A stable network is very important to both network providers and their customers, as it increases reliability, improves security and helps customers and companies save costs. When network outages occur, they result in significant downtime and financial losses for organizations and network users. Traditional methods of detecting and troubleshooting network failures are often reactive and time-consuming, whereby network administrators rely on traditional methods such as reactive monitoring and manual troubleshooting. These methods are often not effective in detecting and preventing network failures. In this paper, we propose a machine learning-based approach to predict network failures and minimize downtime. Network performance observability data from a 5G core network testbed based on Cloud-native Network Functions (CNFs) is used to train several supervised learning models, including random forest, gradient boosting regressor, conventional support vector regressor and proposed support vector regressor, to predict network failures. Our experiments and analysis show that the proposed model Support Vector Regressor (SVR) produced better results as compared to other models. In a very short amount of time (ten seconds), the proposed SVR model is capable of predicting whether a network failure event will occur or not within the next ten minutes, with an f1-score of more than 0.9. Our results indicate that machine learning-based approaches can significantly enhance the detection and prediction of network failures, leading to zero downtime and improved network performance.
{"title":"Towards zero downtime: Using machine learning to predict network failure in 5G and beyond","authors":"Emmanuel Basikolo, Thomas Basikolo","doi":"10.52953/pyaf8065","DOIUrl":"https://doi.org/10.52953/pyaf8065","url":null,"abstract":"A stable network is very important to both network providers and their customers, as it increases reliability, improves security and helps customers and companies save costs. When network outages occur, they result in significant downtime and financial losses for organizations and network users. Traditional methods of detecting and troubleshooting network failures are often reactive and time-consuming, whereby network administrators rely on traditional methods such as reactive monitoring and manual troubleshooting. These methods are often not effective in detecting and preventing network failures. In this paper, we propose a machine learning-based approach to predict network failures and minimize downtime. Network performance observability data from a 5G core network testbed based on Cloud-native Network Functions (CNFs) is used to train several supervised learning models, including random forest, gradient boosting regressor, conventional support vector regressor and proposed support vector regressor, to predict network failures. Our experiments and analysis show that the proposed model Support Vector Regressor (SVR) produced better results as compared to other models. In a very short amount of time (ten seconds), the proposed SVR model is capable of predicting whether a network failure event will occur or not within the next ten minutes, with an f1-score of more than 0.9. Our results indicate that machine learning-based approaches can significantly enhance the detection and prediction of network failures, leading to zero downtime and improved network performance.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122312304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kun Chen.Hu, M. Julia Fernández-Getino García, Ana Garcia Armada
Superimposed Training (ST) is one of the most appealing channel estimation techniques for Orthogonal Frequency Division Multiplexing (OFDM), to be possibly exploited in 6G. The data and pilot symbols are sharing the same time and frequency resources, and hence, the overhead is significantly reduced. Moreover, the superimposed pilots can be also used for the reduction of the Peak-to-Average Power Ratio (PAPR). However, a joint channel estimation and PAPR reduction procedure has not been addressed yet. In this work, a novel scheme denoted as Dual Layers-Superimposed Training (DL-ST) is proposed for this joint purpose. The Training Sequence (TS) of the first layer is targeted to perform channel estimation, while the TS of a second layer is designed for PAPR reduction and it is made transparent to the first one. Both layers can be independently processed, which implies a reduced complexity. To verify the performance of the proposed technique, the analytical expression of the channel estimation Mean Squared Error (MSE) is derived. Finally, several numerical results further illustrate the performance of the proposal, showing how the MSE and achievable rate are improved while significant PAPR reductions are attained with negligible complexity.
{"title":"Channel estimation and PAPR reduction in OFDM based on dual layers-superimposed training","authors":"Kun Chen.Hu, M. Julia Fernández-Getino García, Ana Garcia Armada","doi":"10.52953/juib7583","DOIUrl":"https://doi.org/10.52953/juib7583","url":null,"abstract":"Superimposed Training (ST) is one of the most appealing channel estimation techniques for Orthogonal Frequency Division Multiplexing (OFDM), to be possibly exploited in 6G. The data and pilot symbols are sharing the same time and frequency resources, and hence, the overhead is significantly reduced. Moreover, the superimposed pilots can be also used for the reduction of the Peak-to-Average Power Ratio (PAPR). However, a joint channel estimation and PAPR reduction procedure has not been addressed yet. In this work, a novel scheme denoted as Dual Layers-Superimposed Training (DL-ST) is proposed for this joint purpose. The Training Sequence (TS) of the first layer is targeted to perform channel estimation, while the TS of a second layer is designed for PAPR reduction and it is made transparent to the first one. Both layers can be independently processed, which implies a reduced complexity. To verify the performance of the proposed technique, the analytical expression of the channel estimation Mean Squared Error (MSE) is derived. Finally, several numerical results further illustrate the performance of the proposal, showing how the MSE and achievable rate are improved while significant PAPR reductions are attained with negligible complexity.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132727736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Damien Wohwe Sambo, Jens Dede, Nathalie Mitton, Anna Förster
The deployment and the exploitation of a Wireless Underground Sensor Network (WUSN) remain challenging because of signal attenuation in the soil and the limited battery that powers the sensor nodes. Due to the attenuation of the signal in the ground, the reception or loss of the sent data depends on the ground conditions, which can change dynamically. However, in existing WUSNs, each node sends the data collected in each round regardless of the signal attenuation. It is well demonstrated that sensor nodes consume the most energy during transmission. Obviously, transmission without receiving any data significantly reduces the lifetime of a sensor node useless. This paper presents a novel fuzzy-based decision-making solution called FuzDeMa that reduces energy consumption by anticipating data losses before transmission. To do so, FuzDeMa assesses in real time the loss or the reception of a packet according to the in-situ node's environments before its transmission and decides whether to send or not the packet based on the computed reliability. To validate the proposed approach, we embed it into a dedicated underground node called the MoleNet and realized real experimentations firstly with an existing dataset and secondly, with precision-measuring equipment to estimate the energy consumption. The results revealed the possibility of prolonging the lifetime of the sensor node by saving up to 81.7876 microjoules in a single round. Additionally, FuzDeMa shows the ability to save energy for up to 46 of additional revolutions, thus extending the life of the sensor node to 32.85% for 140 real transmission cycles. An analytical generalization of FuzDeMa is provided regardless of a specific dataset or sensor node. Thus, we provided the conditions for a random dataset to save the energy with any sensor node that implements FuzDeMa during transmissions.
{"title":"FuzDeMa: A portable fuzzy-based decision-making tool for reliable communication in wireless underground sensor networks","authors":"Damien Wohwe Sambo, Jens Dede, Nathalie Mitton, Anna Förster","doi":"10.52953/ixip2995","DOIUrl":"https://doi.org/10.52953/ixip2995","url":null,"abstract":"The deployment and the exploitation of a Wireless Underground Sensor Network (WUSN) remain challenging because of signal attenuation in the soil and the limited battery that powers the sensor nodes. Due to the attenuation of the signal in the ground, the reception or loss of the sent data depends on the ground conditions, which can change dynamically. However, in existing WUSNs, each node sends the data collected in each round regardless of the signal attenuation. It is well demonstrated that sensor nodes consume the most energy during transmission. Obviously, transmission without receiving any data significantly reduces the lifetime of a sensor node useless. This paper presents a novel fuzzy-based decision-making solution called FuzDeMa that reduces energy consumption by anticipating data losses before transmission. To do so, FuzDeMa assesses in real time the loss or the reception of a packet according to the in-situ node's environments before its transmission and decides whether to send or not the packet based on the computed reliability. To validate the proposed approach, we embed it into a dedicated underground node called the MoleNet and realized real experimentations firstly with an existing dataset and secondly, with precision-measuring equipment to estimate the energy consumption. The results revealed the possibility of prolonging the lifetime of the sensor node by saving up to 81.7876 microjoules in a single round. Additionally, FuzDeMa shows the ability to save energy for up to 46 of additional revolutions, thus extending the life of the sensor node to 32.85% for 140 real transmission cycles. An analytical generalization of FuzDeMa is provided regardless of a specific dataset or sensor node. Thus, we provided the conditions for a random dataset to save the energy with any sensor node that implements FuzDeMa during transmissions.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"87 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127997221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In modern telecommunication sectors, zero touch (Zero-Touch) networks are a novel idea. A combination of quick, context-aware network and service configuration, adaptable new service development, and dynamic, effective resource allocation are required for everyone. An innovative telecommunication management software, Zero-Touch Networks (ZTNs), were released to address these complicated conditions. The primary objective of the zero-touch network is autonomous operation, which is governed by higher layers of policies and regulations and allows for self-configuration, self-monitoring, self-healing and self-optimization without the need for human interaction. This conceptual study document is based on white and grey literature in the Google and Web of Science databases. Text, image, audio and video formats all existed for the data. The manuscripts examined the theories, enabling technologies, problems and difficulties associated with zero touch networks. The primary goal of this manuscript is to provide an overview of ZTN so that aspiring academics, researchers, students and businesspeople can profit from it.
在现代电信领域,零接触(zero - touch)网络是一个新颖的概念。每个人都需要快速、上下文感知的网络和业务配置、适应性强的新业务开发以及动态、有效的资源分配的组合。一种创新的电信管理软件,零接触网络(ZTNs),被发布来解决这些复杂的情况。零接触网络的主要目标是自主运行,它由更高层的政策和法规管理,允许自我配置、自我监控、自我修复和自我优化,而无需人工交互。这个概念性研究文件是基于Google和Web of Science数据库中的白色和灰色文献。文本、图像、音频和视频格式都存在于数据中。这些手稿研究了与零接触网络相关的理论、实现技术、问题和困难。本文的主要目的是提供ZTN的概述,以便有抱负的学者,研究人员,学生和商人可以从中获利。
{"title":"360° View on Zero-Touch (Zero-Touch) Networks","authors":"Somayya Madakam, Shlomo Mark, Yotam Lurie","doi":"10.52953/cikx9337","DOIUrl":"https://doi.org/10.52953/cikx9337","url":null,"abstract":"In modern telecommunication sectors, zero touch (Zero-Touch) networks are a novel idea. A combination of quick, context-aware network and service configuration, adaptable new service development, and dynamic, effective resource allocation are required for everyone. An innovative telecommunication management software, Zero-Touch Networks (ZTNs), were released to address these complicated conditions. The primary objective of the zero-touch network is autonomous operation, which is governed by higher layers of policies and regulations and allows for self-configuration, self-monitoring, self-healing and self-optimization without the need for human interaction. This conceptual study document is based on white and grey literature in the Google and Web of Science databases. Text, image, audio and video formats all existed for the data. The manuscripts examined the theories, enabling technologies, problems and difficulties associated with zero touch networks. The primary goal of this manuscript is to provide an overview of ZTN so that aspiring academics, researchers, students and businesspeople can profit from it.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"91 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flood fatalities generally occur in flood-prone areas such as low water bridges and tunnels, and most are vehiclerelated. The existing water depth measurement solutions are neither cost-efficient nor suitable for roadway scenarios. This paper proposes two water depth measurement methods that can be integrated into cellular networks. The proposed methods reuse the periodic communication signals of 5G and 6G to avoid allocating dedicated sensing signals and conflicting with the communication requirements. The main idea of these methods is based on the fact that the Reflection Loss (RL) induced by a water surface exhibits a strong dependence on the water depth. The peak counting method measures the water depth by counting the successive RL peaks separated by a constant spacing. The RL fingerprinting method integrates the RL peak positions and the measured RL values to determine the water depth. Several factors affecting the water depth measurement resolution are also analyzed. The simulation results show that the measurable water depth range of the proposed methods is larger than the water depth that may pose danger to vehicles, indicating that the proposed methods are feasible for roadway scenarios.
{"title":"Reflection loss-based roadway water depth measurement for driver safety","authors":"Yi Geng, Ting Zeng","doi":"10.52953/wbxr8764","DOIUrl":"https://doi.org/10.52953/wbxr8764","url":null,"abstract":"Flood fatalities generally occur in flood-prone areas such as low water bridges and tunnels, and most are vehiclerelated. The existing water depth measurement solutions are neither cost-efficient nor suitable for roadway scenarios. This paper proposes two water depth measurement methods that can be integrated into cellular networks. The proposed methods reuse the periodic communication signals of 5G and 6G to avoid allocating dedicated sensing signals and conflicting with the communication requirements. The main idea of these methods is based on the fact that the Reflection Loss (RL) induced by a water surface exhibits a strong dependence on the water depth. The peak counting method measures the water depth by counting the successive RL peaks separated by a constant spacing. The RL fingerprinting method integrates the RL peak positions and the measured RL values to determine the water depth. Several factors affecting the water depth measurement resolution are also analyzed. The simulation results show that the measurable water depth range of the proposed methods is larger than the water depth that may pose danger to vehicles, indicating that the proposed methods are feasible for roadway scenarios.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"8 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134585159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Container security involves a broad spectrum of concerns, including the security of the operating system, auditing the supply chain and the application security of the running containers. This wide attack surface will also include the security of the container orchestration system and its components once a container orchestration system is introduced to manage the fleet of containers in an environment. In order to advance the research in this field, prior work should be comparable and reproducible. However, we identified a research gap for this aspect; publicly available datasets for container security is sparse and reproducibility of the research output so far is arduous. In this study, we share a dataset consisting of network flows, collected from a Kubernetes cluster. Furthermore, we performed a preliminary analysis on the data as a sanity check to evaluate its quality. By sharing this dataset publicly, we hope to help further studies and establish benchmarks in the field of container networking security.
{"title":"A Kubernetes dataset for misuse detection","authors":"Yigit Sever, Adnan Harun Dogan","doi":"10.52953/fplr8631","DOIUrl":"https://doi.org/10.52953/fplr8631","url":null,"abstract":"Container security involves a broad spectrum of concerns, including the security of the operating system, auditing the supply chain and the application security of the running containers. This wide attack surface will also include the security of the container orchestration system and its components once a container orchestration system is introduced to manage the fleet of containers in an environment. In order to advance the research in this field, prior work should be comparable and reproducible. However, we identified a research gap for this aspect; publicly available datasets for container security is sparse and reproducibility of the research output so far is arduous. In this study, we share a dataset consisting of network flows, collected from a Kubernetes cluster. Furthermore, we performed a preliminary analysis on the data as a sanity check to evaluate its quality. By sharing this dataset publicly, we hope to help further studies and establish benchmarks in the field of container networking security.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121794834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramon Fontes, Allan Martins, Vicente Sousa, Kaio Dantas, Lucas Medeiros, Pedro Alves, Marcelo Fernandes, Iago Rego, Eduardo Aranha, Vin�cius Filho, Mateus Goldbarg, Wysterlanya Barros, Roger Immich, Augusto V. Neto
Experimental tools are a key factor in both academic and industrial research communities to create design evaluations of new networking technologies that involve troubleshooting or changing the planning of deployed networks. Physical Software-Defined Radio (SDR) experimental platforms enable a design solution for the quick prototyping of wireless communication systems. However, SDR-based experimental platforms incur high costs, which leads to scalability limitations in the experimental settings. Having said this, network simulators, emulators, and new testbeds have attracted increasing attention. Emulation-based research prototyping can be distinguished from real communication networks and SDR-based platforms by allowing a tradeoff between cost and flexibility. This paper examines the Mininet-RAN emulation tool, which, as well as Radio Access Network (RAN) modeling, provides a way to test Open RAN Intelligent Controller (RIC) services without the need to deploy an entire RAN infrastructure. The Mininet-RAN creates virtual network elements, such as hosts, L2/L3 devices, controllers, and links, by combining some of the best emulator features, hardware testbeds, and simulators. By running the current code of standard practice Unix/Linux network applications and network stack, the Mininet-RAN enables real-world network data traffic patterns to be delivered to the RIC, regarding the most significant aspect of the dynamic generation of wireless system's KPIs. We provide the basic code of Mininet-RAN for the first two O-RAN Alliance-defined use cases involving V2X and UAV. The xApps are being implemented in O-RAN SC near-RT RIC, with Mininet-RAN which provides a closed-loop validation environment.
{"title":"Open-source emulation-based test environment to settle O-RAN-compliant trials","authors":"Ramon Fontes, Allan Martins, Vicente Sousa, Kaio Dantas, Lucas Medeiros, Pedro Alves, Marcelo Fernandes, Iago Rego, Eduardo Aranha, Vin�cius Filho, Mateus Goldbarg, Wysterlanya Barros, Roger Immich, Augusto V. Neto","doi":"10.52953/vmbq6087","DOIUrl":"https://doi.org/10.52953/vmbq6087","url":null,"abstract":"Experimental tools are a key factor in both academic and industrial research communities to create design evaluations of new networking technologies that involve troubleshooting or changing the planning of deployed networks. Physical Software-Defined Radio (SDR) experimental platforms enable a design solution for the quick prototyping of wireless communication systems. However, SDR-based experimental platforms incur high costs, which leads to scalability limitations in the experimental settings. Having said this, network simulators, emulators, and new testbeds have attracted increasing attention. Emulation-based research prototyping can be distinguished from real communication networks and SDR-based platforms by allowing a tradeoff between cost and flexibility. This paper examines the Mininet-RAN emulation tool, which, as well as Radio Access Network (RAN) modeling, provides a way to test Open RAN Intelligent Controller (RIC) services without the need to deploy an entire RAN infrastructure. The Mininet-RAN creates virtual network elements, such as hosts, L2/L3 devices, controllers, and links, by combining some of the best emulator features, hardware testbeds, and simulators. By running the current code of standard practice Unix/Linux network applications and network stack, the Mininet-RAN enables real-world network data traffic patterns to be delivered to the RIC, regarding the most significant aspect of the dynamic generation of wireless system's KPIs. We provide the basic code of Mininet-RAN for the first two O-RAN Alliance-defined use cases involving V2X and UAV. The xApps are being implemented in O-RAN SC near-RT RIC, with Mininet-RAN which provides a closed-loop validation environment.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132808102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin B. Costa, Felipe S. Dantas Silva, Douglas B. Maciel, Charles H. F. Santos, Augusto J. V. Neto, Fabio L. Verdi
The cloud-network slicing concept has been established to deal with the advent of the Fifth Generation (5G) of mobile networks and its enabling technologies, thus promoting softwarization and cloudification. The Novel Enablers for Cloud Slicing (NECOS) ecosystem distinguishes itself over state of the art through the definition of slicing at both cloud and network levels and by promoting a Management and Orchestration (MANO) platform that provisions features with a self-organized and full-service automation approach across multiple federated domains. In the NECOS architecture, the Infrastructure and Monitoring Abstraction (IMA) component fetches Key Performance Indicators (KPIs) associated with the constituent parts of the active cloud-network slice instances managed by the NECOS platform. However, the design of the IMA monitoring component follows a centralized approach running at the core-cloud domain. Thus, the IMA concentrates on the monitoring data fetching function, done through interaction with measurement applications. It books all of them into a database and then forwards the incoming data for targeting management applications. Our findings in the slice monitoring state of the art study and assessments in IMA central cloud monitoring suggest that the centralized cloud approach cannot make distinct monitoring technologies compatible, besides not presenting a monitoring-as-a-service perspective that allows a self-organized and fully-service automated monitoring management scheme. In this regard, this work proposes the Distributed Infrastructure and Monitoring Abstraction (DIMA) multilevel monitoring plan. DIMA can promote monitoring as a service across an edge-cloud continuum inside the NECOS domain, enabling cloud/edge-centric and distributed monitoring schemes at the granularity of cloud-network slices' constituent parts.
{"title":"Self-organized and fully service-automated monitoring approach at the cloud-network slice granularity","authors":"Kevin B. Costa, Felipe S. Dantas Silva, Douglas B. Maciel, Charles H. F. Santos, Augusto J. V. Neto, Fabio L. Verdi","doi":"10.52953/wmnr9875","DOIUrl":"https://doi.org/10.52953/wmnr9875","url":null,"abstract":"The cloud-network slicing concept has been established to deal with the advent of the Fifth Generation (5G) of mobile networks and its enabling technologies, thus promoting softwarization and cloudification. The Novel Enablers for Cloud Slicing (NECOS) ecosystem distinguishes itself over state of the art through the definition of slicing at both cloud and network levels and by promoting a Management and Orchestration (MANO) platform that provisions features with a self-organized and full-service automation approach across multiple federated domains. In the NECOS architecture, the Infrastructure and Monitoring Abstraction (IMA) component fetches Key Performance Indicators (KPIs) associated with the constituent parts of the active cloud-network slice instances managed by the NECOS platform. However, the design of the IMA monitoring component follows a centralized approach running at the core-cloud domain. Thus, the IMA concentrates on the monitoring data fetching function, done through interaction with measurement applications. It books all of them into a database and then forwards the incoming data for targeting management applications. Our findings in the slice monitoring state of the art study and assessments in IMA central cloud monitoring suggest that the centralized cloud approach cannot make distinct monitoring technologies compatible, besides not presenting a monitoring-as-a-service perspective that allows a self-organized and fully-service automated monitoring management scheme. In this regard, this work proposes the Distributed Infrastructure and Monitoring Abstraction (DIMA) multilevel monitoring plan. DIMA can promote monitoring as a service across an edge-cloud continuum inside the NECOS domain, enabling cloud/edge-centric and distributed monitoring schemes at the granularity of cloud-network slices' constituent parts.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133794857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nina Slamnik-Kriještorac, M. Femminella, Girma M. Yilma, Marco Liebsch, G. Reali, Johann M. Marquez-Barja, Nina Slamnik-Kriještorac
The automotive industry requires ultra-reliable low-latency connectivity for its vehicles, and as such, it is one of the promising customers of 5G ecosystems and their orchestrated network infrastructure. In particular, Multi-Access Edge Computing (MEC) provides moving vehicles with localized low-latency access to service instances. However, given the mobility of vehicles, and various resource demand patterns at the distributed MEC nodes, challenges such as fast reconfiguration of the distributed deployment according to mobility pattern and associated service and resource demand need to be mitigated. In this paper, we present the orchestrated edges platform, which is a solution for orchestrating distributed edges in complex cross-border network environments, tailored to Connected, Cooperative, and Automated Mobility (CCAM) use cases within a 5G ecosystem. The proposed solution enables collaboration between orchestrators that belong to different tiers, and various federated edge domains, with the goal to enable service continuity for vehicles traversing cross-border corridors. The paper presents the prototype that we built for the H2020 5G-CARMEN trials, including the validation of the orchestration design choices, followed by the promising results that span both orchestration (orchestration latency) and application performance-related metrics (client-to-edge and edge-to-edge service data plane latencies).
{"title":"Orchestrating distributed 5G edges for automotive cross-border trials: Validation of an experimental prototype","authors":"Nina Slamnik-Kriještorac, M. Femminella, Girma M. Yilma, Marco Liebsch, G. Reali, Johann M. Marquez-Barja, Nina Slamnik-Kriještorac","doi":"10.52953/jttu5989","DOIUrl":"https://doi.org/10.52953/jttu5989","url":null,"abstract":"The automotive industry requires ultra-reliable low-latency connectivity for its vehicles, and as such, it is one of the promising customers of 5G ecosystems and their orchestrated network infrastructure. In particular, Multi-Access Edge Computing (MEC) provides moving vehicles with localized low-latency access to service instances. However, given the mobility of vehicles, and various resource demand patterns at the distributed MEC nodes, challenges such as fast reconfiguration of the distributed deployment according to mobility pattern and associated service and resource demand need to be mitigated. In this paper, we present the orchestrated edges platform, which is a solution for orchestrating distributed edges in complex cross-border network environments, tailored to Connected, Cooperative, and Automated Mobility (CCAM) use cases within a 5G ecosystem. The proposed solution enables collaboration between orchestrators that belong to different tiers, and various federated edge domains, with the goal to enable service continuity for vehicles traversing cross-border corridors. The paper presents the prototype that we built for the H2020 5G-CARMEN trials, including the validation of the orchestration design choices, followed by the promising results that span both orchestration (orchestration latency) and application performance-related metrics (client-to-edge and edge-to-edge service data plane latencies).","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123398612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Poovendren Govender, Kingsley A. Ogudo, Chabalala Chabalala
With global mobile traffic doubling every 18 months along with the massive increase in unique data users across digital platforms during the Covid-19 pandemic, the world's demand for high-speed connectivity continues to increase every second. The Covid-19 pandemic has transformed the global workforce with remote working arrangements, embracing new platforms, subsequently increasing the requirement for reliable, quality, ubiquitous high speed data connectedness everywhere. 5th Generation (5G) mobile communication technology provides an effective solution, modernizing network infrastructure, efficiently providing reliable high bandwidth capacity for massive data growth and ultra-low latency, making delays virtually impossible to perceive. This means elevating reality even further with fiber-like speeds for everyone, everywhere. 5G network slicing makes it possible for services to own dedicated portions of the 5G network with guaranteed performance for their particular need. These virtual networks allow for a service like IoT, at industrial scale, making society more sustainable and increasing resource efficiency. Our paper proposes a model for 5G network slice creation that meets industry verticals service QoS requirements which are critical to service adoption. A software emulation is utilized to guide the design and evaluation of our proposed model. Simulated results show QoS guarantees are met for the reviewed service requirements in varying network conditions.
{"title":"Exploring the potential of dynamic quality of service cloud-based network slicing in 5G and next generation virtualized networks: A simulation-based study","authors":"Poovendren Govender, Kingsley A. Ogudo, Chabalala Chabalala","doi":"10.52953/xppr9254","DOIUrl":"https://doi.org/10.52953/xppr9254","url":null,"abstract":"With global mobile traffic doubling every 18 months along with the massive increase in unique data users across digital platforms during the Covid-19 pandemic, the world's demand for high-speed connectivity continues to increase every second. The Covid-19 pandemic has transformed the global workforce with remote working arrangements, embracing new platforms, subsequently increasing the requirement for reliable, quality, ubiquitous high speed data connectedness everywhere. 5th Generation (5G) mobile communication technology provides an effective solution, modernizing network infrastructure, efficiently providing reliable high bandwidth capacity for massive data growth and ultra-low latency, making delays virtually impossible to perceive. This means elevating reality even further with fiber-like speeds for everyone, everywhere. 5G network slicing makes it possible for services to own dedicated portions of the 5G network with guaranteed performance for their particular need. These virtual networks allow for a service like IoT, at industrial scale, making society more sustainable and increasing resource efficiency. Our paper proposes a model for 5G network slice creation that meets industry verticals service QoS requirements which are critical to service adoption. A software emulation is utilized to guide the design and evaluation of our proposed model. Simulated results show QoS guarantees are met for the reviewed service requirements in varying network conditions.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}