{"title":"Self provisioning framework for virtualized network functions","authors":"Marouane Mechteri, I. B. Yahia","doi":"10.1109/ICIN.2018.8401598","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401598","url":null,"abstract":"The Dynamic nature of the future software networks built upon SDN, NFV and Cloud principles calls for continuous provisioning to ensure service availability and continuity. In this paper, we present and demonstrate a Self-provisioning framework for efficient deployment, configuration and chaining virtual network function in real cloud infrastructure. The Self Provisioning framework realizes dynamic and agile adjustment of the resource allocation to the customer requests with 1) smart triggering of the right optimization algorithm and 2) dynamic workflow establishment including the configuration of the framework modules. The framework relies on the autonomic control loop design, a.k.a. MAPE-K (Monitor, Analyse, Plan, Execute-Knowledge).","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Omnès, K. Guillouard, M. Ouzzif, R. Picard, P. Seite
{"title":"TANC: Towards autonomic network connectivity: Guidelines for extending the network & IT infrastructure at the edge","authors":"N. Omnès, K. Guillouard, M. Ouzzif, R. Picard, P. Seite","doi":"10.1109/ICIN.2018.8401607","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401607","url":null,"abstract":"Thanks to virtualization, network operators are opening their network & IT infrastructure and offering network & IT Cloud services. Soon after this trend spreads within endusers devices, the edge will be able to instantiate virtual resources on-the-fly, share connectivity, computing and storage resources with edge devices or even be integrated as fully part of the infrastructure. In this article, we provide architectural guidelines and depict the typical phases required for enabling this extension at the edge. After having defined the concepts of resource node and domain, we present the Resource Discovery, Domain Orchestration, Resource Federation and Domain Supervision phases. The actions required to fulfill the phases are highlighted. An illustrating example and running proof-of-concept named TANC: Towards Autonomic Network Connectivity is depicted. This demonstration shows how edge resource nodes can firstly be embedded in the network & IT infrastructure, before being dynamically specialized and modelled depending on the instantaneous needs. In particular, software components are dynamically fetched from a component repository. Furthermore, before specialization, the resource nodes cannot be distinguished one from the other, just like a stem cell is firstly generic before becoming a specific cell. Our work is a first step towards the marking out of edge usages, which are currently drastically evolving.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. Tajiki, S. Salsano, M. Shojafar, L. Chiaraviglio, B. Akbari
{"title":"Energy-efficient path allocation heuristic for service function chaining","authors":"M. M. Tajiki, S. Salsano, M. Shojafar, L. Chiaraviglio, B. Akbari","doi":"10.1109/ICIN.2018.8401618","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401618","url":null,"abstract":"Service Function Chaining (SFC) is a service deployment concept that promises cost efficiency and increases flexibility for computer networks. On the other hand, Software Defined Networking (SDN) provides a powerful infrastructure to implement SFC. In this paper, we mathematically formulate the SFC problem in SDN-based networks. In this way, the energy consumption of the network is minimized while the traffic congestion is controlled through network reconfiguration. Additionally, a low complex heuristic algorithm is proposed to find a near-optimal solution for the mentioned problem. Simulation results show that the proposed heuristic reconfigures the network in a way that the energy consumption is near-optimal while the SFC requirements are met. Besides, the computational complexity is very low which makes it applicable for real-world networks.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An advanced telco cloud simulator and its usage on modelling multi-cloud and 5G multi-access environments","authors":"P. Hegyi, Norbert Varga, L. Bokor","doi":"10.1109/ICIN.2018.8401637","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401637","url":null,"abstract":"This paper introduces an advanced Telco Cloud Simulator that realistically models user behavior (users of different types moving around and demanding network resources) and the effect of this behavior on the relating cloud environment and the distributed Mobile Edge Computing (MEC) subsystems. Expected inputs of the simulation are the following: guidelines behind user behavior, telco infrastructure (with access/backhaul/core segments) and characteristics of Virtual Network Functions (VNFs) needed for serving the users. Outputs of the simulation are the following: movement and network resource demands of users, placing and scaling of the different VNFs needed for service provisioning. Based on the output further computations like energy consumption, total cost of ownership, etc. can be performed. Besides detailing the simulator architecture and operation we also showcase a 5G multi-access communication scenario where multiple service provision domains are simultaneously available for users with highly different communication characteristics and network usage profiles.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling NFV concepts with ontologies","authors":"Ian Oliver, S. Panda, Ke Wang, Aapo Kalliola","doi":"10.1109/ICIN.2018.8401590","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401590","url":null,"abstract":"Reference architectures such as ETSI's Network Function Virtualisation Reference Architecture has the potential not just to clarify terminology but to confuse it. We propose mapping such an architecture and the concepts therein into a properly defined ontology based upon a formal description logic semantics. This enables modelling and reasoning over such concepts. We extend this by showing how such a concept can be integrated with real-life components such as, in the example here, attestation and trust/integrity management in NFV itself.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust SDN controller placement to malicious node attacks","authors":"Dorabella Santos, A. Sousa, C. M. Machuca","doi":"10.1109/ICIN.2018.8401617","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401617","url":null,"abstract":"In software-defined networking (SDN), the control plane is separated from the switching plane (i.e., data plane). The logically centralized control plane is implemented by physically distributing several controllers throughout the network for scalability and resilience. The problem of finding the number and location of the SDN controllers is known as the controller placement problem (CPP). In this paper, we consider the following robust CPP problem variant. For a given maximum switch-controller (SC) delay and a given maximum controller-controller (CC) delay in the regular state, we aim to find a CPP solution that maximizes the network robustness for a given number of malicious node attacks. First, we guarantee that if all but one controller nodes are shutdown, there is still a switching path from any switch to the surviving controller. We propose an ILP based method aiming to enumerate all such solutions. Then, for different malicious node attacks corresponding to different attacker's strategies, we evaluate the previous solutions to determine the ones that maximize the minimum number of switches that can still be connected to at least one controller. We compare the robust CPP solutions with non-robust CPP solutions which aim solely to minimize the average SC delay or average CC delay. In the latter cases, we propose ILP models that can be solved efficiently by standard solvers. Finally, we present a set of computational results showing the trade-off between the robustness improvement of the proposed solutions against the resulting penalties on the SC and CC delays.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriele Baldoni, Christian Grasso, A. Lombardo, C. Rametta, Andrea Scala, S. Sottile
{"title":"Set-top box virtualization as a personal cloud server for 5G users","authors":"Gabriele Baldoni, Christian Grasso, A. Lombardo, C. Rametta, Andrea Scala, S. Sottile","doi":"10.1109/ICIN.2018.8401632","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401632","url":null,"abstract":"In the immediate future, the new networking paradigms SDN, NFV and MEC, together with the incoming 5G mobile network generation, will allow users to receive very- interactive high-quality services from the Telco Operators, thanks to the characteristic of virtualizing network and application functions, and running them very close to the users. In this context, this paper proposes a prototype of a virtual Set-Top Box (STB), the virtualization of a smart device (SD) that is running on the edge of the network, and is able to follow the user when he is in mobility.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaafar Bendriss, I. B. Yahia, R. Riggio, D. Zeghlache
{"title":"Demo: A deep learning based SLA management for NFV-based services","authors":"Jaafar Bendriss, I. B. Yahia, R. Riggio, D. Zeghlache","doi":"10.1109/ICIN.2018.8401592","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401592","url":null,"abstract":"Network function Virtualization (NFV) is expected to accelerate service deployment and enable service agility for Telco operators. NFV builds on virtualization technology and off-the-shelf general purpose hardware, shifting previously dedicated Telco appliances towards the cloud ecosystem. This paradigm shift brings new concepts such as dynamic service chaining that necessitates to rethinking the Network Management approach. In this paper we present CogSLA, a data-driven solution for SLA enforcement in an NFV deployment. CogSLA uses Deep Feedforward Neural Network or Multi-Layer perceptron (MLP) for achieving proactive identification of SLA violations. The key contribution of this work is to proactively change the network state, anticipating and avoiding foreseeable SLA violation.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-level SDN with vehicles as fog computing infrastructures: A new integrated architecture for 5G-VANETs","authors":"Ahmed Soua, S. Tohmé","doi":"10.1109/ICIN.2018.8401604","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401604","url":null,"abstract":"The spectacular emergence of connected and autonomous vehicles coupled with their evergrowing demands on processing, computation and communication resources pose new challenges to provide reliable vehicular services. Here, a combination of a multi-level SdN Approach and a foG computing architEcture based on Vehicles as Infrastructures paradigm, called VISAGE, is proposed for future 5G-VANET systems. By using vehicles as fog infrastructures and integrating them with local SDN controllers, the QoS of vehicular applications and protocols becomes more efficient in terms of computation time and communication delays. This is explained by offloading the computing services from the cloud to the edge of networks, making use of the abundant resources offered by vehicles and making network control decisions locally. Through three typical uses cases of our proposed 5G era vehicular architecture, we show the promising benefits of our approach in terms of communication and computation capacities.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133287425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Chiaraviglio, Fabio D’Andreagiovanni, Giulio Sidoretti, N. Blefari-Melazzi, S. Salsano
{"title":"Optimal design of 5G superfluid networks: Problem formulation and solutions","authors":"L. Chiaraviglio, Fabio D’Andreagiovanni, Giulio Sidoretti, N. Blefari-Melazzi, S. Salsano","doi":"10.1109/ICIN.2018.8401628","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401628","url":null,"abstract":"The forthcoming 5G technology foresees the exploitation of solutions able to increase both the flexibility and the scalability of the network. In line with the current trend of softwarization, in this work we face the problem of designing a 5G network from the outcome of the Horizon 2020 project Super-fluidity. The core of the project is the definition of a 5G converged architecture based on virtual entities, called Reusable Functional Blocks (RFBs), which can be run on different HardWare (HW) and SoftWare (SW) execution environments. The exploitation of RFBs allows to achieve the required level of flexibility required by 5G. After optimally formulating the problem of minimizing the total installation costs of a SuperFluid network composed of RFBs and physical 5G nodes, we propose a new algorithm, called SFDA, to practically tackle the problem. Our results, obtained over a representative case study, show that SFDA is able to solve the problem in a reasonable amount of time, returning solutions very close to the optimum. In addition, we clearly show the trade offs that emerge between the need of providing a service level to users (in terms of downlink traffic or coverage) and the total costs incurred to install the elements of the network.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132101655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}