Despite the many advantages of network function virtualization (NFV) technology, the dependability of virtual services must be carefully addressed so that NFV can meet the requirements of commercial carriers. In parti...
详细信息
ISBN:
(纸本)9781450397377
Despite the many advantages of network function virtualization (NFV) technology, the dependability of virtual services must be carefully addressed so that NFV can meet the requirements of commercial carriers. In particular, it is essential to provide mechanisms to ensure their correct and continuous operation. In this work we propose NHAM: an NFV High Availability Module designed within the NFV-MANO (NFV Management and Orchestration) reference model. NHAM allows the creation and management of fault-tolerant virtual network services consisting of stateful VNFs (Virtualized networkfunctions) and SFCs (Service function Chains). The proposed architecture provides fault management, including a choice of recovery mechanisms that can be applied depending on the specific needs of each service. The solution is holistic in the sense that it does not require any modifications of the source code of VNFs/SFCs to make them fault-tolerant. The strategy is based on SFC buffer management coupled with VNF checkpoint/restore, providing high availability in a transparent way. A prototype was implemented and experimental results are presented.
6G networks are envisioned to deliver a large diversity of applications and meet stringent quality of service (QoS) requirements. Hence, integrated terrestrial and non-terrestrial networks (TN-NTNs) are anticipated to...
详细信息
The Internet of Things (IoT) has garnered considerable interest in recent years as its technical capabilities have facilitated the creation of a diverse variety of commercial revenue models and services (e.g., medical...
详细信息
The deployment of network function virtualization (NFV) in fog networks allows network providers to offer dynamic, delay-sensitive services on top of general purpose hardware. A key challenge is the provisioning of se...
详细信息
With the growing demand for data connectivity, network service providers are faced with the task of reducing their capital and operational expenses while simultaneously improving network performance and addressing the...
详细信息
In 5G networks, the NFV (network function virtualization) concept provides flexible and reconfigurable conditions for applications and operators, however, the virtualized environment can suffer degradation over time. ...
详细信息
ISBN:
(纸本)9781665440356
In 5G networks, the NFV (network function virtualization) concept provides flexible and reconfigurable conditions for applications and operators, however, the virtualized environment can suffer degradation over time. In NFV, control traffic flows serve to manage the NFV infrastructure and provide flexibility of resources. This work presents the implementation of an evaluation testbed based on the ETSI architecture for 5G, to analyze control traffic with focus in 5G scenarios that can be extended with LPWA networks. The analysis uses 4 scenarios with variations in the number of compute nodes and VNFs (Virtual networkfunctions) to allow control traffic characterization in the NFVI (NFV Infrastructure) and analyse the impact of adding new compute nodes and new VNFs. Based on the experimental results, this work also proposes possible approaches to decrease and optimize control traffic to achieve rates compatible with LPWA networks.
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients' health and life by stealing o...
详细信息
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients' health and life by stealing or altering data as it flows among the multiple domains of healthcare networks. The problem is likely to exacerbate with the increasing use of IoT devices, edge, and core clouds in the next generation healthcare networks. Presented in this paper is MUSE, a system of deep hierarchical stacked neural networks for timely and accurate detection of malicious activity that leads to alteration of meta information or payload of the dataflow between the IoT gateway, edge and core clouds. Smaller models at the edge clouds take substantially less time to train as compared to the large models in the core cloud. To improve the speed of training and accuracy of detection of large core cloud models, the MUSE system uses a novel method of merging and aggregating layers of trained edge cloud models to construct a partly pre-trained core cloud model. As a result, the model in the core cloud takes substantially smaller number of epochs (6 to 8) and, consequently, less time, compared to those in the edge clouds, training of which take 35 to 40 epochs to converge. With the help of extensive evaluations, it is shown that with the MUSE system, large, merged models can be trained in significantly less time than the unmerged models that are created independently in the core cloud. Through several runs it is seen that the merged models give on an average 26.2% reduction in training times. From the experimental evaluation we demonstrate that along with fast training speeds the merged MUSE model gives high training and test accuracies, ranging from 95% to 100%, in detection of unknown attacks on dataflows. The merged model thus generalizes very well on the test data. This is a marked improvement when compared with the accuracy given by un-merged model as well as accuracy reported by ot
The advent of virtualization-based infrastructure needed for 5G brought new challenges in utilizing the existing physical network infrastructure effectively. Designing physical routes between virtual networkfunctions...
详细信息
The advent of virtualization-based infrastructure needed for 5G brought new challenges in utilizing the existing physical network infrastructure effectively. Designing physical routes between virtual networkfunctions in a multi-cloud environment is usually handled as a maximum flow problem, separately considering latency requirements. This paper presents an algorithm designed for low latency edge-cloud environments, where results meet both bandwidth and latency requirements of the planned traffic in one step. The proposed algorithm is much faster compared to the wide-spread linear program based flow maximization approach as the incorporated filtering of route candidates by latency allows more efficient search. The paper demonstrates the operation of the algorithm by a detailed example.
The dependence of traditional networkfunctions (NFs) on special hardware results in high capital expenditures (CAPEX) and operating expenditures (OPEX). network function virtualization (NFV) is considered a promising...
详细信息
The dependence of traditional networkfunctions (NFs) on special hardware results in high capital expenditures (CAPEX) and operating expenditures (OPEX). network function virtualization (NFV) is considered a promising technology to reduce the specificity of network equipment as well as the CAPEX and OPEX. With the decoupling of software and hardware, the flexible placement of virtual networkfunctions (VNFs) resolves a wide range of network issues ranging from delay to reliability, from cost to performance, and so on. In this paper, we conduct a comprehensive survey of the VNF placement problem (VNFPP). Firstly, we provide a generic definition of the VNFPP by proposing and combining the basic models of chaining, placing, embedding, and routing. Secondly, we construct a fine-grained taxonomy of works in the VNF placement field based on the solving steps, i.e., objectives, constraints, models, and algorithms. In addition to the traditional cloud network scenario, we investigate the research progress of VNF placement problems in emerging placing scenarios, e.g., backbone networks, mobile networks, and the Internet of Things. Finally, we point out the open challenges and research directions in the field of VNF placement. Compared with the existing surveys, our survey provides a more granular taxonomy and a more comprehensive analysis of the state-of-the-art works in the VNFPP field.
Distribution of networkfunctions virtualization (NFV) environment on multiple locations and datacenters is a hot topic in research and engineering communities. In this article, we are making analytical models to calc...
详细信息
Distribution of networkfunctions virtualization (NFV) environment on multiple locations and datacenters is a hot topic in research and engineering communities. In this article, we are making analytical models to calculate the network packet sojourn time in three different scenarios: classical NFV environment where all NFV elements are on the same location, distributed architecture of the data plane with centralized management and orchestration (MANO) environment, and distributed environment where every location has its own data plane and MANO elements. The analytical models are tested and discussed through Matlab based simulations. Through the simulation results, we discuss the impact of changes of different parameters on the packet sojourn time, and we compare the architectures in order to see how they can be fitted in practical services provided in an NFV environment.
暂无评论