16 research outputs found

    Fog-enabled Scalable C-V2X Architecture for Distributed 5G and Beyond Applications

    Get PDF
    The Internet of Things (IoT) ecosystem, as fostered by fifth generation (5G) applications, demands a highly available network infrastructure. In particular, the internet of vehicles use cases, as a subset of the overall IoT environment, require a combination of high availability and low latency in big volumes support. This can be enabled by a network function virtualization architecture that is able to provide resources wherever and whenever needed, from the core to the edge up to the end user proximity, in accordance with the fog computing paradigm. In this article, we propose a fog-enabled cellular vehicle-to-everything architecture that provides resources at the core, the edge and the vehicle layers. The proposed architecture enables the connection of virtual machines, containers and unikernels that form an application-as-a-service function chain that can be deployed across the three layers. Furthermore, we provide lifecycle management mechanisms that can efficiently manage and orchestrate the underlying physical resources by leveraging live migration and scaling functionalities. Additionally, we design and implement a 5G platform to evaluate the basic functionalities of our proposed mechanisms in real-life scenarios. Finally, the experimental results demonstrate that our proposed scheme maximizes the accepted requests, without violating the applications’ service level agreement.This work has been supported in part by the research projects SPOTLIGHT (722788), AGAUR (2017-SGR-891), 5G-DIVE (859881), SPOT5G (TEC2017-87456-P), MonB5G (871780) and 5G-Routes (951867)

    Optimized Network Slicing Proof-of-Concept with Interactive Gaming Use Case

    Get PDF
    International audienceNetwork Operators expect to accurately satisfy a wide range of user's needs by providing fully customized services relying on Network Slicing. The efficiency of Network Slicing depends on an optimized management of network resources and Quality of Service (QoS). We focus on Network Slice placement optimization problem to give an insight about a latency-aware Network Slice Placement model through a Proof-of-Concept (PoC) illustrated by an Interactive Gaming time-sensitive use case. Therefore, we showcase the proposed Network Slice Placement solution considering user location as a primary constraint to ensure QoS and Quality of Experience (QoE)

    Location-based Data Model for Optimized Network Slice Placement

    Get PDF
    International audienceNetwork Slicing has its roots in Network Function Virtualization (NFV) allowing high flexibility in the delivery of end-to-end network services. To achieve Network Slicing promises on efficiency, Network Slice Providers have to ensure optimized resource utilization and to guarantee Quality of Service when managing the life-cycle of a Network Slice. We focus in this paper on Network Slice Placement, intimately related to the VNF Placement and Chaining problem. In contrary to most studies related to VNF placement, we deal with the most complete and complex Network Slice topologies and we pay special attention to the geographic location of Network Slice Users. We propose a data model adapted to Integer Linear Programming. Extensive numerical experiments assess the relevance of taking into account the user location constraints

    Scalable Orchestration of Service Function Chains in NFV-Enabled Networks: A Federated Reinforcement Learning Approach

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordNetwork function virtualization (NFV) is critical to the scalability and flexibility of various network services in the form of service function chains (SFCs), which refer to a set of Virtual Network Functions (VNFs) chained in a specific order. However, the NFV performance is hard to fulfill the ever-increasing requirements of network services mainly due to the static orchestrations of SFCs. To tackle this issue, a novel Scalable SFC Orchestration (SSCO) scheme is proposed in this paper for NFV-enabled networks via federated reinforcement learning. SSCO has three remarkable characteristics distinguishing from the previous work: (1) A federated-learning-based framework is designed to train a global learning model, with time-variant local model explorations, for scalable SFC orchestration, while avoiding data sharing among stakeholders; (2) SSCO allows for parameter update among local clients and the cloud server just at the first and last epochs of each episode to ensure that distributed clients can make model optimization at a low communication cost; (3) SSCO introduces an efficient deep reinforcement learning (DRL) approach, with the local learning knowledge of available resources and instantiation cost, to map VNFs into networks flexibly. Furthermore, a loss-weight-based mechanism is proposed to generate and exploit reference samples in replay buffers for future training, avoiding the strong relevance of samples. Simulation results obtained from different working scenarios demonstrate that SSCO can significantly reduce placement errors and improve resource utilization ratio to place time-variant VNFs compared with the state-of-the-art mechanisms. Furthermore, the results show that the proposed approach can achieve desirable scalability

    Redes 5G: una revisión desde las perspectivas de arquitectura, modelos de negocio, ciberseguridad y desarrollos de investigación

    Get PDF
    5G technology is transforming our critical networks, with long-term implications. Since 5G is transitioning to a purely software-based network, potential improvements will be software updates, like how smartphones are upgraded. For the global enterprise, the 5G arrival would be disruptive. Long-awaited solutions to various flaws in critical networking systems will arise due to 5G network adoption. Furthermore, the shortcomings of technology in contributing to business growth and success would be turned on their heads. The more complicated part of the actual 5G race is retooling how we protect the most critical network of the twenty-first century and the ecosystem of devices and applications that sprout from that network due to cyber software vulnerabilities. The new technologies enabled by new applications running on 5G networks have much potential. However, as we move toward a connected future, equal or more attention should be paid to protecting those links, computers, and applications. We address critical aspects of 5G standardization and architecture in this article. We also provide a detailed summary of 5G network business models, use cases, and cybersecurity. Furthermore, we perform a study of computer simulation methods and testbeds for the research and development of potential 5G network proposals, which are elements that are rarely addressed in current surveys and review articles.La tecnología 5G está transformando nuestras redes críticas, con implicaciones a largo plazo. Dado que 5G está en transición a una red puramente basada en software, las mejoras potenciales serán las actualizaciones de software, como la forma en que se actualizan los teléfonos inteligentes en la actualidad. Para la empresa global, la llegada de 5G sería disruptiva. Las soluciones largamente esperadas para una variedad de fallas en los sistemas clave de networking surgirán debido a la adopción de la red 5G. Además, las deficiencias de la tecnología en términos de contribuir al crecimiento empresarial y al éxito se pondrán de cabeza. La parte más complicada de la carrera 5G real es reestructurar la forma en que protegemos la red más crítica del siglo XXI y el ecosistema de dispositivos y aplicaciones que surgen de esa red debido a las vulnerabilidades cibernéticas del software. Las nuevas tecnologías habilitadas por las nuevas aplicaciones que se ejecutan en redes 5G tienen mucho potencial. Sin embargo, a medida que avanzamos hacia un futuro conectado, se debe prestar igual o mayor atención a la protección de esos enlaces, computadoras y aplicaciones. En este artículo se abordan los aspectos clave de la estandarización y la arquitectura 5G. También se proporciona un resumen detallado de los modelos comerciales de redes 5G, casos de uso y ciberseguridad. Además, se realiza un estudio de métodos de simulación por computadora y bancos de pruebas para la investigación y el desarrollo de posibles propuestas de redes 5G, que son elementos que rara vez se abordan en estudios y artículos de revisión actuales.Facultad de Informátic

    The 6G Architecture Landscape:European Perspective

    Get PDF
    corecore