{"title":"Network Slicing for Multi-tenant Edge Processing over Shared IoT Infrastructure","authors":"V. Theodorou, Maria-Evgenia Xezonaki","doi":"10.1109/NetSoft48620.2020.9165327","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165327","url":null,"abstract":"Emerging 5G technologies are expected to further unleash the IoT potential, providing the necessary scalability and flexibility for supporting diverse classes of service. In particular, 5G Network Slicing combined with network infrastructure virtualization and programmability can equip cellular IoT with instruments to efficiently facilitate critical, low latency IoT scenaria, as well as massive IoT scenaria of wide-area IoT applications. In parallel, the continuous enhancement of Edge networking infrastrucutre with more capacity and intelligence, presents great opportunities to further improve IoT applications' network-related quality of experience and resource efficiency. In this paper, we focus on massive IoT usage scenaria and we introduce a Network Slicing approach for IoT infrastructure shareability and multi-tenant edge processing of isolated IoT applications. To this end, we propose the 2-tier distribution of IoT Gateways at the network edge and their virtualization as extendable edge platforms and we present a novel architecture building on the NFV MANO architectural framework for slice orchestration and lifecycle management. Initial results from the system prototyping of our solution showcase the automated end-to-end instantiation and readiness of IoT Slices in the order of few minutes.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2020 IEEE Conference on Network Softwarization","authors":"","doi":"10.1109/netsoft48620.2020.9165382","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165382","url":null,"abstract":"","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reza Rokui, Henry Yu, Lingli Deng, David Allabaugh, Mahdi Hemmati, C. Janz
{"title":"A Standards-Based, Model-Driven Solution for 5G Transport Slice Automation and Assurance","authors":"Reza Rokui, Henry Yu, Lingli Deng, David Allabaugh, Mahdi Hemmati, C. Janz","doi":"10.1109/NetSoft48620.2020.9165451","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165451","url":null,"abstract":"This paper reviews the work of industry organizations that are defining the requirements on, and the details of, transport slicing functionality and models, in support of 5G network slicing automation and assurance. Slicing permits the simultaneous support of multiple service frameworks from a converged infrastructure and is key to the 5G operational vision, but poses challenges related to cross-domain coordination, automation and SLA assurance. Transport network slicing is an important component of the overall network slicing picture, and its mechanics are being defined collaboratively by organizations including 3GPP, ETSI ZSM and NFV, and IETF. Supporting demonstrative implementation is being done in the Linux Foundation ONAP project.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123775363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ioannis Dimolitsas, Dimitrios Dechouniotis, V. Theodorou, Panagiotis Papadimitriou, S. Papavassiliou
{"title":"A Multi-Criteria Decision Making Method for Network Slice Edge Infrastructure Selection","authors":"Ioannis Dimolitsas, Dimitrios Dechouniotis, V. Theodorou, Panagiotis Papadimitriou, S. Papavassiliou","doi":"10.1109/netsoft48620.2020.9165307","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165307","url":null,"abstract":"In the era of 5G networks, the demand for high quality service provisioning is growing extremely fast. The enabling of Network Function Virtualization and Network Slicing in the scope of 5G network aims to meet the strict requirements of various business cases. Alongside, the complexity of deployment such services becomes also higher, regarding the differences between infrastructure capabilities and the plethora of various individual requirements. This fact makes the selection of the appropriate infrastructure for slice deployment a complex, but also, a major process, as the optimization of the selection leads to the satisfaction of the user and the better resource allocation from the provider's perspective. In this work, an Edge PoP Selection framework for network slice deployment is proposed. This framework takes into account the user's hard and soft requirements and performs a two-stage selection. The selection of the appropriate infrastructure is based on a multi-criteria decision making method. The proposed framework is evaluated and compared with simple filtering and single-objective selection approaches. The promising results show the importance of the two stage framework in order to simultaneously meet the user's requirements and the optimal utilization of the resources.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130386613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an End-to-End Network Slicing Framework in Multi-Region Infrastructures","authors":"Thomas Lin, Simona Marinova, A. Leon-Garcia","doi":"10.1109/NetSoft48620.2020.9165408","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165408","url":null,"abstract":"End-to-end network slicing is a promising concept based on softwarization and virtualization, leading the way towards efficiently achieving the network and operational key performance indicators (KPIs) for future wireless systems that comprise softwarized network functions. It leverages the underlying physical infrastructure to create and orchestrate agile and programmable network functions which satisfy the end-to-end user demands. These features are crucial during situations in which sudden demand surges stress the wireless system. Proper network orchestration can provide the necessary and timely adaptability to offer sustained communication between end-users. This paper addresses the design and implementation of an end-to-end network slicing framework specifically designed to provide orchestration tools for softwarized network functions, in order to fulfill the system requirements for surge events such as flash crowds. The conducted performance evaluations demonstrate the applicability of this approach and validate the proof-of-concept implementation.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126453606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Esteve Rothenberg, D. A. L. Perez, Nathan F. Saraiva de Sousa, R. V. Rosa, R. Mustafa, Md. Tariqul Islam, P. Gomes
{"title":"Intent-based Control Loop for DASH Video Service Assurance using ML-based Edge QoE Estimation","authors":"Christian Esteve Rothenberg, D. A. L. Perez, Nathan F. Saraiva de Sousa, R. V. Rosa, R. Mustafa, Md. Tariqul Islam, P. Gomes","doi":"10.1109/netsoft48620.2020.9165375","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165375","url":null,"abstract":"Intent-Based Networking (IBN) proposals are based on autonomous closed-loop orchestration architectures that monitor and tune network performance. To this end, IBN defines high-level policies and actions implemented by a closed-loop system. This work demonstrates a Closed Control Loop (CCL) architecture for video service assurance using Machine Learning (ML) based Quality of Experience (QoE) estimation at edge nodes. As part of the solution, network-level Quality of Service (QoS) metrics patterns (e.g., RTT, Throughput) collected through flow-level monitoring are used to build a QoS-to-QoE correlation model tailored to specific target network regions, user groups, and services, in our case DASH video streaming. The demo will showcase the CCL workflow triggering the Orchestrator to take appropriate network-level actions to overcome network QoS degradations and restore the QoE target based on the intent associated with the video service.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Karmakar, V. Varadharajan, U. Tupakula, S. Nepal, Chandra Thapa
{"title":"Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT)","authors":"K. Karmakar, V. Varadharajan, U. Tupakula, S. Nepal, Chandra Thapa","doi":"10.1109/NetSoft48620.2020.9165387","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165387","url":null,"abstract":"Internet of Medical Things (IoMT) are getting popular in the smart healthcare domain. These devices are resource-constrained and are vulnerable to attack. As the IoMTs are connected to the healthcare network infrastructure, it becomes the primary target of the adversary due to weak security and privacy measures. In this regard, this paper proposes a security architecture for smart healthcare network infrastructures. The architecture uses various security components or services that are developed and deployed as virtual network functions. This makes the security architecture ready for future network frameworks such as OpenMANO. Besides, in this security architecture, only authenticated and trusted IoMTs serve the patients along with an encryption-based communication protocol, thus creating a secure, privacy-preserving and trusted healthcare network infrastructure.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G","authors":"A. Esmaeily, Katina Kralevska, D. Gligoroski","doi":"10.1109/NetSoft48620.2020.9165419","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165419","url":null,"abstract":"Network slicing aims to shape 5G as a flexible, scalable, and demand-oriented network. Research communities deploy small-scale and cost-efficient testbeds in order to evaluate network slicing functionalities. We introduce a novel testbed, called 5GIIK, that provides implementation, management, and orchestration of network slices across all network domains and different access technologies. Our methodology identifies design criteria that are a superset of the features present in other state-of-the-art testbeds and determines appropriate open-source tools for implementing them. 5GIIK is one of the most comprehensive testbeds because it provides additional features and capabilities such as slice provision dynamicity, real-time monitoring of VMs and VNF-onboarding to different VIMs. We illustrate the potentials of the proposed testbed and present initial results.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125411871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Crisp is the Crease? A Subjective Study on Web Browsing Perception of Above-The-Fold","authors":"Hamed Z. Jahromi, D. Delaney, Andrew Hines","doi":"10.1109/NETSOFT48620.2020.9165497","DOIUrl":"https://doi.org/10.1109/NETSOFT48620.2020.9165497","url":null,"abstract":"Quality of Experience (QoE) for various types of websites has gained significant attention in recent years. In order to design and evaluate websites, a metric that can estimate a user's experienced quality robustly for diverse content is necessary. SpeedIndex (SI) has been widely adopted to estimate perceived web page loading progress. It measures the speed of rendering pixels for the webpage that is visible in the browser window. This is termed Above-The-Fold (ATF). The influence of animated content on the perception of ATF has been less comprehensively explored. In this paper, we present an experimental design and methodology to measure ATF perception for websites with and without animated elements for various page content categories. We found that pages with animated elements caused people to have more varied perceptions of ATF under different network conditions. Animated content also impacts the page load estimation accuracy of SI for websites. We discuss how the difference in the perception of ATF will impact the QoE management of web applications. We explain the necessity of revisiting the visual assessment of ATF to include the animated contents and improve the robustness of metrics like SI.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hossfeld, P. Heegaard, M. Varela, Lea Skorin-Kapov, M. Fiedler
{"title":"From QoS Distributions to QoE Distributions: a System's Perspective","authors":"T. Hossfeld, P. Heegaard, M. Varela, Lea Skorin-Kapov, M. Fiedler","doi":"10.1109/NetSoft48620.2020.9165426","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165426","url":null,"abstract":"In the context of QoE management, network and service providers commonly rely on models that map system QoS conditions (e.g., system response time, paket loss, etc.) to estimated end user QoE values. Observable QoS conditions in the system may be assumed to follow a certain distribution, meaning that different end users will experience different conditions. On the other hand, drawing from the results of subjective user studies, we know that user diversity leads to distributions of user scores for any given test conditions (in this case referring to the QoS parameters of interest). Our previous studies have shown that to correctly derive various QoE metrics (e.g., Mean Opinion Score (MOS), quantiles, probability of users rating “good or better”, etc.) in a system under given conditions, there is a need to consider rating distributions obtained from user studies, which are often times not available. In this paper we extend these findings to show how to approximate user rating distributions given a QoS-to-MOS mapping function and second order statistics. Such a user rating distribution may then be combined with a QoS distribution observed in a system to finally derive corresponding distributions of QoE scores. We provide two examples to illustrate this process: 1) analytical results using a Web QoE model relating waiting times to QoE, and 2) numerical results using measurements relating packet losses to video stall pattern, which are in turn mapped to QoE estimates.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}