Article
Computer Science, Hardware & Architecture
Josue Castaneda, Saul E. Pomares Hernandez, Sami Yangui, Julio C. Perez Sansalvador, Lil M. Rodriguez Henriquez, Khalil Drira
Summary: NFV virtualizes network appliances by running software on servers, enabling more flexible and scalable network services. Implementing shared network services in multi-domain federations presents challenges, as functional and non-functional dependencies must be considered for consistent lifecycle operations. This paper introduces a distributed approach to ensure consistency during dependent reconfiguration, the first method to support consistent execution of dependent reconfiguration operations for VNF-based network services.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
M. Gharbaoui, C. Contoli, G. Davoli, D. Borsatti, G. Cuffaro, F. Paganelli, W. Cerroni, P. Cappanera, B. Martini
Summary: This paper presents a service chaining orchestration system called LASH-5G, which simulates a typical 5G network deployment in distributed edge clouds and provides low-latency, adaptive, and reliable service chaining orchestration between clouds and network resource domains through SDN.
Article
Computer Science, Hardware & Architecture
Junyu Lai, Jiaqi Tian, Ke Zhang, Zheng Yang, Dingde Jiang
Summary: This paper introduces an innovative cloud-based network emulation platform that outperforms legacy network emulators in scalability, agility, and extensibility in large scale scenarios with lower costs. Docker containers are adopted as a supplement to virtual machines to emulate network nodes, and the platform's effectiveness and efficiency are validated through performance evaluations and case studies.
MOBILE NETWORKS & APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Josue Castaneda Cisneros, Saul E. Pomares Hernandez, Julio Cesar Perez Sansalvador, Lil Maria Rodriguez Henriquez, Sami Yangui, Khalil Drira
Summary: This paper introduces a coordination-free multi-domain orchestration algorithm for consistent shared VNF-FG reconfiguration. The algorithm skips the coordination phase, offers strong eventual consistency, and supports non-functional dependencies. It provides stronger guarantees compared to existing techniques.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Engineering, Electrical & Electronic
Josue Castaneda Cisneros, Sami Yangui, Saul E. Pomares Hernandez, Khalil Drira
Summary: This survey focuses on multi-domain orchestration works from an algorithmic perspective, classifying and evaluating algorithms by considering cooperative and competitive approaches. A taxonomy is proposed to classify works based on different life cycle tasks of network services and evaluate them according to defined key requirements, providing an overview of the current state of multi-domain orchestration algorithms. Future research directions are also identified based on the current perspective.
IEEE COMMUNICATIONS MAGAZINE
(2022)
Article
Computer Science, Theory & Methods
Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu
Summary: NFV is a new networking paradigm focusing on dynamic network function deployment, but existing studies lack effective solutions for security function enforcement. FuncE proposes a method for efficient real-time security function enforcement through unified dynamic flow and function scheduling, achieving near-optimal solutions and significantly reducing latency compared to existing solvers.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Carlos Manso, Pol Alemany, Ricard Vilalta, Raul Munoz, Ramon Casellas, Ricardo Martinez
Summary: This article introduces a Network Slicing solution and end-to-end service orchestration to help telecommunications operators simplify procedures and automate services. These solutions can better meet the high capacity and fast demand of Data Centers and 5G services.
IEICE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Computer Science, Theory & Methods
B. Martini, M. Gharbaoui, P. Castoldi
Summary: Network slicing is a key feature of 5G infrastructures that enables network operators to provide flexible and dynamic network services using NFV and SDN. Vertical industries are interested in the customization and flexibility offered by operators through network slicing, especially if SDN capabilities are included to programmatically connect their application components. This paper presents an intent-based deployment of a NFV orchestration stack that simplifies and automates the deployment of tenant-managed SDN-enabled network slices, while abstracting the underlying implementation details.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Interdisciplinary Applications
Jie Sun, Tianyu Wo, Xudong Liu, Rui Cheng, Xudong Mou, Xiaohui Guo, Haibin Cai, Rajkumar Buyya
Summary: Service Function Chain (SFC) simulators play a crucial role in the design and evaluation of deployment strategies in Multi-domain Service Networks (MDSN). However, existing simulators lack accuracy and comprehensive modeling of service functions. To overcome these drawbacks, we propose CloudSimSFC, a new SFC simulator that can simulate SFC run-time performance and evaluate deployment strategies accurately.
SIMULATION MODELLING PRACTICE AND THEORY
(2022)
Article
Computer Science, Hardware & Architecture
Lina Magoula, Sokratis Barmpounakis, Ioannis Stavrakakis, Nancy Alonistioti
Summary: NFV is crucial in 5G networks for flexible resource management, but challenges remain in meeting strict network performance requirements in industries like Industry 4.0 and IIoT.
Article
Computer Science, Artificial Intelligence
Hejun Xuan, Yi Zhou, Xuelin Zhao, Zhenghui Liu
Summary: Network function virtualization decouples traditional network function from dedicated hardware and promotes the transformation of network service deployment. This paper investigates the deployment problem of VNF service chain in SDN/NFV-Enabled Networks and proposes a real-time algorithm based on multi-agent deep reinforcement learning with self-adaption division strategy (MDRL-SaDS) to minimize energy consumption.
APPLIED SOFT COMPUTING
(2023)
Article
Computer Science, Information Systems
Marwa A. Abdelaal, Gamal A. Ebrahim, Wagdy R. Anis
Summary: The VNFRP approach aims to achieve load balancing over core links in NFV by considering multiple resource constraints. It significantly improves load balancing, reduces network energy consumption by more than 54%, and efficiently decreases SFC placement cost by over 67%.VNFRP is a scalable solution for large networking environments with fast response time and rapid convergence.
Article
Automation & Control Systems
Elaheh Vaezpour
Summary: This paper addresses the issue of switch migration in SDN/NFV-based 5G networks. It presents a multi-objective problem formulation and provides a mathematical-based solution method for the single-objective problem. Additionally, an extended DL approach is proposed for generating multiple mappings over multiple objectives. The verification results demonstrate the effectiveness and efficiency of the proposed multi-objective DL algorithm.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2023)
Article
Computer Science, Information Systems
Tingyu Li, Zuqing Zhu
Summary: This research focuses on optimizing the management reconfiguration of virtual network function service trees (vNF-STs) in a substrate network equipped with heterogeneous platforms. An integer linear programming (ILP) model is formulated to reduce the total resource usage and vNF migration cost during reconfiguration. A two-step algorithm is designed to reduce the time complexity of problem-solving. Extensive simulations demonstrate the effectiveness of the algorithms and their superiority over existing benchmarks.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2023)
Article
Computer Science, Information Systems
Yicen Liu, Hao Lu, Xi Li, Yang Zhang, Leiping Xi, Donghao Zhao
Summary: NFV and MEC are introduced to address challenges in meeting IoT application demands, with the SFC-DOP problem hindering the optimization of VNF placement and service path routing in IoT networks. A DRL-based framework and algorithm are proposed to efficiently deal with the SFC-DOP, showing outstanding performance compared to current benchmarks.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Samira Afzal, Christian Esteve Rothenberg, Vanessa Testoni, Prakash Kolan, Imed Bouazizi
Summary: Demand for video streaming content and multimedia services has increased dramatically, leading to challenges in providing high quality mobile video streaming services. Our proposed Content-Aware and Path-Aware (CAPA) scheduling strategy enhances video quality under different network conditions, showing improvements compared to other scheduling strategies.
Article
Computer Science, Information Systems
Tingting Yuan, Wilson da Rocha Neto, Christian Esteve Rothenberg, Katia Obraczka, Chadi Barakat, Thierry Turletti
Summary: This article introduces a novel dynamic controller assignment algorithm for Internet of Vehicles (IoV) services, utilizing cooperative multi-agent deep reinforcement learning. Simulation results demonstrate that the proposed approach outperforms existing methods by reducing control delay and packet loss.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Telecommunications
Ariel G. Castro, Arthur F. Lorenzon, Fabio D. Rossi, Roberto I. T. da Costa Filho, Fernando M. Ramos, Christian E. Rothenberg, Marcelo C. Luizelli
Summary: The study introduces a novel approach named PINT-I-2 for coordinating the generation and routing of probing packets to collect the required in-band network telemetry data, outperforming existing methods.
IEEE COMMUNICATIONS LETTERS
(2021)
Article
Engineering, Electrical & Electronic
Stuart Clayman, Augusto Neto, Fabio Verdi, Sand Correa, Silvio Sampaio, Ilias Sakelariou, Lefteris Mamatas, Rafael Pasquini, Kleber Cardoso, Francesco Tusa, Christian Rothenberg, Joan Serrat
Summary: Cloud-network slicing is a promising approach to serve vertical industries over multiple domains, but there are challenges in providing end-to-end slices due to complex business and engineering requirements. The NECOS project presents a reference architecture and practical realization of slice-as-a-service paradigm, showcasing the platform's capabilities in creating and managing cloud-network slices.
IEEE COMMUNICATIONS MAGAZINE
(2021)
Article
Engineering, Civil
Tiago do Vale Saraiva, Carlos Alberto Vieira Campos, Ramon dos Reis Fontes, Christian Esteve Rothenberg, Sameh Sorour, Shahrokh Valaee
Summary: Vehicular networks, as critical components of advanced intelligent transportation systems, face challenges in meeting diverse communication requirements in complex dynamic environments. This paper proposes a new application-driven vehicular network framework using 5G network slicing and designs algorithms for heterogeneous traffic in dynamic vehicular environments. Simulation results show significant improvements in network performance compared to state-of-the-art approaches.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Computer Science, Hardware & Architecture
Kayol S. Mayer, Jonathan A. Soares, Rossano P. Pinto, Christian E. Rothenberg, Dalton S. Arantes, Darli A. A. Mello
Summary: This paper evaluates an ML-based soft-failure localization framework in scenarios of partial telemetry. The framework is based on an artificial neural network trained by optical signal and noise power models, exhibiting excellent performance in scenarios of partial telemetry, practically interpolating the missing data and locating the faults accurately.
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING
(2021)
Article
Computer Science, Information Systems
Andre Luiz Beltrami Rocha, Celso Henrique Cesila, Paulo Ditarso Maciel Jr, Sand Luz Correa, Javier Rubio-Loyola, Christian Esteve Rothenberg, Fabio Luciano Verdi
Summary: This paper presents the design, implementation and integration of Architecture for Orchestration and Management of Cloud-Network Slices (CNS-AOM), a modular architecture for managing slice resources and services in CNSs. Two proof-of-concept scenarios are implemented to validate the feasibility of CNS-AOM.
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
(2022)
Article
Computer Science, Information Systems
Tingting Yuan, Christian Esteve Rothenberg, Katia Obraczka, Chadi Barakat, Thierry Turletti
Summary: This paper proposes using multiple 5G UAVs to enhance fairness in network resource allocation among vehicles, leveraging deep reinforcement learning to determine UAV position and improve allocation efficiency. Simulation results demonstrate that this approach can improve network resource allocation based on targeted fairness objectives.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Nathan Franklin Saraiva de Sousa, Md Tariqul Islam, Raza Ul Mustafa, Danny Alex Lachos Perez, Christian Esteve Rothenberg, Pedro Henrique Gomes
Summary: This research proposes a multi-domain ZSM-based architecture for B5G scenarios, utilizing CCLs and machine learning methods for collaborative end-to-end service management. Two ML-assisted techniques are used in the study to estimate SLA violations and identify root causes. Experimental results show the potential benefits of applying ML techniques for QoS-to-QoE estimation and correlation to faulty transport network links in multi-access edge computing facilities.
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
(2022)
Article
Computer Science, Information Systems
Thiago A. Navarro do Amaral, Raphael Rosa, David F. Cruz Moura, Christian Esteve Rothenberg
Summary: Flexibility is a key feature of 5G softwarization, and this article proposes a new design to improve flexibility by reducing run-time adaptation time. By utilizing a solution based on BPF and XDP in the kernel, the design shows significant latency improvements in injecting BPF programs into the Linux kernel, while maintaining the same functionalities and achieving good packet processing performance in downlink/uplink directions.
Article
Engineering, Electrical & Electronic
Kayol S. Mayer, Rossano P. Pinto, Jonathan A. Soares, Dalton S. Arantes, Christian E. Rothenberg, Vinicius Cavalcante, Leonardo L. Santos, Filipe D. Moraes, Darli A. A. Mello
Summary: This paper presents an experimental demonstration of a machine-learning-based soft-failure localization framework that can accurately locate subtle anomalies using network telemetry. The results show that the scheme successfully pinpoints the faulty element in single-failure scenarios and is able to handle double-failure scenarios.
JOURNAL OF LIGHTWAVE TECHNOLOGY
(2022)
Review
Computer Science, Hardware & Architecture
Samira Afzal, Vanessa Testoni, Christian Esteve Rothenberg, Prakash Kolan, Imed Bouazizi
Summary: The demand for wireless video streaming services is rising, with users seeking high-quality streaming experiences. Ensuring Quality of Experience (QoE) is difficult due to varying bandwidth and time limitations. The use of multipath communications, which leverage multiple network interfaces on mobile devices, can improve stability, connectivity, and QoE by increasing aggregate bandwidth and distributing video traffic over multiple paths. However, current transport protocols do not meet the requirements of video streaming applications, and this survey explores the benefits, challenges, and alternatives of multipath video transmission over wireless networks, providing an extensive review and discussion of scheduling functions, trade-offs, and a taxonomy of state-of-the-art approaches. The survey concludes with open issues and suggestions for future research.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Telecommunications
Faezeh Pasandideh, Fabricio E. Rodriguez Cesen, Pedro Henrique Morgan Pereira, Christian Esteve Rothenberg, Edison Pignaton de Freitas
Summary: This paper provides a mixed-integer non-linear programming model to determine the location and number of drone base stations (DBSs). It also proposes an improved PSO and K-means algorithm to optimize the DBSs' locations and find the minimum number of DBSs. Furthermore, a custom communication protocol is presented for data exchange between the users' equipment and the network controller. Simulation experiments show that the proposed solution achieves low packet loss and latency, and provides coverage for most of the users in the scenarios.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Proceedings Paper
Engineering, Electrical & Electronic
Raza Ul Mustafa, David Moura, Christian Esteve Rothenberg
Summary: This study investigates the impact of video streaming services in different environments and the application of machine learning methods through a simulation environment based on 5G traces. By extracting features to predict video quality of experience, it shows that ML classifiers achieve a prediction accuracy above 91%.
2021 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP)
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Rossano P. Pinto, Kayol S. Mayer, Jonathan A. Soares, Dalton S. Arantes, Darli A. A. Mello, Vinicius Cavalcante, Leonardo L. Santos, Filipe D. Moraes, Christian E. Rothenberg
Summary: This study demonstrates a soft-failure localization framework using SDN-based network-wide telemetry, with failure localization accomplished by machine learning algorithms.
2021 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC)
(2021)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)