SlideShare a Scribd company logo
Stenio Fernandes, Eduardo Tavares, Marcelo Santos,
Victor Lira, Paulo Maciel
Federal University of Pernambuco (UFPE)
Center for Informatics
Recife, Brazil
Dependability Assessment of Virtualized
Networks
Outline
 Motivation, Problem Statement, and Proposal
 Related Work
 Technical Background
 Hierarchical Dependability Modeling and
Evaluation
 Dependability Assessment of VNs
 Contributions and Future Work
MOTIVATION, PROBLEM
STATEMENT, AND PROPOSAL
Motivation (1/3)
 Network Virtualization is a paradigm shift to allow
highly flexible networks deployment
 Virtual Networks (VN)
– have intrinsic dynamic aspects
 It allows operators to have on-demand negotiation of a
variety of services
 Important properties: concurrent use of the underlying
resources, along with router, host, and link isolation and
abstraction
– resources reuse is performed through appropriate
resource allocation and partitioning techniques
Motivation (2/3)
 Network Virtualization management strategies
– rely on dynamic resource allocation mechanisms for
deploying efficient high-performance VNs
 Goal: achieve efficient resource allocation of the physical
network infrastructure
– heuristic approaches due to its NP-hardness nature
– Efficient partitioning and allocation of network
resources is the fundamental issue to be tackled
PhysicalNetworks
Composed Network - Virtual
Motivation (3/3)
 However, from the point of view of the end-user
– a Service Provider or any entity that wants to build VN
to offer services
 there is still a missing point:
– What are the risks associated to a certain VN?
Problem statement
 Argument & hypotheses:
– risks are inherent to virtualized infrastructures since
the underlying physical network components are failure-
prone
 E.g., subject to hardware and software components
failures
– Understanding Network Failures in Data Centers:
Measurement, Analysis, and Implications, SIGCOMM 2011
– A first look at problems in the cloud. USENIX HotCloud 2010
– Risk is a crucial factor to the establishment of Service
Level Agreements (SLA) between NV engineering and
business players
Problem statement
 Risk evaluation and analysis, from assessment of
dependability attributes, can quantify and give
concrete measures to be used for network
management and control tasks
 Risk evaluation must be taken into account when
formulating an optimization problem for resource
allocation and provisioning of components at the
physical network
Proposal
 This paper proposes and evaluates a method to
estimate dependability attributes (risks) in virtual
network environments,
– It adopts an hierarchical methodology to mitigate the
complexity of representing large VNs
 Reliability Block Diagram (RBD)
 Stochastic Petri Nets (SPN)
 Assessment of dependability attributes could be
adopted as a critical factor for accurate SLA
contracts
RELATED WORK
Related Work
 Xia et al. tackle the problem of resource provisioning in
the context of routing in optical Wavelength-Division
Multiplexing (WDM) mesh networks
– Risk-Aware Provisioning scheme that elegantly minimizes the
probability of SLA violation
 "Risk-Aware Provisioning for Optical WDM Mesh Networks,"
Networking, IEEE/ACM Transactions on, June 2011
 Sun et al. proposes a cloud dependability model using
System-level Virtualization (CDSV), which adopts
quantitative metrics to evaluate the dependability
– They focus on cloud security and evaluate the impact of
dependability properties of the virtualized components at
system-level
 "A Dependability Model to Enhance Security of Cloud
Environment Using System-Level Virtualization Techniques,"
1st Conference on Pervasive on Computing Signal
Processing and Applications (PCSPA), 2010
Related Work
 Techniques for assessing dependability attributes
have been evaluated in virtual computing systems.
– SPN and Markov models have been adopted to assess them
in VMs and Oses.
 Koslovski et al. takes into account reliability only
support in virtual networks
– it has a general view on nodes and links at the physical
infrastructure
– it does not take into account the hierarchical nature of real
systems,
 Composed of virtual machines, disks, operating systems, etc.
– "Reliability Support in Virtual Infrastructures”, IEEE CloudCom
2010
Related Work
 In general
– Simplified views
 Specific to components, sub-systems, etc OR
 Consider only a direct mapping between the
physical infrastructure and a given VN
– little effort on research studies that provide
dependability measures for risk assessment
 They could be adopted as input for resource
allocation algorithms and provisioning techniques
TECHNICAL BACKGROUND
Technical Background
 Dependability of a system can be understood as
the ability to deliver a set of services that can be
justifiably trusted
– It is also related to fault tolerance, availability, and
reliability disciplines
 Dependability metrics can be calculated by
– Combinatorial Models
 Reliability Block Diagrams (RBD) and Fault Trees
– State-based stochastic models
 Markov chains and Stochastic Petri Nets (SPN)
Technical Background
 Some dependability metrics
– Availability (A) of a given device, component, or system
it is related to its uptime and downtime
 Time to Failure (TTF) or Time to Repair (TTR)
 Mean Time to Failure (MTTF) and Mean Time To Repair
(MTTR)
– Steady-state availability (A) may be represented by the
MTTF and MTTR, as:
Technical Background
 MTTF can be computed considering the system
reliability (R) as
 Exponential, Erlang, and Hyperexponential
distributions are commonly adopted for
representing TTFs and TTR
– i.e., adoption of semi-markovian solution methods
HIERARCHICAL DEPENDABILITY
MODELLING AND EVALUATION
Hierarchical Dependability modelling and
evaluation
Proposed methodology for dependability
evaluation of virtualized networks
Three
steps
System
specification
Subsystem
model
generation
System
model
construction
Hierarchical Dependability modelling and
evaluation
• information concerning the
dependences of VNs and
possible mutual impacts,
such as Common Mode
Failure (CMF)
• information related to the
TTF of each component or
sub-components and the
respective TTR
System
specification
Hierarchical Dependability modelling and
evaluation
• the system may be
represented either by one
model or split into smaller
models that comprise system
parts (i.e., subsystems).
• Such an approach mitigates
possible state space size
explosion for large and
detailed models
Subsystem
model
generation
Hierarchical Dependability modelling and
evaluation
• intermediate results are combined
into a higher level model using the
most suitable representation
• For instance, physical nodes are
initially represented by a RBD
model (using series composition)
and the obtained results are
adopted into a SPN model.
• Final model is then constructed by
using the metrics obtained in
previous activity and, lastly, such a
model is evaluated.
System
model
construction
Hierarchical Dependability modelling and
evaluation
 Proposed method provides the basis for
obtaining the dependability metrics and for
evaluating quantitative properties
 It utilizes Mercury/ASTRO environment for
modeling and evaluating dependability models
– Tools available to academics (under request)
DEPENDABILITY ASSESSMENT OF
VIRTUAL NETWORKS
Dependability Assessment of VNs
Evaluation Methodology
• Generation of several VNs requests that must be allocated
on the top of a common physical network
• For each new allocated VN, we assess dependability
metrics for each system and subsystem in the physical and
virtual network
• We assume that dependability metrics are known for
each component of the network, including their subsystems.
• Information from real measurements and data are
available in the literature
• Depending on the chosen model, dependability metrics
may change for each new VN allocation
Dependability Assessment of VNs
 Virtual Network Topology Generation (R-ViNE)
– the substrate network topologies are randomly generated
using the GT-ITM tool;
– Pairs of nodes are randomly attached with probability 0.5;
 500 VN requests during the simulation time (50,000
time units) in a network substrate with 50 nodes.
– VN requests follow a Poisson process with mean λ = 4
(average of 4 VNs per 100 time units);
– Each VN follows an exponential distribution for its lifetime
with λ = 1000 (i.e., an average of 1000 time units);
– For each request, the number of virtual nodes per VN
follows a uniform distribution in the interval [2, 10].
Dependability Assessment of VNs
 Case Study
 mapping algorithm proposed in [3]
– "Virtual Network Embedding with Coordinated Node and
Link Mapping”, IEEE INFOCOM 2009
– The algorithm provides VN allocations in an
infrastructure provider satisfying CPU, link, and other
constraints.
– It does not assume dependability issues, which may
impact the feasibility of a given allocated VN
 We applied the resource allocation algorithm to
evaluate the dependability features for each
allocated VN
Dependability Assessment of VNs
 Case study (cont.)
– demonstrate the estimation of point availability (i.e.,
availability at a time t) and reliability
– assuming independent allocations and common mode
failure (CMF)
 we assume that the components are connected via series
composition
– if a component fails, the virtualized network fails
Dependability Assessment of VNs
 Typical MTTFs and MTTRs
Node MTTF (h) MTTR (h)
CPU 2500000 1
Hard Disk 200000 1
Memory 480000 1
Network Interface Card 6200000 1
Operating Systems 1440 2
Virtual Machines (VM) 2880 2
VM Monitor 2880 2
Switch/Router 320000 1
Optical Link 19996 12
Dependability Assessment of VNs
 VN net0 has a lower availability level, when CMF is
assumed
 the algorithm could avoid overload in some links
and nodes with smaller MTTFs
Dependability Assessment of VNs
 Availability measures for the sampled VNs are very
similar
– In more complex environments, dispersion metrics can
vary significantly
Extensions to the resource allocation algorithm
 Mapping algorithm might have to take into account
one or more dependability measures
– To meet strict requirements
 For instance, a Service Provider can require an availability
of 0.95 and minimum reliability of 0.99 during the lifetime
of a certain VN.
 Allocation alternatives
– to minimize the impact on availability and reliability of
previously defined VNs
– to improve the dependability measures of a new VN
allocation
CONTRIBUTIONS AND FUTURE
WORK
Contributions and Future Work
 Contributions
– an approach for dependability modeling and evaluation
of virtual networks using a hybrid modeling technique
that considers representative combinatorial and state-
based models.
– The proposed approach provides a basis for estimating
dependability metrics, such as reliability and availability,
which we consider important for heuristics dealing with
resource allocation in VNs
Contributions and Future Work
 Future Work
– analysis of fault-tolerant techniques to improve
dependability levels
 when the ordinary components are not able to achieve the
required service level
– formulate an efficient optimization model in the way that
dependability metrics can be handled as range of values

More Related Content

What's hot

Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
The Air Force Office of Scientific Research
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
IJCNCJournal
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
IRJET Journal
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET Journal
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Eswar Publications
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET Journal
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
DETER-Project
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
KhushbooGupta145
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFO
rahulmonikasharma
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
CSCJournals
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
eSAT Journals
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
eSAT Publishing House
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
IJNSA Journal
 
D035418024
D035418024D035418024
D035418024
ijceronline
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET Journal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 

What's hot (20)

Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFO
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
D035418024
D035418024D035418024
D035418024
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 

Similar to IEEE ICC 2012 - Dependability Assessment of Virtualized Networks

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
IRJET Journal
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALSEMSTUDENTPROJECTS
 
To minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloudTo minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloud
Arumugam Reddy
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
Facultad de Informática UCM
 
B03410609
B03410609B03410609
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...
YOU SHENG CHEN
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
idescitation
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
chennaijp
 
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
Luigi Vanfretti
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
ambitlick
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
 
ID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptxID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptx
DrSNAVANEETHAN
 
H03401049054
H03401049054H03401049054
H03401049054
theijes
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
Ericsson
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
Ivano Malavolta
 
A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...
Papitha Velumani
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...
ieeepondy
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
JPINFOTECH JAYAPRAKASH
 

Similar to IEEE ICC 2012 - Dependability Assessment of Virtualized Networks (20)

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
To minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloudTo minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloud
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
 
B03410609
B03410609B03410609
B03410609
 
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
 
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
ID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptxID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptx
 
H03401049054
H03401049054H03401049054
H03401049054
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
 
A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 

More from Stenio Fernandes

The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
Stenio Fernandes
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networking
Stenio Fernandes
 
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
Stenio Fernandes
 
A brief history of streaming video in the Internet
A brief history of streaming video in the InternetA brief history of streaming video in the Internet
A brief history of streaming video in the Internet
Stenio Fernandes
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Stenio Fernandes
 
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Stenio Fernandes
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Stenio Fernandes
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
A referee's plea reviewed
A referee's plea reviewedA referee's plea reviewed
A referee's plea reviewed
Stenio Fernandes
 

More from Stenio Fernandes (9)

The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networking
 
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
 
A brief history of streaming video in the Internet
A brief history of streaming video in the InternetA brief history of streaming video in the Internet
A brief history of streaming video in the Internet
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
A referee's plea reviewed
A referee's plea reviewedA referee's plea reviewed
A referee's plea reviewed
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

IEEE ICC 2012 - Dependability Assessment of Virtualized Networks

  • 1. Stenio Fernandes, Eduardo Tavares, Marcelo Santos, Victor Lira, Paulo Maciel Federal University of Pernambuco (UFPE) Center for Informatics Recife, Brazil Dependability Assessment of Virtualized Networks
  • 2. Outline  Motivation, Problem Statement, and Proposal  Related Work  Technical Background  Hierarchical Dependability Modeling and Evaluation  Dependability Assessment of VNs  Contributions and Future Work
  • 4. Motivation (1/3)  Network Virtualization is a paradigm shift to allow highly flexible networks deployment  Virtual Networks (VN) – have intrinsic dynamic aspects  It allows operators to have on-demand negotiation of a variety of services  Important properties: concurrent use of the underlying resources, along with router, host, and link isolation and abstraction – resources reuse is performed through appropriate resource allocation and partitioning techniques
  • 5. Motivation (2/3)  Network Virtualization management strategies – rely on dynamic resource allocation mechanisms for deploying efficient high-performance VNs  Goal: achieve efficient resource allocation of the physical network infrastructure – heuristic approaches due to its NP-hardness nature – Efficient partitioning and allocation of network resources is the fundamental issue to be tackled PhysicalNetworks Composed Network - Virtual
  • 6. Motivation (3/3)  However, from the point of view of the end-user – a Service Provider or any entity that wants to build VN to offer services  there is still a missing point: – What are the risks associated to a certain VN?
  • 7. Problem statement  Argument & hypotheses: – risks are inherent to virtualized infrastructures since the underlying physical network components are failure- prone  E.g., subject to hardware and software components failures – Understanding Network Failures in Data Centers: Measurement, Analysis, and Implications, SIGCOMM 2011 – A first look at problems in the cloud. USENIX HotCloud 2010 – Risk is a crucial factor to the establishment of Service Level Agreements (SLA) between NV engineering and business players
  • 8. Problem statement  Risk evaluation and analysis, from assessment of dependability attributes, can quantify and give concrete measures to be used for network management and control tasks  Risk evaluation must be taken into account when formulating an optimization problem for resource allocation and provisioning of components at the physical network
  • 9. Proposal  This paper proposes and evaluates a method to estimate dependability attributes (risks) in virtual network environments, – It adopts an hierarchical methodology to mitigate the complexity of representing large VNs  Reliability Block Diagram (RBD)  Stochastic Petri Nets (SPN)  Assessment of dependability attributes could be adopted as a critical factor for accurate SLA contracts
  • 11. Related Work  Xia et al. tackle the problem of resource provisioning in the context of routing in optical Wavelength-Division Multiplexing (WDM) mesh networks – Risk-Aware Provisioning scheme that elegantly minimizes the probability of SLA violation  "Risk-Aware Provisioning for Optical WDM Mesh Networks," Networking, IEEE/ACM Transactions on, June 2011  Sun et al. proposes a cloud dependability model using System-level Virtualization (CDSV), which adopts quantitative metrics to evaluate the dependability – They focus on cloud security and evaluate the impact of dependability properties of the virtualized components at system-level  "A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques," 1st Conference on Pervasive on Computing Signal Processing and Applications (PCSPA), 2010
  • 12. Related Work  Techniques for assessing dependability attributes have been evaluated in virtual computing systems. – SPN and Markov models have been adopted to assess them in VMs and Oses.  Koslovski et al. takes into account reliability only support in virtual networks – it has a general view on nodes and links at the physical infrastructure – it does not take into account the hierarchical nature of real systems,  Composed of virtual machines, disks, operating systems, etc. – "Reliability Support in Virtual Infrastructures”, IEEE CloudCom 2010
  • 13. Related Work  In general – Simplified views  Specific to components, sub-systems, etc OR  Consider only a direct mapping between the physical infrastructure and a given VN – little effort on research studies that provide dependability measures for risk assessment  They could be adopted as input for resource allocation algorithms and provisioning techniques
  • 15. Technical Background  Dependability of a system can be understood as the ability to deliver a set of services that can be justifiably trusted – It is also related to fault tolerance, availability, and reliability disciplines  Dependability metrics can be calculated by – Combinatorial Models  Reliability Block Diagrams (RBD) and Fault Trees – State-based stochastic models  Markov chains and Stochastic Petri Nets (SPN)
  • 16. Technical Background  Some dependability metrics – Availability (A) of a given device, component, or system it is related to its uptime and downtime  Time to Failure (TTF) or Time to Repair (TTR)  Mean Time to Failure (MTTF) and Mean Time To Repair (MTTR) – Steady-state availability (A) may be represented by the MTTF and MTTR, as:
  • 17. Technical Background  MTTF can be computed considering the system reliability (R) as  Exponential, Erlang, and Hyperexponential distributions are commonly adopted for representing TTFs and TTR – i.e., adoption of semi-markovian solution methods
  • 19. Hierarchical Dependability modelling and evaluation Proposed methodology for dependability evaluation of virtualized networks Three steps System specification Subsystem model generation System model construction
  • 20. Hierarchical Dependability modelling and evaluation • information concerning the dependences of VNs and possible mutual impacts, such as Common Mode Failure (CMF) • information related to the TTF of each component or sub-components and the respective TTR System specification
  • 21. Hierarchical Dependability modelling and evaluation • the system may be represented either by one model or split into smaller models that comprise system parts (i.e., subsystems). • Such an approach mitigates possible state space size explosion for large and detailed models Subsystem model generation
  • 22. Hierarchical Dependability modelling and evaluation • intermediate results are combined into a higher level model using the most suitable representation • For instance, physical nodes are initially represented by a RBD model (using series composition) and the obtained results are adopted into a SPN model. • Final model is then constructed by using the metrics obtained in previous activity and, lastly, such a model is evaluated. System model construction
  • 23. Hierarchical Dependability modelling and evaluation  Proposed method provides the basis for obtaining the dependability metrics and for evaluating quantitative properties  It utilizes Mercury/ASTRO environment for modeling and evaluating dependability models – Tools available to academics (under request)
  • 25. Dependability Assessment of VNs Evaluation Methodology • Generation of several VNs requests that must be allocated on the top of a common physical network • For each new allocated VN, we assess dependability metrics for each system and subsystem in the physical and virtual network • We assume that dependability metrics are known for each component of the network, including their subsystems. • Information from real measurements and data are available in the literature • Depending on the chosen model, dependability metrics may change for each new VN allocation
  • 26. Dependability Assessment of VNs  Virtual Network Topology Generation (R-ViNE) – the substrate network topologies are randomly generated using the GT-ITM tool; – Pairs of nodes are randomly attached with probability 0.5;  500 VN requests during the simulation time (50,000 time units) in a network substrate with 50 nodes. – VN requests follow a Poisson process with mean λ = 4 (average of 4 VNs per 100 time units); – Each VN follows an exponential distribution for its lifetime with λ = 1000 (i.e., an average of 1000 time units); – For each request, the number of virtual nodes per VN follows a uniform distribution in the interval [2, 10].
  • 27. Dependability Assessment of VNs  Case Study  mapping algorithm proposed in [3] – "Virtual Network Embedding with Coordinated Node and Link Mapping”, IEEE INFOCOM 2009 – The algorithm provides VN allocations in an infrastructure provider satisfying CPU, link, and other constraints. – It does not assume dependability issues, which may impact the feasibility of a given allocated VN  We applied the resource allocation algorithm to evaluate the dependability features for each allocated VN
  • 28. Dependability Assessment of VNs  Case study (cont.) – demonstrate the estimation of point availability (i.e., availability at a time t) and reliability – assuming independent allocations and common mode failure (CMF)  we assume that the components are connected via series composition – if a component fails, the virtualized network fails
  • 29. Dependability Assessment of VNs  Typical MTTFs and MTTRs Node MTTF (h) MTTR (h) CPU 2500000 1 Hard Disk 200000 1 Memory 480000 1 Network Interface Card 6200000 1 Operating Systems 1440 2 Virtual Machines (VM) 2880 2 VM Monitor 2880 2 Switch/Router 320000 1 Optical Link 19996 12
  • 30. Dependability Assessment of VNs  VN net0 has a lower availability level, when CMF is assumed  the algorithm could avoid overload in some links and nodes with smaller MTTFs
  • 31. Dependability Assessment of VNs  Availability measures for the sampled VNs are very similar – In more complex environments, dispersion metrics can vary significantly
  • 32. Extensions to the resource allocation algorithm  Mapping algorithm might have to take into account one or more dependability measures – To meet strict requirements  For instance, a Service Provider can require an availability of 0.95 and minimum reliability of 0.99 during the lifetime of a certain VN.  Allocation alternatives – to minimize the impact on availability and reliability of previously defined VNs – to improve the dependability measures of a new VN allocation
  • 34. Contributions and Future Work  Contributions – an approach for dependability modeling and evaluation of virtual networks using a hybrid modeling technique that considers representative combinatorial and state- based models. – The proposed approach provides a basis for estimating dependability metrics, such as reliability and availability, which we consider important for heuristics dealing with resource allocation in VNs
  • 35. Contributions and Future Work  Future Work – analysis of fault-tolerant techniques to improve dependability levels  when the ordinary components are not able to achieve the required service level – formulate an efficient optimization model in the way that dependability metrics can be handled as range of values

Editor's Notes

  1. I’m just gonna give a cople of definitions
  2. In such a case, the resource allocation algorithm must take into account the current deployed resources, their dependency with other VNs, and the dependability features. All those issues must be part of the constraints in the optimization problem. Results from the new extensions were not available to due to space restrictions