首页 > 最新文献

2020 6th IEEE Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Provenance for Intent-Based Networking 基于意图的网络的来源
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165519
Benjamin E. Ujcich, Adam Bates, W. Sanders
Intent-based networking (IBN) promises to simplify the network management and automated orchestration of high-level policies in future networking architectures such as software-defined networking (SDN). However, such abstraction and automation creates new network visibility challenges. Existing SDN network forensics and diagnostics tools operate at a lower level of network abstraction, which makes intent-level reasoning difficult. We present PRovINTENT, a framework extension for SDN control plane tools that accounts for intent semantics. PRovINTENT records the provenance and evolution of intents as the network's state and apps' requests change over time and enables reasoning at multiple abstractions. We define an intent provenance model, we implement a proof-of-concept tool, and we evaluate the efficacy of PRovINTENT'S explanatory capabilities by using a representative intent-driven network application.
基于意图的网络(IBN)有望在未来的网络架构(如软件定义网络(SDN))中简化网络管理和高级策略的自动化编排。然而,这种抽象和自动化带来了新的网络可见性挑战。现有的SDN网络取证和诊断工具在较低的网络抽象级别上运行,这使得意图级推理变得困难。我们提出了PRovINTENT,一个SDN控制平面工具的框架扩展,用于解释意图语义。随着时间的推移,随着网络状态和应用程序请求的变化,PRovINTENT记录了意图的起源和演变,并支持多个抽象的推理。我们定义了一个意图来源模型,实现了一个概念验证工具,并通过使用一个具有代表性的意图驱动的网络应用程序来评估PRovINTENT解释能力的有效性。
{"title":"Provenance for Intent-Based Networking","authors":"Benjamin E. Ujcich, Adam Bates, W. Sanders","doi":"10.1109/NetSoft48620.2020.9165519","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165519","url":null,"abstract":"Intent-based networking (IBN) promises to simplify the network management and automated orchestration of high-level policies in future networking architectures such as software-defined networking (SDN). However, such abstraction and automation creates new network visibility challenges. Existing SDN network forensics and diagnostics tools operate at a lower level of network abstraction, which makes intent-level reasoning difficult. We present PRovINTENT, a framework extension for SDN control plane tools that accounts for intent semantics. PRovINTENT records the provenance and evolution of intents as the network's state and apps' requests change over time and enables reasoning at multiple abstractions. We define an intent provenance model, we implement a proof-of-concept tool, and we evaluate the efficacy of PRovINTENT'S explanatory capabilities by using a representative intent-driven network application.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adaptive Network Slicing with Multi-Site Deployment in 5G Core Networks 5G核心网多站部署自适应网络切片
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165512
Shwetha Vittal, M. Singh, A. Franklin
In today's moving world to ambitious 5G, 3GPP has defined three fundamental and promising services, namely enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC) by tuning user's needs on these services to network slicing. While the Network Function Virtualization (NFV) and Software Defined Networking (SDN) are used to enable the network slicing in the mobile network, an effective end-to-end slice management in 5G system is still a challenge to improve the network performance in terms of throughput, latency, and connectivity for each of these envisioned services. In this paper, we focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. We propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). Our results show that by adopting better strategy in these algorithms and considering learned user traffic from the past, in controlling various phases of slice life cycle, we can reduce the response time for a user request by 50%.
在向雄心勃勃的5G迈进的今天,3GPP通过将用户对这些服务的需求调整为网络切片,定义了三种基本且有前景的服务,即增强型移动宽带(eMBB)、超可靠低延迟通信(uRLLC)和大规模机器类型通信(mMTC)。虽然使用网络功能虚拟化(NFV)和软件定义网络(SDN)来实现移动网络中的网络切片,但在5G系统中,有效的端到端切片管理仍然是一个挑战,要提高网络性能,包括吞吐量、延迟和每项预期服务的连通性。在本文中,我们使用具有一致概念证明的单一管理和编排实体,重点关注不同站点上网络切片的端到端网络切片生命周期管理。我们提出了有效地激活、停用和停用网络切片的算法,利用网络切片管理功能(NSMF)中的网络切片的实时状态信息。我们的研究结果表明,通过在这些算法中采用更好的策略并考虑过去学习到的用户流量,在控制切片生命周期的各个阶段,我们可以将用户请求的响应时间减少50%。
{"title":"Adaptive Network Slicing with Multi-Site Deployment in 5G Core Networks","authors":"Shwetha Vittal, M. Singh, A. Franklin","doi":"10.1109/netsoft48620.2020.9165512","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165512","url":null,"abstract":"In today's moving world to ambitious 5G, 3GPP has defined three fundamental and promising services, namely enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC) by tuning user's needs on these services to network slicing. While the Network Function Virtualization (NFV) and Software Defined Networking (SDN) are used to enable the network slicing in the mobile network, an effective end-to-end slice management in 5G system is still a challenge to improve the network performance in terms of throughput, latency, and connectivity for each of these envisioned services. In this paper, we focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. We propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). Our results show that by adopting better strategy in these algorithms and considering learned user traffic from the past, in controlling various phases of slice life cycle, we can reduce the response time for a user request by 50%.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
When Raft Meets SDN: How to Elect a Leader over a Network 当Raft遇到SDN:如何在网络上选举领导者
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165534
Konstantinos Choumas, T. Korakis
This paper discusses the benefits in the operation of a Raft based SDN controller cluster, when the election of the cluster leader becomes more or less “fair. Raft is a leader based consensus algorithm, which is used by the most popular open-source SDN controllers for replicating the network state. It requires all state changes to be confirmed by the leader, thus the leader election is very crucial for the Raft performance. In case that the inter-controller communication delay is the same for all controller pairs, the election process is absolute fair, meaning that the leadership is shared equally among the controllers. In all other cases, some controllers become leaders more frequently in benefit or at a cost of the average time required for a network state update. In this paper, we model this time as a function of the leadership probabilities of the cluster controllers. We also model these probabilities as a function of the time that each controller is waiting after detecting the current leader failure and before starting its campaign. We configure different ranges for the controller waiting times, adjusting the leadership probabilities and decreasing the average response time. Our model is confirmed by testbed experimentation.
本文讨论了基于Raft的SDN控制器集群运行的好处,当集群领导者的选举变得或多或少“公平”时。Raft是一种基于leader的共识算法,它被最流行的开源SDN控制器用于复制网络状态。它要求所有的状态变化都必须得到leader的确认,因此leader的选举对Raft的性能至关重要。如果所有控制器对的控制器间通信延迟相同,则选举过程是绝对公平的,即领导权在控制器之间平均分配。在所有其他情况下,一些控制器更频繁地成为领导者,或者以网络状态更新所需的平均时间为代价。在本文中,我们将此时间建模为集群控制器的领导概率的函数。我们还将这些概率建模为每个控制器在检测到当前领导者失败后和开始其活动之前等待的时间的函数。我们配置不同范围的控制器等待时间,调整领导概率和减少平均响应时间。通过实验验证了该模型的正确性。
{"title":"When Raft Meets SDN: How to Elect a Leader over a Network","authors":"Konstantinos Choumas, T. Korakis","doi":"10.1109/NetSoft48620.2020.9165534","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165534","url":null,"abstract":"This paper discusses the benefits in the operation of a Raft based SDN controller cluster, when the election of the cluster leader becomes more or less “fair. Raft is a leader based consensus algorithm, which is used by the most popular open-source SDN controllers for replicating the network state. It requires all state changes to be confirmed by the leader, thus the leader election is very crucial for the Raft performance. In case that the inter-controller communication delay is the same for all controller pairs, the election process is absolute fair, meaning that the leadership is shared equally among the controllers. In all other cases, some controllers become leaders more frequently in benefit or at a cost of the average time required for a network state update. In this paper, we model this time as a function of the leadership probabilities of the cluster controllers. We also model these probabilities as a function of the time that each controller is waiting after detecting the current leader failure and before starting its campaign. We configure different ranges for the controller waiting times, adjusting the leadership probabilities and decreasing the average response time. Our model is confirmed by testbed experimentation.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The GNPy Open Source Library of Applications for Software Abstraction of WDM Data Transport in Open Optical Networks 开放光网络中WDM数据传输软件抽象的GNPy开源应用程序库
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165313
Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri
GNPy is an open source project of the Telecom Infra Project (TIP). It aims at the development of a software library for the abstraction of physical layer data transport, implemented as wavelength division multiplexing (WDM) through open-source code and open APIs, with the purpose of automatizing disaggregated, multi-vendor open optical networks. We first introduce the GNPy library of applications and functionalities, then, we present validation of the GNPy core. The quality-of-transmission estimator (QoT-E) enables a quick and accurate prediction of the unique performance metric in WDM data transport of optical networks: the Generalized Signal-to-Noise Ratio (GSNR). The presented validation experiments show an excellent accuracy in predicting the GSNR compared to the values obtained experimentally. Finally, we present the GNPy integration with the ONOS network OS in a multi-vendor scenario including open reconfigurable add drop multiplexers (ROADMs) and the related validation experiment.
GNPy是电信基础设施项目(TIP)的一个开源项目。它旨在开发一个物理层数据传输抽象的软件库,通过开源代码和开放api实现波分复用(WDM),目的是自动化分解的多厂商开放光网络。我们首先介绍GNPy的应用程序和功能库,然后,我们给出GNPy核心的验证。传输质量估计器(QoT-E)能够快速准确地预测光网络中WDM数据传输的独特性能指标:广义信噪比(GSNR)。验证实验结果表明,与实验结果相比,预测GSNR具有较高的精度。最后,我们介绍了GNPy与ONOS网络操作系统在多供应商场景下的集成,包括开放的可重构加丢多路复用器(roadm)和相关的验证实验。
{"title":"The GNPy Open Source Library of Applications for Software Abstraction of WDM Data Transport in Open Optical Networks","authors":"Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri","doi":"10.1109/NetSoft48620.2020.9165313","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165313","url":null,"abstract":"GNPy is an open source project of the Telecom Infra Project (TIP). It aims at the development of a software library for the abstraction of physical layer data transport, implemented as wavelength division multiplexing (WDM) through open-source code and open APIs, with the purpose of automatizing disaggregated, multi-vendor open optical networks. We first introduce the GNPy library of applications and functionalities, then, we present validation of the GNPy core. The quality-of-transmission estimator (QoT-E) enables a quick and accurate prediction of the unique performance metric in WDM data transport of optical networks: the Generalized Signal-to-Noise Ratio (GSNR). The presented validation experiments show an excellent accuracy in predicting the GSNR compared to the values obtained experimentally. Finally, we present the GNPy integration with the ONOS network OS in a multi-vendor scenario including open reconfigurable add drop multiplexers (ROADMs) and the related validation experiment.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attack Detection on the Software Defined Networking Switches 软件定义组网交换机攻击检测
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165459
U. Tupakula, V. Varadharajan, K. Karmakar
Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.
软件定义网络(SDN)是一种颠覆性的网络技术,它采用集中式框架,便于细粒度的网络管理。然而,SDN的安全性仍处于起步阶段,需要大量的工作来应对SDN中的各种攻击。在本文中,我们讨论了一些可能的攻击SDN交换机和提出了检测攻击交换机的技术。我们为SDN控制器开发了一个交换机安全应用程序(SSA),它利用可信计算技术和一些附加组件来检测对交换机的攻击。特别是,在配置交换机上的流规则之前,使用TPM认证来确保交换机在启动期间处于受信任状态。附加组件用于存储和验证与交换机的流规则配置相关的消息。存储的信息用于生成关于交换机中预期流规则的可信报告,并使用此信息验证交换机中实际执行的流规则。如果交换机中执行的流规则与SSA预期的流规则相比有任何变化,则认为交换机受到攻击,并向SDN管理员发出警报。管理员可以将交换机与网络隔离,也可以使用可信报告恢复交换机中的流规则。我们还将介绍我们的技术的原型实现。
{"title":"Attack Detection on the Software Defined Networking Switches","authors":"U. Tupakula, V. Varadharajan, K. Karmakar","doi":"10.1109/NetSoft48620.2020.9165459","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165459","url":null,"abstract":"Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human-centric Quality Management of Immersive Multimedia Applications 沉浸式多媒体应用以人为本的质量管理
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165335
S. V. Damme, M. T. Vega, F. Turck
Augmented Reality (AR) and Virtual Reality (VR) multimodal systems are the latest trend within the field of multimedia. As they emulate the senses by means of omnidirectional visuals, 360° sound, motion tracking and touch simulation, they are able to create a strong feeling of presence and interaction with the virtual environment. These experiences can be applied for virtual training (Industry 4.0), tele-surgery (healthcare) or remote learning (education). However, given the strong time and task sensitiveness of these applications, it is of great importance to sustain the end-user quality, i.e. the Quality-of-Experience (QoE), at all times. Lack of synchronization and quality degradation need to be reduced to a minimum to avoid feelings of cybersickness or loss of immersiveness and concentration. This means that there is a need to shift the quality management from system-centered performance metrics towards a more human, QoE-centered approach. However, this requires for novel techniques in the three areas of the QoE-management loop (monitoring, modelling and control). This position paper identifies open areas of research to fully enable human-centric driven management of immersive multimedia. To this extent, four main dimensions are put forward: (1) Task and well-being driven subjective assessment; (2) Real-time QoE modelling; (3) Accurate viewport prediction; (4) Machine Learning (ML)-based quality optimization and content recreation. This paper discusses the state-of-the-art, and provides with possible solutions to tackle the open challenges.
增强现实(AR)和虚拟现实(VR)多模态系统是多媒体领域的最新发展趋势。由于它们通过全方位的视觉、360°的声音、运动跟踪和触摸模拟来模拟感官,它们能够创造出一种强烈的存在感和与虚拟环境的互动。这些经验可以应用于虚拟培训(工业4.0)、远程手术(医疗保健)或远程学习(教育)。然而,由于这些应用程序具有很强的时间和任务敏感性,因此始终保持最终用户质量(即体验质量(QoE))非常重要。缺乏同步和质量下降需要减少到最低限度,以避免晕机或失去沉浸感和注意力。这意味着需要将质量管理从以系统为中心的性能度量标准转向更人性化的、以qos为中心的方法。然而,这需要qoe管理循环的三个领域(监测、建模和控制)中的新技术。本立场文件确定了开放的研究领域,以充分实现以人为中心的沉浸式多媒体驱动管理。在此基础上,提出了四个主要维度:(1)任务和幸福感驱动的主观评价;(2)实时QoE建模;(3)准确的视口预测;(4)基于机器学习的质量优化和内容再创造。本文讨论了最新的技术,并提供了可能的解决方案,以应对开放的挑战。
{"title":"Human-centric Quality Management of Immersive Multimedia Applications","authors":"S. V. Damme, M. T. Vega, F. Turck","doi":"10.1109/NetSoft48620.2020.9165335","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165335","url":null,"abstract":"Augmented Reality (AR) and Virtual Reality (VR) multimodal systems are the latest trend within the field of multimedia. As they emulate the senses by means of omnidirectional visuals, 360° sound, motion tracking and touch simulation, they are able to create a strong feeling of presence and interaction with the virtual environment. These experiences can be applied for virtual training (Industry 4.0), tele-surgery (healthcare) or remote learning (education). However, given the strong time and task sensitiveness of these applications, it is of great importance to sustain the end-user quality, i.e. the Quality-of-Experience (QoE), at all times. Lack of synchronization and quality degradation need to be reduced to a minimum to avoid feelings of cybersickness or loss of immersiveness and concentration. This means that there is a need to shift the quality management from system-centered performance metrics towards a more human, QoE-centered approach. However, this requires for novel techniques in the three areas of the QoE-management loop (monitoring, modelling and control). This position paper identifies open areas of research to fully enable human-centric driven management of immersive multimedia. To this extent, four main dimensions are put forward: (1) Task and well-being driven subjective assessment; (2) Real-time QoE modelling; (3) Accurate viewport prediction; (4) Machine Learning (ML)-based quality optimization and content recreation. This paper discusses the state-of-the-art, and provides with possible solutions to tackle the open challenges.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coordination Algorithm for Migration of Shared VNFs in Federated Environments 联邦环境下共享VNFs迁移的协调算法
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165333
Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira
Several works in the literature have proposed migration mechanisms for VNFs, however they only consider the migration of isolated Virtual Network Functions (VNFs) instead of the migration under a shared and chained scenario. Reconfiguration of VNFs, like in the case of migration, is necessary to handle dynamic requirements for the service. However, it is not a straightforward operation. On one hand, it is necessary to coordinate VNFs to achieve migration while maintaining the end-to-end service availability. On the other hand, the new deployment can disrupt the chain and violate predefined services constraints. Moreover if there is no access to global references, migration can introduce inconsistent services due to a lack of knowledge from orchestrators. This paper focuses on the problem of coordinating orchestrators in a NFV federation to achieve migration of shared VNFs with only local domain information. It introduces a novel coordination algorithm that relies on ETSI/MANO specifications. The proposed algorithm is implemented and evaluated for validation purposes. Results show that migration satisfies the constraints for seamless migration and the algorithm obtains better performance compared to state of the art solution with a slight overhead cost when considering the shared VNFs instead of isolated VNFS.
一些文献提出了虚拟网络功能的迁移机制,但他们只考虑了孤立的虚拟网络功能(VNFs)的迁移,而不是共享和链式场景下的迁移。与迁移的情况一样,VNFs的重新配置对于处理服务的动态需求是必要的。然而,这并不是一个简单的操作。一方面,有必要协调VNFs以实现迁移,同时保持端到端的服务可用性。另一方面,新的部署可能会破坏链并违反预定义的服务约束。此外,如果无法访问全局引用,则由于编排者缺乏知识,迁移可能会引入不一致的服务。本文主要研究NFV联盟中协调协调器的问题,以实现仅使用本地域信息的共享VNFs迁移。介绍了一种基于ETSI/MANO规范的新型协调算法。为了验证目的,对所提出的算法进行了实现和评估。结果表明,在考虑共享VNFs而非隔离VNFs时,该算法满足了无缝迁移的约束条件,并且与目前的解决方案相比,该算法获得了更好的性能,并且开销很小。
{"title":"Coordination Algorithm for Migration of Shared VNFs in Federated Environments","authors":"Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira","doi":"10.1109/NetSoft48620.2020.9165333","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165333","url":null,"abstract":"Several works in the literature have proposed migration mechanisms for VNFs, however they only consider the migration of isolated Virtual Network Functions (VNFs) instead of the migration under a shared and chained scenario. Reconfiguration of VNFs, like in the case of migration, is necessary to handle dynamic requirements for the service. However, it is not a straightforward operation. On one hand, it is necessary to coordinate VNFs to achieve migration while maintaining the end-to-end service availability. On the other hand, the new deployment can disrupt the chain and violate predefined services constraints. Moreover if there is no access to global references, migration can introduce inconsistent services due to a lack of knowledge from orchestrators. This paper focuses on the problem of coordinating orchestrators in a NFV federation to achieve migration of shared VNFs with only local domain information. It introduces a novel coordination algorithm that relies on ETSI/MANO specifications. The proposed algorithm is implemented and evaluated for validation purposes. Results show that migration satisfies the constraints for seamless migration and the algorithm obtains better performance compared to state of the art solution with a slight overhead cost when considering the shared VNFs instead of isolated VNFS.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Network Slicing: Composing Network Slices based on VNFs, CNFs Network Services 混合网络切片:基于VNFs、CNFs网络服务组成网络切片
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165378
P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz
This paper presents the creation of Network Slices, which are composed of Network Services that are either composed of Cloud-native Network Functions or Virtual Network Functions. This is referred to as Hybrid Network Slice. In addition to describing this idea, this paper demonstrates the benefits of Hybrid Network Slices. This idea has been validated in an immersive-media pilot. An Hybrid Network Slice and a classical Network Slice deployments have been compared in order to validate the benefits from the hybrid case.
本文介绍了网络切片的创建,它由由云原生网络功能或虚拟网络功能组成的网络服务组成。这被称为混合网络切片。除了描述这个想法之外,本文还演示了混合网络切片的好处。这个想法已经在一个沉浸式媒体试验中得到了验证。为了验证混合情况的好处,对混合网络切片和经典网络切片部署进行了比较。
{"title":"Hybrid Network Slicing: Composing Network Slices based on VNFs, CNFs Network Services","authors":"P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz","doi":"10.1109/netsoft48620.2020.9165378","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165378","url":null,"abstract":"This paper presents the creation of Network Slices, which are composed of Network Services that are either composed of Cloud-native Network Functions or Virtual Network Functions. This is referred to as Hybrid Network Slice. In addition to describing this idea, this paper demonstrates the benefits of Hybrid Network Slices. This idea has been validated in an immersive-media pilot. An Hybrid Network Slice and a classical Network Slice deployments have been compared in order to validate the benefits from the hybrid case.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Benchmarking and Profiling 5G Verticals' Applications: An Industrial IoT Use Case 对标和分析5G垂直应用:一个工业物联网用例
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165393
A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl
The Industry 4.0 sector is evolving in a tremendous pace by introducing a set of industrial automation mechanisms tightly coupled with the exploitation of Internet of Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, and other industrial devices are networked together with industrial applications, formulating the Industrial IoT (IIoT) and aiming to improve the efficiency and reliability of the deployed applications and provide Quality of Service (QoS) guarantees. However, in a 5G era, efficient, reliable and highly performant applications' provision has to be combined with exploitation of capabilities offered by 5G networks. Optimal usage of the available resources has to be realised, while guaranteeing strict QoS requirements such as high data rates, ultra-low latency and jitter. The first step towards this direction is based on the accurate profiling of vertical industries' applications in terms of resources usage, capacity limits and reliability characteristics. To achieve so, in this paper we provide an integrated methodology and approach for benchmarking and profiling 5G vertical industries' applications. This approach covers the realisation of benchmarking experiments and the extraction of insights based on the analysis of the collected data. Such insights are considered the cornerstones for the development of AI models that can lead to optimal infrastructure usage along with assurance of high QoS provision. The detailed approach is applied in a real IIoT use case, leading to profiling of a set of 5G network functions.
通过引入一套与物联网(IoT)、5G和人工智能(AI)技术紧密结合的工业自动化机制,工业4.0领域正在以惊人的速度发展。通过这些新兴技术的结合,互联的传感器、仪器和其他工业设备与工业应用联网,形成工业物联网(IIoT),旨在提高部署应用的效率和可靠性,并提供QoS (Quality of Service)保证。然而,在5G时代,高效、可靠和高性能的应用必须与5G网络提供的功能相结合。必须实现对可用资源的最佳利用,同时保证严格的QoS要求,如高数据速率、超低延迟和抖动。朝着这个方向迈出的第一步是基于对垂直行业应用在资源使用、容量限制和可靠性特征方面的准确分析。为了实现这一目标,在本文中,我们提供了一种集成的方法和方法来对5G垂直行业的应用进行基准测试和分析。这种方法涵盖了基准实验的实现和基于收集数据分析的见解的提取。这些见解被认为是开发人工智能模型的基石,可以导致最佳的基础设施使用,并保证高QoS提供。详细的方法应用于实际的工业物联网用例,从而对一组5G网络功能进行分析。
{"title":"Benchmarking and Profiling 5G Verticals' Applications: An Industrial IoT Use Case","authors":"A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl","doi":"10.1109/NetSoft48620.2020.9165393","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165393","url":null,"abstract":"The Industry 4.0 sector is evolving in a tremendous pace by introducing a set of industrial automation mechanisms tightly coupled with the exploitation of Internet of Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, and other industrial devices are networked together with industrial applications, formulating the Industrial IoT (IIoT) and aiming to improve the efficiency and reliability of the deployed applications and provide Quality of Service (QoS) guarantees. However, in a 5G era, efficient, reliable and highly performant applications' provision has to be combined with exploitation of capabilities offered by 5G networks. Optimal usage of the available resources has to be realised, while guaranteeing strict QoS requirements such as high data rates, ultra-low latency and jitter. The first step towards this direction is based on the accurate profiling of vertical industries' applications in terms of resources usage, capacity limits and reliability characteristics. To achieve so, in this paper we provide an integrated methodology and approach for benchmarking and profiling 5G vertical industries' applications. This approach covers the realisation of benchmarking experiments and the extraction of insights based on the analysis of the collected data. Such insights are considered the cornerstones for the development of AI models that can lead to optimal infrastructure usage along with assurance of high QoS provision. The detailed approach is applied in a real IIoT use case, leading to profiling of a set of 5G network functions.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Federated Learning Approach to Routing in Challenged SDN-Enabled Edge Networks 基于sdn的边缘网络中路由的联邦学习方法
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165506
Alessio Sacco, Flavio Esposito, G. Marchetto
The edge computing paradigm allows computationally intensive tasks to be offloaded from small devices to nearby (more) powerful servers, via an edge network. The intersection between such edge computing paradigm and Machine Learning (ML), in general, and deep learning in particular, has brought to light several advantages for network operators: from automating management tasks, to gain additional insights on their networks. Most of the existing approaches that use ML to drive routing and traffic control decisions are valuable but rarely focus on challenged networks, that are characterized by continually varying network conditions and the high volume of traffic generated by edge devices. In particular, recently proposed distributed ML-based architectures require either a long synchronization phase or a training phase that is unsustainable for challenged networks. In this paper, we fill this knowledge gap with Blaster, a federated architecture for routing packets within a distributed edge network, to improve the application's performance and allow scalability of data-intensive applications. We also propose a novel path selection model that uses Long Short Term Memory (LSTM) to predict the optimal route. Finally, we present some initial results obtained by testing our approach via simulations and with a prototype deployed over the GENI testbed. By leveraging a Federated Learning (FL) model, our approach shows that we can optimize the communication between SDN controllers, preserving bandwidth for the data traffic.
边缘计算范式允许通过边缘网络将计算密集型任务从小型设备卸载到附近(更)强大的服务器上。这种边缘计算范式与机器学习(ML)之间的交集,特别是深度学习,为网络运营商带来了几个优势:从自动化管理任务,到获得对其网络的额外见解。大多数使用机器学习来驱动路由和流量控制决策的现有方法都是有价值的,但很少关注具有挑战性的网络,这些网络的特点是不断变化的网络条件和由边缘设备产生的大量流量。特别是,最近提出的基于分布式机器学习的体系结构需要很长的同步阶段或训练阶段,这对于受挑战的网络来说是不可持续的。在本文中,我们用Blaster填补了这一知识空白,Blaster是一种用于在分布式边缘网络中路由数据包的联邦架构,以提高应用程序的性能并允许数据密集型应用程序的可扩展性。我们还提出了一种新的路径选择模型,该模型使用长短期记忆(LSTM)来预测最优路径。最后,我们通过模拟和在GENI测试台上部署的原型对我们的方法进行了测试,并给出了一些初步结果。通过利用联邦学习(FL)模型,我们的方法表明我们可以优化SDN控制器之间的通信,为数据流量保留带宽。
{"title":"A Federated Learning Approach to Routing in Challenged SDN-Enabled Edge Networks","authors":"Alessio Sacco, Flavio Esposito, G. Marchetto","doi":"10.1109/NetSoft48620.2020.9165506","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165506","url":null,"abstract":"The edge computing paradigm allows computationally intensive tasks to be offloaded from small devices to nearby (more) powerful servers, via an edge network. The intersection between such edge computing paradigm and Machine Learning (ML), in general, and deep learning in particular, has brought to light several advantages for network operators: from automating management tasks, to gain additional insights on their networks. Most of the existing approaches that use ML to drive routing and traffic control decisions are valuable but rarely focus on challenged networks, that are characterized by continually varying network conditions and the high volume of traffic generated by edge devices. In particular, recently proposed distributed ML-based architectures require either a long synchronization phase or a training phase that is unsustainable for challenged networks. In this paper, we fill this knowledge gap with Blaster, a federated architecture for routing packets within a distributed edge network, to improve the application's performance and allow scalability of data-intensive applications. We also propose a novel path selection model that uses Long Short Term Memory (LSTM) to predict the optimal route. Finally, we present some initial results obtained by testing our approach via simulations and with a prototype deployed over the GENI testbed. By leveraging a Federated Learning (FL) model, our approach shows that we can optimize the communication between SDN controllers, preserving bandwidth for the data traffic.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2020 6th IEEE Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1