-
Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration
Authors:
Joberto S. B. Martins,
Tereza C. Carvalho,
Rodrigo Moreira,
Cristiano Both,
Adnei Donatti,
João H. Corrêa,
José A. Suruagy,
Sand L. Corrêa,
Antonio J. G. Abelem,
Moisés R. N. Ribeiro,
Jose-Marcos Nogueira,
Luiz C. S. Magalhães,
Juliano Wickboldt,
Tiago Ferreto,
Ricardo Mello,
Rafael Pasquini,
Marcos Schwarz,
Leobino N. Sampaio,
Daniel F. Macedo,
José F. de Rezende,
Kleber V. Cardoso,
Flávio O. Silva
Abstract:
Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed re…
▽ More
Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed resources among dynamic, demanding clients with highly distinct application requirements. Various standardization organizations, like 3GPP's proposal for new generation networks and state-of-the-art 5G/6G research projects, are proposing new NS architectures. However, new NS architectures have to deal with an extensive range of requirements that inherently result in having NS architecture proposals typically fulfilling the needs of specific sets of domains with commonalities. The Slicing Future Internet Infrastructures (SFI2) architecture proposal explores the gap resulting from the diversity of NS architectures target domains by proposing a new NS reference architecture with a defined focus on integrating experimental networks and enhancing the NS architecture with Machine Learning (ML) native optimizations, energy-efficient slicing, and slicing-tailored security functionalities. The SFI2 architectural main contribution includes the utilization of the slice-as-a-service paradigm for end-to-end orchestration of resources across multi-domains and multi-technology experimental networks. In addition, the SFI2 reference architecture instantiations will enhance the multi-domain and multi-technology integrated experimental network deployment with native ML optimization, energy-efficient aware slicing, and slicing-tailored security functionalities for the practical domain.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
NDN4IVC: A Framework for Simulating and Testing of Applications in Vehicular Named Data Networking
Authors:
Guilherme B. Araujo,
Maycon L. M. Peixoto,
Leobino N. Sampaio
Abstract:
This paper presents a customized framework (NDN4IVC) for simulating and testing intelligent transportation systems and applications in vehicular named-data networking (V-NDN). The project uses two popular simulators in the literature for VANET simulation, a network simulator based on discrete events (Ns-3), with ndnSIM module installed, and Sumo, a simulator for urban mobility. NDN4IVC allows bidi…
▽ More
This paper presents a customized framework (NDN4IVC) for simulating and testing intelligent transportation systems and applications in vehicular named-data networking (V-NDN). The project uses two popular simulators in the literature for VANET simulation, a network simulator based on discrete events (Ns-3), with ndnSIM module installed, and Sumo, a simulator for urban mobility. NDN4IVC allows bidirectional communication between Sumo and Ns-3 and integrates the NDN stack and the NFD (NDN Forwarding Daemon) code. The project also brings together a comprehensive set of codes, models, functionalities, and technologies to improve proposals and protocols in V-NDN.
△ Less
Submitted 9 July, 2021; v1 submitted 1 July, 2021;
originally announced July 2021.
-
A SDN/OpenFlow Framework for Dynamic Resource Allocation based on Bandwidth Allocation Model
Authors:
Eliseu Silva Torres,
Rafael F. Reale,
Leobino N. Sampaio,
Joberto S. B. Martins
Abstract:
The communication network context in actual systems like 5G, cloud and IoT (Internet of Things), presents an ever-increasing number of users, applications, and services that are highly distributed with distinct and heterogeneous communications requirements. Resource allocation in this context requires dynamic, efficient, and customized solutions and Bandwidth Allocation Models (BAMs) are an altern…
▽ More
The communication network context in actual systems like 5G, cloud and IoT (Internet of Things), presents an ever-increasing number of users, applications, and services that are highly distributed with distinct and heterogeneous communications requirements. Resource allocation in this context requires dynamic, efficient, and customized solutions and Bandwidth Allocation Models (BAMs) are an alternative to support this new trend. This paper proposes the BAMSDN (Bandwidth Allocation Model through Software-Defined Networking) framework that dynamically allocates resources (bandwidth) for a MPLS (MultiProtocol Label Switching) network using a SDN (Software-Defined Networking)/OpenFlow strategy with BAM. The framework adopts an innovative implementation approach for BAM systems by controlling the MPLS network using SDN with OpenFlow. Experimental results suggest that using SDN/OpenFlow with BAM for bandwidth allocation does have effective advantages for MPLS networks requiring flexible resource sharing among applications and facilitates the migration path to a SDN/OpenFlow network.
△ Less
Submitted 31 January, 2021;
originally announced February 2021.
-
Connected greedy coloring $H$-free graphs
Authors:
Esdras Mota,
Ana Silva,
Leonardo Sampaio
Abstract:
A connected ordering $(v_1, v_2, \ldots, v_n)$ of $V(G)$ is an ordering of the vertices such that $v_i$ has at least one neighbour in $\{v_1, \ldots, v_{i - 1}\}$ for every $i \in \{2, \ldots, n\}$. A connected greedy coloring (CGC for short) is a coloring obtained by applying the greedy algorithm to a connected ordering. This has been first introduced in 1989 by Hertz and de Werra, but still very…
▽ More
A connected ordering $(v_1, v_2, \ldots, v_n)$ of $V(G)$ is an ordering of the vertices such that $v_i$ has at least one neighbour in $\{v_1, \ldots, v_{i - 1}\}$ for every $i \in \{2, \ldots, n\}$. A connected greedy coloring (CGC for short) is a coloring obtained by applying the greedy algorithm to a connected ordering. This has been first introduced in 1989 by Hertz and de Werra, but still very little is known about this problem. An interesting aspect is that, contrary to the traditional greedy coloring, it is not always true that a graph has a connected ordering that produces an optimal coloring; this motivates the definition of the connected chromatic number of $G$, which is the smallest value $χ_c(G)$ such that there exists a CGC of $G$ with $χ_c(G)$ colors. An even more interesting fact is that $χ_c(G) \le χ(G)+1$ for every graph $G$ (Benevides et. al. 2014).
In this paper, in the light of the dichotomy for the coloring problem restricted to $H$-free graphs given by Král et.al. in 2001, we are interested in investigating the problems of, given an $H$-free graph $G$: (1). deciding whether $χ_c(G)=χ(G)$; and (2). given also a positive integer $k$, deciding whether $χ_c(G)\le k$. We have proved that Problem (2) has the same dichotomy as the coloring problem (i.e., it is polynomial when $H$ is an induced subgraph of $P_4$ or of $P_3+K_1$, and it is NP-complete otherwise). As for Problem (1), we have proved that $χ_c(G) = χ(G)$ always hold when $G$ is an induced subgraph of $P_5$ or of $P_4+K_1$, and that it is NP-hard to decide whether $χ_c(G)=χ(G)$ when $H$ is not a linear forest or contains an induced $P_9$. We mention that some of the results actually involve fixed $k$ and fixed $χ(G)$.
△ Less
Submitted 24 July, 2018;
originally announced July 2018.
-
Secure and Privacy-Aware Data Dissemination for Cloud-Based Applications
Authors:
Lilia Sampaio,
Fábio Silva,
Amanda Souza,
Andrey Brito,
Pascal Felber
Abstract:
In this paper we propose a data dissemination platform that supports data security and different privacy levels even when the platform and the data are hosted by untrusted infrastructures. The proposed system aims at enabling an application ecosystem that uses off-the-shelf trusted platforms (in this case, Intel SGX), so that users may allow or disallow third parties to access the live data stream…
▽ More
In this paper we propose a data dissemination platform that supports data security and different privacy levels even when the platform and the data are hosted by untrusted infrastructures. The proposed system aims at enabling an application ecosystem that uses off-the-shelf trusted platforms (in this case, Intel SGX), so that users may allow or disallow third parties to access the live data stream with a specific sensitivity-level. Moreover, this approach does not require users to manage the encryption keys directly. Our experiments show that such an approach is indeed practical for medium scale systems, where participants disseminate small volumes of data at a time, such as in smart grids and IoT environments.
△ Less
Submitted 2 March, 2018;
originally announced March 2018.
-
On the b-continuity of the lexicographic product of graphs
Authors:
Cláudia Linhares Sales,
Leonardo Sampaio,
Ana Silva
Abstract:
A b-coloring of the vertices of a graph is a proper coloring where each color class contains a vertex which is adjacent to each other color class. The b-chromatic number of $G$ is the maximum integer $χ_b(G)$ for which $G$ has a b-coloring with $χ_b(G)$ colors. A graph $G$ is b-continuous if $G$ has a b-coloring with $k$ colors, for every integer $k$ in the interval $[χ(G),χ_b(G)]$. It is known th…
▽ More
A b-coloring of the vertices of a graph is a proper coloring where each color class contains a vertex which is adjacent to each other color class. The b-chromatic number of $G$ is the maximum integer $χ_b(G)$ for which $G$ has a b-coloring with $χ_b(G)$ colors. A graph $G$ is b-continuous if $G$ has a b-coloring with $k$ colors, for every integer $k$ in the interval $[χ(G),χ_b(G)]$. It is known that not all graphs are b-continuous. Here, we investigate whether the lexicographic product $G[H]$ of b-continuous graphs $G$ and $H$ is also b-continuous. Using homomorphisms, we provide a new lower bound for $χ_b(G[H])$, namely $χ_b(G[K_t])$, where $t=χ_b(H)$, and prove that if $G[K_\ell]$ is b-continuous for every positive integer $\ell$, then $G[H]$ admits a b-coloring with $k$ colors, for every $k$ in the interval $[χ(G[H]),χ_b(G[K_t])]$. We also prove that $G[K_\ell]$ is b-continuous, for every positive integer $\ell$, whenever $G$ is a $P_4$-sparse graph, and we give further results on the b-spectrum of $G[K_\ell]$, when $G$ is chordal.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Energy efficient OFDMA networks maintaining statistical QoS guarantees for delay-sensitive traffic
Authors:
Taufik Abrão,
Lucas D. H. Sampaio,
Shaoshi Yang,
Kent Tsz Kan Cheung,
Paul Jean E. Jeszensky,
Lajos Hanzo
Abstract:
An energy-efficient design is proposed under specific statistical quality-of-service (QoS) guarantees for delay-sensitive traffic in the downlink orthogonal frequency-division multiple-access (OFDMA) networks. This design is based on Wu's $\textit{effective capacity}$ (EC) concept [1], which characterizes the maximum throughput of a system subject to statistical delay-QoS requirements at the data-…
▽ More
An energy-efficient design is proposed under specific statistical quality-of-service (QoS) guarantees for delay-sensitive traffic in the downlink orthogonal frequency-division multiple-access (OFDMA) networks. This design is based on Wu's $\textit{effective capacity}$ (EC) concept [1], which characterizes the maximum throughput of a system subject to statistical delay-QoS requirements at the data-link layer. In the particular context considered, our main contributions consist of quantifying the $\textit{effective energy-efficiency}$ (EEE)-versus-EC tradeoff and characterizing the delay-sensitive traffic as a function of the QoS-exponent $θ$, which expresses the exponential decay rate of the delay-QoS violation probabilities. Upon exploiting the properties of fractional programming, the originally quasi-concave EEE optimization problem having a fractional form is transformed into a subtractive optimization problem by applying Dinkelbach's method. As a result, an iterative inner-outer loop based resource allocation algorithm is conceived for efficiently solving the transformed EEE optimization problem. Our simulation results demonstrate that the proposed scheme converges within a few Dinkelbach algorithm's iterations to the desired solution accuracy. Furthermore, the impact of the circuitry power, of the QoS-exponent and of the power amplifier inefficiency is characterized numerically. These results reveal that the optimally allocated power maximizing the EEE decays exponentially with respect to both the circuitry power and the QoS-exponent, whilst decaying linearly with respect to the power amplifier inefficiency.
△ Less
Submitted 12 February, 2016;
originally announced February 2016.
-
Considering Human Aspects on Strategies for Designing and Managing Distributed Human Computation
Authors:
Lesandro Ponciano,
Francisco Brasileiro,
Nazareno Andrade,
Lívia Sampaio
Abstract:
A human computation system can be viewed as a distributed system in which the processors are humans, called workers. Such systems harness the cognitive power of a group of workers connected to the Internet to execute relatively simple tasks, whose solutions, once grouped, solve a problem that systems equipped with only machines could not solve satisfactorily. Examples of such systems are Amazon Me…
▽ More
A human computation system can be viewed as a distributed system in which the processors are humans, called workers. Such systems harness the cognitive power of a group of workers connected to the Internet to execute relatively simple tasks, whose solutions, once grouped, solve a problem that systems equipped with only machines could not solve satisfactorily. Examples of such systems are Amazon Mechanical Turk and the Zooniverse platform. A human computation application comprises a group of tasks, each of them can be performed by one worker. Tasks might have dependencies among each other. In this study, we propose a theoretical framework to analyze such type of application from a distributed systems point of view. Our framework is established on three dimensions that represent different perspectives in which human computation applications can be approached: quality-of-service requirements, design and management strategies, and human aspects. By using this framework, we review human computation in the perspective of programmers seeking to improve the design of human computation applications and managers seeking to increase the effectiveness of human computation infrastructures in running such applications. In doing so, besides integrating and organizing what has been done in this direction, we also put into perspective the fact that the human aspects of the workers in such systems introduce new challenges in terms of, for example, task assignment, dependency management, and fault prevention and tolerance. We discuss how they are related to distributed systems and other areas of knowledge.
△ Less
Submitted 6 June, 2015;
originally announced June 2015.
-
Energy and Spectral Efficiencies Trade-off with Filter Optimization in Multiple Access Interference-Aware
Authors:
Álvaro R. C. Souza,
Taufik Abrão,
Lucas H. Sampaio,
Paul Jean E. Jeszensky
Abstract:
This work analyzes the optimized deployment of two resources scarcely available in mobile multiple access systems, i.e., spectrum and energy, as well as the impact of filter optimization in the system performance. Taking in perspective the two conflicting metrics, throughput maximization and power consumption minimization, the distributed energy efficiency (EE) cost function is formulated. Further…
▽ More
This work analyzes the optimized deployment of two resources scarcely available in mobile multiple access systems, i.e., spectrum and energy, as well as the impact of filter optimization in the system performance. Taking in perspective the two conflicting metrics, throughput maximization and power consumption minimization, the distributed energy efficiency (EE) cost function is formulated. Furthermore, the best energy-spectral efficiencies (EE-SE) trade-off is achieved when each node allocates exactly the power necessary to attain the best SINR response, which guarantees the maximal EE. To demonstrate the validity of our analysis, two low-complexity energy-spectral efficient algorithms, based on distributed instantaneous SINR level are developed, and the impact of single and multiuser detection filters on the EE-SE trade-off is analyzed.
△ Less
Submitted 19 June, 2012;
originally announced June 2012.
-
Power-Rate Allocation in DS/CDMA Based on Discretized Verhulst Equilibrium
Authors:
Lucas Dias H. Sampaio,
Moisés F. Lima,
Mario Lemes Proença Jr,
Taufik Abrão
Abstract:
This paper proposes to extend the discrete Verhulst power equilibrium approach, previously suggested in [1], to the power-rate optimal allocation problem. Multirate users associated to different types of traffic are aggregated to distinct user' classes, with the assurance of minimum rate allocation per user and QoS. Herein, Verhulst power allocation algorithm was adapted to the single-input-single…
▽ More
This paper proposes to extend the discrete Verhulst power equilibrium approach, previously suggested in [1], to the power-rate optimal allocation problem. Multirate users associated to different types of traffic are aggregated to distinct user' classes, with the assurance of minimum rate allocation per user and QoS. Herein, Verhulst power allocation algorithm was adapted to the single-input-single-output DS/CDMA jointly power-rate control problem. The analysis was carried out taking into account the convergence time, quality of solution, in terms of the normalized squared error (NSE), when compared with the analytical solution based on interference matrix inverse, and computational complexity. Numerical results demonstrate the validity of the proposed resource allocation methodology.
△ Less
Submitted 22 December, 2010;
originally announced December 2010.