Orchestration of computing and network resources across multiple technology layers is critical for the autonomous roll-out of network services that fulfill the heterogeneous requirements of vertical industries. Theref...
详细信息
ISBN:
(纸本)9781538674628
Orchestration of computing and network resources across multiple technology layers is critical for the autonomous roll-out of network services that fulfill the heterogeneous requirements of vertical industries. Therefore, effectively mapping the requirements of verticals into underlying infrastructure management decisions is a challenging issue. In this paper, we evaluate the provisioning of vertical-driven network services, composed of a set of interconnected virtual networkfunctions, on top of a distributed cloud infrastructure interconnected through an Elastic Optical network (EON). To this end, we propose a solution exploiting the advantages of Deep Reinforcement Learning. This solution relies on two cooperating agents to execute an efficient selection of computing resources in the cloud infrastructure for the placement of virtualized networkfunctions, as well as the routing and spectrum assignment in the EON. The performance of the proposed solution is evaluated in scenarios where arrival and departure of service requests are dynamic. Experimental results show the improved performance of the proposed solution with and without invalid action masking over a heuristic algorithm in terms of service blocking rate.
networkfunctions virtualization (NFV) enables carriers to replace dedicated middleboxes with Virtual networkfunctions (VNFs) consolidated on a few shared servers. However, the question of how (and even whether) one ...
详细信息
Service chaining provides network services to users by processing packets with a series of virtualized networkfunctions (VNFs). This paper proposes a multi-source multicast service chaining model that guarantees the ...
详细信息
ISBN:
(纸本)9781665476409
Service chaining provides network services to users by processing packets with a series of virtualized networkfunctions (VNFs). This paper proposes a multi-source multicast service chaining model that guarantees the reliability of services with flexible routing and VNF placement. In order to obtain cost-efficient feasible solutions, we introduce an algorithm that iteratively solves an integer linear programming problem and an algorithm that conducts the VNF placement with a concept of the betweenness centrality. Numerical results show that the proposed model allocates the network and computation resources with the reduction in the total cost compared to the existing model.
In network function virtualization (NFV), service providers can accommodate services from clients by deploying software-based functions, called service functions (SFs), on commodity servers. The deployed SFs are conne...
详细信息
ISBN:
(纸本)9781538674628
In network function virtualization (NFV), service providers can accommodate services from clients by deploying software-based functions, called service functions (SFs), on commodity servers. The deployed SFs are connected to SF forwarders for efficient management in these commodity servers. Many efforts have been put into protecting SFs from failures. However, little attention has been paid to protecting SF forwarders from failures. In this paper, we investigate how to efficiently allocate backup computing resources when facing SF and SF forwarder failures. To protect the deployed SFs with the minimum backup computing resources, we define a new SF forwarder off-site shared protection problem and approve its NP-hardness. An efficient heuristic algorithm is proposed and proved to be logarithmic approximate. Extensive simulation results show that the proposed algorithm significantly outperforms the approaches directly extended from the existing work.
This paper presents a solution to the problem of managing and supporting mobile services with different quality of service requirements in a space-ground integrated network that has limited resources. To this end, we ...
详细信息
ISBN:
(纸本)9798350328356;9798350328349
This paper presents a solution to the problem of managing and supporting mobile services with different quality of service requirements in a space-ground integrated network that has limited resources. To this end, we apply network slicing technology and present a reliable deployment algorithm for multi-service network slicing. Specifically, the network slice deployment problem is transformed into a mixed integer linear programming model, and virtual nodes are sorted and deployed using the breadth-first search algorithm based on their reliability index. Finally, virtual link deployment solutions are provided on demand for different types of network slices. Simulation experiments demonstrate that compared to traditional service function chain mapping algorithms, our proposed algorithm reduces deployment costs while increasing network resource utilization and reliability.
network function virtualization (NFV) -based fog computing paradigms support delay-sensitive applications with flexible deployment of virtual networkfunctions (VNFs). However, the limited resources at the fog nodes r...
详细信息
ISBN:
(纸本)9798400703676
network function virtualization (NFV) -based fog computing paradigms support delay-sensitive applications with flexible deployment of virtual networkfunctions (VNFs). However, the limited resources at the fog nodes result in overload at high traffic volumes, thus impacting capacity and quality of service. Hence, this paper proposes a pre-overload migration scheme that copies mapped VNFs from a host node to neighboring target nodes before a saturation event. Once the latter occurs, requests are rerouted to a backup path to resume service with minimal migration iterations and service downtime as compared to a reactive post-overload migration scheme.
A virtual network service can be implemented as a Service function Chain (SFC) which is a composition of multiple Virtualized networkfunctions (VNFs) forming the service topology. The IETF defines a standard architec...
详细信息
Mobile Edge Computing (MEC) and network function virtualization (NFV) have emerged as viable solutions for meeting the growing need in mobile networks for low-latency, high-bandwidth, and efficient data processing. ME...
详细信息
Emerging machine learning techniques enable Internet-connected devices to generate service function chain (SFC) requests for reliability-sensitive applications. To facilitate reliable SFC provisioning, prior works hav...
详细信息
ISBN:
(纸本)9781538674628
Emerging machine learning techniques enable Internet-connected devices to generate service function chain (SFC) requests for reliability-sensitive applications. To facilitate reliable SFC provisioning, prior works have proposed the SFC dedicated protection approach for fog and cloud networks, which generally have abundant resources and connectivity. However, with limited resources and connectivity, it might be inefficient to directly employ these approaches at the network edge. In this work, we study how to efficiently embed and provide dedicated protection when accommodating SFCs at the network edge. We formally define the problem of SFC embedding with dedicated protection (SFCE-DP) to minimize the bandwidth resources usage at the network edge. Based on the proposed technique of augmenting path in a layered graph, we construct an efficient algorithm, called augmenting-path-based SFC embedding with dedicated protection (AP-SDP), to optimize SFCE-DP. When the network resources are limited, our results show that AP-SDP significantly outperforms the benchmark that is directly extended from the state-of-the-art.
The networkfunctions virtualization (NFV) technology is a network architecture that virtualizes traditional network services into virtualized networkfunctions (VNFs) which are dependent on the reliability and securi...
详细信息
The networkfunctions virtualization (NFV) technology is a network architecture that virtualizes traditional network services into virtualized networkfunctions (VNFs) which are dependent on the reliability and security of standard hardware appliances (HAs). The mapping relationship between VNFs and HAs is very complicated, and designing secure routing for the multi-layer NFV network to defend against attacks such as Sybil attack is challenging. In this work, we first designed the mapping patterns of VNFs and HAs in the NFV network. Secondly, we propose a security capacity formulation model which profoundly relies on the mapping patterns. Thirdly, a new multi-path secure routing referred to as SecRouting is suggested to navigate data packets to avoid the Sybil attackers. Finally, we systematically evaluate the security capacity and traffic capacity of the proposed SecRouting compared with many baselines.
暂无评论