846 research outputs found

    NFV orchestration in edge and fog scenarios

    Get PDF
    MenciĂłn Internacional en el tĂ­tulo de doctorLas infraestructuras de red actuales soportan una variedad diversa de servicios como video bajo demanda, video conferencias, redes sociales, sistemas de educaciĂłn, o servicios de almacenamiento de fotografĂ­as. Gran parte de la poblaciĂłn mundial ha comenzado a utilizar estos servicios, y los utilizan diariamente. Proveedores de Cloud y operadores de infraestructuras de red albergan el trĂĄfico de red generado por estos servicios, y sus tareas de gestiĂłn no solo implican realizar el enrutamiento del trĂĄfico, sino tambiĂ©n el procesado del trĂĄfico de servicios de red. Tradicionalmente, el procesado del trĂĄfico ha sido realizado mediante aplicaciones/ programas desplegados en servidores que estaban dedicados en exclusiva a tareas concretas como la inspecciĂłn de paquetes. Sin embargo, en los Ășltimos anos los servicios de red se han virtualizado y esto ha dado lugar al paradigma de virtualizaciĂłn de funciones de red (Network Function Virtualization (NFV) siguiendo las siglas en ingles), en el que las funciones de red de un servicio se ejecutan en contenedores o mĂĄquinas virtuales desacopladas de la infraestructura hardware. Como resultado, el procesado de trĂĄfico se ha ido haciendo mĂĄs flexible gracias al laxo acople del software y hardware, y a la posibilidad de compartir funciones de red tĂ­picas, como firewalls, entre los distintos servicios de red. NFV facilita la automatizaciĂłn de operaciones de red, ya que tareas como el escalado, o la migraciĂłn son tĂ­picamente llevadas a cabo mediante un conjunto de comandos previamente definidos por la tecnologĂ­a de virtualizaciĂłn pertinente, bien mediante contenedores o mĂĄquinas virtuales. De todos modos, sigue siendo necesario decidir el en rutamiento y procesado del trĂĄfico de cada servicio de red. En otras palabras, que servidores tienen que encargarse del procesado del trĂĄfico, y que enlaces de la red tienen que utilizarse para que las peticiones de los usuarios lleguen a los servidores finales, es decir, el conocido como embedding problem. Bajo el paraguas del paradigma NFV, a este problema se le conoce en inglĂ©s como Virtual Network Embedding (VNE), y esta tesis utiliza el termino “NFV orchestration algorithm” para referirse a los algoritmos que resuelven este problema. El problema del VNE es NP-hard, lo cual significa que que es imposible encontrar una soluciĂłn optima en un tiempo polinĂłmico, independientemente del tamaño de la red. Como consecuencia, la comunidad investigadora y de telecomunicaciones utilizan heurĂ­sticos que encuentran soluciones de manera mĂĄs rĂĄpida que productos para la resoluciĂłn de problemas de optimizaciĂłn. Tradicionalmente, los “NFV orchestration algorithms” han intentado minimizar los costes de despliegue derivados de las soluciones asociadas. Por ejemplo, estos algoritmos intentan no consumir el ancho de banda de la red, y usar rutas cortas para no utilizar tantos recursos. AdemĂĄs, una tendencia reciente ha llevado a la comunidad investigadora a utilizar algoritmos que minimizan el consumo energĂ©tico de los servicios desplegados, bien mediante la elecciĂłn de dispositivos con un consumo energĂ©tico mĂĄs eficiente, o mediante el apagado de dispositivos de red en desuso. TĂ­picamente, las restricciones de los problemas de VNE se han resumido en un conjunto de restricciones asociadas al uso de recursos y consumo energĂ©tico, y las soluciones se diferenciaban por la funciĂłn objetivo utilizada. Pero eso era antes de la 5a generaciĂłn de redes mĂłviles (5G) se considerase en el problema de VNE. Con la apariciĂłn del 5G, nuevos servicios de red y casos de uso entraron en escena. Los estĂĄndares hablaban de comunicaciones ultra rĂĄpidas y fiables (Ultra-Reliable and Low Latency Communications (URLLC) usando las siglas en inglĂ©s) con latencias por debajo de unos pocos milisegundos y fiabilidades del 99.999%, una banda ancha mejorada (enhanced Mobile Broadband (eMBB) usando las siglas en inglĂ©s) con notorios incrementos en el flujo de datos, e incluso la consideraciĂłn de comunicaciones masivas entre maquinas (Massive Machine-Type Communications (mMTC) usando las siglas en inglĂ©s) entre dispositivos IoT. Es mĂĄs, paradigmas como edge y fog computing se incorporaron a la tecnologĂ­a 5G, e introducĂ­an la idea de tener dispositivos de computo mĂĄs cercanos al usuario final. Como resultado, el problema del VNE tenĂ­a que incorporar los nuevos requisitos como restricciones a tener en cuenta, y toda soluciĂłn debĂ­a satisfacer bajas latencias, alta fiabilidad, y mayores tasas de transmisiĂłn. Esta tesis estudia el problema des VNE, y propone algunos heurĂ­sticos que lidian con las restricciones asociadas a servicios 5G en escenarios edge y fog, es decir, las soluciones propuestas se encargan de asignar funciones virtuales de red a servidores, y deciden el enrutamiento del trafico en las infraestructuras 5G con dispositivos edge y fog. Para evaluar el rendimiento de las soluciones propuestas, esta tesis estudia en primer lugar la generaciĂłn de grafos que representan redes 5G. Los mecanismos propuestos para la generaciĂłn de grafos sirven para representar distintos escenarios 5G. En particular, escenarios de federaciĂłn en los que varios dominios comparten recursos entre ellos. Los grafos generados tambiĂ©n representan servidores en el edge, asĂ­ como dispositivos fog con una baterĂ­a limitada. AdemĂĄs, estos grafos tienen en cuenta los requisitos de estĂĄndares, y la demanda que se espera en las redes 5G. La generaciĂłn de grafos propuesta sirve para representar escenarios federaciĂłn en los que varios dominios comparten recursos entre ellos, y redes 5G con servidores edge, asĂ­ como dispositivos fog estĂĄticos o mĂłviles con una baterĂ­a limitada. Los grafos generados para infraestructuras 5G tienen en cuenta los requisitos de estĂĄndares, y la demanda de red que se espera en las redes 5G. AdemĂĄs, los grafos son diferentes en funciĂłn de la densidad de poblaciĂłn, y el ĂĄrea de estudio, es decir, si es una zona industrial, una autopista, o una zona urbana. Tras detallar la generaciĂłn de grafos que representan redes 5G, esta tesis propone algoritmos de orquestaciĂłn NFV para resolver con el problema del VNE. Primero, se centra en escenarios federados en los que los servicios de red se tienen que asignar no solo a la infraestructura de un dominio, sino a los recursos compartidos en la federaciĂłn de dominios. Dos problemas diferentes han sido estudiados, uno es el problema del VNE propiamente dicho sobre una infraestructura federada, y el otro es la delegaciĂłn de servicios de red. Es decir, si un servicio de red se debe desplegar localmente en un dominio, o en los recursos compartidos por la federaciĂłn de dominios; a sabiendas de que el Ășltimo caso supone el pago de cuotas por parte del dominio local a cambio del despliegue del servicio de red. En segundo lugar, esta tesis propone OKpi, un algoritmo de orquestaciĂłn NFV para conseguir la calidad de servicio de las distintas slices de las redes 5G. Conceptualmente, el slicing consiste en partir la red de modo que cada servicio de red sea tratado de modo diferente dependiendo del trozo al que pertenezca. Por ejemplo, una slice de eHealth reservara los recursos de red necesarios para conseguir bajas latencias en servicios como operaciones quirĂșrgicas realizadas de manera remota. Cada trozo (slice) estĂĄ destinado a unos servicios especĂ­ficos con unos requisitos muy concretos, como alta fiabilidad, restricciones de localizaciĂłn, o latencias de un milisegundo. OKpi es un algoritmo de orquestaciĂłn NFV que consigue satisfacer los requisitos de servicios de red en los distintos trozos, o slices de la red. Tras presentar OKpi, la tesis resuelve el problema del VNE en redes 5G con dispositivos fog estĂĄticos y mĂłviles. El algoritmo de orquestaciĂłn NFV presentado tiene en cuenta las limitaciones de recursos de computo de los dispositivos fog, ademĂĄs de los problemas de falta de cobertura derivados de la movilidad de los dispositivos. Para concluir, esta tesis estudia el escalado de servicios vehiculares Vehicle-to-Network (V2N), que requieren de bajas latencias para servicios como la prevenciĂłn de choques, avisos de posibles riesgos, y conducciĂłn remota. Para estos servicios, los atascos y congestiones en la carretera pueden causar el incumplimiento de los requisitos de latencia. Por tanto, es necesario anticiparse a esas circunstancias usando tĂ©cnicas de series temporales que permiten saber el trĂĄfico inminente en los siguientes minutos u horas, para asĂ­ poder escalar el servicio V2N adecuadamente.Current network infrastructures handle a diverse range of network services such as video on demand services, video-conferences, social networks, educational systems, or photo storage services. These services have been embraced by a significant amount of the world population, and are used on a daily basis. Cloud providers and Network operators’ infrastructures accommodate the traffic rates that the aforementioned services generate, and their management tasks do not only involve the traffic steering, but also the processing of the network services’ traffic. Traditionally, the traffic processing has been assessed via applications/programs deployed on servers that were exclusively dedicated to a specific task as packet inspection. However, in recent years network services have stated to be virtualized and this has led to the Network Function Virtualization (Network Function Virtualization (NFV)) paradigm, in which the network functions of a service run on containers or virtual machines that are decoupled from the hardware infrastructure. As a result, the traffic processing has become more flexible because of the loose coupling between software and hardware, and the possibility of sharing common network functions, as firewalls, across multiple network services. NFV eases the automation of network operations, since scaling and migrations tasks are typically performed by a set of commands predefined by the virtualization technology, either containers or virtual machines. However, it is still necessary to decide the traffic steering and processing of every network service. In other words, which servers will hold the traffic processing, and which are the network links to be traversed so the users’ requests reach the final servers, i.e., the network embedding problem. Under the umbrella of NFV, this problem is known as Virtual Network Embedding (VNE), and this thesis refers as “NFV orchestration algorithms” to those algorithms solving such a problem. The VNE problem is a NP-hard, meaning that it is impossible to find optimal solutions in polynomial time, no matter the network size. As a consequence, the research and telecommunications community rely on heuristics that find solutions quicker than a commodity optimization solver. Traditionally, NFV orchestration algorithms have tried to minimize the deployment costs derived from their solutions. For example, they try to not exhaust the network bandwidth, and use short paths to use less network resources. Additionally, a recent tendency led the research community towards algorithms that minimize the energy consumption of the deployed services, either by selecting more energy efficient devices or by turning off those network devices that remained unused. VNE problem constraints were typically summarized in a set of resources/energy constraints, and the solutions differed on which objectives functions were aimed for. But that was before 5th generation of mobile networks (5G) were considered in the VNE problem. With the appearance of 5G, new network services and use cases started to emerge. The standards talked about Ultra Reliable Low Latency Communication (Ultra-Reliable and Low Latency Communications (URLLC)) with latencies below few milliseconds and 99.999% reliability, an enhanced mobile broadband (enhanced Mobile Broadband (eMBB)) with significant data rate increases, and even the consideration of massive machine-type communications (Massive Machine-Type Communications (mMTC)) among Internet of Things (IoT) devices. Moreover, paradigms such as edge and fog computing blended with the 5G technology to introduce the idea of having computing devices closer to the end users. As a result, the VNE problem had to incorporate the new requirements as constraints to be taken into account, and every solution should either satisfy low latencies, high reliability, or larger data rates. This thesis studies the VNE problem, and proposes some heuristics tackling the constraints related to 5G services in Edge and fog scenarios, that is, the proposed solutions assess the assignment of Virtual Network Functions to resources, and the traffic steering across 5G infrastructures that have Edge and Fog devices. To evaluate the performance of the proposed solutions, the thesis studies first the generation of graphs that represent 5G networks. The proposed mechanisms to generate graphs serve to represent diverse 5G scenarios. In particular federation scenarios in which several domains share resources among themselves. The generated graphs also represent edge servers, so as fog devices with limited battery capacity. Additionally, these graphs take into account the standard requirements, and the expected demand for 5G networks. Moreover, the graphs differ depending on the density of population, and the area of study, i.e., whether it is an industrial area, a highway, or an urban area. After detailing the generation of graphs representing the 5G networks, this thesis proposes several NFV orchestration algorithms to tackle the VNE problem. First, it focuses on federation scenarios in which network services should be assigned not only to a single domain infrastructure, but also to the shared resources of the federation of domains. Two different problems are studied, one being the VNE itself over a federated infrastructure, and the other the delegation of network services. That is, whether a network service should be deployed in a local domain, or in the pool of resources of the federation domain; knowing that the latter charges the local domain for hosting the network service. Second, the thesis proposes OKpi, a NFV orchestration algorithm to meet 5G network slices quality of service. Conceptually, network slicing consists in splitting the network so network services are treated differently based on the slice they belong to. For example, an eHealth network slice will allocate the network resources necessary to meet low latencies for network services such as remote surgery. Each network slice is devoted to specific services with very concrete requirements, as high reliability, location constraints, or 1ms latencies. OKpi is a NFV orchestration algorithm that meets the network service requirements among different slices. It is based on a multi-constrained shortest path heuristic, and its solutions satisfy latency, reliability, and location constraints. After presenting OKpi, the thesis tackles the VNE problem in 5G networks with static/moving fog devices. The presented NFV orchestration algorithm takes into account the limited computing resources of fog devices, as well as the out-of-coverage problems derived from the devices’ mobility. To conclude, this thesis studies the scaling of Vehicle-to-Network (V2N) services, which require low latencies for network services as collision avoidance, hazard warning, and remote driving. For these services, the presence of traffic jams, or high vehicular traffic congestion lead to the violation of latency requirements. Hence, it is necessary to anticipate to such circumstances by using time-series techniques that allow to derive the incoming vehicular traffic flow in the next minutes or hours, so as to scale the V2N service accordingly.The 5G Exchange (5GEx) project (2015-2018) was an EU-funded project (H2020-ICT-2014-2 grant agreement 671636). The 5G-TRANSFORMER project (2017-2019) is an EU-funded project (H2020-ICT-2016-2 grant agreement 761536). The 5G-CORAL project (2017-2019) is an EU-Taiwan project (H2020-ICT-2016-2 grant agreement 761586).Programa de Doctorado en IngenierĂ­a TelemĂĄtica por la Universidad Carlos III de MadridPresidente: Ioannis Stavrakakis.- Secretario: Pablo Serrano Yåñez-Mingot.- Vocal: Paul Horatiu Patra

    Journal of Telecommunications and Information Technology, 2003, nr 4

    Get PDF
    kwartalni

    Migration and Human Development in India

    Get PDF
    The paper discusses how gaps in both the data on migration and the understanding of the role of migration in livelihood strategies and economic growth in India, have led to inaccurate policy prescriptions and a lack of political commitment to improving the living and working conditions of migrants. Field evidence from major migrant employing sectors is synthesised to show that circular migration is the dominant form of economic mobility for the poor; especially the lower castes and tribes. The authors argue that the human costs of migration are high due to faulty implementation of protective legislation and loopholes in the law and not due to migration per se. The paper discusses child labour in specific migration streams in detail stressing that this issue needs to be addressed in parallel. It also highlights the non-economic drivers and outcomes of migration that need to be considered when understanding its impacts. The authors calculate that there are roughly 100 million circular migrants in India contributing 10% to the national GDP. New vulnerabilities created by the economic recession are discussed. Detailed analysis of village resurveys in Madhya Pradesh and Andhra Pradesh are also presented and these show conclusively that migration is an important route out of poverty.India; circular migration; caste; tribe; child labour; human development

    Migration and Human Development in India

    Get PDF
    The paper discusses how gaps in both the data on migration and the understanding of the role of migration in livelihood strategies and economic growth in India, have led to inaccurate policy prescriptions and a lack of political commitment to improving the living and working conditions of migrants. Field evidence from major migrant employing sectors is synthesised to show that circular migration is the dominant form of economic mobility for the poor; especially the lower castes and tribes. The authors argue that the human costs of migration are high due to faulty implementation of protective legislation and loopholes in the law and not due to migration per se. The paper discusses child labour in specific migration streams in detail stressing that this issue needs to be addressed in parallel. It also highlights the non-economic drivers and outcomes of migration that need to be considered when understanding its impacts. The authors calculate that there are roughly 100 million circular migrants in India contributing 10% to the national GDP. New vulnerabilities created by the economic recession are discussed. Detailed analysis of village resurveys in Madhya Pradesh and Andhra Pradesh are also presented and these show conclusively that migration is an important route out of poverty.India; circular migration; caste; tribe; child labour; human development

    Distributed collaborative knowledge management for optical network

    Get PDF
    Network automation has been long time envisioned. In fact, the Telecommunications Management Network (TMN), defined by the International Telecommunication Union (ITU), is a hierarchy of management layers (network element, network, service, and business management), where high-level operational goals propagate from upper to lower layers. The network management architecture has evolved with the development of the Software Defined Networking (SDN) concept that brings programmability to simplify configuration (it breaks down high-level service abstraction into lower-level device abstractions), orchestrates operation, and automatically reacts to changes or events. Besides, the development and deployment of solutions based on Artificial Intelligence (AI) and Machine Learning (ML) for making decisions (control loop) based on the collected monitoring data enables network automation, which targets at reducing operational costs. AI/ML approaches usually require large datasets for training purposes, which are difficult to obtain. The lack of data can be compensated with a collective self-learning approach. In this thesis, we go beyond the aforementioned traditional control loop to achieve an efficient knowledge management (KM) process that enhances network intelligence while bringing down complexity. In this PhD thesis, we propose a general architecture to support KM process based on four main pillars, which enable creating, sharing, assimilating and using knowledge. Next, two alternative strategies based on model inaccuracies and combining model are proposed. To highlight the capacity of KM to adapt to different applications, two use cases are considered to implement KM in a purely centralized and distributed optical network architecture. Along with them, various policies are considered for evaluating KM in data- and model- based strategies. The results target to minimize the amount of data that need to be shared and reduce the convergence error. We apply KM to multilayer networks and propose the PILOT methodology for modeling connectivity services in a sandbox domain. PILOT uses active probes deployed in Central Offices (COs) to obtain real measurements that are used to tune a simulation scenario reproducing the real deployment with high accuracy. A simulator is eventually used to generate large amounts of realistic synthetic data for ML training and validation. We apply KM process also to a more complex network system that consists of several domains, where intra-domain controllers assist a broker plane in estimating accurate inter-domain delay. In addition, the broker identifies and corrects intra-domain model inaccuracies, as well as it computes an accurate compound model. Such models can be used for quality of service (QoS) and accurate end-to-end delay estimations. Finally, we investigate the application on KM in the context of Intent-based Networking (IBN). Knowledge in terms of traffic model and/or traffic perturbation is transferred among agents in a hierarchical architecture. This architecture can support autonomous network operation, like capacity management.La automatización de la red se ha concebido desde hace mucho tiempo. De hecho, la red de gestión de telecomunicaciones (TMN), definida por la Unión Internacional de Telecomunicaciones (ITU), es una jerarquía de capas de gestión (elemento de red, red, servicio y gestión de negocio), donde los objetivos operativos de alto nivel se propagan desde las capas superiores a las inferiores. La arquitectura de gestión de red ha evolucionado con el desarrollo del concepto de redes definidas por software (SDN) que brinda capacidad de programación para simplificar la configuración (descompone la abstracción de servicios de alto nivel en abstracciones de dispositivos de nivel inferior), organiza la operación y reacciona automåticamente a los cambios o eventos. Ademås, el desarrollo y despliegue de soluciones basadas en inteligencia artificial (IA) y aprendizaje automåtico (ML) para la toma de decisiones (bucle de control) en base a los datos de monitorización recopilados permite la automatización de la red, que tiene como objetivo reducir costes operativos. AI/ML generalmente requieren un gran conjunto de datos para entrenamiento, los cuales son difíciles de obtener. La falta de datos se puede compensar con un enfoque de autoaprendizaje colectivo. En esta tesis, vamos mås allå del bucle de control tradicional antes mencionado para lograr un proceso eficiente de gestión del conocimiento (KM) que mejora la inteligencia de la red al tiempo que reduce la complejidad. En esta tesis doctoral, proponemos una arquitectura general para apoyar el proceso de KM basada en cuatro pilares principales que permiten crear, compartir, asimilar y utilizar el conocimiento. A continuación, se proponen dos estrategias alternativas basadas en inexactitudes del modelo y modelo de combinación. Para resaltar la capacidad de KM para adaptarse a diferentes aplicaciones, se consideran dos casos de uso para implementar KM en una arquitectura de red óptica puramente centralizada y distribuida. Junto a ellos, se consideran diversas políticas para evaluar KM en estrategias basadas en datos y modelos. Los resultados apuntan a minimizar la cantidad de datos que deben compartirse y reducir el error de convergencia. Aplicamos KM a redes multicapa y proponemos la metodología PILOT para modelar servicios de conectividad en un entorno aislado. PILOT utiliza sondas activas desplegadas en centrales de telecomunicación (CO) para obtener medidas reales que se utilizan para ajustar un escenario de simulación que reproducen un despliegue real con alta precisión. Un simulador se utiliza finalmente para generar grandes cantidades de datos sintéticos realistas para el entrenamiento y la validación de ML. Aplicamos el proceso de KM también a un sistema de red mås complejo que consta de varios dominios, donde los controladores intra-dominio ayudan a un plano de bróker a estimar el retardo entre dominios de forma precisa. Ademås, el bróker identifica y corrige las inexactitudes de los modelos intra-dominio, así como también calcula un modelo compuesto preciso. Estos modelos se pueden utilizar para estimar la calidad de servicio (QoS) y el retardo extremo a extremo de forma precisa. Finalmente, investigamos la aplicación en KM en el contexto de red basada en intención (IBN). El conocimiento en términos de modelo de tråfico y/o perturbación del tråfico se transfiere entre agentes en una arquitectura jerårquica. Esta arquitectura puede soportar el funcionamiento autónomo de la red, como la gestión de la capacidad.Postprint (published version

    An intelligent-agent approach for managing congestion in W-CDMA networks

    Get PDF
    PhDResource Management is a crucial aspect in the next generation cellular networks since the use of W-CDMA technology gives an inherent flexibility in managing the system capacity. The concept of a “Service Level Agreement” (SLA) also plays a very important role as it is the means to guarantee the quality of service provided to the customers in response to the level of service to which they have subscribed. Hence there is a need to introduce effective SLA-based policies as part of the radio resource management. This work proposes the application of intelligent agents in SLA-based control in resource management, especially when congestion occurs. The work demonstrates the ability of intelligent agents in improving and maintaining the quality of service to meet the required SLA as the congestion occurs. A particularly novel aspect of this work is the use of learning (here Case Based Reasoning) to predict the control strategies to be imposed. As the system environment changes, the most suitable policy will be implemented. When congestion occurs, the system either proposes the solution by recalling from experience (if the event is similar to what has been previously solved) or recalculates the solution from its knowledge (if the event is new). With this approach, the system performance will be monitored at all times and a suitable policy can be immediately applied as the system environment changes, resulting in maintaining the system quality of service
    • 

    corecore