SlideShare a Scribd company logo
EMERGING APPROACH FOR
RESOURCE OVER PROVISIONING
Presented by
Venkadesh R
2023614033
1
Introduction:
 It is able to integrate SDN and NFV for efficient resource over‐reservation control to support
differentiated QoS over the 5G Internet without undue signalling and related processing overhead.
 Network operator -1 is a mulitioperator network scenario encompassing network.
 Network operator -2 is considered as a cloud of clouds.
 The SDNC is responsible for granting or denying access to the network and the related resources in
such a way as to ensure that each admitted user receives the QoS contracted.
 Also, the SDNC’s functions include, among others, traffic load balancing to avoid unnecessary
congestion occurrence inside the network while inter‐domain connections are performed according
to pre‐defined Service Level Agreements (SLAs) between the operators for scalability reasons.
2
Introduction:
 The SDNC is enabled for defining appropriate control policies and dictating the enforcement on the transport elements
(e.g. switches and routers)
 Through appropriate signalling protocols (e.g. OpenFlow compliant protocol). This will ensure that every application is
effectively prevented from starving other applications of their resources inside the network.
 Therefore, the SDNC embeds a set of control components such as, but not limited to:
(i) Control Information Repository (CIR) as being a database for maintaining network topological information and
users’ profiles.
(ii) Service Admission Control Policies (SACP), as the entity responsible for defining appropriate control policies and
managing access to the network resources.
(iii) Network Resource Provisioning(NRP), which can be used for advanced resource allocation. Further details on
these components in terms of functions and interactions are provided in the following subsections.
3
4
Control Information Repository:
 CIR by the is exploited SDNC to maintain the network topology and related link resource statistics, including
communication paths that may be created inside the network along with the IDs of the outgoing interfaces that
belong to the paths.
 The CIR records the overall capacity of each network interface and the amount of bandwidth.
 Active session information includes, but is not limited to, the QoS requirements of the session (e.g. bandwidth,
delay, jitter and packets loss).
 The session ID, the IDs of the flows that make up the session, the ID of the CoS to which the session belongs, the
flows’ source and destination IDs (e.g. IP and Media Access Control – MAC – addresses).
 The ports’ IDs. The users’ other profile information, such as billing and personalisation parameters, may also be
stored in the CIR.
 In summary, the specific design and configurations of a SDNC would depend on the operators’ preferences, which
may vary from one operator to another.
5
Service Admission Control Policies:
 The SACP enables the SDNC to admit or deny service access to the network by dynamically taking into account
incoming service request QoS requirements (e.g. bandwidth).
 It provides an interface to allow interactions with end‐users to receive requests on one hand, and with the network
nodes (e.g. routers) for sending control instructions to be enforced throughout the network, on the other.
 Hence, upon admission, termination or readjustment of the QoS requirements of a session in a CoS on a
communication path, the session‐related information (e.g. resource usage) must be updated in the local CIR in a
real‐time manner.
 The SACP is able to admit, terminate or readjust the QoS demands without undue signalling overhead or waste of
resources.
 Since the network resource utilisation statistics are maintained in a real‐time manner in the CIR, the information
can be exploited to improve traffic load‐balancing functions in a flexible way without undesired path‐probing and
the related signalling overhead.
6
Network Resource Provisioning:
 The main role of the NRP component is to define the amount of resources to be over‐reserved and the
parameters, such as reservation thresholds, to be configured for each CoS on each interface inside the network
according to the local control policies.
 This component must be intelligent enough to allow the integration of existing over‐reservation algorithms and
policies, as in including future algorithms.
 This is important since the NRP is invoked dynamically by the admission control functions so that reservation
parameters can be readjusted upon need to prevent ineffective use of resources while reducing signalling
frequency.
 It turns out that this component can also be used to create and manage deterministic communication paths
inside the network (e.g. Label Switching Paths as in Multi‐protocol Label Switching – MPLS).
7
Network Configurations:
 The SDNC is able to discover the network topology dynamically as new nodes boot up inside the network. One
may use existing topology discovery mechanisms by importing the information from link‐state routing
protocols.
 Hence, by taking the network topology and appropriate algorithm as inputs, the SDNC is able to compute all
possible paths, especially the edge‐to‐edge paths inside the core network under its control.
 A combination of the paths may lead to all possible branched routes and the best paths can be filtered, for
example, based on the number of hops or bottleneck bandwidth.
 It is worth recalling that the use of deterministic paths is very important to improve network resource control.
8
Network Operations:
9
 To facilitate the understanding, let’s suppose that User A wants to enjoy a 3D video service from the provider of DC B
(Data Centre B) in the cloud. Hence, the user issues a service request, which is directed to the SDNC via a gateway,
BR1 (step 1).
 The service request contains the user’s QoS requirements (e.g. bandwidth) and the related traffic characteristics (e.g.
codec).
 Hence, based on the information received, SDNC I performs the admission control according to the pre‐defined local
control policies and books the best path with sufficient available bandwidth for connecting the gateway BR1 and
egress BR3 towards DC B.
 It is therefore very important to note that the SDNC is able to do so without any path probing or extra QoS signalling
into the network since we assume that it integrates the resource over‐reservation solution .
 In case these operations are successful, the server redirects the request to SDNC II (operator B’s network), as being
the next domain on the end‐to‐end path towards the DC B.
 When SDNC II receives the request, it also books the best path (BR5 to BR8) without any extra signalling overhead and
checks the requested service availability in the DC B. Then, upon receiving a successful response from the DC B, SDNC
II enforces the booked path by properly configuring the border routers on the path (BR5 and BR8).
10
 Examples of the configurations include the selected path’s multicast group (in multicast‐enabled domain) or MPLS
label (in MPLS domain), and traffic conditioning parameters (e.g. classification, shaping and policing).
 This will ensure that incoming media packets will be correctly encapsulated at the ingress edge routers to follow the
desired paths, so they enjoy the QoS reserved for them. The packets are decapsulated at the relevant egress edge
routers for delivery to the end‐user or the following domain.
 As we explained in 2.6.3, only the BRs are configured since it is assumed that the over‐reserved resources are still
available on the core/interior nodes on the path. As we detailed earlier, the core nodes are signalled to reconfigure
the reservation parameters only after the over‐reserved resource has exhausted and is not sufficient for the
incoming request.
 In this way, not only can the signalling frequency be significantly reduced, but also the session setup time will be
reduced. Afterwards, SDNC II replies to SDNC I and the latter also enforces the path that was booked for the service
(see step 7).
 Finally, SDNC I notifies user A about the operations success (see step 8). At the same time, SDNC I sends an
Acknowledgement (ACK) message to SDNC II, whose message is forwarded to DC B (see step 9) to trigger the media
streaming..
11
THANK YOU
12

More Related Content

Similar to WBN.pptx

QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...ijwmn
 
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...ijwmn
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wiMd.Akm Sahansha
 
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSIJCI JOURNAL
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Lab 10 manual
Lab 10 manualLab 10 manual
Lab 10 manualtrayyoo
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)trayyoo
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 

Similar to WBN.pptx (20)

QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
 
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
 
B010410411
B010410411B010410411
B010410411
 
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Lab 10 manual
Lab 10 manualLab 10 manual
Lab 10 manual
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)
 
Ch7
Ch7Ch7
Ch7
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 

Recently uploaded

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 

Recently uploaded (20)

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

WBN.pptx

  • 1. EMERGING APPROACH FOR RESOURCE OVER PROVISIONING Presented by Venkadesh R 2023614033 1
  • 2. Introduction:  It is able to integrate SDN and NFV for efficient resource over‐reservation control to support differentiated QoS over the 5G Internet without undue signalling and related processing overhead.  Network operator -1 is a mulitioperator network scenario encompassing network.  Network operator -2 is considered as a cloud of clouds.  The SDNC is responsible for granting or denying access to the network and the related resources in such a way as to ensure that each admitted user receives the QoS contracted.  Also, the SDNC’s functions include, among others, traffic load balancing to avoid unnecessary congestion occurrence inside the network while inter‐domain connections are performed according to pre‐defined Service Level Agreements (SLAs) between the operators for scalability reasons. 2
  • 3. Introduction:  The SDNC is enabled for defining appropriate control policies and dictating the enforcement on the transport elements (e.g. switches and routers)  Through appropriate signalling protocols (e.g. OpenFlow compliant protocol). This will ensure that every application is effectively prevented from starving other applications of their resources inside the network.  Therefore, the SDNC embeds a set of control components such as, but not limited to: (i) Control Information Repository (CIR) as being a database for maintaining network topological information and users’ profiles. (ii) Service Admission Control Policies (SACP), as the entity responsible for defining appropriate control policies and managing access to the network resources. (iii) Network Resource Provisioning(NRP), which can be used for advanced resource allocation. Further details on these components in terms of functions and interactions are provided in the following subsections. 3
  • 4. 4
  • 5. Control Information Repository:  CIR by the is exploited SDNC to maintain the network topology and related link resource statistics, including communication paths that may be created inside the network along with the IDs of the outgoing interfaces that belong to the paths.  The CIR records the overall capacity of each network interface and the amount of bandwidth.  Active session information includes, but is not limited to, the QoS requirements of the session (e.g. bandwidth, delay, jitter and packets loss).  The session ID, the IDs of the flows that make up the session, the ID of the CoS to which the session belongs, the flows’ source and destination IDs (e.g. IP and Media Access Control – MAC – addresses).  The ports’ IDs. The users’ other profile information, such as billing and personalisation parameters, may also be stored in the CIR.  In summary, the specific design and configurations of a SDNC would depend on the operators’ preferences, which may vary from one operator to another. 5
  • 6. Service Admission Control Policies:  The SACP enables the SDNC to admit or deny service access to the network by dynamically taking into account incoming service request QoS requirements (e.g. bandwidth).  It provides an interface to allow interactions with end‐users to receive requests on one hand, and with the network nodes (e.g. routers) for sending control instructions to be enforced throughout the network, on the other.  Hence, upon admission, termination or readjustment of the QoS requirements of a session in a CoS on a communication path, the session‐related information (e.g. resource usage) must be updated in the local CIR in a real‐time manner.  The SACP is able to admit, terminate or readjust the QoS demands without undue signalling overhead or waste of resources.  Since the network resource utilisation statistics are maintained in a real‐time manner in the CIR, the information can be exploited to improve traffic load‐balancing functions in a flexible way without undesired path‐probing and the related signalling overhead. 6
  • 7. Network Resource Provisioning:  The main role of the NRP component is to define the amount of resources to be over‐reserved and the parameters, such as reservation thresholds, to be configured for each CoS on each interface inside the network according to the local control policies.  This component must be intelligent enough to allow the integration of existing over‐reservation algorithms and policies, as in including future algorithms.  This is important since the NRP is invoked dynamically by the admission control functions so that reservation parameters can be readjusted upon need to prevent ineffective use of resources while reducing signalling frequency.  It turns out that this component can also be used to create and manage deterministic communication paths inside the network (e.g. Label Switching Paths as in Multi‐protocol Label Switching – MPLS). 7
  • 8. Network Configurations:  The SDNC is able to discover the network topology dynamically as new nodes boot up inside the network. One may use existing topology discovery mechanisms by importing the information from link‐state routing protocols.  Hence, by taking the network topology and appropriate algorithm as inputs, the SDNC is able to compute all possible paths, especially the edge‐to‐edge paths inside the core network under its control.  A combination of the paths may lead to all possible branched routes and the best paths can be filtered, for example, based on the number of hops or bottleneck bandwidth.  It is worth recalling that the use of deterministic paths is very important to improve network resource control. 8
  • 10.  To facilitate the understanding, let’s suppose that User A wants to enjoy a 3D video service from the provider of DC B (Data Centre B) in the cloud. Hence, the user issues a service request, which is directed to the SDNC via a gateway, BR1 (step 1).  The service request contains the user’s QoS requirements (e.g. bandwidth) and the related traffic characteristics (e.g. codec).  Hence, based on the information received, SDNC I performs the admission control according to the pre‐defined local control policies and books the best path with sufficient available bandwidth for connecting the gateway BR1 and egress BR3 towards DC B.  It is therefore very important to note that the SDNC is able to do so without any path probing or extra QoS signalling into the network since we assume that it integrates the resource over‐reservation solution .  In case these operations are successful, the server redirects the request to SDNC II (operator B’s network), as being the next domain on the end‐to‐end path towards the DC B.  When SDNC II receives the request, it also books the best path (BR5 to BR8) without any extra signalling overhead and checks the requested service availability in the DC B. Then, upon receiving a successful response from the DC B, SDNC II enforces the booked path by properly configuring the border routers on the path (BR5 and BR8). 10
  • 11.  Examples of the configurations include the selected path’s multicast group (in multicast‐enabled domain) or MPLS label (in MPLS domain), and traffic conditioning parameters (e.g. classification, shaping and policing).  This will ensure that incoming media packets will be correctly encapsulated at the ingress edge routers to follow the desired paths, so they enjoy the QoS reserved for them. The packets are decapsulated at the relevant egress edge routers for delivery to the end‐user or the following domain.  As we explained in 2.6.3, only the BRs are configured since it is assumed that the over‐reserved resources are still available on the core/interior nodes on the path. As we detailed earlier, the core nodes are signalled to reconfigure the reservation parameters only after the over‐reserved resource has exhausted and is not sufficient for the incoming request.  In this way, not only can the signalling frequency be significantly reduced, but also the session setup time will be reduced. Afterwards, SDNC II replies to SDNC I and the latter also enforces the path that was booked for the service (see step 7).  Finally, SDNC I notifies user A about the operations success (see step 8). At the same time, SDNC I sends an Acknowledgement (ACK) message to SDNC II, whose message is forwarded to DC B (see step 9) to trigger the media streaming.. 11