-
Autonomous Integration of TSN-unaware Applications with QoS Requirements in TSN Networks
Authors:
Moritz Flüchter,
Steffen Lindner,
Lukas Osswald,
Jérôme Arnaud,
Michael Menth
Abstract:
Modern industrial networks transport both best-effort and real-time traffic. Time-Sensitive Networking (TSN) was introduced by the IEEE TSN Task Group as an enhancement to Ethernet to provide high quality of service (QoS) for real-time traffic. In a TSN network, applications signal their QoS requirements to the network before transmitting data. The network then allocates resources to meet these re…
▽ More
Modern industrial networks transport both best-effort and real-time traffic. Time-Sensitive Networking (TSN) was introduced by the IEEE TSN Task Group as an enhancement to Ethernet to provide high quality of service (QoS) for real-time traffic. In a TSN network, applications signal their QoS requirements to the network before transmitting data. The network then allocates resources to meet these requirements. However, TSN-unaware applications can neither perform this registration process nor profit from TSN's QoS benefits. The contributions of this paper are twofold. First, we introduce a novel network architecture in which an additional device autonomously signals the QoS requirements of TSN-unaware applications to the network. Second, we propose a processing method to detect real-time streams in a network and extract the necessary information for the TSN stream signaling. It leverages a Deep Recurrent Neural Network (DRNN) to detect periodic traffic, extracts an accurate traffic description, and uses traffic classification to determine the source application. As a result, our proposal allows TSN-unaware applications to benefit from TSNs QoS guarantees. Our evaluations underline the effectiveness of the proposed architecture and processing method.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking
Authors:
Fabian Ihle,
Steffen Lindner,
Michael Menth
Abstract:
Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication, including the Credit-Based Shaper (CBS) for prioritized scheduling and the Time-Aware Shaper (TAS) for scheduled traffic. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Str…
▽ More
Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication, including the Credit-Based Shaper (CBS) for prioritized scheduling and the Time-Aware Shaper (TAS) for scheduled traffic. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Stream Filtering and Policing (PSFP) has been defined. For credit-based metering, well-known token bucket policers are applied. However, time-based metering requires time-dependent switch behavior and time synchronization with sub-microsecond precision. While TSN-capable switches support various TSN traffic sha** mechanisms, a full implementation of PSFP is still not available. To bridge this gap, we present a P4-based implementation of PSFP on a 100 Gb/s per port hardware switch. We explain the most interesting aspects of the PSFP implementation whose code is available on GitHub. We demonstrate credit-based and time-based policing and synchronization capabilities to validate the functionality and effectiveness of P4-PSFP. The implementation scales up to 35840 streams depending on the stream identification method. P4-PSFP can be used in practice as long as appropriate TSN switches lack this function. Moreover, its implementation may be helpful for other P4-based hardware implementations that require time synchronization.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Exploring the Protein Sequence Space with Global Generative Models
Authors:
Sergio Romero-Romero,
Sebastian Lindner,
Noelia Ferruz
Abstract:
Recent advancements in specialized large-scale architectures for training image and language have profoundly impacted the field of computer vision and natural language processing (NLP). Language models, such as the recent ChatGPT and GPT4 have demonstrated exceptional capabilities in processing, translating, and generating human languages. These breakthroughs have also been reflected in protein re…
▽ More
Recent advancements in specialized large-scale architectures for training image and language have profoundly impacted the field of computer vision and natural language processing (NLP). Language models, such as the recent ChatGPT and GPT4 have demonstrated exceptional capabilities in processing, translating, and generating human languages. These breakthroughs have also been reflected in protein research, leading to the rapid development of numerous new methods in a short time, with unprecedented performance. Language models, in particular, have seen widespread use in protein research, as they have been utilized to embed proteins, generate novel ones, and predict tertiary structures. In this book chapter, we provide an overview of the use of protein generative models, reviewing 1) language models for the design of novel artificial proteins, 2) works that use non-Transformer architectures, and 3) applications in directed evolution approaches.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
A Survey of Scheduling Algorithms for the Time-Aware Shaper in Time-Sensitive Networking (TSN)
Authors:
Thomas Stüber,
Lukas Osswald,
Steffen Lindner,
Michael Menth
Abstract:
Time-Sensitive Networking (TSN) is an enhancement of Ethernet which provides various mechanisms for real-time communication. Time-triggered (TT) traffic represents periodic data streams with strict real-time requirements. Amongst others, TSN supports scheduled transmission of TT streams, i.e., the transmission of their frames by end stations is coordinated in such a way that none or very little qu…
▽ More
Time-Sensitive Networking (TSN) is an enhancement of Ethernet which provides various mechanisms for real-time communication. Time-triggered (TT) traffic represents periodic data streams with strict real-time requirements. Amongst others, TSN supports scheduled transmission of TT streams, i.e., the transmission of their frames by end stations is coordinated in such a way that none or very little queuing delay occurs in intermediate nodes. TSN supports multiple priority queues per egress port. The TAS uses so-called gates to explicitly allow and block these queues for transmission on a short periodic timescale. The TAS is utilized to protect scheduled traffic from other traffic to minimize its queuing delay. In this work, we consider scheduling in TSN which comprises the computation of periodic transmission instants at end stations and the periodic opening and closing of queue gates.
In this paper, we first give a brief overview of TSN features and standards. We state the TSN scheduling problem and explain common extensions which also include optimization problems. We review scheduling and optimization methods that have been used in this context. Then, the contribution of currently available research work is surveyed. We extract and compile optimization objectives, solved problem instances, and evaluation results. Research domains are identified, and specific contributions are analyzed. Finally, we discuss potential research directions and open problems.
△ Less
Submitted 27 March, 2023; v1 submitted 20 November, 2022;
originally announced November 2022.
-
A Tutorial on Trace-based Simulations of Mobile Ad-hoc Networks on the Example of Aeronautical Communications
Authors:
Musab Ahmed Eltayeb Ahmed,
Konrad Fuger,
Sebastian Lindner,
Fatema Khan,
Andreas Timm-Giel
Abstract:
The OMNeT++ simulator is well-suited for the simulation of randomized user behavior in communication networks. However, there are scenarios, where such a random model is unsuited to evaluate a communication system, and this paper attempts to highlight such a case. Using this example of ad-hoc communication between aircraft mid-flight, a tutorial-style description is attempted that shall show how t…
▽ More
The OMNeT++ simulator is well-suited for the simulation of randomized user behavior in communication networks. However, there are scenarios, where such a random model is unsuited to evaluate a communication system, and this paper attempts to highlight such a case. Using this example of ad-hoc communication between aircraft mid-flight, a tutorial-style description is attempted that shall show how the OMNeT++ simulator can be used when a wealth of real-world trace data is available. In particular, it is described how mobility trace files can be directly used within OMNeT++, and how to link the generation of data messages to this mobility data. This is explained via an example simulation that evaluates a communication network in which an aircraft notifies the ground control when it enters or leaves a specific geographic region. Additionally, a novel trace-based application has been developed to achieve this link between mobility and message generation. Furthermore, a new TDMA-based medium access protocol for decentralized communication networks is presented, which is oracle-based and thus allows a TDMA-like behavior of medium access without causing any overhead; it can be useful when upper-layer protocols should be evaluated under the assumption of TDMA-like behavior, but isolated from the effects of a full-fledged TDMA protocol. Finally, physical layer behavior is often either overly simplistic or overly computationally expensive. For the latter case, when a detailed channel model is available but its evaluation requires prohibitive computational effort, then averaging its behavior into trace data can find a middle ground between efficient evaluation and realistic representation. Hence, a novel trace-based radio model has been developed that makes use of an SNR to PER map**. In the spirit of open science, all implementations have been made available under open licenses.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Agent-based simulations for protecting nursing homes with prevention and vaccination strategies
Authors:
Jana Lasser,
Johannes Zuber,
Johannes Sorger,
Elma Dervic,
Katharina Ledebur,
Simon David Lindner,
Elisabeth Klager,
Maria Kletečka-Pulker,
Harald Willschke,
Katrin Stangl,
Sarah Stadtmann,
Christian Haslinger,
Peter Klimek,
Thomas Wochele-Thoma
Abstract:
Due to its high lethality amongst the elderly, the safety of nursing homes has been of central importance during the COVID-19 pandemic. With test procedures becoming available at scale, such as antigen or RT-LAMP tests, and increasing availability of vaccinations, nursing homes might be able to safely relax prohibitory measures while controlling the spread of infections (meaning an average of one…
▽ More
Due to its high lethality amongst the elderly, the safety of nursing homes has been of central importance during the COVID-19 pandemic. With test procedures becoming available at scale, such as antigen or RT-LAMP tests, and increasing availability of vaccinations, nursing homes might be able to safely relax prohibitory measures while controlling the spread of infections (meaning an average of one or less secondary infections per index case). Here, we develop a detailed agent-based epidemiological model for the spread of SARS-CoV-2 in nursing homes to identify optimal prevention strategies. The model is microscopically calibrated to high-resolution data from nursing homes in Austria, including detailed social contact networks and information on past outbreaks. We find that the effectiveness of mitigation testing depends critically on the timespan between test and test result, the detection threshold of the viral load for the test to give a positive result, and the screening frequencies of residents and employees. Under realistic conditions and in absence of an effective vaccine, we find that preventive screening of employees only might be sufficient to control outbreaks in nursing homes, provided that turnover times and detection thresholds of the tests are low enough. If vaccines that are moderately effective against infection and transmission are available, control is achieved if 80% or more of the inhabitants are vaccinated, even if no preventive testing is in place and residents are allowed to have visitors. Since these results strongly depend on vaccine efficacy against infection, retention of testing infrastructures, regular voluntary screening and sequencing of virus genomes is advised to enable early identification of new variants of concern.
△ Less
Submitted 14 June, 2021; v1 submitted 16 November, 2020;
originally announced April 2021.
-
A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research
Authors:
Frederik Hauser,
Marco Häberle,
Daniel Merling,
Steffen Lindner,
Vladimir Gurevich,
Florian Zeiger,
Reinhard Frank,
Michael Menth
Abstract:
Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane application programming interfaces (APIs) which may be leveraged by user-defined software-defined networking (SDN) control. This offers great flexibility for network customization, be it for specialized, commercial appliances, e.g., in 5G or data center networks, or f…
▽ More
Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane application programming interfaces (APIs) which may be leveraged by user-defined software-defined networking (SDN) control. This offers great flexibility for network customization, be it for specialized, commercial appliances, e.g., in 5G or data center networks, or for rapid prototy** in industrial and academic research. Programming protocol-independent packet processors (P4) has emerged as the currently most widespread abstraction, programming language, and concept for data plane programming. It is developed and standardized by an open community, and it is supported by various software and hardware platforms. In the first part of this paper we give a tutorial of data plane programming models, the P4 programming language, architectures, compilers, targets, and data plane APIs. We also consider research efforts to advance P4 technology. In the second part, we categorize a large body of literature of P4-based applied research into different research domains, summarize the contributions of these papers, and extract prototypes, target platforms, and source code availability. For each research domain, we analyze how the reviewed works benefit from P4's core features. Finally, we discuss potential next steps based on our findings.
△ Less
Submitted 4 August, 2021; v1 submitted 26 January, 2021;
originally announced January 2021.
-
P4-Protect: 1+1 Path Protection for P4
Authors:
Steffen Lindner,
Daniel Merling,
Marco Häberle,
Michael Menth
Abstract:
1+1 protection is a method to secure traffic between two nodes against failures in between. The sending node duplicates the traffic and forwards it over two disjoint paths. The receiving node assures that only a single copy of the traffic is further forwarded to its destination. In contrast to other protection schemes, this method prevents almost any packet loss in case of failures. 1+1 protection…
▽ More
1+1 protection is a method to secure traffic between two nodes against failures in between. The sending node duplicates the traffic and forwards it over two disjoint paths. The receiving node assures that only a single copy of the traffic is further forwarded to its destination. In contrast to other protection schemes, this method prevents almost any packet loss in case of failures. 1+1 protection is usually applied on the optical layer, on Ethernet, or on MPLS.
In this work we propose the application of 1+1 for P4-based IP networks. We define an 1+1 protection header for that purpose. We describe the behavior of sending and receiving nodes and provide a P4-based implementation for the BMv2 software switch and the hardware switch Tofino Edgecore Wedge 100BF-32X. We illustrate how to secure traffic, e.g. individual TCP flows, on the Internet with this approach. Finally, we present performance results showing that the P4-based implementation efficiently works on the Tofino Edgecore Wedge 100BF-32X.
△ Less
Submitted 3 February, 2020; v1 submitted 30 January, 2020;
originally announced January 2020.
-
Learning restricted Bayesian network structures
Authors:
Raymond Hemmecke,
Silvia Lindner,
Milan Studený
Abstract:
Bayesian networks are basic graphical models, used widely both in statistics and artificial intelligence. These statistical models of conditional independence structure are described by acyclic directed graphs whose nodes correspond to (random) variables in consideration. A quite important topic is the learning of Bayesian network structures, which is determining the best fitting statistical model…
▽ More
Bayesian networks are basic graphical models, used widely both in statistics and artificial intelligence. These statistical models of conditional independence structure are described by acyclic directed graphs whose nodes correspond to (random) variables in consideration. A quite important topic is the learning of Bayesian network structures, which is determining the best fitting statistical model on the basis of given data. Although there are learning methods based on statistical conditional independence tests, contemporary methods are mainly based on maximization of a suitable quality criterion that evaluates how good the graph explains the occurrence of the observed data. This leads to a nonlinear combinatorial optimization problem that is in general NP-hard to solve. In this paper we deal with the complexity of learning restricted Bayesian network structures, that is, we wish to find network structures of highest score within a given subset of all possible network structures. For this, we introduce a new unique algebraic representative for these structures, called the characteristic imset. We show that these imsets are always 0-1-vectors and that they have many nice properties that allow us to simplify long proofs for some known results and to easily establish new complexity results for learning restricted Bayes network structures.
△ Less
Submitted 30 November, 2010;
originally announced November 2010.