Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165519
Benjamin E. Ujcich, Adam Bates, W. Sanders
Intent-based networking (IBN) promises to simplify the network management and automated orchestration of high-level policies in future networking architectures such as software-defined networking (SDN). However, such abstraction and automation creates new network visibility challenges. Existing SDN network forensics and diagnostics tools operate at a lower level of network abstraction, which makes intent-level reasoning difficult. We present PRovINTENT, a framework extension for SDN control plane tools that accounts for intent semantics. PRovINTENT records the provenance and evolution of intents as the network's state and apps' requests change over time and enables reasoning at multiple abstractions. We define an intent provenance model, we implement a proof-of-concept tool, and we evaluate the efficacy of PRovINTENT'S explanatory capabilities by using a representative intent-driven network application.
{"title":"Provenance for Intent-Based Networking","authors":"Benjamin E. Ujcich, Adam Bates, W. Sanders","doi":"10.1109/NetSoft48620.2020.9165519","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165519","url":null,"abstract":"Intent-based networking (IBN) promises to simplify the network management and automated orchestration of high-level policies in future networking architectures such as software-defined networking (SDN). However, such abstraction and automation creates new network visibility challenges. Existing SDN network forensics and diagnostics tools operate at a lower level of network abstraction, which makes intent-level reasoning difficult. We present PRovINTENT, a framework extension for SDN control plane tools that accounts for intent semantics. PRovINTENT records the provenance and evolution of intents as the network's state and apps' requests change over time and enables reasoning at multiple abstractions. We define an intent provenance model, we implement a proof-of-concept tool, and we evaluate the efficacy of PRovINTENT'S explanatory capabilities by using a representative intent-driven network application.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/netsoft48620.2020.9165512
Shwetha Vittal, M. Singh, A. Franklin
In today's moving world to ambitious 5G, 3GPP has defined three fundamental and promising services, namely enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC) by tuning user's needs on these services to network slicing. While the Network Function Virtualization (NFV) and Software Defined Networking (SDN) are used to enable the network slicing in the mobile network, an effective end-to-end slice management in 5G system is still a challenge to improve the network performance in terms of throughput, latency, and connectivity for each of these envisioned services. In this paper, we focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. We propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). Our results show that by adopting better strategy in these algorithms and considering learned user traffic from the past, in controlling various phases of slice life cycle, we can reduce the response time for a user request by 50%.
{"title":"Adaptive Network Slicing with Multi-Site Deployment in 5G Core Networks","authors":"Shwetha Vittal, M. Singh, A. Franklin","doi":"10.1109/netsoft48620.2020.9165512","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165512","url":null,"abstract":"In today's moving world to ambitious 5G, 3GPP has defined three fundamental and promising services, namely enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC) by tuning user's needs on these services to network slicing. While the Network Function Virtualization (NFV) and Software Defined Networking (SDN) are used to enable the network slicing in the mobile network, an effective end-to-end slice management in 5G system is still a challenge to improve the network performance in terms of throughput, latency, and connectivity for each of these envisioned services. In this paper, we focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. We propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). Our results show that by adopting better strategy in these algorithms and considering learned user traffic from the past, in controlling various phases of slice life cycle, we can reduce the response time for a user request by 50%.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165534
Konstantinos Choumas, T. Korakis
This paper discusses the benefits in the operation of a Raft based SDN controller cluster, when the election of the cluster leader becomes more or less “fair. Raft is a leader based consensus algorithm, which is used by the most popular open-source SDN controllers for replicating the network state. It requires all state changes to be confirmed by the leader, thus the leader election is very crucial for the Raft performance. In case that the inter-controller communication delay is the same for all controller pairs, the election process is absolute fair, meaning that the leadership is shared equally among the controllers. In all other cases, some controllers become leaders more frequently in benefit or at a cost of the average time required for a network state update. In this paper, we model this time as a function of the leadership probabilities of the cluster controllers. We also model these probabilities as a function of the time that each controller is waiting after detecting the current leader failure and before starting its campaign. We configure different ranges for the controller waiting times, adjusting the leadership probabilities and decreasing the average response time. Our model is confirmed by testbed experimentation.
{"title":"When Raft Meets SDN: How to Elect a Leader over a Network","authors":"Konstantinos Choumas, T. Korakis","doi":"10.1109/NetSoft48620.2020.9165534","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165534","url":null,"abstract":"This paper discusses the benefits in the operation of a Raft based SDN controller cluster, when the election of the cluster leader becomes more or less “fair. Raft is a leader based consensus algorithm, which is used by the most popular open-source SDN controllers for replicating the network state. It requires all state changes to be confirmed by the leader, thus the leader election is very crucial for the Raft performance. In case that the inter-controller communication delay is the same for all controller pairs, the election process is absolute fair, meaning that the leadership is shared equally among the controllers. In all other cases, some controllers become leaders more frequently in benefit or at a cost of the average time required for a network state update. In this paper, we model this time as a function of the leadership probabilities of the cluster controllers. We also model these probabilities as a function of the time that each controller is waiting after detecting the current leader failure and before starting its campaign. We configure different ranges for the controller waiting times, adjusting the leadership probabilities and decreasing the average response time. Our model is confirmed by testbed experimentation.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165313
Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri
GNPy is an open source project of the Telecom Infra Project (TIP). It aims at the development of a software library for the abstraction of physical layer data transport, implemented as wavelength division multiplexing (WDM) through open-source code and open APIs, with the purpose of automatizing disaggregated, multi-vendor open optical networks. We first introduce the GNPy library of applications and functionalities, then, we present validation of the GNPy core. The quality-of-transmission estimator (QoT-E) enables a quick and accurate prediction of the unique performance metric in WDM data transport of optical networks: the Generalized Signal-to-Noise Ratio (GSNR). The presented validation experiments show an excellent accuracy in predicting the GSNR compared to the values obtained experimentally. Finally, we present the GNPy integration with the ONOS network OS in a multi-vendor scenario including open reconfigurable add drop multiplexers (ROADMs) and the related validation experiment.
{"title":"The GNPy Open Source Library of Applications for Software Abstraction of WDM Data Transport in Open Optical Networks","authors":"Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri","doi":"10.1109/NetSoft48620.2020.9165313","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165313","url":null,"abstract":"GNPy is an open source project of the Telecom Infra Project (TIP). It aims at the development of a software library for the abstraction of physical layer data transport, implemented as wavelength division multiplexing (WDM) through open-source code and open APIs, with the purpose of automatizing disaggregated, multi-vendor open optical networks. We first introduce the GNPy library of applications and functionalities, then, we present validation of the GNPy core. The quality-of-transmission estimator (QoT-E) enables a quick and accurate prediction of the unique performance metric in WDM data transport of optical networks: the Generalized Signal-to-Noise Ratio (GSNR). The presented validation experiments show an excellent accuracy in predicting the GSNR compared to the values obtained experimentally. Finally, we present the GNPy integration with the ONOS network OS in a multi-vendor scenario including open reconfigurable add drop multiplexers (ROADMs) and the related validation experiment.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165459
U. Tupakula, V. Varadharajan, K. Karmakar
Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.
{"title":"Attack Detection on the Software Defined Networking Switches","authors":"U. Tupakula, V. Varadharajan, K. Karmakar","doi":"10.1109/NetSoft48620.2020.9165459","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165459","url":null,"abstract":"Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165335
S. V. Damme, M. T. Vega, F. Turck
Augmented Reality (AR) and Virtual Reality (VR) multimodal systems are the latest trend within the field of multimedia. As they emulate the senses by means of omnidirectional visuals, 360° sound, motion tracking and touch simulation, they are able to create a strong feeling of presence and interaction with the virtual environment. These experiences can be applied for virtual training (Industry 4.0), tele-surgery (healthcare) or remote learning (education). However, given the strong time and task sensitiveness of these applications, it is of great importance to sustain the end-user quality, i.e. the Quality-of-Experience (QoE), at all times. Lack of synchronization and quality degradation need to be reduced to a minimum to avoid feelings of cybersickness or loss of immersiveness and concentration. This means that there is a need to shift the quality management from system-centered performance metrics towards a more human, QoE-centered approach. However, this requires for novel techniques in the three areas of the QoE-management loop (monitoring, modelling and control). This position paper identifies open areas of research to fully enable human-centric driven management of immersive multimedia. To this extent, four main dimensions are put forward: (1) Task and well-being driven subjective assessment; (2) Real-time QoE modelling; (3) Accurate viewport prediction; (4) Machine Learning (ML)-based quality optimization and content recreation. This paper discusses the state-of-the-art, and provides with possible solutions to tackle the open challenges.
{"title":"Human-centric Quality Management of Immersive Multimedia Applications","authors":"S. V. Damme, M. T. Vega, F. Turck","doi":"10.1109/NetSoft48620.2020.9165335","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165335","url":null,"abstract":"Augmented Reality (AR) and Virtual Reality (VR) multimodal systems are the latest trend within the field of multimedia. As they emulate the senses by means of omnidirectional visuals, 360° sound, motion tracking and touch simulation, they are able to create a strong feeling of presence and interaction with the virtual environment. These experiences can be applied for virtual training (Industry 4.0), tele-surgery (healthcare) or remote learning (education). However, given the strong time and task sensitiveness of these applications, it is of great importance to sustain the end-user quality, i.e. the Quality-of-Experience (QoE), at all times. Lack of synchronization and quality degradation need to be reduced to a minimum to avoid feelings of cybersickness or loss of immersiveness and concentration. This means that there is a need to shift the quality management from system-centered performance metrics towards a more human, QoE-centered approach. However, this requires for novel techniques in the three areas of the QoE-management loop (monitoring, modelling and control). This position paper identifies open areas of research to fully enable human-centric driven management of immersive multimedia. To this extent, four main dimensions are put forward: (1) Task and well-being driven subjective assessment; (2) Real-time QoE modelling; (3) Accurate viewport prediction; (4) Machine Learning (ML)-based quality optimization and content recreation. This paper discusses the state-of-the-art, and provides with possible solutions to tackle the open challenges.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165333
Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira
Several works in the literature have proposed migration mechanisms for VNFs, however they only consider the migration of isolated Virtual Network Functions (VNFs) instead of the migration under a shared and chained scenario. Reconfiguration of VNFs, like in the case of migration, is necessary to handle dynamic requirements for the service. However, it is not a straightforward operation. On one hand, it is necessary to coordinate VNFs to achieve migration while maintaining the end-to-end service availability. On the other hand, the new deployment can disrupt the chain and violate predefined services constraints. Moreover if there is no access to global references, migration can introduce inconsistent services due to a lack of knowledge from orchestrators. This paper focuses on the problem of coordinating orchestrators in a NFV federation to achieve migration of shared VNFs with only local domain information. It introduces a novel coordination algorithm that relies on ETSI/MANO specifications. The proposed algorithm is implemented and evaluated for validation purposes. Results show that migration satisfies the constraints for seamless migration and the algorithm obtains better performance compared to state of the art solution with a slight overhead cost when considering the shared VNFs instead of isolated VNFS.
{"title":"Coordination Algorithm for Migration of Shared VNFs in Federated Environments","authors":"Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira","doi":"10.1109/NetSoft48620.2020.9165333","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165333","url":null,"abstract":"Several works in the literature have proposed migration mechanisms for VNFs, however they only consider the migration of isolated Virtual Network Functions (VNFs) instead of the migration under a shared and chained scenario. Reconfiguration of VNFs, like in the case of migration, is necessary to handle dynamic requirements for the service. However, it is not a straightforward operation. On one hand, it is necessary to coordinate VNFs to achieve migration while maintaining the end-to-end service availability. On the other hand, the new deployment can disrupt the chain and violate predefined services constraints. Moreover if there is no access to global references, migration can introduce inconsistent services due to a lack of knowledge from orchestrators. This paper focuses on the problem of coordinating orchestrators in a NFV federation to achieve migration of shared VNFs with only local domain information. It introduces a novel coordination algorithm that relies on ETSI/MANO specifications. The proposed algorithm is implemented and evaluated for validation purposes. Results show that migration satisfies the constraints for seamless migration and the algorithm obtains better performance compared to state of the art solution with a slight overhead cost when considering the shared VNFs instead of isolated VNFS.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/netsoft48620.2020.9165378
P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz
This paper presents the creation of Network Slices, which are composed of Network Services that are either composed of Cloud-native Network Functions or Virtual Network Functions. This is referred to as Hybrid Network Slice. In addition to describing this idea, this paper demonstrates the benefits of Hybrid Network Slices. This idea has been validated in an immersive-media pilot. An Hybrid Network Slice and a classical Network Slice deployments have been compared in order to validate the benefits from the hybrid case.
{"title":"Hybrid Network Slicing: Composing Network Slices based on VNFs, CNFs Network Services","authors":"P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz","doi":"10.1109/netsoft48620.2020.9165378","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165378","url":null,"abstract":"This paper presents the creation of Network Slices, which are composed of Network Services that are either composed of Cloud-native Network Functions or Virtual Network Functions. This is referred to as Hybrid Network Slice. In addition to describing this idea, this paper demonstrates the benefits of Hybrid Network Slices. This idea has been validated in an immersive-media pilot. An Hybrid Network Slice and a classical Network Slice deployments have been compared in order to validate the benefits from the hybrid case.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165393
A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl
The Industry 4.0 sector is evolving in a tremendous pace by introducing a set of industrial automation mechanisms tightly coupled with the exploitation of Internet of Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, and other industrial devices are networked together with industrial applications, formulating the Industrial IoT (IIoT) and aiming to improve the efficiency and reliability of the deployed applications and provide Quality of Service (QoS) guarantees. However, in a 5G era, efficient, reliable and highly performant applications' provision has to be combined with exploitation of capabilities offered by 5G networks. Optimal usage of the available resources has to be realised, while guaranteeing strict QoS requirements such as high data rates, ultra-low latency and jitter. The first step towards this direction is based on the accurate profiling of vertical industries' applications in terms of resources usage, capacity limits and reliability characteristics. To achieve so, in this paper we provide an integrated methodology and approach for benchmarking and profiling 5G vertical industries' applications. This approach covers the realisation of benchmarking experiments and the extraction of insights based on the analysis of the collected data. Such insights are considered the cornerstones for the development of AI models that can lead to optimal infrastructure usage along with assurance of high QoS provision. The detailed approach is applied in a real IIoT use case, leading to profiling of a set of 5G network functions.
通过引入一套与物联网(IoT)、5G和人工智能(AI)技术紧密结合的工业自动化机制,工业4.0领域正在以惊人的速度发展。通过这些新兴技术的结合,互联的传感器、仪器和其他工业设备与工业应用联网,形成工业物联网(IIoT),旨在提高部署应用的效率和可靠性,并提供QoS (Quality of Service)保证。然而,在5G时代,高效、可靠和高性能的应用必须与5G网络提供的功能相结合。必须实现对可用资源的最佳利用,同时保证严格的QoS要求,如高数据速率、超低延迟和抖动。朝着这个方向迈出的第一步是基于对垂直行业应用在资源使用、容量限制和可靠性特征方面的准确分析。为了实现这一目标,在本文中,我们提供了一种集成的方法和方法来对5G垂直行业的应用进行基准测试和分析。这种方法涵盖了基准实验的实现和基于收集数据分析的见解的提取。这些见解被认为是开发人工智能模型的基石,可以导致最佳的基础设施使用,并保证高QoS提供。详细的方法应用于实际的工业物联网用例,从而对一组5G网络功能进行分析。
{"title":"Benchmarking and Profiling 5G Verticals' Applications: An Industrial IoT Use Case","authors":"A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl","doi":"10.1109/NetSoft48620.2020.9165393","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165393","url":null,"abstract":"The Industry 4.0 sector is evolving in a tremendous pace by introducing a set of industrial automation mechanisms tightly coupled with the exploitation of Internet of Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, and other industrial devices are networked together with industrial applications, formulating the Industrial IoT (IIoT) and aiming to improve the efficiency and reliability of the deployed applications and provide Quality of Service (QoS) guarantees. However, in a 5G era, efficient, reliable and highly performant applications' provision has to be combined with exploitation of capabilities offered by 5G networks. Optimal usage of the available resources has to be realised, while guaranteeing strict QoS requirements such as high data rates, ultra-low latency and jitter. The first step towards this direction is based on the accurate profiling of vertical industries' applications in terms of resources usage, capacity limits and reliability characteristics. To achieve so, in this paper we provide an integrated methodology and approach for benchmarking and profiling 5G vertical industries' applications. This approach covers the realisation of benchmarking experiments and the extraction of insights based on the analysis of the collected data. Such insights are considered the cornerstones for the development of AI models that can lead to optimal infrastructure usage along with assurance of high QoS provision. The detailed approach is applied in a real IIoT use case, leading to profiling of a set of 5G network functions.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/NetSoft48620.2020.9165506
Alessio Sacco, Flavio Esposito, G. Marchetto
The edge computing paradigm allows computationally intensive tasks to be offloaded from small devices to nearby (more) powerful servers, via an edge network. The intersection between such edge computing paradigm and Machine Learning (ML), in general, and deep learning in particular, has brought to light several advantages for network operators: from automating management tasks, to gain additional insights on their networks. Most of the existing approaches that use ML to drive routing and traffic control decisions are valuable but rarely focus on challenged networks, that are characterized by continually varying network conditions and the high volume of traffic generated by edge devices. In particular, recently proposed distributed ML-based architectures require either a long synchronization phase or a training phase that is unsustainable for challenged networks. In this paper, we fill this knowledge gap with Blaster, a federated architecture for routing packets within a distributed edge network, to improve the application's performance and allow scalability of data-intensive applications. We also propose a novel path selection model that uses Long Short Term Memory (LSTM) to predict the optimal route. Finally, we present some initial results obtained by testing our approach via simulations and with a prototype deployed over the GENI testbed. By leveraging a Federated Learning (FL) model, our approach shows that we can optimize the communication between SDN controllers, preserving bandwidth for the data traffic.
{"title":"A Federated Learning Approach to Routing in Challenged SDN-Enabled Edge Networks","authors":"Alessio Sacco, Flavio Esposito, G. Marchetto","doi":"10.1109/NetSoft48620.2020.9165506","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165506","url":null,"abstract":"The edge computing paradigm allows computationally intensive tasks to be offloaded from small devices to nearby (more) powerful servers, via an edge network. The intersection between such edge computing paradigm and Machine Learning (ML), in general, and deep learning in particular, has brought to light several advantages for network operators: from automating management tasks, to gain additional insights on their networks. Most of the existing approaches that use ML to drive routing and traffic control decisions are valuable but rarely focus on challenged networks, that are characterized by continually varying network conditions and the high volume of traffic generated by edge devices. In particular, recently proposed distributed ML-based architectures require either a long synchronization phase or a training phase that is unsustainable for challenged networks. In this paper, we fill this knowledge gap with Blaster, a federated architecture for routing packets within a distributed edge network, to improve the application's performance and allow scalability of data-intensive applications. We also propose a novel path selection model that uses Long Short Term Memory (LSTM) to predict the optimal route. Finally, we present some initial results obtained by testing our approach via simulations and with a prototype deployed over the GENI testbed. By leveraging a Federated Learning (FL) model, our approach shows that we can optimize the communication between SDN controllers, preserving bandwidth for the data traffic.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}