4.7 Review

Network Service Orchestration: A survey

期刊

COMPUTER COMMUNICATIONS
卷 142, 期 -, 页码 69-94

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2019.04.008

关键词

Network Service Orchestration (NSO); SDN; NFV; Multi-domain; Orchestration; Virtualization; Lifecycle management

资金

  1. Innovation Center, Ericsson S.A., Brazil [UNI.62]
  2. Federal Institute of Piaui (IFPI), Brazil
  3. EU-Brazil NECOS project [777067]

向作者/读者索取更多资源

Business models of network service providers are undergoing an evolving transformation fueled by vertical customer demands and technological advances such as 5G, Software Defined Networking (SDN), and Network Function Virtualization (NFV). Emerging scenarios call for agile network services consuming network, storage, and compute resources across heterogeneous infrastructures and administrative domains. Coordinating resource control and service creation across interconnected domains and diverse technologies becomes a grand challenge. Research and development efforts are being devoted to enabling orchestration processes to automate, coordinate, and manage the deployment and operation of network services. In this survey, we delve into the topic of Network Service Orchestration (NSO) by reviewing the historical background, relevant research projects, enabling technologies, and standardization activities. We define key concepts and propose a taxonomy of NSO approaches and solutions to pave the way towards a common understanding of the various ongoing efforts around the realization of diverse NSO application scenarios. Based on the analysis of the state of affairs, we present a series of open challenges and research opportunities, altogether contributing to a timely and comprehensive survey on the vibrant and strategic topic of network service orchestration.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Multipath MMT-based approach for streaming high quality video over multiple wireless access networks

Samira Afzal, Christian Esteve Rothenberg, Vanessa Testoni, Prakash Kolan, Imed Bouazizi

Summary: Demand for video streaming content and multimedia services has increased dramatically, leading to challenges in providing high quality mobile video streaming services. Our proposed Content-Aware and Path-Aware (CAPA) scheduling strategy enhances video quality under different network conditions, showing improvements compared to other scheduling strategies.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning

Tingting Yuan, Wilson da Rocha Neto, Christian Esteve Rothenberg, Katia Obraczka, Chadi Barakat, Thierry Turletti

Summary: This article introduces a novel dynamic controller assignment algorithm for Internet of Vehicles (IoV) services, utilizing cooperative multi-agent deep reinforcement learning. Simulation results demonstrate that the proposed approach outperforms existing methods by reducing control delay and packet loss.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Telecommunications

Near-Optimal Probing Planning for In-Band Network Telemetry

Ariel G. Castro, Arthur F. Lorenzon, Fabio D. Rossi, Roberto I. T. da Costa Filho, Fernando M. Ramos, Christian E. Rothenberg, Marcelo C. Luizelli

Summary: The study introduces a novel approach named PINT-I-2 for coordinating the generation and routing of probing packets to collect the required in-band network telemetry data, outperforming existing methods.

IEEE COMMUNICATIONS LETTERS (2021)

Article Engineering, Electrical & Electronic

The NECOS Approach to End-to-End Cloud-Network Slicing as a Service

Stuart Clayman, Augusto Neto, Fabio Verdi, Sand Correa, Silvio Sampaio, Ilias Sakelariou, Lefteris Mamatas, Rafael Pasquini, Kleber Cardoso, Francesco Tusa, Christian Rothenberg, Joan Serrat

Summary: Cloud-network slicing is a promising approach to serve vertical industries over multiple domains, but there are challenges in providing end-to-end slices due to complex business and engineering requirements. The NECOS project presents a reference architecture and practical realization of slice-as-a-service paradigm, showcasing the platform's capabilities in creating and managing cloud-network slices.

IEEE COMMUNICATIONS MAGAZINE (2021)

Article Engineering, Civil

An Application-Driven Framework for Intelligent Transportation Systems Using 5G Network Slicing

Tiago do Vale Saraiva, Carlos Alberto Vieira Campos, Ramon dos Reis Fontes, Christian Esteve Rothenberg, Sameh Sorour, Shahrokh Valaee

Summary: Vehicular networks, as critical components of advanced intelligent transportation systems, face challenges in meeting diverse communication requirements in complex dynamic environments. This paper proposes a new application-driven vehicular network framework using 5G network slicing and designs algorithms for heterogeneous traffic in dynamic vehicular environments. Simulation results show significant improvements in network performance compared to state-of-the-art approaches.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

Machine-learning-based soft-failure localization with partial software-defined networking telemetry

Kayol S. Mayer, Jonathan A. Soares, Rossano P. Pinto, Christian E. Rothenberg, Dalton S. Arantes, Darli A. A. Mello

Summary: This paper evaluates an ML-based soft-failure localization framework in scenarios of partial telemetry. The framework is based on an artificial neural network trained by optical signal and noise power models, exhibiting excellent performance in scenarios of partial telemetry, practically interpolating the missing data and locating the faults accurately.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2021)

Article Computer Science, Information Systems

CNS-AOM: Design, Implementation and Integration of an Architecture for Orchestration and Management of Cloud-Network Slices

Andre Luiz Beltrami Rocha, Celso Henrique Cesila, Paulo Ditarso Maciel Jr, Sand Luz Correa, Javier Rubio-Loyola, Christian Esteve Rothenberg, Fabio Luciano Verdi

Summary: This paper presents the design, implementation and integration of Architecture for Orchestration and Management of Cloud-Network Slices (CNS-AOM), a modular architecture for managing slice resources and services in CNSs. Two proof-of-concept scenarios are implemented to validate the feasibility of CNS-AOM.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2022)

Article Computer Science, Information Systems

Harnessing UAVs for Fair 5G Bandwidth Allocation in Vehicular Communication via Deep Reinforcement Learning

Tingting Yuan, Christian Esteve Rothenberg, Katia Obraczka, Chadi Barakat, Thierry Turletti

Summary: This paper proposes using multiple 5G UAVs to enhance fairness in network resource allocation among vehicles, leveraging deep reinforcement learning to determine UAV position and improve allocation efficiency. Simulation results demonstrate that this approach can improve network resource allocation based on targeted fairness objectives.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks

Nathan Franklin Saraiva de Sousa, Md Tariqul Islam, Raza Ul Mustafa, Danny Alex Lachos Perez, Christian Esteve Rothenberg, Pedro Henrique Gomes

Summary: This research proposes a multi-domain ZSM-based architecture for B5G scenarios, utilizing CCLs and machine learning methods for collaborative end-to-end service management. Two ML-assisted techniques are used in the study to estimate SLA violations and identify root causes. Experimental results show the potential benefits of applying ML techniques for QoS-to-QoE estimation and correlation to faulty transport network links in multi-access edge computing facilities.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2022)

Article Computer Science, Information Systems

Run-Time Adaptive In-Kernel BPF/XDP Solution for 5G UPF

Thiago A. Navarro do Amaral, Raphael Rosa, David F. Cruz Moura, Christian Esteve Rothenberg

Summary: Flexibility is a key feature of 5G softwarization, and this article proposes a new design to improve flexibility by reducing run-time adaptation time. By utilizing a solution based on BPF and XDP in the kernel, the design shows significant latency improvements in injecting BPF programs into the Linux kernel, while maintaining the same functionalities and achieving good packet processing performance in downlink/uplink directions.

ELECTRONICS (2022)

Article Engineering, Electrical & Electronic

Demonstration of ML-Assisted Soft-Failure Localization Based on Network Digital Twins

Kayol S. Mayer, Rossano P. Pinto, Jonathan A. Soares, Dalton S. Arantes, Christian E. Rothenberg, Vinicius Cavalcante, Leonardo L. Santos, Filipe D. Moraes, Darli A. A. Mello

Summary: This paper presents an experimental demonstration of a machine-learning-based soft-failure localization framework that can accurately locate subtle anomalies using network telemetry. The results show that the scheme successfully pinpoints the faulty element in single-failure scenarios and is able to handle double-failure scenarios.

JOURNAL OF LIGHTWAVE TECHNOLOGY (2022)

Review Computer Science, Hardware & Architecture

A holistic survey of multipath wireless video streaming

Samira Afzal, Vanessa Testoni, Christian Esteve Rothenberg, Prakash Kolan, Imed Bouazizi

Summary: The demand for wireless video streaming services is rising, with users seeking high-quality streaming experiences. Ensuring Quality of Experience (QoE) is difficult due to varying bandwidth and time limitations. The use of multipath communications, which leverage multiple network interfaces on mobile devices, can improve stability, connectivity, and QoE by increasing aggregate bandwidth and distributing video traffic over multiple paths. However, current transport protocols do not meet the requirements of video streaming applications, and this survey explores the benefits, challenges, and alternatives of multipath video transmission over wireless networks, providing an extensive review and discussion of scheduling functions, trade-offs, and a taxonomy of state-of-the-art approaches. The survey concludes with open issues and suggestions for future research.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Telecommunications

An Improved Particle Swarm Optimization Algorithm for UAV Base Station Placement

Faezeh Pasandideh, Fabricio E. Rodriguez Cesen, Pedro Henrique Morgan Pereira, Christian Esteve Rothenberg, Edison Pignaton de Freitas

Summary: This paper provides a mixed-integer non-linear programming model to determine the location and number of drone base stations (DBSs). It also proposes an improved PSO and K-means algorithm to optimize the DBSs' locations and find the minimum number of DBSs. Furthermore, a custom communication protocol is presented for data exchange between the users' equipment and the network controller. Simulation experiments show that the proposed solution achieves low packet loss and latency, and provides coverage for most of the users in the scenarios.

WIRELESS PERSONAL COMMUNICATIONS (2023)

Proceedings Paper Engineering, Electrical & Electronic

Machine Learning Approach to Estimate Video QoE of Encrypted DASH Traffic in 5G Networks

Raza Ul Mustafa, David Moura, Christian Esteve Rothenberg

Summary: This study investigates the impact of video streaming services in different environments and the application of machine learning methods through a simulation environment based on 5G traces. By extracting features to predict video quality of experience, it shows that ML classifiers achieve a prediction accuracy above 91%.

2021 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP) (2021)

Proceedings Paper Engineering, Electrical & Electronic

Demonstration of Machine-Intelligent Soft-Failure Localization Using SDN Telemetry

Rossano P. Pinto, Kayol S. Mayer, Jonathan A. Soares, Dalton S. Arantes, Darli A. A. Mello, Vinicius Cavalcante, Leonardo L. Santos, Filipe D. Moraes, Christian E. Rothenberg

Summary: This study demonstrates a soft-failure localization framework using SDN-based network-wide telemetry, with failure localization accomplished by machine learning algorithms.

2021 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC) (2021)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Intelligent wireless sensing driven metaverse: A survey

Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang

Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PrivMaskFL: A private masking approach for heterogeneous federated learning in IoT

Jing Xiong, Hong Zhu

Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Quantum-resistant Transport Layer Security

Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy

Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario

Annisa Sarah, Gianfranco Nencioni

Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Sumana Maiti, Sudip Misra, Ayan Mondal

Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PiGateway: Real-time granular analysis of smart home network traffic using P4

Suvrima Datta, U. Venkanna

Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G

Rajesh Kumar, Deepak Sinwar, Vijander Singh

Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Dynamic WiFi indoor positioning based on the multi-scale metric learning

Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang

Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.

COMPUTER COMMUNICATIONS (2024)