-
Deploying AI-Based Applications with Serverless Computing in 6G Networks: An Experimental Study
Authors:
Marc Michalke,
Chukwuemeka Muonagor,
Admela Jukan
Abstract:
Future 6G networks are expected to heavily utilize machine learning capabilities in a wide variety of applications with features and benefits for both, the end user and the provider. While the options for utilizing these technologies are almost endless, from the perspective of network architecture and standardized service, the deployment decisions on where to execute the AI-tasks are critical, esp…
▽ More
Future 6G networks are expected to heavily utilize machine learning capabilities in a wide variety of applications with features and benefits for both, the end user and the provider. While the options for utilizing these technologies are almost endless, from the perspective of network architecture and standardized service, the deployment decisions on where to execute the AI-tasks are critical, especially when considering the dynamic and heterogeneous nature of processing and connectivity capability of 6G networks. On the other hand, conceptual and standardization work is still in its infancy, as to how to categorizes ML applications in 6G landscapes; some of them are part of network management functions, some target the inference itself, while many others emphasize model training. It is likely that future mobile services may all be in the AI domain, or combined with AI. This work makes a case for the serverless computing paradigm to be used to this end. We first provide an overview of different machine learning applications that are expected to be relevant in 6G networks. We then create a set of general requirements for software engineering solutions executing these workloads from them and propose and implement a high-level edge-focused architecture to execute such tasks. We then map the ML-serverless paradigm to the case study of 6G architecture and test the resulting performance experimentally for a machine learning application against a setup created in a more traditional, cloud-based manner. Our results show that, while there is a trade-off in predictability of the response times and the accuracy, the achieved median accuracy in a 6G setup remains the same, while the median response time decreases by around 25% compared to the cloud setup.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Enhancing Path Selections with Interference Graphs in Multihop Relay Wireless Networks
Authors:
Cao Vien Phung,
Andre Drummond,
Admela Jukan
Abstract:
The multihop relay wireless networks have gained traction due to the emergence of Reconfigurable Intelligent Surfaces (RISs) which can be used as relays in high frequency range wireless network, including THz or mmWave. To select paths in these networks, the transmission performance plays the key network in these networks. In this paper, we enhance and greatly simplify the path selection in multih…
▽ More
The multihop relay wireless networks have gained traction due to the emergence of Reconfigurable Intelligent Surfaces (RISs) which can be used as relays in high frequency range wireless network, including THz or mmWave. To select paths in these networks, the transmission performance plays the key network in these networks. In this paper, we enhance and greatly simplify the path selection in multihop relay RIS enabled wireless networks with what we refer to as interference graphs. Interference graphs are created based on SNR model, conical and cylindrical beam shapes in the transmission and the related interference model. Once created, they can be simply and efficiently used to select valid paths, without overestimation of the effect of interference. The results show that decreased ordering of conflict selections in the graphs yields the best results, as compared to conservative approach that tolerates no interference.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
An experimental study of the response time in an edge-cloud continuum with ClusterLink
Authors:
Marc Michalke,
Fin Gentzen,
Admela Jukan,
Kfir Toledo,
Etai Lev Ran
Abstract:
In this paper, we conduct an experimental study to provide a general sense of the application response time implications that inter-cluster communication experiences at the edge at the example of a specific IoT-edge-cloud contiuum solution from the EU Project ICOS called ClusterLink. We create an environment to emulate different networking topologies that include multiple cloud or edge sites scena…
▽ More
In this paper, we conduct an experimental study to provide a general sense of the application response time implications that inter-cluster communication experiences at the edge at the example of a specific IoT-edge-cloud contiuum solution from the EU Project ICOS called ClusterLink. We create an environment to emulate different networking topologies that include multiple cloud or edge sites scenarios, and conduct a set of tests to compare the application response times via ClusterLink to direct communications in relation to node distances and request/response payload size. Our results show that, in an edge context, ClusterLink does not introduce a significant processing overhead to the communication for small payloads as compared to cloud. For higher payloads and on comparably more aged consumer hardware, ClusterLink version 0.2 introduces communication overhead relative to the delay experienced on the link.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Predictive Intent Maintenance with Intent Drift Detection in Next Generation Network
Authors:
Chukwuemeka Muonagor,
Mounir Bensalem,
Admela Jukan
Abstract:
Intent-Based Networking (IBN) is a known concept for enabling the autonomous configuration and self-adaptation of networks. One of the major issues in IBN is maintaining the applied intent due the effects of drifts over time, which is the gradual degradation in the fulfillment of the intents, before they fail. Despite its critical role to intent assurance and maintenance, intent drift detection wa…
▽ More
Intent-Based Networking (IBN) is a known concept for enabling the autonomous configuration and self-adaptation of networks. One of the major issues in IBN is maintaining the applied intent due the effects of drifts over time, which is the gradual degradation in the fulfillment of the intents, before they fail. Despite its critical role to intent assurance and maintenance, intent drift detection was largely overlooked in the literature. To fill this gap, we propose an intent drift detection algorithm for predictive maintenance of intents which can use various unsupervised learning techniques (Affinity Propagation, DBSCAN, Gaussian Mixture Models, Hierarchical clustering, K-Means clustering, OPTICS, One-Class SVM), here applied and comparatively analyzed due to their simplicity, yet efficiency in detecting drifts. The results show that DBSCAN is the best model for detecting the intent drifts. The worst performance is exhibited by the Affinity Propagation model, reflected in its poorest accuracy and latency values.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Outage Probability Analysis of Wireless Paths with Faulty Reconfigurable Intelligent Surfaces
Authors:
Mounir Bensalem,
Admela Jukan
Abstract:
We consider a next generation wireless network incorporating a base station a set of typically low-cost and faulty Reconfigurable Intelligent Surfaces (RISs). The base station needs to select the path including the RIS to provide the maximum signal-to-noise ratio (SNR) to the user. We study the effect of the number of elements, distance and RIS hardware failure on the path outage probability, and…
▽ More
We consider a next generation wireless network incorporating a base station a set of typically low-cost and faulty Reconfigurable Intelligent Surfaces (RISs). The base station needs to select the path including the RIS to provide the maximum signal-to-noise ratio (SNR) to the user. We study the effect of the number of elements, distance and RIS hardware failure on the path outage probability, and based on the known signal propagation model at high frequencies, derive the closed-form expression for the said probability of outage. Numerical results show the path outage likelihood as function of the probability of hardware failure of RIS elements, the number of elements, and the distance between mobile users and the RIS.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Maximizing Throughput with Routing Interference Avoidance in RIS-Assisted Relay Mesh Networks
Authors:
Cao Vien Phung,
Andre Drummond,
Admela Jukan
Abstract:
In the modern landscape of wireless communications, multi-hop, high-bandwidth, indoor Terahertz (THz) wireless communications are gaining significant attention. These systems couple Reconfigurable Intelligent Surface (RIS) and relay devices within the emerging 6G network framework, offering promising solutions for creating cell-less, indoor, and on-demand mesh networks. RIS devices are especially…
▽ More
In the modern landscape of wireless communications, multi-hop, high-bandwidth, indoor Terahertz (THz) wireless communications are gaining significant attention. These systems couple Reconfigurable Intelligent Surface (RIS) and relay devices within the emerging 6G network framework, offering promising solutions for creating cell-less, indoor, and on-demand mesh networks. RIS devices are especially attractive, constructed by an array of reflecting elements that can phase shifts, such that the reflecting signals can be focused, steered, and the power of the signal enhanced towards the destination. This paper presents an in-depth, analytical examination of how path allocation impacts interference within such networks. We develop the first model which analyzes interference based on the geometric parameters of beams (conic, cylindrical) as they interact with RIS, User Equipment (UE), and relay devices. We introduce a transmission scheduling heuristic designed to mitigate interference, alongside an efficient optimization method to maximize throughput. Our performance results elucidate the interference's effect on communication path quality and highlight effective path selection strategies with throughput maximization.
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
Scaling Performance of Serverless Edge Networking
Authors:
Marc Michalke,
Francisco Carpio,
Admela Jukan
Abstract:
When clustering devices at the edge, inter-node latency poses a significant challenge that directly impacts the application performance. In this paper, we experimentally examine the impact that inter-node latency has on application performance by measuring the throughput of an distributed serverless application in a real world testbed. We deploy Knative over a Kubernetes cluster of nodes and emula…
▽ More
When clustering devices at the edge, inter-node latency poses a significant challenge that directly impacts the application performance. In this paper, we experimentally examine the impact that inter-node latency has on application performance by measuring the throughput of an distributed serverless application in a real world testbed. We deploy Knative over a Kubernetes cluster of nodes and emulate networking delay between them to compare the performance of applications when deployed over a single-site versus multiple distributed computing sites. The results show that multi-site edge networks achieve half the throughput compared to a deployment hosted at a single site under low processing times conditions, whereas the throughput performance significantly improves otherwise.
△ Less
Submitted 27 October, 2023; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Towards Optimal Serverless Function Scaling in Edge Computing Network
Authors:
Mounir Bensalem,
Francisco Carpio,
Admela Jukan
Abstract:
Serverless computing has emerged as a new execution model which gained a lot of attention in cloud computing thanks to the latest advances in containerization technologies. Recently, serverless has been adopted at the edge, where it can help overcome heterogeneity issues, constrained nature and dynamicity of edge devices. Due to the distributed nature of edge devices, however, the scaling of serve…
▽ More
Serverless computing has emerged as a new execution model which gained a lot of attention in cloud computing thanks to the latest advances in containerization technologies. Recently, serverless has been adopted at the edge, where it can help overcome heterogeneity issues, constrained nature and dynamicity of edge devices. Due to the distributed nature of edge devices, however, the scaling of serverless functions presents a major challenge. We address this challenge by studying the optimality of serverless function scaling. To this end, we propose Semi-Markov Decision Process-based (SMDP) theoretical model, which yields optimal solutions by solving the serverless function scaling problem as a decision making problem. We compare the SMDP solution with practical, monitoring-based heuristics. We show that SMDP can be effectively used in edge computing networks, and in combination with monitoring-based approaches also in real-world implementations.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Engineering and Experimentally Benchmarking Open Source MQTT Broker Implementations
Authors:
Jasenka Dizdarevic,
Marc Michalke,
Admela Jukan
Abstract:
The Message Queuing Telemetry Transport (MQTT) protocol is one of the most widely used IoT protocol solutions. In this work, we are especially interested in open-source MQTT Broker implementations (such as Mosquitto, EMQX, RabbitMQ, VerneMQ, and HiveMQ). To this end, we engineer a network testbed to experimentally benchmark the performance of these implementations in an edge computing context with…
▽ More
The Message Queuing Telemetry Transport (MQTT) protocol is one of the most widely used IoT protocol solutions. In this work, we are especially interested in open-source MQTT Broker implementations (such as Mosquitto, EMQX, RabbitMQ, VerneMQ, and HiveMQ). To this end, we engineer a network testbed to experimentally benchmark the performance of these implementations in an edge computing context with constrained devices. In more detail, we engineer an automated deployment and orchestration of the containerized MQTT broker implementations, with support for deployment across either moderately powerful AMD64 devices, or more resource constrained ARM64 devices. The proposed MQTT implementations are evaluated in terms of overhead response time and different payload sizes. Results showed that the hardware platform used as well as the message size, and the network parameters (latency, packet loss and jitter) have a significant impact on the performance differences between the brokers. All results, software tools and code are fully reproducible and free and open source.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Scaling Serverless Functions in Edge Networks: A Reinforcement Learning Approach
Authors:
Mounir Bensalem,
Erkan Ipek,
Admela Jukan
Abstract:
With rapid advances in containerization techniques, the serverless computing model is becoming a valid candidate execution model in edge networking, similar to the widely used cloud model for applications that are stateless, single purpose and event-driven, and in particular for delay-sensitive applications. One of the cloud serverless processes, i.e., the auto-scaling mechanism, cannot be however…
▽ More
With rapid advances in containerization techniques, the serverless computing model is becoming a valid candidate execution model in edge networking, similar to the widely used cloud model for applications that are stateless, single purpose and event-driven, and in particular for delay-sensitive applications. One of the cloud serverless processes, i.e., the auto-scaling mechanism, cannot be however directly applied at the edge, due to the distributed nature of edge nodes, the difficulty of optimal resource allocation, and the delay sensitivity of workloads. We propose a solution to the auto-scaling problem by applying reinforcement learning (RL) approach to solving problem of efficient scaling and resource allocation of serverless functions in edge networks. We compare RL and Deep RL algorithms with empirical, monitoring-based heuristics, considering delay-sensitive applications. The simulation results shows that RL algorithm outperforms the standard, monitoring-based algorithms in terms of total delay of function requests, while achieving an improvement in delay performance by up to 50%.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Parallel Downlink Data Distribution in Indoor Multi-hop THz Networks
Authors:
Cao Vien Phung,
Andre Drummond,
Admela Jukan
Abstract:
The emerging dynamic Virtual Reality (VR) applications are the best candidate applications in high bandwidth indoor Terahertz (THz) wireless networks, with the Reconfigurable Intelligent Surface (RIS) devices presenting a breakthrough solution in extending the typically short THz communication range and alleviating line-of-sight link blockages. In future smart factories, it is envisioned that fact…
▽ More
The emerging dynamic Virtual Reality (VR) applications are the best candidate applications in high bandwidth indoor Terahertz (THz) wireless networks, with the Reconfigurable Intelligent Surface (RIS) devices presenting a breakthrough solution in extending the typically short THz communication range and alleviating line-of-sight link blockages. In future smart factories, it is envisioned that factory workers will use VR devices via VR application data with high quality resolution, while transmitting over THz links and RIS devices, enabled by the Mobile Edge Computing (MEC) capabilities. Since indoor RIS placement is static, whereas VR users move and send multiple VR data download requests simultaneously, there is a challenge of proper network load balancing, which if unaddressed can result in poor resource utilization and low throughput. To address this challenge, we propose a parallel downlink data distribution system and develop multi-criteria optimization solutions that can improve throughput, while transmitting each downlink data flow over a set of possible paths between source and destination devices. The results show that the proposed system can enhance the performance in terms of throughput benefit, as compared to the system using one serial download link distribution.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
BenchFaaS: Benchmarking Serverless Functions in an Edge Computing Network Testbed
Authors:
Francisco Carpio,
Marc Michalke,
Admela Jukan
Abstract:
The serverless computing model has evolved as one of the key solutions in the cloud for fast autoscaling and capacity planning. In edge computing environments, however, the serverless model is challenged by the system heterogeneity and performance variability. In this paper, we introduce BenchFaaS, an open-source edge computing network testbed which automates the deployment and benchmarking of ser…
▽ More
The serverless computing model has evolved as one of the key solutions in the cloud for fast autoscaling and capacity planning. In edge computing environments, however, the serverless model is challenged by the system heterogeneity and performance variability. In this paper, we introduce BenchFaaS, an open-source edge computing network testbed which automates the deployment and benchmarking of serverless functions. Our edge computing network considers a cluster of virtual machines and Raspberry Pis, and is designed to benchmark serverless functions under different hardware and network conditions. We measure and evaluate: (i) overhead incurred by testbed, (ii) performance of compute intensive tasks, (iii) impact of application payload size, (iv) scalability, and (v) performance of chained serverless functions. We share the lessons learnt in engineering and implementing the testbed. We present the measurement results and analyze the impact of networked infrastructure on serverless performance. The measurements indicate that a properly dimensioned edge computing network can effectively serve as a serverless infrastructure.
△ Less
Submitted 17 August, 2022; v1 submitted 5 June, 2022;
originally announced June 2022.
-
Increasing Fault Tolerance and Throughput with Adaptive Control Plane in Smart Factories
Authors:
Cao Vien Phung,
Admela Jukan
Abstract:
Future smart factories are expected to deploy an emerging dynamic Virtual Reality (VR) applications with high bandwidth wireless connections in the THz communication bands, where a factory worker can follow activities through 360°video streams with high quality resolution. THz communications, while promising as a high bandwidth wireless communication technology, are however known for low fault tol…
▽ More
Future smart factories are expected to deploy an emerging dynamic Virtual Reality (VR) applications with high bandwidth wireless connections in the THz communication bands, where a factory worker can follow activities through 360°video streams with high quality resolution. THz communications, while promising as a high bandwidth wireless communication technology, are however known for low fault tolerance, and are sensible to external factors. Since THz channel states are in general hard to estimate, what is needed is a system that can adaptively react to transceiver configurations in terms of coding and modulation. To this end, we propose an adaptive control plane that can help us configure the THz communication system. The control plane implements a workflow algorithm designed to adaptively choose between various coding and modulation schemes depending on THz channel states. The results show that an adaptive control plane can improve throughput and signal resolution quality, with theoretically zeroed bit error probability and a maximum achievable throughput in the scenarios analayzed.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Towards Optimal Path Allocation for Unreliable Reconfigurable Intelligent Surfaces
Authors:
Mounir Bensalem,
Anna Engelmann,
Admela Jukan
Abstract:
Terahertz (THz) communications and reconfigurable intelligent surfaces (RISs) have been recently proposed to enable various powerful indoor applications, such as wireless virtual reality (VR). For an efficient servicing of VR users, an efficient THz path allocation solution becomes a necessity. Assuming the RIS component is the most critical one in enabling the service, we investigate the impact o…
▽ More
Terahertz (THz) communications and reconfigurable intelligent surfaces (RISs) have been recently proposed to enable various powerful indoor applications, such as wireless virtual reality (VR). For an efficient servicing of VR users, an efficient THz path allocation solution becomes a necessity. Assuming the RIS component is the most critical one in enabling the service, we investigate the impact of RIS hardware failure on path allocation performance. To this end, we study a THz network that employs THz operated RISs acting as base stations, serving VR users. We propose a Semi-Markov decision Process (SMDP)-based path allocation model to ensure the reliability of THz connection, while maximizing the total long-term expected system reward, considering the system gains, costs of link utilization, and the penalty of RIS failure. The SMDP-based model of the RIS system is formulated by defining the state space, action space, reward model, and transition probability distribution. We propose an optimal iterative algorithm for path allocation that decides the next action at each system state. The results show the average reward and VR service blocking probability under different scenarios and with various VR service arrivals and RIS failure rates, as first step towards feasible VR services over unreliable THz RIS.
△ Less
Submitted 22 December, 2022; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Engineering Edge-Cloud Offloading of Big Data for Channel Modelling in THz-range Communications
Authors:
Zied Ennaceur,
Anna Engelmann,
Admela Jukan
Abstract:
Channel estimation in mmWave and THz-range wireless communications (producing Gb/Tb-range of data) is critical to configuring system parameters related to transmission signal quality, and yet it remains a daunting challenge both in software and hardware. Current methods of channel estimations, be it modeling- or data-based (machine learning (ML)), - use and create big data. This in turn requires a…
▽ More
Channel estimation in mmWave and THz-range wireless communications (producing Gb/Tb-range of data) is critical to configuring system parameters related to transmission signal quality, and yet it remains a daunting challenge both in software and hardware. Current methods of channel estimations, be it modeling- or data-based (machine learning (ML)), - use and create big data. This in turn requires a large amount of computational resources, read operations to prove if there is some predefined channel configurations, e.g., QoS requirements, in the database, as well as write operations to store the new combinations of QoS parameters in the database. Especially the ML-based approach requires high computational and storage resources, low latency and a higher hardware flexibility. In this paper, we engineer and study the offloading of the above operations to edge and cloud computing systems to understand the suitability of edge and cloud computing to provide rapid response with channel and link configuration parameters on the example of THz channel modeling. We evaluate the performance of the engineered system when the computational and storage resources are orchestrated based on: 1) monolithic architecture, 2) microservices architectures, both in edge-cloud based approach. For microservices approach, we engineer both Docker Swarm and Kubernetes systems. The measurements show a great promise of edge computing and microservices that can quickly respond to properly configure parameters and improve transmission distance and signal quality with ultra-high speed wireless communications.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Benchmarking Various ML Solutions in Complex Intent-Based Network Management Systems
Authors:
Mounir Bensalem,
Jasenka Dizdarević,
Admela Jukan
Abstract:
Intent-based networking (IBN) solutions to managing complex ICT systems have become one of the key enablers of intelligent and autonomous network management. As the number of machine learning (ML) techniques deployed in IBN increases, it becomes increasingly important to understand their expected performance. Whereas IBN concepts are generally specific to the use case envisioned, the underlying pl…
▽ More
Intent-based networking (IBN) solutions to managing complex ICT systems have become one of the key enablers of intelligent and autonomous network management. As the number of machine learning (ML) techniques deployed in IBN increases, it becomes increasingly important to understand their expected performance. Whereas IBN concepts are generally specific to the use case envisioned, the underlying platforms are generally heterogenous, comprised of complex processing units, including CPU/GPU, CPU/FPGA and CPU/TPU combinations, which needs to be considered when running the ML techniques chosen. We focus on a case study of IBNs in the so-called ICT supply chain systems, where multiple ICT artifacts are integrated in one system based on heterogeneous hardware platforms. Here, we are interested in the problem of benchmarking the computational performance of ML technique defined by the intents. Our benchmarking method is based on collaborative filtering techniques, relying on ML-based methods like Singular Value Decomposition and Stochastic Gradient Descent, assuming initial lack of explicit knowledge about the expected number of operations, framework, or the device processing characteristics. We show that it is possible to engineer a practical IBN system with various ML techniques with an accurate estimated performance based on data from a few benchmarks only.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
Performance Analysis of MDPC and RS codes in Two-channel THz Communication Systems
Authors:
Cao Vien Phung,
Christoph Herold,
David Humphreys,
Thomas Kurner,
Admela Jukan
Abstract:
We analyze whether a multidimensional parity check (MDPC) or a Reed-Solomon (RS) code in combination with an auxiliary channel can improve the throughput and extend the THz transmission distance. While channel quality is addressed by various coding approaches, and an effective THz system configuration is enabled by other approaches with additional channels, their combination is new with the potent…
▽ More
We analyze whether a multidimensional parity check (MDPC) or a Reed-Solomon (RS) code in combination with an auxiliary channel can improve the throughput and extend the THz transmission distance. While channel quality is addressed by various coding approaches, and an effective THz system configuration is enabled by other approaches with additional channels, their combination is new with the potential for significant improvements in quality of the data transmission. Our specific solution is designed to correct data bits at the physical layer by using a low complexity erasure code (MDPC or RS), whereby original and parity data are transferred over two separate and parallel THz channels, including one main channel and one additional channel. The results are theoretically analyzed to see that our new solution can improve throughput, support higher modulation levels and transfer data over the longer distances with THz communications.
△ Less
Submitted 16 November, 2021; v1 submitted 15 July, 2021;
originally announced July 2021.
-
The Role of Intent-Based Networking in ICT Supply Chains
Authors:
Mounir Bensalem,
Jasenka Dizdarević,
Francisco Carpio,
Admela Jukan
Abstract:
The evolution towards Industry 4.0 is driving the need for innovative solutions in the area of network management, considering the complex, dynamic and heterogeneous nature of ICT supply chains. To this end, Intent-Based networking (IBN) which is already proven to evolve how network management is driven today, can be implemented as a solution to facilitate the management of large ICT supply chains…
▽ More
The evolution towards Industry 4.0 is driving the need for innovative solutions in the area of network management, considering the complex, dynamic and heterogeneous nature of ICT supply chains. To this end, Intent-Based networking (IBN) which is already proven to evolve how network management is driven today, can be implemented as a solution to facilitate the management of large ICT supply chains. In this paper, we first present a comparison of the main architectural components of typical IBN systems and, then, we study the key engineering requirements when integrating IBN with ICT supply chain network systems while considering AI methods. We also propose a general architecture design that enables intent translation of ICT supply chain specifications into lower level policies, to finally show an example of how the access control is performed in a modeled ICT supply chain system.
△ Less
Submitted 11 May, 2021;
originally announced May 2021.
-
Engineering and Experimentally Benchmarking a Serverless Edge Computing System
Authors:
Francisco Carpio,
Marc Michalke,
Admela Jukan
Abstract:
Thanks to the latest advances in containerization, the serverless edge computing model is becoming close to reality. Serverless at the edge is expected to enable low latency applications with fast autoscaling mechanisms, all running on heterogeneous and resource-constrained devices. In this work, we engineer and experimentally benchmark a serverless edge computing system architecture. We deploy a…
▽ More
Thanks to the latest advances in containerization, the serverless edge computing model is becoming close to reality. Serverless at the edge is expected to enable low latency applications with fast autoscaling mechanisms, all running on heterogeneous and resource-constrained devices. In this work, we engineer and experimentally benchmark a serverless edge computing system architecture. We deploy a decentralized edge computing platform for serverless applications providing processing, storage, and communication capabilities using only open-source software, running over heterogeneous resources (e.g., virtual machines, Raspberry Pis, or bare metal servers, etc). To achieve that, we provision an overlay-network based on Nebula network agnostic technology, running over private or public networks, and use K3s to provide hardware abstraction. We benchmark the system in terms of response times, throughput and scalability using different hardware devices connected through the public Internet. The results show that while serverless is feasible on heterogeneous devices showing a good performance on constrained devices, such as Raspberry Pis, the lack of support when determining computational power and network characterization leaves much room for improvement in edge environments.
△ Less
Submitted 11 May, 2021;
originally announced May 2021.
-
Scaling Migrations and Replications of Virtual Network Functions based on Network Traffic Forecasting
Authors:
Francisco Carpio,
Wolfgang Bziuk,
Admela Jukan
Abstract:
Migration and replication of virtual network functions (VNFs) are well-known mechanisms to face dynamic resource requests in Internet Service Provider (ISP) edge networks. They are not only used to reallocate resources in carrier networks, but in case of excessive traffic churns also to offloading VNFs to third party cloud providers. We propose to study how traffic forecasting can help to reduce t…
▽ More
Migration and replication of virtual network functions (VNFs) are well-known mechanisms to face dynamic resource requests in Internet Service Provider (ISP) edge networks. They are not only used to reallocate resources in carrier networks, but in case of excessive traffic churns also to offloading VNFs to third party cloud providers. We propose to study how traffic forecasting can help to reduce the number of required migrations and replications when the traffic dynamically changes in the network. We analyze and compare three scenarios for the VNF migrations and replications based on: (i) the current observed traffic demands only, (ii) specific maximum traffic demand value observed in the past, or (iii) predictive traffic values. For the prediction of traffic demand values, we use an LSTM model which is proven to be one of the most accurate methods in time series forecasting problems. Based the traffic prediction model, we then use a Mixed-Integer Linear Programming (MILP) model as well as a greedy algorithm to solve this optimization problem that considers migrations and replications of VNFs. The results show that LSTM-based traffic prediction can reduce the number of migrations up to 45\% when there is enough available resources to allocate replicas, while less cloud-based offloading is required compared to overprovisioning.
△ Less
Submitted 11 May, 2021;
originally announced May 2021.
-
Benchmarking Machine Learning Techniques for THz Channel Estimation Problems
Authors:
Mounir Bensalem,
Admela Jukan
Abstract:
Terahertz communication is one of the most promising wireless communication technologies for 6G generation and beyond. For THz systems to be practically adopted, channel estimation is one of the key issues. We consider the problem of channel modeling and estimation with deterministic channel propagation and the related physical characteristics of THz bands, and benchmark various machine learning a…
▽ More
Terahertz communication is one of the most promising wireless communication technologies for 6G generation and beyond. For THz systems to be practically adopted, channel estimation is one of the key issues. We consider the problem of channel modeling and estimation with deterministic channel propagation and the related physical characteristics of THz bands, and benchmark various machine learning algorithms to estimate THz channel, including neural networks (NN), logistic regression (LR), and projected gradient ascent (PGA). Numerical results show that PGA algorithm yields the most promising performance at SNR=0 dB with NMSE of -12.8 dB.
△ Less
Submitted 16 November, 2021; v1 submitted 16 April, 2021;
originally announced April 2021.
-
Engineering an IoT-Edge-Cloud Computing System Architecture: Lessons Learnt from An Undergraduate Lab Course
Authors:
Jasenka Dizdarevic,
Admela Jukan
Abstract:
With the rapid advances in IoT, edge and cloud computing solutions, it is critical to educate and train students in computer science and engineering in various aspects of IoT-edge-cloud (IoT-E-C) system architecture implementations. We outline the design and development of an undergraduate laboratory course that sets the goal of implementing various interfaces and communication protocols to connec…
▽ More
With the rapid advances in IoT, edge and cloud computing solutions, it is critical to educate and train students in computer science and engineering in various aspects of IoT-edge-cloud (IoT-E-C) system architecture implementations. We outline the design and development of an undergraduate laboratory course that sets the goal of implementing various interfaces and communication protocols to connect IoT, edge and cloud computing systems and evaluating their performance. The lab setup is modular and based on open source tools. In the IoT context, it consists of low-cost processing platforms with various sensors and actuators. In the edge and cloud computing context, we implement and deploy single board computers and Firebase cloud solutions, respectively. The modular lab setup allows students to engineer and integrate various communication protocol solutions, including MQTT, COAP and HTTP. In addition to the system implementation, students can evaluate and benchmark the performance of the entire system.
△ Less
Submitted 26 April, 2021; v1 submitted 21 March, 2021;
originally announced March 2021.
-
Benchmarking Buffer Size in IoT Devices Deploying REST HTTP
Authors:
Cao Vien Phung,
Mounir Bensalem,
Admela Jukan
Abstract:
A few potential IoT communication protocols at the application layer have been proposed, including MQTT, CoAP and REST HTTP, with the latter being the protocol of choice for software developers due to its compatibility with the existing systems. We present a theoretical model of the expected buffer size on the REST HTTP client buffer in IoT devices under lossy wireless conditions, and validate the…
▽ More
A few potential IoT communication protocols at the application layer have been proposed, including MQTT, CoAP and REST HTTP, with the latter being the protocol of choice for software developers due to its compatibility with the existing systems. We present a theoretical model of the expected buffer size on the REST HTTP client buffer in IoT devices under lossy wireless conditions, and validate the study experimentally. The results show that increasing the buffer size in IoT devices does not always improve performance in lossy environments, hence demonstrating the importance of benchmarking the buffer size in IoT systems deploying REST HTTP.
△ Less
Submitted 16 November, 2021; v1 submitted 7 January, 2021;
originally announced January 2021.
-
Increasing Transmission Distance in THz systems with Erasure Coding and Auxiliary Channels
Authors:
Cao Vien Phung,
Admela Jukan
Abstract:
We analyze whether the THz transmission distance can be extended with systematic linear network coding (sRLNC) and a low-bitrate additional channel. While various coding techniques have been proposed to mitigate issues of channel quality, and other techniques have used auxiliary channels to enable an effective THz transmission system configuration, their combination is new, and carries potential f…
▽ More
We analyze whether the THz transmission distance can be extended with systematic linear network coding (sRLNC) and a low-bitrate additional channel. While various coding techniques have been proposed to mitigate issues of channel quality, and other techniques have used auxiliary channels to enable an effective THz transmission system configuration, their combination is new, and carries potential for significant improvements in transmission quality. Our specific solution is designed to complementing a generic low complexity FEC code by a low complexity erasure code (sRLNC), whereby channel coding is proposed to simultaneously send the native and coded data over two parallel channels, including one main THz channel and one auxiliary channel with comparably lower bitrate. We show theoretically that the proposed system can improve throughput, support higher modulation levels and transfer data over the longer distances with THz communications.
△ Less
Submitted 31 October, 2020;
originally announced November 2020.
-
On Optimal Placement of Hybrid Service Function Chains (SFCs) of Virtual Machines and Containers in a Generic Edge-Cloud Continuum
Authors:
Francisco Carpio,
Wolfgang Bziuk,
Admela Jukan
Abstract:
Traditionally, Network Function Virtualization (NFV) has been implemented to run on Virtual Machines (VMs) in form of Virtual Network Functions (VNFs). More recently, the so-called Serverless Computing has gained traction in cloud computing, offering Function-as-a-Service (FaaS) platforms that make use of containerization techniques to deploy services. In contrast to VM-based VNFs, where resources…
▽ More
Traditionally, Network Function Virtualization (NFV) has been implemented to run on Virtual Machines (VMs) in form of Virtual Network Functions (VNFs). More recently, the so-called Serverless Computing has gained traction in cloud computing, offering Function-as-a-Service (FaaS) platforms that make use of containerization techniques to deploy services. In contrast to VM-based VNFs, where resources are usually reserved and continuously running, FaaS can just be subsets of code implementing small functions allowing for event-driven, on-demand instantiations. Thus, a hybrid VM-Container based Service Function Chains (SFCs) are a natural evolution of NFV architecture. We study a novel problem of optimal placement of hybrid SFCs from an Internet Service Provider (ISP) point of view, whereby VNFs can be instantiated either over VMs or containers in a generic edge and cloud continuum. To this end, we propose a Mixed-Integer Linear Programming model as well as a heuristic solution to solve this optimization problem that considers three objectives unique to the specific VM and container deployment in a carrier network: operational costs for maintaining servers in the edge, costs of placing VNFs in third-party cloud providers and penalty costs applied when SLA agreements are violated in terms of end-to-end delay. We also propose 2-phases optimization process to analyze the effect on performance as a result of replications and migrations of VNFs. The model can be used to highlight scenarios where a combination of VMs and containers can provide most benefits from the monetary costs point of view.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Jamming-Aware Control Plane in Elastic Optical Networks
Authors:
Ítalo Brasileiro,
Mounir Bensalem,
André Drummond,
Admela Jukan
Abstract:
Physical layer security is essential in optical networks. In this paper, we study a jamming-aware control plane, in which a high power jamming attack exists in the network. The studied control plane considers that the jammed connections can be detected and avoided. We used a physical layer model, in which we embedded the additional jamming power, to evaluate different security in scenarios, such a…
▽ More
Physical layer security is essential in optical networks. In this paper, we study a jamming-aware control plane, in which a high power jamming attack exists in the network. The studied control plane considers that the jammed connections can be detected and avoided. We used a physical layer model, in which we embedded the additional jamming power, to evaluate different security in scenarios, such as a jamming-free scenario, jamming with an unaware controller, and jamming with an aware controller. The performance is analyzed in terms of the blocking rate and slots utilization. We analyze the impact of jamming attacks in the least used link and in the most used link on the network. The results demonstrates that the jamming avoidance by the control plane can reach performance near the not jammed scenario.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
A Simple Reliability Analysis of Complex Service Function Chains (SFCs)
Authors:
Anna Engelmann,
Admela Jukan
Abstract:
In the framework of Network Function Virtualization (NFV), the reliability of Service Function Chain (SFC), -- an end-to-end service is presented by a chain of virtual network functions (VNFs), is a complex function of placement, configuration and deployment requirements, both in hardware and software. Previous reliability analysis models cannot be directly applied to SFC because they do not consi…
▽ More
In the framework of Network Function Virtualization (NFV), the reliability of Service Function Chain (SFC), -- an end-to-end service is presented by a chain of virtual network functions (VNFs), is a complex function of placement, configuration and deployment requirements, both in hardware and software. Previous reliability analysis models cannot be directly applied to SFC because they do not consider aspects of system component sharing, heterogeneity of system components and their interdependency in case of failures. In this paper, we analyze service reliability of complex SFC configurations, including serial and parallel VNF chaining, as well as their related backup protection components. Our analysis is based on combinatorial analysis and a reduced binomial theorem, and this simple approach can be utilized to analyzing rather complex SFC configurations. We consider, for the first time, failure dependences among VNF components placed in data centers, racks, and servers. We show that our analysis can easily consider different VNF placement strategies in data center networks in arbitrary configurations and, thus, be effectively used for optimizations of the reliable SFC placement.
△ Less
Submitted 1 April, 2020;
originally announced May 2020.
-
Error Correction with Systematic RLNC in Multi-Channel THz Communication Systems
Authors:
Cao Vien Phung,
Anna Engelmann,
Admela Jukan
Abstract:
The terahertz (THz) frequency band (0.3-10THz) has the advantage of large available bandwidth and is a candidate to satisfy the ever increasing mobile traffic in wireless communications. However, the THz channels are often absorbed by molecules in the atmosphere, which can decrease the signal quality resulting in high bit error rate of received data. In this paper, we study the usage of systematic…
▽ More
The terahertz (THz) frequency band (0.3-10THz) has the advantage of large available bandwidth and is a candidate to satisfy the ever increasing mobile traffic in wireless communications. However, the THz channels are often absorbed by molecules in the atmosphere, which can decrease the signal quality resulting in high bit error rate of received data. In this paper, we study the usage of systematic random linear network coding (sRLNC) for error correction in generic THz systems with with 2N parallel channels, whereby N main high-bitrate channels are used in parallel with N auxiliary channels with lower bit rate. The idea behind this approach is to use coded low-bit rate channels to carry redundant information from high-bit rate channels, and thus compensate for errors in THz transmission. The analytical results evaluate and compare the different scenarios of the THz system in term of the amount of coding redundancy, a code rate, transmission rate of auxiliary channels, the number of THz channels, the modulation format and transmission distance as required system configurations for a fault tolerant THz transmission.
△ Less
Submitted 5 June, 2021; v1 submitted 7 March, 2020;
originally announced March 2020.
-
An Experimental Study of Network Coded REST HTTP in Dynamic IoT Systems
Authors:
Cao Vien Phung,
Jasenka Dizdarevic,
Admela Jukan
Abstract:
REST HTTP is the communication protocol of choice for software developers today. In IoT systems with unreliable connectivity, however, a stateless protocol like REST HTTP needs to send a request message multiple times, and it only stops the retransmissions when an acknowledgement arrives at the sender. In our previous work, we studied the usage of random linear network coding (RLNC) for REST HTTP…
▽ More
REST HTTP is the communication protocol of choice for software developers today. In IoT systems with unreliable connectivity, however, a stateless protocol like REST HTTP needs to send a request message multiple times, and it only stops the retransmissions when an acknowledgement arrives at the sender. In our previous work, we studied the usage of random linear network coding (RLNC) for REST HTTP protocol to reducing the amount of unnecessarily retransmissions. In this paper, we experimentally validate the study and analyze REST HTTP with and without RLNC in a simple testbed in dynamic IoT systems. The measurements show notable improvements in bandwidth utilization in terms of reducing the retransmissions and delay when using network-coded REST HTTP.
△ Less
Submitted 23 February, 2021; v1 submitted 29 February, 2020;
originally announced March 2020.
-
Improving THz Quality-of-Transmission with Systematic RLNC and Auxiliary Channels
Authors:
Cao Vien Phung,
Anna Engelmann,
Thomas Kuerner,
Admela Jukan
Abstract:
In this paper, we propose a novel solution that can improve the quality of THz transmission with systematic random linear network coding (sRLNC) and a low-bitrate auxiliary channel. To minimize complexity of channel coding, we complement a generic low complexity FEC code by a low complexity sRLNC. To increase the overall throughput of THz transmission, we propose to send the native data and coding…
▽ More
In this paper, we propose a novel solution that can improve the quality of THz transmission with systematic random linear network coding (sRLNC) and a low-bitrate auxiliary channel. To minimize complexity of channel coding, we complement a generic low complexity FEC code by a low complexity sRLNC. To increase the overall throughput of THz transmission, we propose to send the native data and coding redundancy in parallel over 2 differently configured THz channels, i.e., over 1 high bit rate main channel and 1 low bit rate low error rate auxiliary channel. The results show, that the main THz channel supported by low bit rate auxiliary channel can use a higher level modulation format and sent over longer distances with a higher throughput.
△ Less
Submitted 5 June, 2021; v1 submitted 29 February, 2020;
originally announced March 2020.
-
Engineering and Experimentally Benchmarking a Container-based Edge Computing System
Authors:
Francisco Carpio,
Marta Delgado,
Admela Jukan
Abstract:
While edge computing is envisioned to superbly serve latency sensitive applications, the implementation-based studies benchmarking its performance are few and far between. To address this gap, we engineer a modular edge cloud computing system architecture that is built on latest advances in containerization techniques, including Kafka, for data streaming, Docker, as application platform, and Fireb…
▽ More
While edge computing is envisioned to superbly serve latency sensitive applications, the implementation-based studies benchmarking its performance are few and far between. To address this gap, we engineer a modular edge cloud computing system architecture that is built on latest advances in containerization techniques, including Kafka, for data streaming, Docker, as application platform, and Firebase Cloud, as realtime database system. We benchmark the performance of the system in terms of scalability, resource utilization and latency by comparing three scenarios: cloud-only, edge-only and combined edge-cloud. The measurements show that edge-only solution outperforms other scenarios only when deployed with data located at one edge only, i.e., without edge computing wide data synchronization. In case of applications requiring data synchronization through the cloud, edge-cloud scales around a factor 10 times better than cloud-only, until certain number of concurrent users in the system, and above this point, cloud-only scales better. In terms of resource utilization, we observe that whereas the mean utilization increases linearly with the number of user requests, the maximum values for the memory and the network I/O heavily increase when with an increasing amount of data.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
Embedding Jamming Attacks into Physical Layer Models in Optical Networks
Authors:
Mounir Bensalem,
Ítalo Brasileiro,
André Drummond,
Admela Jukan
Abstract:
Optical networks are prone to physical layer attacks, in particular the insertion of high jamming power. In this paper, we present a study of jamming attacks in elastic optical networks (EON) by embedding the jamming into the physical layer model, and we analyze its impact on the blocking probability and slots utilization. We evaluate our proposed model using a single link and a network topology a…
▽ More
Optical networks are prone to physical layer attacks, in particular the insertion of high jamming power. In this paper, we present a study of jamming attacks in elastic optical networks (EON) by embedding the jamming into the physical layer model, and we analyze its impact on the blocking probability and slots utilization. We evaluate our proposed model using a single link and a network topology and we show that for in-band-jamming, the slots utilization decreases with the increase of jamming power, and becomes null when the jamming power is higher than 3 dB, while for out-of-band jamming, the impact is maximal for a specific jamming power, 1.75 dB in our simulation. Considering multiple positions of attackers, we attained the highest blocking probability 32% for a specific jamming power 2 dB. We conclude that the impact of jamming depends on attacker positions as well as the jamming power.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
Modeling of Deep Neural Network (DNN) Placement and Inference in Edge Computing
Authors:
Mounir Bensalem,
Jasenka Dizdarević,
Admela Jukan
Abstract:
With the edge computing becoming an increasingly adopted concept in system architectures, it is expected its utilization will be additionally heightened when combined with deep learning (DL) techniques. The idea behind integrating demanding processing algorithms in Internet of Things (IoT) and edge devices, such as Deep Neural Network (DNN), has in large measure benefited from the development of e…
▽ More
With the edge computing becoming an increasingly adopted concept in system architectures, it is expected its utilization will be additionally heightened when combined with deep learning (DL) techniques. The idea behind integrating demanding processing algorithms in Internet of Things (IoT) and edge devices, such as Deep Neural Network (DNN), has in large measure benefited from the development of edge computing hardware, as well as from adapting the algorithms for use in resource constrained IoT devices. Surprisingly, there are no models yet to optimally place and use machine learning in edge computing. In this paper, we propose the first model of optimal placement of Deep Neural Network (DNN) Placement and Inference in edge computing. We present a mathematical formulation to the DNN Model Variant Selection and Placement (MVSP) problem considering the inference latency of different model-variants, communication latency between nodes, and utilization cost of edge computing nodes. We evaluate our model numerically, and show that for low load increasing model co-location decreases the average latency by 33% of millisecond-scale per request, and for high load, by 21%.
△ Less
Submitted 19 January, 2020;
originally announced January 2020.
-
Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding
Authors:
Anna Engelmann,
Admela Jukan
Abstract:
Anonymity networks are providing practical mechanisms to protect its users against censorship by hiding their identity and information content. The best-known anonymity network, The Onion Routing (Tor) network, is however subject to censorship attacks by blocking the public Tor entry routers and a few secret Tor entry points (bridges), thus preventing users to access the Tor. To further advance th…
▽ More
Anonymity networks are providing practical mechanisms to protect its users against censorship by hiding their identity and information content. The best-known anonymity network, The Onion Routing (Tor) network, is however subject to censorship attacks by blocking the public Tor entry routers and a few secret Tor entry points (bridges), thus preventing users to access the Tor. To further advance the evolution of anonymity networks, while addressing censorship attacks, we propose to enhance the well-known multi-circuit Tor technique with linear network coding (LNC) and analyze the resulting censorship success. The results show that LNC can improve the robustness of Tor against censorship.
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
Enhancing Block-Wise Transfer with Network Coding in CoAP
Authors:
Cao Vien Phung,
Jasenka Dizdarevic,
Admela Jukan
Abstract:
CoAP (Constrained Application Protocol) with block-wise transfer (BWT) option is a known protocol choice for large data transfer in general lossy IoT network environments. Lossy transmission environments on the other hand lead to CoAP resending multiple blocks, which creates overheads. To tackle this problem, we design a BWT with network coding (NC), with the goal to reducing the number of unneces…
▽ More
CoAP (Constrained Application Protocol) with block-wise transfer (BWT) option is a known protocol choice for large data transfer in general lossy IoT network environments. Lossy transmission environments on the other hand lead to CoAP resending multiple blocks, which creates overheads. To tackle this problem, we design a BWT with network coding (NC), with the goal to reducing the number of unnecessary retransmissions. The results show the reduction in the number of block retransmissions for different values of blocksize, implying the reduced transfer time. For the maximum blocksize of 1024 bytes and total probability loss of 0.5, CoAP with NC can resend up to 5 times less blocks.
△ Less
Submitted 27 May, 2019;
originally announced May 2019.
-
Engineering a QoS Provider Mechanism for Edge Computing with Deep Reinforcement Learning
Authors:
Francisco Carpio,
Admela Jukan,
Roman Sosa,
Ana Juan Ferrer
Abstract:
With the development of new system solutions that integrate traditional cloud computing with the edge/fog computing paradigm, dynamic optimization of service execution has become a challenge due to the edge computing resources being more distributed and dynamic. How to optimize the execution to provide Quality of Service (QoS) in edge computing depends on both the system architecture and the resou…
▽ More
With the development of new system solutions that integrate traditional cloud computing with the edge/fog computing paradigm, dynamic optimization of service execution has become a challenge due to the edge computing resources being more distributed and dynamic. How to optimize the execution to provide Quality of Service (QoS) in edge computing depends on both the system architecture and the resource allocation algorithms in place. We design and develop a QoS provider mechanism, as an integral component of a fog-to-cloud system, to work in dynamic scenarios by using deep reinforcement learning. We choose reinforcement learning since it is particularly well suited for solving problems in dynamic and adaptive environments where the decision process needs to be frequently updated. We specifically use a Deep Q-learning algorithm that optimizes QoS by identifying and blocking devices that potentially cause service disruption due to dynamicity. We compare the reinforcement learning based solution with state-of-the-art heuristics that use telemetry data, and analyze pros and cons.
△ Less
Submitted 2 May, 2019;
originally announced May 2019.
-
Enhancing REST HTTP with Random Linear Network Coding in Dynamic Edge Computing Environments
Authors:
Cao Vien Phung,
Jasenka Dizdarevic,
Francisco Carpio,
Admela Jukan
Abstract:
The rising number of IoT devices is accelerating the research on new solutions that will be able to efficiently deal with unreliable connectivity in highly dynamic computing applications. To improve the overall performance in IoT applications, there are multiple communication solutions available, either proprietary or open source, all of which satisfy different communication requirements. Most com…
▽ More
The rising number of IoT devices is accelerating the research on new solutions that will be able to efficiently deal with unreliable connectivity in highly dynamic computing applications. To improve the overall performance in IoT applications, there are multiple communication solutions available, either proprietary or open source, all of which satisfy different communication requirements. Most commonly, for this kind of communication, developers choose REST HTTP protocol as a result of its ease of use and compatibility with the existing computing infrastructure. In applications where mobility and unreliable connectivity play a significant role, ensuring a reliable exchange of data with the stateless REST HTTP protocol completely depends on the developer itself. This often means resending multiple request messages when the connection fails, constantly trying to access the service until the connection reestablishes. In order to alleviate this problem, in this paper, we combine REST HTTP with random linear network coding (RLNC) to reduce the number of additional retransmissions. We show how using RLNC with REST HTTP requests can decrease the reconnection time by reducing the additional packet retransmissions in unreliable highly dynamic scenarios.
△ Less
Submitted 23 February, 2021; v1 submitted 8 March, 2019;
originally announced March 2019.
-
On Detecting and Preventing Jamming Attacks with Machine Learning in Optical Networks
Authors:
Mounir Bensalem,
Sandeep Kumar Singh,
Admela Jukan
Abstract:
Optical networks are prone to power jamming attacks intending service disruption. This paper presents a Machine Learning (ML) framework for detection and prevention of jamming attacks in optical networks. We evaluate various ML classifiers for detecting out-of-band jamming attacks with varying intensities. Numerical results show that artificial neural network is the fastest (10^6 detections per se…
▽ More
Optical networks are prone to power jamming attacks intending service disruption. This paper presents a Machine Learning (ML) framework for detection and prevention of jamming attacks in optical networks. We evaluate various ML classifiers for detecting out-of-band jamming attacks with varying intensities. Numerical results show that artificial neural network is the fastest (10^6 detections per second) for inference and most accurate (~ 100 %) in detecting power jamming attacks as well as identifying the optical channels attacked. We also discuss and study a novel prevention mechanism when the system is under active jamming attacks. For this scenario, we propose a novel resource reallocation scheme that utilizes the statistical information of attack detection accuracy to lower the probability of successful jamming of lightpaths while minimizing lightpaths' reallocations. Simulation results show that the likelihood of jamming a lightpath reduces with increasing detection accuracy, and localization reduces the number of reallocations required
△ Less
Submitted 10 February, 2020; v1 submitted 20 February, 2019;
originally announced February 2019.
-
On Coding for Reliable VNF Chaining in DCNs
Authors:
Anna Engelmann,
Admela Jukan,
Rastin Pries
Abstract:
We study how erasure coding can improve service reliability in Data Center Networks (DCN). To this end, we find that coding can be best deployed in systems, where i) traffic is split into multiple parallel sub-flows, ii) each sub-flow is encoded; iii) SFC along with their corresponding Virtual Network Functions (VNF) concatenated are replicated into at least as many VNF instances as there are sub-…
▽ More
We study how erasure coding can improve service reliability in Data Center Networks (DCN). To this end, we find that coding can be best deployed in systems, where i) traffic is split into multiple parallel sub-flows, ii) each sub-flow is encoded; iii) SFC along with their corresponding Virtual Network Functions (VNF) concatenated are replicated into at least as many VNF instances as there are sub-flows, resulting in parallel sub- SFCs; and iv) all coded sub-flows are distributed over parallel paths and processed in parallel. We study service reliability as function of the level of parallelization within DCN and the resulting amount of redundancy. Based on the probability theory and by considering failures of path segments, VNF and server failures, we analytically derive the probability that parallel subflows are successfully processed by the parallelized SFC and that the original serial traffic can be successfully recovered without service interruptions.We compare the proposed failure protection with coding and the standard backup protection and evaluate the related overhead of both methods, including decoding, traffic redirection and VNF migration. The results not only show the benefit of our scheme for reliability, but also a reduced overhead required in comparison to backup protection.
△ Less
Submitted 29 October, 2018;
originally announced October 2018.
-
Survey of Communication Protocols for Internet-of-Things and Related Challenges of Fog and Cloud Computing Integration
Authors:
Jasenka Dizdarevic,
Francisco Carpio,
Admela Jukan,
Xavi Masip-Bruin
Abstract:
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This paper surveys on the application lay…
▽ More
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This paper surveys on the application layer communication protocols to fulfil the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the paper first presents a comparative analysis of the main characteristics of IoT communication protocols, including request-reply and publish-subscribe protocols. After that, the paper surveys the protocols that are widely adopted and implemented in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their interoperability and wider system integration. Finally, the paper reviews the main performance issues, including latency, energy consumption and network throughput. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.
△ Less
Submitted 27 February, 2019; v1 submitted 5 April, 2018;
originally announced April 2018.
-
Artificial Intelligence (AI) Methods in Optical Networks: A Comprehensive Survey
Authors:
Javier Mata,
Ignacio de Miguel,
Ramó n J. Durá n,
Noemí Merayo,
Sandeep Kumar Singh,
Admela Jukan,
Mohit Chamania
Abstract:
Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by emulating complex biological processes such as learning, reasoning and self-correction. This paper presents a comprehensive review of the application of AI techniques for improving performance of optical communication systems and networks. The use of AI-based techniques is first s…
▽ More
Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by emulating complex biological processes such as learning, reasoning and self-correction. This paper presents a comprehensive review of the application of AI techniques for improving performance of optical communication systems and networks. The use of AI-based techniques is first studied in applications related to optical transmission, ranging from the characterization and operation of network components to performance monitoring, mitigation of nonlinearities, and quality of transmission estimation. Then, applications related to optical network control and management are also reviewed, including topics like optical network planning and operation in both transport and access networks. Finally, the paper also presents a summary of opportunities and challenges in optical networking where AI is expected to play a key role in the near future.
△ Less
Submitted 15 January, 2018; v1 submitted 5 January, 2018;
originally announced January 2018.
-
Improving Reliability of Service Function Chains with Combined VNF Migrations and Replications
Authors:
Francisco Carpio,
Admela Jukan
Abstract:
The Network Function Virtualization (NFV) paradigm is enabling flexibility, programmability and implementation of traditional network functions into generic hardware, in form of Virtual Network Functions (VNFs). To provide services, the VNFs are commonly concatenated in a certain ordered sequence, known as Service Function Chains (SFCs). SFCs are usually required to meeting a certain level of reli…
▽ More
The Network Function Virtualization (NFV) paradigm is enabling flexibility, programmability and implementation of traditional network functions into generic hardware, in form of Virtual Network Functions (VNFs). To provide services, the VNFs are commonly concatenated in a certain ordered sequence, known as Service Function Chains (SFCs). SFCs are usually required to meeting a certain level of reliability. This creates the need to place the VNFs while optimizing reliability jointly with other objectives, such as network and server load balancing. Traditional migration and replication mechanisms, commonly used for Virtual Machines (VM) in data centers, can be used to improve SFC reliability. We study how to improve service reliability using jointly replications and migrations, considering the chaining problem inherent in NFV. While replications provide reliability, performing migrations to more reliable servers decreases the resource overhead. A Linear Programming (LP) model is presented to study the impact of active-active configurations on the network and server resources. Additionally, to provide a fast recovery from server failures, we consider N-to-N configurations in NFV networks and study its impact on server resources. The results show that replications do not only improve reliability, but can also be used to achieving a better server and network load balancing, and when used jointly with migrations can improve resource utilization without degrading reliability.
△ Less
Submitted 24 November, 2017;
originally announced November 2017.
-
A Reliability Study of Parallelized VNF Chaining
Authors:
Anna Engelmann,
Admela Jukan
Abstract:
In this paper, we study end-to-end service reliability in Data Center Networks (DCN) with flow and Service Function Chains (SFCs) parallelism. In our approach, we consider large flows to i) be split into multiple parallel smaller sub-flows; ii) SFC along with their VNFs are replicated into at least as many VNF instances as there are sub-flows, resulting in parallel sub-SFCs; and iii) all sub-flows…
▽ More
In this paper, we study end-to-end service reliability in Data Center Networks (DCN) with flow and Service Function Chains (SFCs) parallelism. In our approach, we consider large flows to i) be split into multiple parallel smaller sub-flows; ii) SFC along with their VNFs are replicated into at least as many VNF instances as there are sub-flows, resulting in parallel sub-SFCs; and iii) all sub-flows are distributed over multiple shortest paths and processed in parallel by parallel sub-SFCs. We study service reliability as a function of flow and SFC parallelism and placement of parallel active and backup sub-SFCs within DCN. Based on the probability theory and by considering both server and VNF failures, we analytically derive for each studied VNF placement method the probability that all sub-flows can be successfully processed by the parallelized SFC without service interruption. We evaluate the amount of backup VNFs required to protect the parallelized SFC with a certain level of service reliability. The results show that the proposed flow and SFC parallelism in DCN can significantly increase end-to-end service reliability, while reducing the amount of backup VNFs required, as compared to traditional SFCs with serial traffic flows.
△ Less
Submitted 20 November, 2017;
originally announced November 2017.
-
Evolution towards Smart Optical Networking: Where Artificial Intelligence (AI) meets the World of Photonics
Authors:
Admela Jukan,
Mohit Chamania
Abstract:
Smart optical networks are the next evolution of programmable networking and programmable automation of optical networks, with human-in-the-loop network control and management. The paper discusses this evolution and the role of Artificial Intelligence (AI).
Smart optical networks are the next evolution of programmable networking and programmable automation of optical networks, with human-in-the-loop network control and management. The paper discusses this evolution and the role of Artificial Intelligence (AI).
△ Less
Submitted 27 July, 2017;
originally announced July 2017.
-
Exploiting Parallelism in Optical Network Systems: A Case Study of Random Linear Network Coding (RLNC) in Ethernet-over-Optical Networks
Authors:
Anna Engelmann,
Wolfgang Bziuk,
Admela Jukan,
Muriel Medard
Abstract:
As parallelism becomes critically important in the semiconductor technology, high-performance computing, and cloud applications, parallel network systems will increasingly follow suit. Today, parallelism is an essential architectural feature of 40/100/400 Gigabit Ethernet standards, whereby high speed Ethernet systems are equipped with multiple parallel network interfaces. This creates new network…
▽ More
As parallelism becomes critically important in the semiconductor technology, high-performance computing, and cloud applications, parallel network systems will increasingly follow suit. Today, parallelism is an essential architectural feature of 40/100/400 Gigabit Ethernet standards, whereby high speed Ethernet systems are equipped with multiple parallel network interfaces. This creates new network topology abstractions and new technology requirements: instead of a single high capacity network link, multiple Ethernet end-points and interfaces need to be considered together with multiple links in form of discrete parallel paths. This new paradigm is enabling implementations of various new features to improve overall system performance. In this paper, we analyze the performance of parallel network systems with network coding. In particular, by using random LNC (RLNC), - a code without the need for decoding, we can make use of the fact that we have codes that are both distributed (removing the need for coordination or optimization of resources) and composable (without the need to exchange code information), leading to a fully stateless operation. We propose a novel theoretical modeling framework, including derivation of the upper and lower bounds as well as an expected value of the differential delay of parallel paths, and the resulting queue size at the receiver. The results show a great promise of network system parallelism in combination with RLNC: with a proper set of design parameters, the differential delay and the buffer size at the Ethernet receiver can be reduced significantly, while the cross-layer design and routing can be greatly simplified.
△ Less
Submitted 10 July, 2017;
originally announced July 2017.
-
Computing Exact and Approximate Blocking Probabilities in Elastic Optical Networks
Authors:
Sandeep Kumar Singh,
Admela Jukan
Abstract:
In this paper, we propose the first exact Markov model for connection blocking analysis in elastic optical networks, based on the occupancy status of spectrum slices on all links due to arrivals and departures of various classes of connections in a network. Since the complexity of the exact Markov model grows exponentially with the link capacity, number of links, routes, and classes of demands, we…
▽ More
In this paper, we propose the first exact Markov model for connection blocking analysis in elastic optical networks, based on the occupancy status of spectrum slices on all links due to arrivals and departures of various classes of connections in a network. Since the complexity of the exact Markov model grows exponentially with the link capacity, number of links, routes, and classes of demands, we further advance the state-of-the-art in computing approximate blocking probability in elastic optical networks and propose two novel approximations, i.e., load-independent and load-dependent. These approximations are used to compute state-dependent per-class connection setup rates in multi-class elastic optical networks with or without spectrum converters by taking into account the spectrum fragmentation factor in each state. We validate approximation analysis by exact and/or simulation results, and show that load-independent and load-dependent approximations can be more accurately used than previously proposed approximations, under a random-fit (RF) and a first-fit (FF) spectrum allocation policies. The approximate results match closely with the exact model, for smaller networks, and with the simulations under a variety of network scenarios.
△ Less
Submitted 4 June, 2018; v1 submitted 23 June, 2017;
originally announced June 2017.
-
Balancing the Migration of Virtual Network Functions with Replications in Data Centers
Authors:
Francisco Carpio,
Admela Jukan,
Rastin Pries
Abstract:
The Network Function Virtualization (NFV) paradigm is enabling flexibility, programmability and implementation of traditional network functions into generic hardware, in form of the so-called Virtual Network Functions (VNFs). Today, cloud service providers use Virtual Machines (VMs) for the instantiation of VNFs in the data center (DC) networks. To instantiate multiple VNFs in a typical scenario o…
▽ More
The Network Function Virtualization (NFV) paradigm is enabling flexibility, programmability and implementation of traditional network functions into generic hardware, in form of the so-called Virtual Network Functions (VNFs). Today, cloud service providers use Virtual Machines (VMs) for the instantiation of VNFs in the data center (DC) networks. To instantiate multiple VNFs in a typical scenario of Service Function Chains (SFCs), many important objectives need to be met simultaneously, such as server load balancing, energy efficiency and service execution time. The well-known \emph{VNF placement} problem requires solutions that often consider \emph{migration} of virtual machines (VMs) to meet this objectives. Ongoing efforts, for instance, are making a strong case for migrations to minimize energy consumption, while showing that attention needs to be paid to the Quality of Service (QoS) due to service interruptions caused by migrations. To balance the server allocation strategies and QoS, we propose using \emph{replications} of VNFs to reduce migrations in DC networks. We propose a Linear Programming (LP) model to study a trade-off between replications, which while beneficial to QoS require additional server resources, and migrations, which while beneficial to server load management can adversely impact the QoS. The results show that, for a given objective, the replications can reduce the number of migrations and can also enable a better server and data center network load balancing.
△ Less
Submitted 28 September, 2017; v1 submitted 16 May, 2017;
originally announced May 2017.
-
Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Authors:
Francisco Carpio,
Wolgang Bziuk,
Admela Jukan
Abstract:
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains (SFCs), a common cloud an…
▽ More
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains (SFCs), a common cloud and network service approach today. The placement of these chained functions increases the **-pong traffic between VNFs, directly affecting to the efficiency of bandwidth utilization. The optimization of the placement of these VNFs is a challenge as also other factors need to be considered, such as the resource utilization. To address this issue, we study the problem of VNF placement with replications, and especially the potential of VNFs replications to help load balance the network, while the server utilization is minimized. In this paper we present a Linear Programming (LP) model for the optimum placement of functions finding a trade-off between the minimization of two objectives: the link utilization and CPU resource usage. The results show how the model load balance the utilization of all links in the network using minimum resources.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
What is a Fog Node A Tutorial on Current Concepts towards a Common Definition
Authors:
Eva Marin Tordera,
Xavi Masip-Bruin,
Jordi Garcia-Alminana,
Admela Jukan,
Guang-Jie Ren,
Jiafeng Zhu,
Josep Farre
Abstract:
Fog computing has emerged as a promising technology that can bring the cloud applications closer to the physical IoT devices at the network edge. While it is widely known what cloud computing is, and how data centers can build the cloud infrastructure and how applications can make use of this infrastructure, there is no common picture on what fog computing and a fog node, as its main building bloc…
▽ More
Fog computing has emerged as a promising technology that can bring the cloud applications closer to the physical IoT devices at the network edge. While it is widely known what cloud computing is, and how data centers can build the cloud infrastructure and how applications can make use of this infrastructure, there is no common picture on what fog computing and a fog node, as its main building block, really is. One of the first attempts to define a fog node was made by Cisco, qualifying a fog computing system as a mini-cloud, located at the edge of the network and implemented through a variety of edge devices, interconnected by a variety, mostly wireless, communication technologies. Thus, a fog node would be the infrastructure implementing the said mini-cloud. Other proposals have their own definition of what a fog node is, usually in relation to a specific edge device, a specific use case or an application. In this paper, we first survey the state of the art in technologies for fog computing nodes as building blocks of fog computing, paying special attention to the contributions that analyze the role edge devices play in the fog node definition. We summarize and compare the concepts, lessons learned from their implementation, and show how a conceptual framework is emerging towards a unifying fog node definition. We focus on core functionalities of a fog node as well as in the accompanying opportunities and challenges towards their practical realization in the near future.
△ Less
Submitted 28 November, 2016;
originally announced November 2016.
-
Practical Privacy in WDM Networks with All-Optical Layered Encryption
Authors:
Anna Engelmann,
Admela Jukan
Abstract:
Privacy in form of anonymous communication could be comparably both faster and harder to break in optical routers than in today's anonymous IP networks based on The Onion Routing (Tor). Implementing the practical privacy alloptically,however, is not straightforward, as it requires key generation in each anonymization node to avoid distribution of long keys, and layered encryption, both at the opti…
▽ More
Privacy in form of anonymous communication could be comparably both faster and harder to break in optical routers than in today's anonymous IP networks based on The Onion Routing (Tor). Implementing the practical privacy alloptically,however, is not straightforward, as it requires key generation in each anonymization node to avoid distribution of long keys, and layered encryption, both at the optical line rate. Due to the unavailability of cryptographically strong optical key generation and encryption components, not only a layered encryption is a challenge, but an optical encryption in general. In this paper, we address the challenges of optical anonymous networking for the first time from the system's perspective, and discuss options for practical implementation of all-optical layered encryption. To this end, we propose an optical anonymization component realized with the state-of-the-art optical XOR logic and optical Linear Feedback Shift Registers (oLFSRs). Given that LFSR alone is known for its weak cryptographic security due to its linear properties, we propose an implementation with parallel oLFSRs and analyze the resulting computational security. The results show that proposed optical anonymization component is promising as it can be practically realized to provide a high computational security against deanonymization (privacy) attack.
△ Less
Submitted 28 October, 2016;
originally announced October 2016.