了与ILP相似的性能,同时增加了非常低的复杂性的好处。
{"title":"QoS-aware SFC Migration Scheduling Based on Encoder-Decoder RNN for Cloud-Native Platform","authors":"Takahiro Hirayama, M. Jibiki, T. Miyazawa, Ved P. Kafle","doi":"10.23919/CNSM55787.2022.9964715","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964715","url":null,"abstract":"Service function chaining (SFC) provides the plat-form for flexible resource management by dynamically allocating resources to virtual and/or container network functions (VNFs/CNFs). To meet the quality of service (QoS) requirements while facing increasing resource demands, the sys-tem will require the migration of the VNFs/CNFs from the current server to the others that offer sufficient resources. In this study, we formulate an integer linear programming (ILP) based optimization model to solve the function migration scheduling problem so that it meets QoS requirements of each service function (SF) chain. The remarkable points of this work are the following two points. The one is that we consider latency between VNFs/CNFs belonging to an SF chain, avoiding overhead due to their unnecessary migration and resource shortage. And the other is that we consider the case in which each VNF/CNF must be to be deployed strictly to a designated virtual machine (or container). To reduce complexity, we apply an encoder-decoder recurrent neural network (ED-RNN) as a machine learning model to the function migration scheduling problem. Performance evaluations show that the ED-RNN based approach achieves a similar performance as the ILP, while adding the benefits of very low complexity.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"21 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122062626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Function-as-a-Service Orchestration in Fog Computing Environments 雾计算环境中的功能即服务编排
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964970
Gaetano Francesco Pittalà, G. Davoli, D. Borsatti, W. Cerroni, C. Raffaelli
With the establishment of the Everything-as-a-Service (XaaS) paradigm for service provisioning, coupled with the increasingly-demanding requirements imposed by modern network services, the need for a XaaS-aware orchestration system able to cope with a heterogeneous infrastructure, such as the one of Fog Computing environments, is evident. In this work, we describe the working principles and implementation aspects that allow the orchestration of services offered according to the Function-as-a-Service (FaaS) model. The live demonstration will showcase the ability of the system to deploy this kind of services on a suitable test bed, with comments on the procedure and the performance.
随着用于服务供应的“一切即服务”(XaaS)范式的建立,再加上现代网络服务施加的日益苛刻的需求,对能够处理异构基础设施(如雾计算环境之一)的支持XaaS的编排系统的需求是显而易见的。在本文中,我们描述了允许根据功能即服务(FaaS)模型提供的服务编排的工作原理和实现方面。现场演示将展示系统在合适的测试平台上部署此类服务的能力,并对过程和性能进行评论。
{"title":"Function-as-a-Service Orchestration in Fog Computing Environments","authors":"Gaetano Francesco Pittalà, G. Davoli, D. Borsatti, W. Cerroni, C. Raffaelli","doi":"10.23919/CNSM55787.2022.9964970","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964970","url":null,"abstract":"With the establishment of the Everything-as-a-Service (XaaS) paradigm for service provisioning, coupled with the increasingly-demanding requirements imposed by modern network services, the need for a XaaS-aware orchestration system able to cope with a heterogeneous infrastructure, such as the one of Fog Computing environments, is evident. In this work, we describe the working principles and implementation aspects that allow the orchestration of services offered according to the Function-as-a-Service (FaaS) model. The live demonstration will showcase the ability of the system to deploy this kind of services on a suitable test bed, with comments on the procedure and the performance.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114174040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
iRED: Improving the DASH QoS by dropping packets in programmable data planes red:通过在可编程数据平面中丢弃数据包来改善DASH QoS
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964949
L. Almeida, Guilherme Matos, R. Pasquini, C. Papagianni, F. Verdi
Video services account for the largest share of all Internet traffic, demanding a network capable of supporting the requirements of delay-sensitive traffic. Fluctuations in network load can cause high delays in the queues of network routers, which tend to degrade the Quality of Service (QoS) for adaptive video streaming, such as Dynamic Adaptive Streaming over HTTP (DASH). This work is positioned in the scope of active management queues (AQM) to improve the QoS of a DASH service by means of dropping packets. One traditional AQM that adopts a packet drop policy is Random Early Detection (RED), developed to drain the flow in times of congestion and thus reduce queueing delay. We revisited and implemented a P4-based implementation of RED, named iRED (ingress RED), an algorithm capable of dropping packets at the ingress pipeline, an innovation compared to other AQM strategies based on dropping at the egress. iRED was evaluated in two scenarios. First, we compare iRED against state-of-art AQM algorithms employing egress packet dropping in terms of Round-Trip Time (RTT), throughput and their impact on resources usage. Our findings indicate that iRED outperforms existing P4-based approaches by approximately up to 2.5x in RTT and 0.75x in throughput for the given buffer sizes. Next, we compare iRED versus Tail Drop (TD) approach in an emulated programmable Content Delivery Network (CDN) employing DASH. Experiments indicate that the iRED improve the QoS by approximately 0.85x in terms of cached video available in the client’s buffer and 0.9x in Frames Per Second (FPS) played.
视频业务在整个互联网流量中所占的比例最大,因此需要一个能够支持延迟敏感流量需求的网络。网络负载的波动可能导致网络路由器队列的高延迟,这往往会降低自适应视频流的服务质量(QoS),例如基于HTTP的动态自适应流(DASH)。这项工作定位在主动管理队列(AQM)的范围内,通过丢弃数据包来提高DASH服务的QoS。采用丢包策略的一种传统AQM是随机早期检测(RED),它的开发目的是在拥塞时排出流量,从而减少排队延迟。我们重新审视并实现了一个基于p4的RED实现,名为iRED (ingress RED),这是一种能够在入口管道上丢弃数据包的算法,与其他基于在出口上丢弃的AQM策略相比,这是一种创新。在两种情况下评估iRED。首先,我们在往返时间(RTT)、吞吐量及其对资源使用的影响方面,将iRED与采用出口丢包的最先进AQM算法进行了比较。我们的研究结果表明,对于给定的缓冲区大小,iRED的RTT性能比现有的基于p4的方法高出约2.5倍,吞吐量提高0.75倍。接下来,我们在采用DASH的模拟可编程内容分发网络(CDN)中比较iRED与尾降(TD)方法。实验表明,就客户端缓冲区中可用的缓存视频而言,iRED将QoS提高了约0.85倍,每秒播放帧数(FPS)提高了0.9倍。
{"title":"iRED: Improving the DASH QoS by dropping packets in programmable data planes","authors":"L. Almeida, Guilherme Matos, R. Pasquini, C. Papagianni, F. Verdi","doi":"10.23919/CNSM55787.2022.9964949","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964949","url":null,"abstract":"Video services account for the largest share of all Internet traffic, demanding a network capable of supporting the requirements of delay-sensitive traffic. Fluctuations in network load can cause high delays in the queues of network routers, which tend to degrade the Quality of Service (QoS) for adaptive video streaming, such as Dynamic Adaptive Streaming over HTTP (DASH). This work is positioned in the scope of active management queues (AQM) to improve the QoS of a DASH service by means of dropping packets. One traditional AQM that adopts a packet drop policy is Random Early Detection (RED), developed to drain the flow in times of congestion and thus reduce queueing delay. We revisited and implemented a P4-based implementation of RED, named iRED (ingress RED), an algorithm capable of dropping packets at the ingress pipeline, an innovation compared to other AQM strategies based on dropping at the egress. iRED was evaluated in two scenarios. First, we compare iRED against state-of-art AQM algorithms employing egress packet dropping in terms of Round-Trip Time (RTT), throughput and their impact on resources usage. Our findings indicate that iRED outperforms existing P4-based approaches by approximately up to 2.5x in RTT and 0.75x in throughput for the given buffer sizes. Next, we compare iRED versus Tail Drop (TD) approach in an emulated programmable Content Delivery Network (CDN) employing DASH. Experiments indicate that the iRED improve the QoS by approximately 0.85x in terms of cached video available in the client’s buffer and 0.9x in Frames Per Second (FPS) played.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131483813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LOCOMOTIVE 5G Core for 6G ready Resilient and Highly Available Network Slices and SFCs 机车5G核心,适用于6G ready弹性和高可用网络切片和sfc
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964553
Sourav Sarkar, Shwetha Vittal, Antony Franklin A
The presence of a Load Balancer (LB)s is much significant to keep up the High Availability (HA) and resilience of the scalable 5G Core (5GC). The whole system may collapse just because of inefficient LB at any NF, resulting in total disruption to the High Availability (HA) service. In this paper, we present the LOCOMOTIVE 5GC which outperforms the traditional hot standby in both HA and resilience during various dynamic conditions. LOCOMOTIVE serves 16% (at least) more user requests compared to hot standby in the control plane while handling unexpected overloaded conditions (without the failure of LB). During the failures of LB, it drops 22% lesser user requests than hot standby. With this outstanding resilience, LOCOMOTIVE even achieves 4% better availability than the hot standby in an active-active cluster configuration. To prove the feasibility of LOCOMOTIVE and to encourage further research works in the world of LBs, we developed its entire framework in a 3GPP compliant 5G test-bed system along with eXpress Data Path (XDP) and extended Berkeley Packet Filter (eBPF) framework.
负载均衡器(LB)的存在对于保持可扩展5G Core (5GC)的高可用性(HA)和弹性非常重要。在任何一个NF上,由于负载均衡效率低下,整个系统都可能崩溃,从而导致HA (High Availability)服务完全中断。在本文中,我们提出了机车5GC,在各种动态条件下,它在HA和弹性方面都优于传统的热备。与控制平面的热备相比,在处理意外过载情况(没有LB故障)时,机车服务的用户请求增加了16%(至少)。在LB故障期间,它比热备减少22%的用户请求。有了这种出色的弹性,机车的可用性甚至比双活集群配置中的热备高4%。为了证明机车的可行性并鼓励LBs领域的进一步研究工作,我们在符合3GPP的5G测试平台系统中开发了机车的整个框架,以及eXpress数据路径(XDP)和扩展的伯克利数据包过滤器(eBPF)框架。
{"title":"LOCOMOTIVE 5G Core for 6G ready Resilient and Highly Available Network Slices and SFCs","authors":"Sourav Sarkar, Shwetha Vittal, Antony Franklin A","doi":"10.23919/CNSM55787.2022.9964553","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964553","url":null,"abstract":"The presence of a Load Balancer (LB)s is much significant to keep up the High Availability (HA) and resilience of the scalable 5G Core (5GC). The whole system may collapse just because of inefficient LB at any NF, resulting in total disruption to the High Availability (HA) service. In this paper, we present the LOCOMOTIVE 5GC which outperforms the traditional hot standby in both HA and resilience during various dynamic conditions. LOCOMOTIVE serves 16% (at least) more user requests compared to hot standby in the control plane while handling unexpected overloaded conditions (without the failure of LB). During the failures of LB, it drops 22% lesser user requests than hot standby. With this outstanding resilience, LOCOMOTIVE even achieves 4% better availability than the hot standby in an active-active cluster configuration. To prove the feasibility of LOCOMOTIVE and to encourage further research works in the world of LBs, we developed its entire framework in a 3GPP compliant 5G test-bed system along with eXpress Data Path (XDP) and extended Berkeley Packet Filter (eBPF) framework.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"481 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scope-based Flow Monitoring to Improve Traffic Analysis in Programmable Networks 基于范围的流量监测改进可编程网络中的流量分析
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964741
Christoph Hardegen
Flow monitoring allows to obtain an aggregated network traffic view that can be leveraged for subsequent analysis. Since network management tasks like flow-based traffic classification or prediction benefit from broader data views, the flow tracking scope used to export required traffic metadata can be enlarged: First, coherent packet streams can not only be monitored in a unidirectional but also bidirectional context that combines interrelated forward and backward direction views. Second, time-based subflow management for both contexts separates observed packet streams into consecutive windows covering a particular fraction to gain higher data granularity. To support these diversified traffic views in combination with variable feature sets for demand-driven data export serving different traffic analysis tasks, flow tracking and export strategies are required to operate in a dynamic manner. This paper proposes a flow monitoring approach enabling to track the four aforementioned scopes while adapting timeout-based data export operating on programmable switches. A multi-level system architecture and an adaptive protocol ensure flexible sharing and analysis of data records. Evaluations show that exported data can be used to improve analysis outcomes, whereby the considered data scope affects achieved accuracy but also the monitoring overhead.
流量监控允许获得聚合的网络流量视图,该视图可用于后续分析。由于基于流的流量分类或预测等网络管理任务受益于更广泛的数据视图,因此可以扩大用于导出所需流量元数据的流跟踪范围:首先,不仅可以在单向上下文中监控连贯的数据包流,还可以在双向上下文中监控相互关联的正向和反向视图。其次,这两种上下文的基于时间的子流管理将观察到的数据包流分离到覆盖特定部分的连续窗口中,以获得更高的数据粒度。为了支持这些多样化的流量视图,并结合需求驱动数据导出的可变特征集,为不同的流量分析任务服务,流量跟踪和导出策略需要以动态的方式运行。本文提出了一种流量监测方法,能够跟踪上述四个范围,同时适应基于超时的数据导出操作在可编程开关上。多级系统架构和自适应协议保证了数据记录的灵活共享和分析。评估表明,导出的数据可用于改进分析结果,因此所考虑的数据范围会影响实现的准确性,但也会影响监视开销。
{"title":"Scope-based Flow Monitoring to Improve Traffic Analysis in Programmable Networks","authors":"Christoph Hardegen","doi":"10.23919/CNSM55787.2022.9964741","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964741","url":null,"abstract":"Flow monitoring allows to obtain an aggregated network traffic view that can be leveraged for subsequent analysis. Since network management tasks like flow-based traffic classification or prediction benefit from broader data views, the flow tracking scope used to export required traffic metadata can be enlarged: First, coherent packet streams can not only be monitored in a unidirectional but also bidirectional context that combines interrelated forward and backward direction views. Second, time-based subflow management for both contexts separates observed packet streams into consecutive windows covering a particular fraction to gain higher data granularity. To support these diversified traffic views in combination with variable feature sets for demand-driven data export serving different traffic analysis tasks, flow tracking and export strategies are required to operate in a dynamic manner. This paper proposes a flow monitoring approach enabling to track the four aforementioned scopes while adapting timeout-based data export operating on programmable switches. A multi-level system architecture and an adaptive protocol ensure flexible sharing and analysis of data records. Evaluations show that exported data can be used to improve analysis outcomes, whereby the considered data scope affects achieved accuracy but also the monitoring overhead.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124754333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Black-box Attacks to Log-based Anomaly Detection 黑盒攻击到基于日志的异常检测
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964935
Shaohan Huang, Yi Liu, Carol J. Fung, Hailong Yang, Zhongzhi Luan
Anomaly detection is the key to Quality of Service (QoS) in many modern systems. Logs, which record the runtime information of system, are widely used for anomaly detection. The security of the log-based anomaly detection has not been well investigated. In this paper, we conduct an empirical study on black-box attacks on log-based anomaly detection. We investigate eight different methods on log attacking and compare their performance on various log parsing methods and log anomaly detection models. We propose a method to evaluate the imperceptibility of log attacking methods. In our experiments, we evaluate the performance on the attack methods on two real log datasets. The results of our experiments show that LogBug outperforms the others in almost all situations. We also compare the imperceptibility of various attack methods and find a trade-off between performance and imperceptibility, where better attack performance means worse imperceptibility. To the best of our knowledge, this is the first work to investigate and compare the attack models on log-based anomaly detection.
在许多现代系统中,异常检测是服务质量的关键。日志记录了系统的运行信息,广泛用于异常检测。基于日志的异常检测的安全性还没有得到很好的研究。本文对基于日志的异常检测中的黑盒攻击进行了实证研究。研究了八种不同的日志攻击方法,并比较了它们在不同日志解析方法和日志异常检测模型上的性能。我们提出了一种评估日志攻击方法不可感知性的方法。在实验中,我们在两个真实日志数据集上评估了攻击方法的性能。我们的实验结果表明,在几乎所有情况下,LogBug的性能都优于其他工具。我们还比较了各种攻击方法的不可感知性,并找到了性能和不可感知性之间的权衡,其中更好的攻击性能意味着更差的不可感知性。据我们所知,这是第一个研究和比较基于日志的异常检测的攻击模型的工作。
{"title":"Black-box Attacks to Log-based Anomaly Detection","authors":"Shaohan Huang, Yi Liu, Carol J. Fung, Hailong Yang, Zhongzhi Luan","doi":"10.23919/CNSM55787.2022.9964935","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964935","url":null,"abstract":"Anomaly detection is the key to Quality of Service (QoS) in many modern systems. Logs, which record the runtime information of system, are widely used for anomaly detection. The security of the log-based anomaly detection has not been well investigated. In this paper, we conduct an empirical study on black-box attacks on log-based anomaly detection. We investigate eight different methods on log attacking and compare their performance on various log parsing methods and log anomaly detection models. We propose a method to evaluate the imperceptibility of log attacking methods. In our experiments, we evaluate the performance on the attack methods on two real log datasets. The results of our experiments show that LogBug outperforms the others in almost all situations. We also compare the imperceptibility of various attack methods and find a trade-off between performance and imperceptibility, where better attack performance means worse imperceptibility. To the best of our knowledge, this is the first work to investigate and compare the attack models on log-based anomaly detection.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexiCast: A Structure-Adaptive Protocol for Efficient Data-Sharing in IoT FlexiCast:物联网中高效数据共享的结构自适应协议
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964962
Madhav Tummula, Manish Kausik H, S. Saha
IoT-technology is gaining a wide popularity over a large range of applications including not only monitoring of structures but also management and control of smart-systems. An IoT-system, in general, is composed of a number of IoT-devices which form a wireless decentralized setting as they get installed over a specific area to serve a particular purpose. The structure of the underlying wireless network depends on the structure of the target where the system gets deployed and hence, widely varies based on the exact application. Such structural variations often have an impact on the performance of the underlying IoT-protocols. Unfortunately most of the network protocols do not take care of such issues explicitly. For instance, although there have been quite significant development in the data-sharing protocols, especially with the advent of Synchronous-Transmission (ST), most of them are designed without considering the variation in the structural formation of the base networks. These protocols are tested over either in small scale simulated networks or in testbed settings bearing fixed/homogeneous structures. In this work, we demonstrate that the property of self-adaptability in an IoT-system can enable it not only to run faster but also save substantial energy which is an extremely important issue in the context of low-power system, in general. In particular, we design and implement a flexible and structure-adaptive many-to-many data-sharing protocol FlexiCast. Through extensive experiments under emulation-settings and IoT-testbeds we demonstrate that FlexiCast performs upto 49% faster and consumes upto 53% lesser energy compared to the case when it does not adapt to the network structure.
物联网技术在广泛的应用中得到广泛的普及,不仅包括对结构的监测,还包括智能系统的管理和控制。一般来说,物联网系统由许多物联网设备组成,这些设备在安装在特定区域以服务于特定目的时形成无线分散设置。底层无线网络的结构取决于部署系统的目标的结构,因此,根据确切的应用程序有很大的不同。这种结构变化通常会影响底层物联网协议的性能。不幸的是,大多数网络协议都没有明确地处理这些问题。例如,虽然数据共享协议已经有了相当大的发展,特别是随着同步传输(ST)的出现,但大多数协议的设计都没有考虑到基础网络结构形成的变化。这些协议要么在小规模模拟网络中进行测试,要么在承载固定/均匀结构的试验台设置中进行测试。在这项工作中,我们证明了物联网系统的自适应特性不仅可以使其运行更快,而且可以节省大量能量,这在低功耗系统中通常是一个极其重要的问题。特别地,我们设计并实现了一个灵活的、结构自适应的多对多数据共享协议FlexiCast。通过在仿真设置和物联网测试平台下的大量实验,我们证明,与不适应网络结构的情况相比,FlexiCast的执行速度提高了49%,消耗的能量减少了53%。
{"title":"FlexiCast: A Structure-Adaptive Protocol for Efficient Data-Sharing in IoT","authors":"Madhav Tummula, Manish Kausik H, S. Saha","doi":"10.23919/CNSM55787.2022.9964962","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964962","url":null,"abstract":"IoT-technology is gaining a wide popularity over a large range of applications including not only monitoring of structures but also management and control of smart-systems. An IoT-system, in general, is composed of a number of IoT-devices which form a wireless decentralized setting as they get installed over a specific area to serve a particular purpose. The structure of the underlying wireless network depends on the structure of the target where the system gets deployed and hence, widely varies based on the exact application. Such structural variations often have an impact on the performance of the underlying IoT-protocols. Unfortunately most of the network protocols do not take care of such issues explicitly. For instance, although there have been quite significant development in the data-sharing protocols, especially with the advent of Synchronous-Transmission (ST), most of them are designed without considering the variation in the structural formation of the base networks. These protocols are tested over either in small scale simulated networks or in testbed settings bearing fixed/homogeneous structures. In this work, we demonstrate that the property of self-adaptability in an IoT-system can enable it not only to run faster but also save substantial energy which is an extremely important issue in the context of low-power system, in general. In particular, we design and implement a flexible and structure-adaptive many-to-many data-sharing protocol FlexiCast. Through extensive experiments under emulation-settings and IoT-testbeds we demonstrate that FlexiCast performs upto 49% faster and consumes upto 53% lesser energy compared to the case when it does not adapt to the network structure.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128928247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2022 18th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1