This paper is written to give basic knowledge of Network function virtualisation in network system. In this paper the work on NFV done till now has been collaborated. It describes how the challenges faced by industry lead to NFV and what is meaning of NFV and NFV architecture model. It also explains NFV Infrastructure is managed and the forwarding path on which packets traverse in NFV. A relationship of NFV with SDN and current research ongoing on NFV policies is discussed.
Artigo: Multilayer Networks: An Architecture FrameworkDiogo Oliveira
Artigo bem bacana do professor Nasir Ghani (University of South Florida) que explica o que são redes Multicamadas. O objetivo do artigo não é explicar a multicamadas, mas apresentar um framework. Porém através das explicações e do cenário a compreensão do termo é facilitada.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
Abstract: A quality of service framework is a fundamental component of a 4G broadband wireless network for satisfactory service delivery of evolving Internet applications to end users, and managing the network resources. Today’s popular mobile Internet applications, such as voice, gaming, streaming, and social networking services, have diverse traffic characteristics and, consequently, different QoS requirements. A rather flexible QoS framework is highly desirable to be future-proof to deliver the incumbent as well as emerging mobile Internet applications. This article highlights QoS frameworks and features of OFDMA-based 4G technologies — IEEE 802.16e, IEEE 802.16m — to support various applications’ QoS requirements. A few advanced QoS features such as new scheduling service (i.e., aGP), quick access, delayed bandwidth request, and priority controlled access in IEEE 802.16m are explained in detail. A brief comparison of the QoS framework of the aforementioned technologies is also provide
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
This paper is written to give basic knowledge of Network function virtualisation in network system. In this paper the work on NFV done till now has been collaborated. It describes how the challenges faced by industry lead to NFV and what is meaning of NFV and NFV architecture model. It also explains NFV Infrastructure is managed and the forwarding path on which packets traverse in NFV. A relationship of NFV with SDN and current research ongoing on NFV policies is discussed.
Artigo: Multilayer Networks: An Architecture FrameworkDiogo Oliveira
Artigo bem bacana do professor Nasir Ghani (University of South Florida) que explica o que são redes Multicamadas. O objetivo do artigo não é explicar a multicamadas, mas apresentar um framework. Porém através das explicações e do cenário a compreensão do termo é facilitada.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
Abstract: A quality of service framework is a fundamental component of a 4G broadband wireless network for satisfactory service delivery of evolving Internet applications to end users, and managing the network resources. Today’s popular mobile Internet applications, such as voice, gaming, streaming, and social networking services, have diverse traffic characteristics and, consequently, different QoS requirements. A rather flexible QoS framework is highly desirable to be future-proof to deliver the incumbent as well as emerging mobile Internet applications. This article highlights QoS frameworks and features of OFDMA-based 4G technologies — IEEE 802.16e, IEEE 802.16m — to support various applications’ QoS requirements. A few advanced QoS features such as new scheduling service (i.e., aGP), quick access, delayed bandwidth request, and priority controlled access in IEEE 802.16m are explained in detail. A brief comparison of the QoS framework of the aforementioned technologies is also provide
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
Final Performance Evaluation of 3GPP NR eMBB within 5G-PPP consortiumEiko Seidel
Nomor Research contributed extensive system level simulation results to the evaluation group of the 5G-PPP consortium as an independent source. The evaluation has been submitted to 34th meeting of the ITU-R Working Party 5D confirming that the 5G requirements of 3GPP New Radio air interface are indeed fulfilled. With the presentation of the evaluation reports at the ITU-R Working Party 5D meeting held in Geneva, Switzerland, in February 2020, the independent evaluation activity has officially been closed.
The system level simulations performed by Nomor Research GmbH are only a part of the overall evaluation of the 5G NR air interface. A summary of the simulation-based evaluation based on the 5G NR RealNeS system simulator is being provided in this white paper.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
Initial deployments of LTE networks are based on so-called homogeneous networks consisting of base stations providing basic coverage, called macro base stations. The concept of heterogeneous networks has recently attracted considerable attention to optimize performance particularly for unequal user or traffic distribution. Here, the layer of planned high-power macro eNBs is overlaid with layers of lower-power pico or femto eNBs that are deployed in a less well planed or even entirely uncoordinated manner. Such deployments can achieve significantly improved overall capacity and cell-edge performance and are often seen as the second phase in LTE network deployment.
This paper discusses the concept of heterogeneous networks as compared to homogeneous networks. It demonstrates the need for inter-cell interference coordination (ICIC) and outlines some ICIC methods that are feasible with release 8 /9 of the LTE standard. System-level simulation results illustrate the benefits of the various features discussed in the following.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...IJCNCJournal
Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as
Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile
protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Wide area networks (WANs) are used to interconnect multiple data centers, and are an important part of the overall network design strategy. While this document will not discuss backup/recovery...
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
Service convergence, content digitization, rapid and flexible service delivery, reduction of capital and operating costs, economies of scale, changes in telecom policy and regulation, and ever increasing competition have been key factors in the evolution of virtualized Next Generation Networks (vNGN). IP-centric converged networks aim to provide a multitude of services over a single network infrastructure. Tremendous success and benefit of server virtualization in data centers is driving the adaption of network virtualization. Network virtualization is applicable to enterprise data center, and enterprise as well as wide area networks. The focus of this paper is network virtualization aspects of service providers’ next generation network. The key factors for moving to virtualized network is optimal use and sharing of network infrastructure even among competitive service providers, programmability of network and rapid introduction of new service and standard based on open platform rather than proprietary implementation. Evolving Software Defined Network (SDN) and Network Function Virtualization (NFV) shall enable common network infrastructure sharing, control, and management at a higher layer thus making network devices more generic and less intelligent, thus enabling cost competitiveness and quick service delivery. Network virtualization shall enable key benefits such as lower cost, flexibility, efficiency, and security, However, the deployment of virtualized next generation networks has brought its unique challenges for network managers and planners, as the network has to be planned in a comprehensive way with effective management of virtual network elements, its correlation with physical infrastructure and monitoring of control functions and server platforms. This paper discusses generic next generation network, its virtualization, and addresses the challenges related to the planning and managing of virtualized next generation networks. This paper proposes a reference OSS model enabling effective management of vNGN, which is key contribution of this paper.
A novel architecture for sdn based cellular network ijwmn
In this paper, we propose a novel SDN-based cellular network architecture that will be able to utilize the
opportunities of centralized administration of today’s emerging mobile network. Our proposed architecture
would not depend on a single controller, rather it divides the whole cellular area into clusters, and each
cluster is controlled by a separate controller. A number of controller services are provided on top of each
controller to manage all the major functionalities of the network and help to make the network
programmable and more agile, and create opportunities for policy-driven supervision and more
automation.
AN ARCHITECTURAL FRAMEWORK FOR DELIVERING SIP-AS MULTIMEDIA SERVICES BASED ON...ijngnjournal
This paper proposes a new scalable service-oriented architecture based on Open Service Gateway Initiative (OSGI) technology. A key part of this architecture is its SIP application as a service (SIP-AS). It relies on IMS core network supported by multi agents components implemented using Java Agent DEvelopment (JADE) platform. As a proof of concept, a real testbed/prototype has been developed to validate our approach. The validation process consisted of two phases: (i) configuration of the JADE/OSGi SIP-AS architecture to provide a televoting service and (ii) characterization and analysis of jitter, packet loss, load capacity and CPU utilization of the implemented architecture. Results demonstrate that this televoting service scales up and out enabling the elasticity of the architecture on the processing of concurrent calls and dynamic load balancing.
Final Performance Evaluation of 3GPP NR eMBB within 5G-PPP consortiumEiko Seidel
Nomor Research contributed extensive system level simulation results to the evaluation group of the 5G-PPP consortium as an independent source. The evaluation has been submitted to 34th meeting of the ITU-R Working Party 5D confirming that the 5G requirements of 3GPP New Radio air interface are indeed fulfilled. With the presentation of the evaluation reports at the ITU-R Working Party 5D meeting held in Geneva, Switzerland, in February 2020, the independent evaluation activity has officially been closed.
The system level simulations performed by Nomor Research GmbH are only a part of the overall evaluation of the 5G NR air interface. A summary of the simulation-based evaluation based on the 5G NR RealNeS system simulator is being provided in this white paper.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
Initial deployments of LTE networks are based on so-called homogeneous networks consisting of base stations providing basic coverage, called macro base stations. The concept of heterogeneous networks has recently attracted considerable attention to optimize performance particularly for unequal user or traffic distribution. Here, the layer of planned high-power macro eNBs is overlaid with layers of lower-power pico or femto eNBs that are deployed in a less well planed or even entirely uncoordinated manner. Such deployments can achieve significantly improved overall capacity and cell-edge performance and are often seen as the second phase in LTE network deployment.
This paper discusses the concept of heterogeneous networks as compared to homogeneous networks. It demonstrates the need for inter-cell interference coordination (ICIC) and outlines some ICIC methods that are feasible with release 8 /9 of the LTE standard. System-level simulation results illustrate the benefits of the various features discussed in the following.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...IJCNCJournal
Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as
Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile
protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Wide area networks (WANs) are used to interconnect multiple data centers, and are an important part of the overall network design strategy. While this document will not discuss backup/recovery...
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
Service convergence, content digitization, rapid and flexible service delivery, reduction of capital and operating costs, economies of scale, changes in telecom policy and regulation, and ever increasing competition have been key factors in the evolution of virtualized Next Generation Networks (vNGN). IP-centric converged networks aim to provide a multitude of services over a single network infrastructure. Tremendous success and benefit of server virtualization in data centers is driving the adaption of network virtualization. Network virtualization is applicable to enterprise data center, and enterprise as well as wide area networks. The focus of this paper is network virtualization aspects of service providers’ next generation network. The key factors for moving to virtualized network is optimal use and sharing of network infrastructure even among competitive service providers, programmability of network and rapid introduction of new service and standard based on open platform rather than proprietary implementation. Evolving Software Defined Network (SDN) and Network Function Virtualization (NFV) shall enable common network infrastructure sharing, control, and management at a higher layer thus making network devices more generic and less intelligent, thus enabling cost competitiveness and quick service delivery. Network virtualization shall enable key benefits such as lower cost, flexibility, efficiency, and security, However, the deployment of virtualized next generation networks has brought its unique challenges for network managers and planners, as the network has to be planned in a comprehensive way with effective management of virtual network elements, its correlation with physical infrastructure and monitoring of control functions and server platforms. This paper discusses generic next generation network, its virtualization, and addresses the challenges related to the planning and managing of virtualized next generation networks. This paper proposes a reference OSS model enabling effective management of vNGN, which is key contribution of this paper.
A novel architecture for sdn based cellular network ijwmn
In this paper, we propose a novel SDN-based cellular network architecture that will be able to utilize the
opportunities of centralized administration of today’s emerging mobile network. Our proposed architecture
would not depend on a single controller, rather it divides the whole cellular area into clusters, and each
cluster is controlled by a separate controller. A number of controller services are provided on top of each
controller to manage all the major functionalities of the network and help to make the network
programmable and more agile, and create opportunities for policy-driven supervision and more
automation.
AN ARCHITECTURAL FRAMEWORK FOR DELIVERING SIP-AS MULTIMEDIA SERVICES BASED ON...ijngnjournal
This paper proposes a new scalable service-oriented architecture based on Open Service Gateway Initiative (OSGI) technology. A key part of this architecture is its SIP application as a service (SIP-AS). It relies on IMS core network supported by multi agents components implemented using Java Agent DEvelopment (JADE) platform. As a proof of concept, a real testbed/prototype has been developed to validate our approach. The validation process consisted of two phases: (i) configuration of the JADE/OSGi SIP-AS architecture to provide a televoting service and (ii) characterization and analysis of jitter, packet loss, load capacity and CPU utilization of the implemented architecture. Results demonstrate that this televoting service scales up and out enabling the elasticity of the architecture on the processing of concurrent calls and dynamic load balancing.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Analysis of basic Architectures used for Lifecycle Management and Orchestrati...rahulmonikasharma
The Network Function Virtualization (NFV), Software Defined Networking are technologies, so which are in combination inorder to provide a high flexibility for network and dynamical continuum of resources for the deployment of services in the environment of high network programmability. A Network Function Virtualization Orchestration (NFVO) is an important topic played a major role in above scenario and in high availability of Virtual Network Functions (VNF), lifecycle and configuration management of network elements. However, the hardware usage is one of the obstacle towards network programmability and is generally considered as a contrast with respect to NFV concepts. In this paper shows many architectures, workflow in virtualization environment, compatibility, flexibility is discussed. These architectures involve in great enhancement of network infrastructure in virtualized environment. Each architecture is needed to gain better results in network function virtualization environment.
This paper focuses on the evolutionary stages for cloudification then covers the key software building blocks that will be needed to enable NFV, and ultimately ICT transformation to 5G. It describes how Intel® Open Networking Platform (Intel® ONP) Server running on innovative new networking platforms based on Intel® silicon can help reduce the cost and effort required for service providers and vendors alike to adopt and deploy SDN and NFV architectures.
Softwarization has been transforming industries like data center and communications businesses. The established hardware-based architectures are being replaced by fundamentally new approaches - software-based systems which are essentially more flexible, dynamic and powerful. In this paper we analyse the evolution in data centers and communications networks towards virtualized platforms and study how a similar type of evolution could impact and benefit power distribution. Following the softwarization process in other industry sectors, we consider that next a Software Defined Grid (SDG) will emerge.
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
In a conventional network, most network devices, such as routers, are dedicated devices that do not
have much variation in capacity. In recent years, a new concept of Network Functions
Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions
with software on general-purpose servers and this allows the network operator to select any
capabilities and locations of network functions without any physical constraints.
This paper focuses on the deployment of NFV-based routing functions which are one of critical
virtual network functions, and present the algorithm of virtual routing function allocation that
minimize the total network cost. In addition, this paper presents the useful allocation policy of
virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy
takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the
network into consideration. Furthermore, this paper shows that there are cases where the use of
NFV-based routing functions makes it possible to reduce the total network cost dramatically, in
comparison to a conventional network, in which it is not economically viable to distribute smallcapacity
routing functions
Network functions virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualized entire classes of network node functions into building blocks that may connect, or chain together, to create communication services.
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
Abstract: SDN creates a dynamic and flexible network architecture that can change as the business
requirements change. The growth of the SDN market and cloud computing are very much connected. As the
applications change and the network is abstracted, virtualization become a necessary step and SDN serves as
the fundamental building blocks for the network. Traditional networking devices are composed of an embedded
control plane that manages switching, routing and traffic engineering activities while the data plane forwards
packet/frames based on traffic. In SDN architecture, control plane functions are removed from individual
networking devices and embedded in a centralizedserver. The SDN controller makes all traffic related decisions
in the network without nodes active participation, as opposed to today’s networks.
Keyword-API, cloud computing, IT, middleware, OpenFlow, SDN
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
Ericsson Review: Software-Defined-NetworkingEricsson
An architecture based on software-defined networking (SDN) techniques gives operators greater freedom to balance operational and business parameters, such as network resilience, service performance and QoE against opex and capex. With its beginnings in data-center technology, software-defined networking (SDN) technology has developed to the point where it can offer significant opportunities to service providers.
The traditional way of describing network architecture and how a network behaves is through the fixed designs and behaviors of its various elements. The concept of software-defined networking (SDN) describes networks and how they behave in a more flexible way – through software tools that describe network elements in terms of programmable network states.
To maximize the potential benefits and deliver superior user experience, software-defined networking (SDN) needs to be implemented outside the sphere of the data center across the entire network. This can be achieved through enabling network programmability based on open APIs. Service Provider SDN will help operators to scale networks and take advantage of new revenue-generating possibilities.
For more from Ericsson Review visit: http://www.ericsson.com/thinkingahead/technology_insights
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
Currently there is increasing interest in scientific research on network traffic management for advanced scenarios (e.g. Internet of Everything (IoE), Everything as a Service (XaaS), Smart Cities, and the like) and their respective demands for novel network services. Such networked applications bring massive amounts of traffic data to be processed in real-time, thus driving researchers to develop affordable yet efficient network management systems. In fact, new paradigms, services, and architectures, such as Network Virtualization (NV), Software-Defined Networking (SDN), Distributed Cloud Computing, Network Functions Virtualization (NFV), Service Function Chaining (SFC), etc, will require robust and dynamic capabilities to support a myriad of possibilities for applications from the IoE and XaaS concepts. For example, there is a need for an in-depth understanding of the composition and the dynamics of Internet traffic to perform accurate capacity planning, deploy efficient management policies and pricing strategies, assess protocol performance, and detect abnormalities in such scenarios. Research on measurement, modeling, and analysis of network traffic and infrastructure always face new challenges as new applications are continuously deployed.
In this talk, I will discuss the rise of IoE and XaaS as well as the demand for advanced networking services, paradigms, and architectures (e.g., SDN, NFV). I will give an overview of some challenges, opportunities, and directions in these research topics.
Similar to Conference Paper: Network Function Chaining in DCs: the unified recurring control approach (20)
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
Continuous innovation in 5G networks is creating new opportunities for video-enabled services for both consumers and industries, particularly in areas such as the Internet of Things and the automotive sector. These new services are expected to rely on continued video evolution toward 8K resolutions and beyond, and on new strict requirements such as low end-to-end latency for video delivery.
The latest Ericsson Technology Review article explores recent developments in video compression technology and introduces Versatile Video Coding (VVC) – a significant improvement on existing video codecs that we think deserves to be widely deployed in the market. VVC has the potential both to enhance the user experience for existing video services and offer an appropriate performance level for new media services over 5G networks.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
Critical Internet of Things (IoT) connectivity is an emerging concept in IoT development that enables more efficient and innovative services across a wide range of industries by reliably meeting time-critical communication needs. Mobile network operators (MNOs) are in the perfect position to enable these types of time-critical services due to their ability to leverage advanced 5G networks in a systematic and cost-effective way.
This Ericsson Technology Review article explores the benefits of Critical IoT connectivity in areas such as industrial control, mobility automation, remote control and real-time media. It also provides an overview of key network technologies and architectures. It concludes with several case studies based on two deployment scenarios – wide area and local area – that illustrate how well suited 5G spectrum assets are for Critical IoT use cases.
5G New Radio has already evolved in important ways since the 3GPP standardized Release 15 in late 2018. The significant enhancements in Releases 16 and 17 are certain to play a critical role in expanding both the availability and the applicability of 5G NR in both industry and public services in the near future.
This Ericsson Technology Review article summarizes the most notable new developments in releases 16 and 17, grouped into two categories: enhancements to existing features and features that address new verticals and deployment scenarios. This analysis and our insights about the future beyond Release 17 is an important component of our work to help mobile network operators and other stakeholders better understand and plan for the many new 5G NR opportunities that are on the horizon.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
For many operators, the introduction of the 5G System (5GS) to provide wide-area services in existing Evolved Packet System (EPS) deployments is a necessary step toward creating a full-service, future-proof 5GS in the longer term. The creation of a combined 4G-5G network requires careful planning and a holistic strategy, as the introduction of 5GS has significant impacts across all network domains, including the RAN, packet core, user data and policies, and services, as well as affecting devices and backend systems.
This Ericsson Technology Review article provides an overview of all the aspects that operators need to consider when putting together a robust EPS-to-5GS migration strategy and provides guidance about how they can adapt the transition to address their particular needs per domain.
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
The rise of the innovation platform
Society and industry are transforming at an unprecedented rate. At the same time, the network platform is emerging as an innovation platform with the potential to offer all the connectivity, processing, storage and security needed by current and future applications. In my 2019 trends article, featured in this issue of Ericsson Technology Review, I share my view of the future network platform in relation to six key technology trends.
This issue of the magazine also addresses critical topics such as trust enablement, the extension of computing resources all the way to the edge of the mobile network, the growing impact of the cloud in the telco domain, overcoming latency and battery consumption challenges, and the need for end-to-end connectivity. I hope it provides you with valuable insights about how to overcome the challenges ahead and take full advantage of new opportunities.
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
The Internet of Things (IoT) has emerged as a fundamental cornerstone in the digitalization of both industry and society as a whole. It represents a huge opportunity not only in economic terms, but also from a global challenges perspective – making it easier for governments, non-governmental organizations and the private sector to address pressing food, energy, water and climate related issues.
5G and the IoT are closely intertwined. One of the biggest innovations within 5G is support for the IoT in all its forms, both by addressing mission criticality as well as making it possible to connect low-cost, long-battery-life sensors.
With this in mind, we decided to create a special issue of Ericsson Technology Review solely focused on IoT opportunities and challenges. I hope it provides you with valuable insights about the IoT-related opportunities available to your organization, along with ideas about how we can overcome the challenges ahead.
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
A variety of automotive and transport services that require cellular connectivity are already in commercial operation today, and many more are yet to come. Among other things, these services will improve road safety and traffic efficiency, saving lives and helping to reduce the emissions that contribute to climate change. At Ericsson, we believe that the best way to address the growing connectivity needs of this industry sector is through a common network solution, as opposed to taking a single-segment silo approach.
The latest Ericsson Technology Review article explains how the ongoing rollout of 5G provides a cost-efficient and feature-rich foundation for a horizontal multiservice network that can meet the connectivity needs of the automotive and transport ecosystem. It also outlines the key challenges and presents potential solutions.
This presentation explains the importance of SD-WAN technology as part of the Enterprise digital transformation strategy. It goes over the first wave of SD-WAN in a single vendor deployment, with Do-it-yourself (DIY) as the preferred model. Then continues with the importance of orchestration in the second wave of SD-WAN deployments in a multi-vendor ecosystem, turning to SD-WAN Managed Services as the preferred model. It ends up with some examples of use cases and the Verizon customer case. More information on Ericsson Dynamic orchestration - http://m.eric.sn/6rsZ30psKLu
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
Time-Sensitive Networking (TSN) is becoming the standard Ethernet-based technology for converged networks of Industry 4.0. Understanding the importance and relevance of TSN features, as well as the capabilities that allow 5G to achieve wireless deterministic and time-sensitive communication, is essential to industrial automation in the future.
The latest Ericsson Technology Review article explains how TSN is an enabler of Industry 4.0, and that together with 5G URLLC capabilities, the two key technologies can be combined and integrated to provide deterministic connectivity end to end. It also discusses TSN standards and the value of the TSN toolbox for next generation industrial automation networks.
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
Low latency communication and minimal battery consumption are key requirements of many 5G and IoT use cases, including smart transport and critical control of remote devices. Thanks to Ericsson’s 4G/5G research activities and lessons learned from legacy networks, we have identified solutions that address both of these requirements by reducing the amount of signaling required during state transitions, and shared our discoveries with the 3GPP.
This Ericsson Technology Review article explains the why and how behind the new Radio Resource Control (RRC) state model in the standalone version of the 5G New Radio standard, which features a new, Ericsson-developed state called inactive. On top of overcoming latency and battery consumption challenges, the new state also increases overall system capacity by decreasing the processing effort in the network.
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
Cloud-native application design is set to become standard practice in the telecom industry in the near future due to the major efficiency gains it can provide, particularly in terms of speeding up software upgrades and releases. At Ericsson, we have been actively exploring the potential of cloud-native computing in the telecom industry since we joined the Cloud Native Computing Foundation (CNCF) a few years ago.
This Ericsson Technology Review article explains the opportunities that CNCF technology has enabled, as well as unveiling key aspects of our application development framework, which is designed to help navigate the transition to a cloud-native approach. It also discusses the challenges that the large-scale reuse of open-source technology can raise, along with key strategies for how to mitigate them.
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
To meet the requirements of use cases in areas such as the Internet of Things, AR/VR, Industry 4.0 and the automotive sector, operators need to be able to provide computing resources across the whole telco domain – all the way to the edge of the mobile network. Service exposure and APIs will play a key role in creating solutions that are both effective and cost efficient.
The latest Ericsson Technology Review article explores recent advances in the service exposure area that have resulted from the move toward 5G and the adoption of cloud-native principles, as well as the combination of Service-based Architecture, microservices and container technologies. It includes examples that illustrate how service exposure can be deployed in a multitude of locations, each with a different set of requirements that drive modularity and configurability needs.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Conference Paper: Network Function Chaining in DCs: the unified recurring control approach
1. Network Function Chaining in DCs:
the Unified Recurring Control Approach
Janos Elek, David Jocha and Robert Szabo
Ericsson Research, Hungary
Abstract—The introduction of Network Function Virtualiza-
tion (NFV) in carrier-grade networks promises improved oper-
ations in terms of flexibility, efficiency, and manageability. NFV
is an approach to combine network and compute virtualizations
together. However, network and compute resource domains ex-
pose different virtualizations and programmable interfaces. In the
UNIFY framework[1] we introduced a joint compute and network
virtualization and programming. In this paper we analyze how
the joint virtualization and control of UNIFY can be applied
to a OpenStack-OpenDaylight Data Center. We show through
an implementation, that the proposed unified recurring control
has clear advantages compared to standard separated cloud and
WAN orchestration approaches.
I. INTRODUCTION
Today, rigid network control limits the flexibility of service
creation. It is not unusual that an average service creation
time cycle is over 90 hours, which must be decreased to the
order of minutes [2]. Therefore, the EU-FP7 UNIFY project
[3] envisions rapid and flexible service programmability in a
“unified production environment” integrating data centre and
carrier network resources. We pursue a service and resource
programmability framework capable of overcoming existing
limitations in terms of efficiency in operations, flexibility in
service deployment and fast and flexible service provisioning.
One of the crucial enablers to support this unified produc-
tion environment is the definition of open and standardized
programmatic interfaces from users (end or enterprise users,
other service providers, over the top providers, etc.) to the
infrastructures [4].
Network Function Virtualization (NFV) [5], Software De-
fined Networking (SDN) [6] and Cloud, e.g., OpenStack
(OS)[7], are key technology enablers nowadays for virtu-
alization. Throughout virtualization, the community pursues
telecommunication grade flexible services with reduced costs.
European Telecommunications Standards Institute (ETSI)
made significant effort to boost open demonstrations of proofs
of concept (PoCs) to build industrial awareness and confidence
in NFV [8]. Many of the PoCs investigate how legacy Data
Centers (DCs) can be used as a NFV Infrastructure (NFVI)
for NFV. For example, PoC#1: “Demonstration of CloudNFV
Open NFV Framework” shows how an OS controlled DC
could be brought under the NFV framework.
Internet Engineering Task Force (IETF) Service Function
Chaining (SFC) working group [9] looks into the problem how
to deliver end-to-end services through the chain of service
functions. Many of such service functions are envisioned to
be transparent to the client, i.e., they intercept the client con-
nection for adding value to the services without the knowledge
of the client [10].
However, deploying service function chains in DCs with
Virtualized Network Functions (VNFs) are far from trivial. For
example, examine the simple case of a DC connected through
one link to a Wide Area Network (WAN). Assume that a
service provider wants to add one or more transparent network
function to some customer services available on the WAN for
the users. The provider’s service orchestrator takes the service
definition, e.g., in the form of a Virtualized Network Function
Forwarding Graph (VNF-FG), and maps it to the infrastructure
domain. The OS controller instantiates the Virtual Machines
(VMs), establishes intra-DC networking and last but not least
the explicit forwarding overlay is configured on the WAN by
the network controller.
Fig. 1. VNF Forwarding Graph in a DC
Now the main question: Do the different technology do-
mains offer proper abstractions and expose powerful Applica-
tion Programming Interfaces (APIs) for the service orchestrator
to be able to decide and execute optimized placement of
Network Functions (NFs) and configuration of the forwarding
chain? We argue that with nowadays separated compute and
2. network control APIs, network overlay is typically just an
afterthought after compute orchestration. Furthermore, the lack
of powerful network abstraction and lack of exposed control
for compute domains also constrains the options available for
chain forwarding[4].
Fortunately, the EU-FP7-UNIFY project pursues joint ab-
straction and control for compute and network resources. In
this paper, we present our design for the joint virtualization
with associated control API for DC domains to enable telco
grade network function chains. Our design follows the UNIFY
architecture and its joint compute and network virtualization
concept.
In the rest of the paper in Sec. II we discuss related
work together with an introduction to the UNIFY concepts. In
Sec. III we present our design and evaluation for the unified
DC scenario. Finally, we draw conclusions in Sec. IV.
II. RELATED WORK
A. NFV, Cloud and SDN
Flexible service definition and creation start by abstract-
ing and formalizing the service into the concept of network
function forwarding graphs (see for example ETSI VNF-FG
in [11]). These graphs represent the way in which service end
points (e.g., customer’s access) are interconnected with the
desired network functions (such as firewalls, load balancers) or
other functionalities (e.g., web-server) to deliver a service. Ser-
vice graph representations form the input for the management
and orchestration to instantiate and configure the requested ser-
vice. ETSI defined a Management and Orchestration (MANO)
framework in [12]. Among others, MANO components are
the Network Function Virtualization Orchestrator (NFVO) for
the lifecycle management of the services and the Virtualized
Infrastructure Managers (VIMs) for controlling and managing
compute, storage and network resources (see Fig. 1 and Fig. 2).
The cloud view of the ETSI MANO framework is that
OS controller can act as a VIM responsible for the com-
pute domain together with its internal networking (as shown
in Fig. 1). The problem, however, is that OS’s northbound
API is not powerful enough to control networking beyond
basic L3 network configuration. That is, Neutron[13] only
supports traditional L2 and L3 networking, some extensions
like load balancer, but no direct forwarding control over the
DC switches. Basically from networking point of view, all
the VMs in an OS network are identified with their private
IP. This IP only visible to VMs in the same network slice.
If one needs a publicly available IP for a VM, a floating
IP must be created. From external domains only through
this IP can the given VM be reached. This already imply
the requirements for some kind of L3 tunneling technology
for traffic steering into a VM VNF. Additionally, the Nova
scheduler of OS use least loaded, random or availability zones
to place VMs, independent of their communication patters,
networking constraints, etc. (see the randomly deployed VMs
in Fig. 1 and the resulting forwarding overlay).
On the networking part, Open Networking Forum (ONF)
works on the definition of an SDN architecture[14]. ONF
focuses on three layers: data, control and application plane
layers, but also include traditional management plane and
end user systems into their architecture. SDN applications
are defined as control plane functions operating over the
forwarding abstraction offered by the SDN Controller The
SDN control plane’s main responsibilities are i) creating the
domain wide abstraction for internal use; ii) creating applica-
tion or client SDN controller specific virtualization and policy
enforcement; and iii) coordinating resources and operations
for virtualization. The data plane of the SDN architecture
constitutes of Network Elements (NEs) that deals directly with
customer traffic. NEs’ forwarding behavior is configured by an
SDN Controller.
Recently, the OpenDaylight (ODL) open-source SDN Con-
troller project developed a northbound neutron adapter plug-
in, therefore an ODL SDN Controller can be used to configure
the DC internal network (see Cloud Network Controller in
Fig. 1). As long as the DC and the WAN of Fig. 1 belong to
the same administration, direct control of the Cloud Network
Controller from the Service Orchestrator could remedy the
intra DC forwarding control problems.
B. UNIFYing cloud and network resources
In the UNIFY programmability framework we anticipated
a three-layered architecture[1] distinguishing infrastructure,
orchestration and service layers (see big dashed boxes of
Fig. 2). The major differences between the ETSI MANO
and the UNIFY frameworks are that UNIFY i) logically
centralize the VIM related resource management functions into
a Resource Orchestrator (RO) and ii) that the UNIFY RO
operates at a joint compute and network virtualization with
control unlike having the network as an afterthought. A more
detailed comparison of UNIFY to ETSI MANO and ONF
SDN, as well as an architecture description is given in [15].
Central to the UNIFY concept is the joint virtualization and
control of compute resources and network forwarding behav-
ior. The joint virtualization is realized as a Big Switch with Big
Software (BiS-BiS) abstraction, which combines both compute
and networking capabilities into a single representation, which
can accommodate VNFs, create VNF ports and receive SDN
forwarding control for these ports.
The UNIFY architecture is recursive, i.e., arbitrary number
of RO with virtualizers can be stacked on top of each other.
This native UNIFY reference point is denoted by Sl-Or (see
the multi-level recursion in Fig. 2 and also [1]).
The role of the Controller Adapter (CA) in the UNIFY
architecture is i) to combine virtualizations and split control
for native UNIFY domains and ii) to create appropriate virtu-
alization and to translate control from the Network Function
Forwarding Graph (NF-FG) abstraction to technology specific
domains. Fig. 2 shows two technology domains similar to
Fig. 1: an SDN WAN and a DC domain. The problem is
twofold: i) how to create UNIFY abstraction and translate
control for legacy SDN and Cloud domains and ii) how to
transfer a legacy DC into a native UNIFY domain. In this
paper, we answer these two questions.
C. Joint compute and network virtualization with control
We are not the first to argue for the introduction of a
unified and programmable system abstraction. For example,
3. Fig. 2. UNIFY narrow waist architecture with programmatic reference points
and some exemplary infrastructure options
in their “middlebox manifesto”, Sekar et al. [16] argue that
despite the critical role that middleboxes play in introducing
new network functionality, they have been largely ignored so
far for designing networks that are amenable to innovation.
The authors envision a world with software-centric middlebox
implementations running on general-purpose hardware plat-
forms that are managed via open and extensible management
APIs. However, while we share the philosophy of [16], our
work focuses more on the specific case of DC and carrier
network unification, and proposes a concrete architecture and
programmability framework.
The Stratos framework[17] aims at composite virtual
middle-box orchestration in a correct and scalable manner
in DCs. The framework design is to be easy to use by the
service consumers, but no exact description of the interface
for deployment requests are given. Moreover we focus on the
broader spectrum of NFs while it concentrate on middle-boxes.
A very similar approach is presented by Benson et al. [18], but
none of these two works consider the unification of multiple
domains.
It is worth to mention the OpenNF control plane[19], where
the focus is on the state transition of NFs in case of scale-out
events. While it is important to have a failproof method for
resource provisioning, our main contribution is on the unified
controlling. We believe, however, that our system is fully
compatible with the solutions provided by the above control
plane.
III. DESIGN AND EVALUATION
Let’s assume that the Service Provider (SP) pursues joint
compute and network virtualization with programmatic control
as described in Sec. II-B. This can only be achieved if compute
and networking requests and requirements are matched and
merged together within the DC for joint considerations. How-
ever, this yields the idea of genuinely combining and trans-
mitting compute and networking requests together. According
to the UNIFY programmatic framework, the NF-FG at the
Sl-Or reference point (see Fig. 2) is one such combination
of compute and network request with associated constraints.
However, one need to build an additional layer on top of the
existing datacenter controller, in order to support the joint
programmatic API. Moreover the DC inner working must be
modified to overcome the scheduler’s limitations described in
the I. section.
With a legacy OS DC one can only use L2/L3 networking
in the internal network, that is, the VMs can be reached only
through its public IP. Consequently, to steer traffic into an
NF deployed as a VM in such a DC some tunneling must be
used. We investigated a scenario like this and found that the
creation of VxLAN tunnels can be appropriate in such a case.
However, the additional processing coupled with the tunneling
and the overhead on the packet size can be a not acceptable
limitation. Moreover, the OS scheduler can not provide optimal
VM placement on its own. In this section we show how a joint
compute and network virtualization with control can remedy
the situation as part of the UNIFY concept.
1) Toward telco grade NFC: A typical OS DC consists of a
couple of compute nodes connected with Open Flow Switches
(OFSes) and a control node on which the OS control functions
are running. The control node expose a standard REST API
through which one can instantiate VMs. In our scenario there
is also an ODL controller on the control node that configures
the OFSes on the request of OS controller. The ODL controller
provides a REST API too. These two API make possible the
joint orchestration. We implemented the CA-ODL controller
RO CA CA-SDN
SDN Net
SDN Controller
BiS/BiS OpenStack DC
Local RO
1: RSDN
(REST)
2: ISDN
(NF-FG)
3: IDC
(NF-FG)
4: Vunified=ISDN+IDC
5: Vunified
(NF-FG)
End of virtualization/Start of NFC request
6: Mapping
on Vunified
7: Munified
(NF-FG)
8: Munified=>MSDN+MDC
9: MDC
(NF-FG)
10: Done
11: MSDN
(NF-FG) 12: Flow rules
(REST)13: Done14: Done
Fig. 3. NF-FG scenario sequence diagram
4. BiS/BiS OpenStack DC
Local RO Local CA CA ODL CA OS Open-Daylight OS Controller
1: Rcompute
(REST)2: Rnetwork
(REST)3: Icompute
(NF-FG)
4: Inetwork
(NF-FG)
5: Vunified=Icompute + Inetwork
6: Vunified
(NF-FG)
End of virtualization/Start of NFC request
7: Mapping
on Vunified
8: Munified
(NF-FG)
9: Munified=>Mcompute+Mnetwork
10: Mcompute
(NF-FG)
11: DVNF1
(REST)
12: DVNF2
(REST)
13: M'compute
(NF-FG)
14: Update Mnetwork
15: Mnetwork 16: Flow rules
(REST)17: Done18: Done
Fig. 4. NF-FG scenario sequence diagram
adapter towards the ODL and the CA-OS adapter towards the
OS controller. In that way we have direct control over the DC
internal network therefore we do not need to create VxLAN
tunnels, and knowing the exact locations of the compute nodes
we can achieve optimal VM deployment by commanding the
OS controller to deploy VMs on a specific node.
In that case, however, the RO on top of these two controller
sees all the underlying resource details. This would give away
too much details and control if the overarching orchestration
belongs to a separate business entity. In the typical case a
third party DC owner wouldn’t allow to give such an access
to the RO and expose its whole intra DC network topology.
Therefore, we introduced a DC domain virtualization on the
top of the DC that not just hides (abstracts) the internal
resource views but at the same time provides equivalently
powerful control as if all the details were exposed.
The UNIFY scenario introduces such a joint compute
and network virtualization with control API in the form of
the NF-FG. Shall the DC domain become a native UNIFY
domain (see bottom right recursion in Fig. 2), the need for
an external technology adapter diminishes and only a simple
NF-FG multiplexer/de-multiplexer CA is needed. The new
domain contains a Local RO that advertises the infrastructure
virtualization with NF-FGs to the global CA, that aggregates
it to the global view of the (overarching) RO. Moreover the
Local RO is waiting for service requests again in the form of
NF-FG that can be directly given by the CA.
We describe now in details the process of infrastructure dis-
covery and an Network Function Chaining (NFC) deployment
process.
2) Virtualizations: An overall picture of the discovery
process can be seen in Fig. 5. On the bottom right hand side
resides the OS/ODL domain with its Local RO and multiple
controller adapters. Note the Service Access Point (SAP) on
the gateway switch (SAPb) that is eventually propagated to
the Local RO and also to the global CA. On the left can be
seen the SDN domain with three OpenvSwitches (OVSes) and
three SAPs from which the SAPa port is connected to the
OS/ODL domain’s SAP. The discovery process is also showed
in the upper part of the sequence diagram Fig.3 where the
relevant information flows and the appropriate communication
protocols are showed. The process start with the capturing of
the networking resources, RSDN , in (step 1). This information
is processed and converted by the CA-SDN. In (step 2) the
SDN domain’s infrastructure description, ISDN , is sent to the
global CA as a NF-FG. In the same manner the Local RO
captures its underlying infrastructure and creates a virtualized
infrastructure description, IDC, that is sent to the global CA
in (step 3). In (step 4) the two infrastructure is combined to
a unified view, Vunified, and also the interconnection between
the two domain is inserted into this view. This external
configuration is given by an NF-FG to the CA, and can be
seen in Fig. 5 as the blue configuration data. In (step 5) the
unified view is sent to the global RO by the global CA. The
informations sent as NF-FG can be seen in Fig. 5 on the
appropriate interfaces.
Fig. 5. Unified NF-FG infrastructure view
Inside the DC domain, the OS and the ODL controllers
are used by the CA-OS and CA-ODL modules to collect the
network topology and the corresponding compute nodes. This
process is showed on the upper part of sequence diagram
in Fig.4. First the compute resources, Rcompute, then the
network resources, Rnetwork are captured by the two controller
adapters in (steps 1,2). From these information both create
5. an infrastructure description, Icompute and Inetwork that is
sent to the Local CA in (step 3,4). The two description then
combined in (step 5) by the Local CA and a unified view,
Vunified is created. In (step 6) Vunified is sent to the Local
RO. The Local RO, based on the combined virtualization and
additional configuration data, creates the virtualized view of
the domain that is sent to the global CA (step 3) in Fig. 3.
Note, that the internal domain wide virtualization and the
external virtualization can differ; actually, the role of the
Local RO is to hide the internals of the DC and present a
virtualization best suited for the client/consumer but at the
same time provide powerful resource control capabilities. In
Fig. 5 the virtualized view is a single BiS-BiS with a single
SAP (SAPb).
Fig. 6. Unified NF-FG mapped request
3) NFC request: A simple example of the deployment
process can be seen in Fig. 6. The abstract request given to
the global RO consists of two NFs inserted between SAP1 and
SAP2. The sequence of this process can be seen in the lower
part of Fig. 3 starting with the mapping of the given request
by the global RO in (step 6). In the resulted mapping the
two NFs are placed on the BiS-BiS representing the OS/ODL
domain and flow rules are created in the up and right BiS-
BiS Nodes for the inward traffic and in the right and down
BiS-BiS Nodes for the outward traffic. Moreover flow rules
are mapped to the DC1 BiS-BiS for the inward and outward
traffic and also for the interconnection of the two NFs. Then
the created mapping, Munififed, is sent to the global CA in
(step 7). The CA converts the flow rules to domain specific
rules (see section III-4) and splits the unified mapping into
MSDN for the SDN domain and MDC for the DC domain in
(step 8). The CA sends first the MDC NF-FG to the Local
RO in (step 9) and after getting a Done response in (step 10)
sends the MSDN NF-FG to the CA-SDN. In response the
CA-SDN installs the requested flow rules in (step 12) through
the SDN controller REST interface and sends a Done message
to the global CA in (step 13). With this the CA is ready with
the deployment and indicates this by sending a Done message
to the global RO.
The orchestration process in the DC domain is showed in
the lower part of Fig. 4. Getting the request the Local RO
maps it to the unified view advertised by the Local CA. In
(step 8) the created mapping is sent to the Local CA as a NF-
FG. Again, the CA splits these request to a Mcompute and a
Mnetwork part in (step 9) and sends first the compute part to
the CA-OS in (step 10). The Mcompute request contains only
the two NF, therefore the only request sent to the OS controller
is two deployment message through the REST interface in
(step 11,12). If the deployment was successful both REST
requests return a response containing the ports created for the
new VMs in the DC. With this information the Mcompute NF-
FG is updated and the new NF-FG, Mcompute, is sent back
to the Local CA in (step 13). The port informations then
inserted into the Mnetwork NF-FG by the CA in (step 14)
and sent to the CA-ODL in (step 15). The necessary flow rules
are instantiated by the ODL controller for the request of the
CA-ODL in (step 16) and in case of a success a Done message
is sent to the Local CA what in turn responds also with a Done
message in (step 18) for the Local RO original request.
4) Flow rule mapping and tagging: After getting a request
the RO maps it onto the unified view showed by the CA. This
mapping consists not just finding an appropriate place for the
NFs in the request, but selecting a paths between those and
creating flow rules that realize these paths. For creating the
paths we used a type of tunneling technology which consists
a classifier rule, a tunnel starting rule, one or more tunnel
matching rule and a tunnel closing rule. From the RO point
of view it is irrelevant what type of specific technology is
used. It only selects an abstract tag for a given path that is
converted to a concrete tunneling type by the CA. The possible
tunneling technologies are populated in the CA in the process
of discovery when all the ports in the infrastructure advertise
what it is supporting.
In our example there are three paths: 1) SAP1 to NF1, 2)
NF1 to NF2 and 3) NF2 to SAP2. As we did not give any
filtering criteria in the original request the RO will classify
all the traffic coming from SAP1 in BiS-BiS up as an input
to the NF1 and tag them with tag T1. This tag is matched in
BiS-BiS right and also in BiS-BiS DC1 where it is deleted
and the packets are sent to NF1 without any tag. As the two
NFs are residing on the same BiS-BiS there is no need for a
tag in the forwarding rule between them. The outward path is
created in the same manner as the inward but with tag T2.
In our implementation all the ports support the VLAN
tunneling and this is advertised from the SDN domain through
the CA-SDN domain as parameters of the ports and from the
DC domain as a parameter of SAPb. Moreover the available
VLAN ID space in the domains is also known by the CA,
therefore it picks available IDs V ID1 for tag T1 and V ID2
for tag T2. The so created flow rules then propagated to the
6. CA-SDN where are instantiated as OpenFlow rules. The DC
domain, however, gets a request in which the traffic coupled
with SAPb has a filtering criteria indicating the VLAN ID
V ID1 and V ID2. The Local RO can decide not to use this
ID as tag in its internal domain, but from SAPb to classify
only the traffic with the VLAN ID V ID1 and send traffic
belonging to the requested path only with the V ID2. With this
procedure we fully decouple the orchestration from the used
domain specific technology and provide efficient mechanism
for traffic steering in a inter-domain consistent manner.
5) Summary: With the introduction of a Local RO in a
DC domain we can enable joint virtualization and control
for external orchestrators without necessarily exposing domain
internal details. This paves the way to be able to offer telco
grade NFC services via DCs.
In our simple example, the view provided by the Local
RO was a single BiS-BiS node. However, the virtualization is
not limited to a single BiS-BiS but arbitrary topology of BiS-
BiS Nodes can be used. For example, with a virtualization of
two BiS-BiS nodes with different set of available NF types one
can introduce cost diversity by providing low cost services in
one of the BiS-BiS and value added services at a higher cost
in the other BiS-BiS. In summary, with the new layer at the
DC we created a powerful tool to enable NFC in DCs.
IV. CONCLUSIONS
In the context of the UNIFY architecture we designed and
evaluated a method to deploy NFC in DCs. We analyzed how
an SDN domain and a DC can inter-work to provide bump-
in-the-wire middlebox services.
We showed that our NF-FG model is a powerful abstraction
and can be used to express complex policies in different
environments.
We designed and evaluated a UNIFY native virtualization
for DC domains, with joint compute and network control API.
Based on our analysis, it is not only possible to retain the busi-
ness boundaries between the DC and the overarching domain
but also possible to effectively control resource allocation.
Furthermore, the UNIFY framework enriches us with powerful
joint compute and network virtualization, definition of arbitrary
topologies and resource slices to be presented to clients for
their policy control.
We believe, that our DC virtualization and control frame-
work paves the way for telco grade NFC deployment.
ACKNOWLEDGMENT
This work was conducted within the framework of the FP7
UNIFY project, which is partially funded by the Commission
of the European Union. The views expressed here are those of
the authors only. The European Commission is not liable for
any use that may be made of the information in this document.
The authors are thankful to the UNIFY team for the inspiring
discussions.
REFERENCES
[1] R. Szabo, B. Sonkoly, M. Kind et al., “D2.2: Final Architecture,”
UNIFY Project, Deliverable 2.2, Nov. 2014. Available here
[2] 5G-PPP Association, “Contractual Arrangement: Setting up a Public-
Private Partnership in the Area of Advance 5G Network Infrastructure
for the Future Internet between the European Union and the 5G
Infrastructure Association,” Dec. 2013. Available here
[3] UNIFY, “Use Cases and Initial Architecture,” UNIFY Project,
Deliverable 2.1, Aug. 2014. Available here
[4] R. Szabo, A. Csaszar, K. Pentikousis et al., “Unifying carrier and
cloud networks: Problem statement and challenges,” Working Draft,
IETF Secretariat, Internet-Draft draft-unify-nfvrg-challenges-01, March
2015, http://www.ietf.org/internet-drafts/draft-unify-nfvrg-challenges-
01.txt. Available here
[5] ETSI, “White Paper: Network Functions Virtualisation (NFV),” 2013.
Available here
[6] ONF, “Open networking foundation,” 2014. Available here
[7] The OpenStack project, “Openstack cloud software,”
http://openstack.org, 2014.
[8] ETSI network functions virtualisation industry specification group,
proofs of concept. Available here
[9] IETF, “Service Function Chaining (sfc) Working Group,” online.
Available here
[10] J. Halpern and C. Pignataro, “Service function chaining (sfc)
architecture,” Working Draft, IETF Secretariat, Internet-Draft draft-
ietf-sfc-architecture-07, March 2015. Available here
[11] ETSI, “Architectural framework,” ETSI, Group Specification v1.1.1,
Oct. 2013. Available here
[12] ——, “Network Function Virtualization (NFV) Management and
Orchestration,” ETSI, Group Specification V0.6.1. (DRAFT), Jul.
2014. Available here
[13] OpenStack, OpenStack Networking (neutron): APIv2.0 and Extensions
Reference, OpenStack, Mar. 2015. Available here
[14] Open Networking Forum (ONF), “SDN architecture,” ONF, TR
(Technical Reference), non-normative, type 2 SDN ARCH 1.0
06062014, Jun. 2014. Available here
[15] R. Szabo, M. Kind, F.-J. Westphal et al., “Elastic network functions:
opportunities and challenges,” Network, IEEE, vol. 29, no. 3, pp.
15–21, May 2015. Available here
[16] V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi, “Design
and implementation of a consolidated middlebox architecture,” in
Proceedings of the 9th USENIX Conference on Networked Systems
Design and Implementation, ser. NSDI’12. Berkeley, CA, USA:
USENIX Association, 2012, pp. 24–24. Available here
[17] A. Gember, A. Krishnamurthy, S. S. John et al., “Stratos: A
network-aware orchestration layer for middleboxes in the cloud,”
CoRR, vol. abs/1305.0209, 2013. Available here
[18] T. Benson, A. Akella, A. Shaikh, and S. Sahu, “Cloudnaas: A cloud
networking platform for enterprise applications,” in Proceedings of the
2Nd ACM Symposium on Cloud Computing, ser. SOCC ’11. New
York, NY, USA: ACM, 2011, pp. 8:1–8:13. Available here
[19] A. Gember-Jacobson, R. Viswanathan, C. Prakash et al., “Opennf:
Enabling innovation in network function control,” in Proceedings of
the 2014 ACM Conference on SIGCOMM, ser. SIGCOMM ’14. New
York, NY, USA: ACM, 2014, pp. 163–174. Available here