43 research outputs found

    Proactive admission control and dynamic resource management in SDN-based virtualized networks

    Get PDF
    Network virtualization is a promising approach in which common physical resources are shared between service providers. Due to the substrate network limitations such as maximum available memory of each node of the substrate network as well as different service priorities and requirements, resource management in this setup is essential. On the other hand, SDN is bringing a considerable flexibility in resource management by introducing a centralized controller which can monitor all the substrate network states. In this paper, we propose a proactive admission control and dynamic resource management in SDNbased virtualized network in which the number of accepted highpriority virtual network (VN) requests is maximized, subject to both substrate limitations and memory requirement of each VN request. In the proposed formulation, based on the prediction of the substrate network utilization, we reserve resources for upcoming high-priority VN requests. Via simulation, we show that the algorithm can increase the acceptance ratio of the highpriority VN requests up to % 100 where the substrate network is congested, i.e., arrival rates of both high-priority and low-priority VN requests are high

    A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

    Full text link
    The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can tremendously improve the quality of life by enabling various use cases that require high data-rate, low latency, and continuous connectivity for applications pertaining to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of Things (IoT). However, these applications need secure servicing as well as resource policing for effective network formations. There have been a lot of studies, which emphasized the security aspects of 5G networks while focusing only on the adaptability features of these networks. However, there is a gap in the literature which particularly needs to follow recent computing paradigms as alternative mechanisms for the enhancement of security. To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules. The taxonomy on the basis of security requirements is presented, which also includes the comparison of the existing state-of-the-art solutions. This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. Finally, various security challenges and open issues are discussed to emphasize the works to follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure Wireless Networks, pp. 69-102. Springer, Cham, 201

    On the Orchestration and Provisioning of NFV-enabled Multicast Services

    Get PDF
    The paradigm of network function virtualization (NFV) with the support of software-defined networking has emerged as a prominent approach to foster innovation in the networking field and reduce the complexity involved in managing modern-day conventional networks. Before NFV, functions, which can manipulate the packet header and context of traffic flow, used to be implemented at fixed locations in the network substrate inside proprietary physical devices (called middlewares). With NFV, such functions are softwarized and virtualized. As such, they can be deployed in commodity servers as demanded. Hence, the provisioning of a network service becomes more agile and abstract, thereby giving rise to the next-generation service-customized networks which have the potential to meet new demands and use cases. In this thesis, we focus on three complementary research problems essential to the orchestration and provisioning of NFV-enabled multicast network services. An NFV-enabled multicast service connects a source with a set of destinations. It specifies a set of NFs that should be executed at the chosen routes from the source to the destinations, with some resources and ordering relationships that should be satisfied in wired core networks. In Problem I, we investigate a static joint traffic routing and virtual NF placement framework for accommodating multicast services over the network substrate. We develop optimal formulations and efficient heuristic algorithms that jointly handle the static embedding of one or multiple service requests over the network substrate with single-path and multipath routing. In Problem II, we study the online orchestration of NFV-enabled network services. We consider both unicast and multicast NFV-enabled services with mandatory and best-effort NF types. Mandatory NFs are strictly necessary for the correctness of a network service, whereas best-effort NFs are preferable yet not necessary. Correspondingly, we propose a primal-dual based online approximation algorithm that allocates both processing and transmission resources to maximize a profit function that is proportional to the throughput. The online algorithm resembles a joint admission mechanism and an online composition, routing, and NF placement framework. In the core network, traffic patterns exhibit time-varying characteristics that can be cumbersome to model. Therefore, in Problem III, we develop a dynamic provisioning approach to allocate processing and transmission resources based on the traffic pattern of the embedded network service using deep reinforcement learning (RL). Notably, we devise a model-assisted exploration procedure to improve the efficiency and consistency of the deep RL algorithm

    An intelligent call admission control algorithm for load balancing in 5G-satellite networks

    Get PDF
    A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.Cellular networks are projected to deal with an immense rise in data traffic, as well as an enormous and diverse device, plus advanced use cases, in the nearest future; hence, future 5G networks are being developed to consist of not only 5G but also different RATs integrated. In addition to 5G, the user’s device (UD) will be able to connect to the network via LTE, WiMAX, Wi-Fi, Satellite, and other technologies. On the other hand, Satellite has been suggested as a preferred network to support 5G use cases. Satellite networks are among the most sophisticated communication technologies which offer specific benefits in geographically dispersed and dynamic networks. Utilising their inherent advantages in broadcasting capabilities, global coverage, decreased dependency on terrestrial infrastructure, and high security, they offer highly efficient, effective, and rapid network deployments. Satellites are more suited for large-scale communications than terrestrial communication networks. Due to their extensive service coverage and strong multilink transmission capabilities, satellites offer global high-speed connectivity and adaptable access systems. The convergence of 5G technology and satellite networks therefore marks a significant milestone in the evolution of global connectivity. However, this integration introduces a complex problem related to resource management, particularly in Satellite – Terrestrial Integrated Networks (STINs). The key issue at hand is the efficient allocation of resources in STINs to enhance Quality of Service (QoS) for users. The root cause of this issue originates from a vast quantity of users sharing these resources, the dynamic nature of generated traffic, the scarcity of wireless spectrum resources, and the random allocation of wireless channels. Hence, resource allocation is critical to ensure user satisfaction, fair traffic distribution, maximised throughput, and minimised congestion. Achieving load balancing is essential to guarantee an equal amount of traffic distributed between different RATs in a heterogeneous wireless network; this would enable optimal utilisation of the radio resources and lower the likelihood of call blocking/dropping. This research endeavours to address this challenge through the development and evaluation of an intelligent call admission control (CAC) algorithm based on Enhanced Particle Swarm Optimization (EPSO). The primary aim of this research is to design an EPSO-based CAC algorithm tailored specifically for 5G-satellite heterogeneous wireless networks. The algorithm's objectives include maximising the number of admitted calls while maintaining Quality of Service (QoS) for existing users, improving network resource utilization, reducing congestion, ensuring fairness, and enhancing user satisfaction. To achieve these objectives, a detailed research methodology is outlined, encompassing algorithm development, numerical simulations, and comparative analysis. The proposed EPSO algorithm is benchmarked against alternative artificial intelligence and machine learning algorithms, including the Artificial Bee Colony algorithm, Simulated Annealing algorithm, and Q-Learning algorithm. Performance metrics such as throughput, call blocking rates, and fairness are employed to evaluate the algorithms' efficacy in achieving load-balancing objectives. The experimental findings yield insights into the performance of the EPSO-based CAC algorithm and its comparative advantages over alternative techniques. Through rigorous analysis, this research elucidates the EPSO algorithm's strengths in dynamically adapting to changing network conditions, optimising resource allocation, and ensuring equitable distribution of traffic among different RATs. The result shows the EPSO algorithm outperforms the other 3 algorithms in all the scenarios. The contributions of this thesis extend beyond academic research, with potential societal implications including enhanced connectivity, efficiency, and user experiences in 5G-Satellite heterogeneous wireless networks. By advancing intelligent resource management techniques, this research paves the way for improved network performance and reliability in the evolving landscape of wireless communication

    High-Performance Modelling and Simulation for Big Data Applications

    Get PDF
    This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications

    Internet Daemons: Digital Communications Possessed

    Get PDF
    We’re used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net’s infrastructure—as well as the devices we use to access it—daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives—including their role in hot-button issues like network neutrality. Going back to Victorian times and the popular thought experiment Maxwell’s Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast’s efforts to control peer-to-peer networking, and Pirate Bay’s attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight. Table of Contents Abbreviations and Technical Terms Introduction 1. The Devil We Know: Maxwell’s Demon, Cyborg Sciences, and Flow Control 2. Possessing Infrastructure: Nonsynchronous Communication, IMPs, and Optimization 3. IMPs, OLIVERs, and Gateways: Internetworking before the Internet 4. Pandaemonium: The Internet as Daemons 5. Suffering from Buffering? Affects of Flow Control 6. The Disoptimized: The Ambiguous Tactics of the Pirate Bay 7. A Crescendo of Online Interactive Debugging? Gamers, Publics and Daemons Conclusion Acknowledgments Appendix: Internet Measurement and Mediators Notes Bibliography Index Reviews Beneath social media, beneath search, Internet Daemons reveals another layer of algorithms: deeper, burrowed into information networks. Fenwick McKelvey is the best kind of intellectual spelunker, taking us deep into the infrastructure and shining his light on these obscure but vital mechanisms. What he has delivered is a precise and provocative rethinking of how to conceive of power in and among networks. —Tarleton Gillespie, author of Custodians of the Internet Internet Daemons is an original and important contribution to the field of digital media studies. Fenwick McKelvey extensively maps and analyzes how daemons influence data exchanges across Internet infrastructures. This study insightfully demonstrates how daemons are transformative entities that enable particular ways of transferring information and connecting up communication, with significant social and political consequences. —Jennifer Gabrys, author of Program Eart
    corecore