A wireless mesh network (WMN)-based disaster network shall provide an emergency communication infrastructure in case of a catastrophe destroyed any existing communication infrastructure. Since the hardware of the disa...
详细信息
ISBN:
(数字)9781728197388
ISBN:
(纸本)9781728197395
A wireless mesh network (WMN)-based disaster network shall provide an emergency communication infrastructure in case of a catastrophe destroyed any existing communication infrastructure. Since the hardware of the disaster network is deployed in an environment affected by the outcome of a catastrophe, events such as aftershocks and/or outbreaking fires are likely to occur and may destroy the hardware of the disaster network. To maintain its provided functionality and thus its usability, the network requires to be resilient to these and other events which are affecting the network infrastructure. To achieve a resilient network, the normal state of the network as well as possible challenges affecting the normal state need to be defined in prior. This scientific work deals with the derivation and definition of the required normal state of the WMN-based disaster network, as well as the definition of possible challenges resulting from environmental-based events. Since each possible challenge is influencing the network infrastructure of the WMN-based disaster network, possible measures for preventing and/or reducing the impact of each challenge are defined. In addition, emergency corrections capable of resolving the influences of an occurring challenge are defined.
The Virtual networkfunction (VNF) embedding problem is important for service provision in the context of network function virtualisation (NFV). However, this problem is proved to be NP-hard and challenging, and requi...
详细信息
The Virtual networkfunction (VNF) embedding problem is important for service provision in the context of network function virtualisation (NFV). However, this problem is proved to be NP-hard and challenging, and requires to be explored further. In this study, the authors first formulate it as an Integer Linear Programming (ILP) model for optimal solutions. Then, to compensate for the high running time of solving the ILP model, they propose a heuristic approach which fulfils the embedding process by jointly taking the global network connectivity and the local substrate node capacity into consideration. The simulation on real-world network topologies demonstrates that the proposed approach can provide solutions within 1.7 times of the optimal solution offered by ILP. In addition, the experiments also suggest that the proposed approach can provide up to 2.75 times reduction in the overall cost than the other benchmarks.
In the software defined network (SDN) environment, network function virtualisation enables the virtual machine migration. Owing to the fact that transferring large amount of data will impede competing workflows, virtu...
详细信息
In the software defined network (SDN) environment, network function virtualisation enables the virtual machine migration. Owing to the fact that transferring large amount of data will impede competing workflows, virtual networkfunction (VNF) migration has brought a new perspective. Many optimised algorithms focusing on limiting migration time and migration cost have been proposed. In this study, the authors address the problem from a different perspective. They view the network topology from a global perspective and focus on the network effect of the whole network caused by VNF migration in the context of SDN. They introduce a parameter delay to formulate the network effect and an effect model is proposed to evaluate the migration effect of the network. In addition, a heuristic algorithm is proposed to minimise network effect while balancing network load and improving the service considering the migration cost and resources limit at the same time. The practicability and efficiency of the proposed model and algorithm are validated by simulation evaluation. By comparing their proposed algorithm with traditional benchmarks and closely related benchmarks, the experimental results show that their proposed algorithm largely reduces the network effect, while at the same time limiting the run time.
There is a strong industrial drive to use cloud computing technologies and concepts for providing timing sensitive services in the networking domain since it would provide the means to share the physical resources amo...
详细信息
There is a strong industrial drive to use cloud computing technologies and concepts for providing timing sensitive services in the networking domain since it would provide the means to share the physical resources among multiple users and thus increase the elasticity and reduce the costs. In this work, we develop a mathematical model for user-stateless virtual networkfunctions forming a forwarding graph. The model captures uncertainties of the performance of these virtual resources as well as the time-overhead needed to instantiate them. The model is used to derive a service controller for horizontal scaling of the virtual resources as well as an admission controller that guarantees that packets exiting the forwarding graph meet their end-to-end deadline. The Automatic Service and Admission Controller (AutoSAC) developed in this work uses feedback and feedforward making it robust against uncertainties of the underlying infrastructure. Also, it has a fast reaction time to changes in the input.
Novel networking paradigms, such as software-defined networking (SDN) and network function virtualisation (NFV), introduce new opportunities in the design of next-generation mobile networks. The present work investiga...
详细信息
Novel networking paradigms, such as software-defined networking (SDN) and network function virtualisation (NFV), introduce new opportunities in the design of next-generation mobile networks. The present work investigates the benefits of the emerging SDN and NFV technologies on the radio resource management (RRM) in mobile cellular networks. In particular, the aim of the proposed RRM scheme is to enable an efficient and flexible radio resource allocation in order to assure quality of experience of mobile users. The authors consider the orthogonal frequency division multiple access scheme and the complete radio resource sharing policy. To enable time- and space-efficient resource allocation, the authors investigate the applicability of the well-known Kaufman-Roberts recursion in the context of new architectural and functional changes of SDN/NFV based mobile environments. Finally, they discuss the applicability of the proposed approach for more complicated resource sharing policies.
network function virtualisation (NFV) represents one of the key enablers of the next generation mobile network systems (5G). NFV allows running virtual networkfunctions (NFs) as software components on top of a virtua...
详细信息
network function virtualisation (NFV) represents one of the key enablers of the next generation mobile network systems (5G). NFV allows running virtual networkfunctions (NFs) as software components on top of a virtualisation system (i.e. virtual machines or containers) hosted in a cloud, allowing high flexibility and elasticity to deploy network services and functions. Therefore, the NFs in 5G core network can be deployed on the common hardware platform in the form of software. In this study, network repository function (NRF) is implemented in Docker-based NFV platform in the form of JSON+HTTP/2.0 that supports service discovery function. The performance of NRF is also tested on real hardware platforms, including NF Register, NF Update, and NF Deregister. From the experimental data, it can be seen that the NRF in the NFV-based 5G architecture has good performance, and Docker-based NFV platform is more flexible than traditional communication networks.
In this paper we present a 5G Internet Radio-Light (IoRL) architecture and services for museums that can be readily deployed because it utilizes unlicensed visible light and millimeter wave part of the electromagnetic...
详细信息
ISBN:
(纸本)9782956309109
In this paper we present a 5G Internet Radio-Light (IoRL) architecture and services for museums that can be readily deployed because it utilizes unlicensed visible light and millimeter wave part of the electromagnetic spectrum and which is used to provide museums' visitors with accurate location, interaction, access to Internet and high resolution video on a Tablet PC. The paper describes the museum, its related use case scenarios, the user and functional requirements and the IoRL architecture
The emerging concepts Software Defined networking (SDN) and networkfunctions virtualisation (NFV) lay the ground for system softwarization of future networks and services, under the umbrella of 5G. In this regard, a ...
详细信息
ISBN:
(纸本)9781538623503
The emerging concepts Software Defined networking (SDN) and networkfunctions virtualisation (NFV) lay the ground for system softwarization of future networks and services, under the umbrella of 5G. In this regard, a special focus is given to Video Distribution networks (VDN), particularly in relation to existing difficulties in handling demands laid on the network as well as in relation to challenges in providing the expected Quality of Experience (QoE) and other performance demands like minimum energy consumption. The paper is focused on some of the most important elements associated with the virtualisation of Over-The-Top (OTT) video distribution networks and also advancing the system for managing the OTT traffic in network function virtualisation (NFV) environment. The paper provides motivation, problem description, virtualisation target, standardisation efforts, NFV framework as well as short presentation of the main technical issues associated with managing the OTT traffic i n NFV scenarios.
Federated cloud networks are formed by federating virtual network segments from different cloud platforms into a single federated network. This allows virtual machines from one virtual network segment to communicate w...
详细信息
ISBN:
(纸本)9783319721255;9783319721248
Federated cloud networks are formed by federating virtual network segments from different cloud platforms into a single federated network. This allows virtual machines from one virtual network segment to communicate with virtual machines running on the other virtual network segments of the federated network. Federated cloud networks can be very useful for creating application specific isolated networks between clouds. In this paper we describe current work in the BEACON project to secure the federated network with a global security policy. Virtual networkfunctions and service function chaining are used to implement the security policy. The federated cloud network security policy is described in a service manifest. This enables automated deployment and configuration of network security functions across the different cloud federation networks. The approach is illustrated with a simple case study where communications between trusted and untrusted clouds are encrypted.
Virtual radio access networks (RANs) is the candidate solution for 5G access networks, the concept of virtualised radio resources completing the virtual RAN paradigm. This paper proposes a new analytical model for the...
详细信息
Virtual radio access networks (RANs) is the candidate solution for 5G access networks, the concept of virtualised radio resources completing the virtual RAN paradigm. This paper proposes a new analytical model for the management of virtual radio resources in full heterogeneous networks. The estimation of network capacity and data rate allocation are the model's two main components. Based on the probability distribution of the signal- tointerference-plus-noise-ratio observed at the user terminal, the model leads to the probability distribution for the total network data rate. It considers different approaches for the estimation of the total network data rate, based on different channel qualities, i. e., optimistic, realistic and pessimistic. The second component uses the outcome of the first one in order to maximise the weighted data rate subject to the total network capacity, the SLAs (service level agreements) of Virtual network Operators (VNOs), and fairness. The weights for services in the objective function of the resource allocation component enable the model to have prioritisation among services. The performance of the proposed model is evaluated in a practical heterogeneous access network. Results show an increase of 2.5 times in network capacity by implementing an access point at the centre of each cell of a cellular network. It is shown that the cellular network capacity itself can vary from 0.9 Gbps in the pessimistic approach up to 5.5 Gbps in the optimistic one. Finally, the isolation of service classes and VNOs by means of virtualisation of radio resources is clearly demonstrated.
暂无评论