Hostname: page-component-586b7cd67f-t7fkt Total loading time: 0 Render date: 2024-11-24T03:22:22.383Z Has data issue: false hasContentIssue false

Probabilistic QoS-aware Placement of VNF Chains at the Edge

Published online by Cambridge University Press:  15 February 2021

STEFANO FORTI
Affiliation:
Department of Computer Science, University of Pisa, Pisa, Italy (e-mails: [email protected], [email protected], [email protected])
FEDERICA PAGANELLI
Affiliation:
Department of Computer Science, University of Pisa, Pisa, Italy (e-mails: [email protected], [email protected], [email protected])
ANTONIO BROGI
Affiliation:
Department of Computer Science, University of Pisa, Pisa, Italy (e-mails: [email protected], [email protected], [email protected])
Rights & Permissions [Opens in a new window]

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.

Deploying Internet of Things (IoT)-enabled virtual network function (VNF) chains to Cloud-Edge infrastructures requires determining a placement for each VNF that satisfies all set deployment requirements as well as a software-defined routing of traffic flows between consecutive functions that meets all set communication requirements. In this article, we present a declarative solution, EdgeUsher, to the problem of how to best place VNF chains to Cloud-Edge infrastructures. EdgeUsher can determine all eligible placements for a set of VNF chains to a Cloud-Edge infrastructure so to satisfy all of their hardware, IoT, security, bandwidth, and latency requirements. It exploits probability distributions to model the dynamic variations in the available Cloud-Edge infrastructure and to assess output eligible placements against those variations.

Type
Original Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
© The Author(s), 2021. Published by Cambridge University Press on behalf of Theory and Practice of Logic Programming

References

Abbas, N., Zhang, Y., Taherkordi, A. and Skeie, T. 2018. Mobile edge computing: A survey. IEEE Internet of Things Journal 5, 1, 450465.CrossRefGoogle Scholar
Addis, B., Belabed, D., Bouet, M. and Secci, S. 2015. Virtual network functions placement and routing optimization. In 2015 IEEE 4th International Conference on Cloud Networking (CloudNet). IEEE, 171177.Google Scholar
Alhussein, O., Do, P. T., Li, J., Ye, Q., Shi, W., Zhuang, W., Shen, X., Li, X. and Rao, J. 2018. Joint VNF placement and multicast traffic routing in 5G core networks. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 16.Google Scholar
Baktir, A. C., Ozgovde, A. and Ersoy, C. 2017. How can edge computing benefit from software-defined networking: A survey, use cases, and future directions. IEEE Communications Surveys & Tutorials 19, 4, 23592391.CrossRefGoogle Scholar
Bouten, N., Claeys, M., Mijumbi, R., Famaey, J., Latré, S. and Serrat, J. 2016. Semantic validation of affinity constrained service function chain requests. In IEEE NetSoft Conference and Workshops, NetSoft 2016, Seoul, South Korea, June 6–10, 2016. IEEE, 202210.Google Scholar
Brogi, A., Forti, S., Guerrero, C. and Lera, I. 2020. How to place your apps in the fog: State of the art and open challenges. Software: Practice and Experience 50, 5, 719740.Google Scholar
Cheng, X., Wu, Y., Min, G. and Zomaya, A. Y. 2018. Network function virtualization in dynamic networks: A stochastic perspective. IEEE Journal on Selected Areas in Communications 36, 10, 22182232.CrossRefGoogle Scholar
Cziva, R., Anagnostopoulos, C. and Pezaros, D. P. 2018. Dynamic, latency-optimal vNF placement at the network edge. In IEEE INFOCOM 2018 – IEEE Conference on Computer Communications. 693701.Google Scholar
De Raedt, L. and Kimmig, A. 2015. Probabilistic (logic) programming concepts. Machine Learning 100, 1, 547.CrossRefGoogle Scholar
Dwiardhika, D. and Tachibana, T. 2019. Virtual network embedding based on security level with VNF placement. Security and Communication Networks 2019. Article ID 5640134.CrossRefGoogle Scholar
Eramo, V., Miucci, E., Ammar, M. and Lavacca, F. G. 2017. An approach for service function chain routing and virtual function network instance migration in network function virtualization architectures. IEEE/ACM Transactions on Networking 25, 4, 20082025.CrossRefGoogle Scholar
ETSI. 2019. Multi-access Edge Computing (MEC); Framework and Reference Architecture. Tech. Rep. ETSI GS MEC 003 V2.1.1, ETSI. January.Google Scholar
Farris, I., Taleb, T., Khettab, Y. and Song, J. 2019. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys Tutorials 21, 1 (Firstquarter), 812837.CrossRefGoogle Scholar
Fischer, A., Kühn, R., Mandarawi, W. and de Meer, H. 2017. Modeling security requirements for VNE algorithms. In Proceedings of the 10th EAI International Conference on Performance Evaluation Methodologies and Tools. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 149154.Google Scholar
Forti, S. and Brogi, A. 2020. Continuous reasoning for managing next-gen distributed applications. In Proceedings 36th International Conference on Logic Programming (Technical Communications), ICLP Technical Communications 2020, (Technical Communications) UNICAL, Rende (CS), Italy, 18–24th September 2020, Ricca, F., Russo, A., Greco, S., Leone, N., Artikis, A., Friedrich, G., Fodor, P., Kimmig, A., Lisi, F. A., Maratea, M., Mileo, A., and Riguzzi, F., Eds. EPTCS, vol. 325, 164177.Google Scholar
Forti, S., Ferrari, G.-L. and Brogi, A. 2020. Secure cloud-edge deployments, with trust. Future Generation Computer Systems 102, 775788.CrossRefGoogle Scholar
Forti, S., Gaglianese, M. and Brogi, A. 2021. Lightweight self-organising distributed monitoring of Fog infrastructures. Future Generation Computing Systems 114, 605618.CrossRefGoogle Scholar
Forti, S., Ibrahim, A. and Brogi, A. 2019. Mimicking fogdirector application management. SICS Software-Intensive Cyber-Physical Systems 34, 2, 151161.CrossRefGoogle Scholar
Gil Herrera, J. and Botero, J. F. 2016. Resource allocation in NFV: A comprehensive survey. IEEE Transactions on Network and Service Management 13, 3, 518532.CrossRefGoogle Scholar
Jia, Y., Wu, C., Li, Z., Le, F. and Liu, A. 2018. Online scaling of NFV service chains across geo-distributed datacenters. IEEE/ACM Transactions on Networking 26, 2, 699710.CrossRefGoogle Scholar
Kimmig, A., Demoen, B., De Raedt, L., Costa, V. S. and Rocha, R. 2011. On the implementation of the probabilistic logic programming language ProbLog. Theory and Practice of Logic Programming 11, 2–3, 235262.CrossRefGoogle Scholar
Laghrissi, A. and Taleb, T. 2018. A survey on the placement of virtual resources and virtual network functions. IEEE Communications Surveys & Tutorials 21, 2, 14091434.Google Scholar
Leivadeas, A., Kesidis, G., Ibnkahla, M. and Lambadaris, I. 2019. VNF Placement Optimization at the Edge and Cloud. Future Internet 11, 3, 69.CrossRefGoogle Scholar
Lopes, N. P., Navarro, J. A., Rybalchenko, A. and Singh, A. 2010. Applying prolog to develop distributed systems. Theory and Practice of Logic Programming 10, 4–6, 691707.CrossRefGoogle Scholar
Luizelli, M. C., da Costa Cordeiro, W. L., Buriol, L. S. and Gaspary, L. P. 2017. A fix-and-optimize approach for efficient and large scale virtual network function placement and chaining. Computer Communications 102, 6777.CrossRefGoogle Scholar
Ma, J., Le, F., Wood, D., Russo, A. and Lobo, J. 2013. A declarative approach to distributed computing: Specification, execution and analysis. Theory and Practice of Logic Programming 13, 4–5, 815830.CrossRefGoogle Scholar
Mijumbi, R., Serrat, J., Gorricho, J.-L., Bouten, N., De Turck, F. and Boutaba, R. 2015. Network function virtualization: State-of-the-art and research challenges. IEEE Communications surveys & tutorials 18, 1, 236262.Google Scholar
Morabito, R. and Beijar, N. 2017. A Framework Based on SDN and Containers for Dynamic Service Chains on IoT Gateways. In Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems, HotConNet ’17. ACM, New York, NY, USA, 4247.Google Scholar
Mouradian, C., Kianpisheh, S. and Glitho, R. H. 2018. Application component placement in NFV-based hybrid cloud/fog systems. In 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). IEEE, 2530.Google Scholar
Nguyen, V.-G., Brunstrom, A., Grinnemo, K.-J. and Taheri, J. 2017. SDN/NFV-based mobile packet core network architectures: A survey. IEEE Communications Surveys & Tutorials 19, 3, 15671602.CrossRefGoogle Scholar
Ni, J., Zhang, K., Lin, X. and Shen, X. 2018. Securing fog computing for internet of things applications: Challenges and solutions. IEEE Comm. Surveys & Tutorials 20, 1, 601628. https://doi.org/10.1109/COMST.2017.2762345.CrossRefGoogle Scholar
Ning, Z., Kong, X., Xia, F., Hou, W. and Wang, X. 2019. Green and sustainable cloud of things: Enabling collaborative edge computing. IEEE Communications Magazine 57, 1, 7278.CrossRefGoogle Scholar
Oechsner, S. and Ripke, A. 2015. Flexible support of VNF placement functions in openstack. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft). IEEE, 16.Google Scholar
Ojo, M., Adami, D. and Giordano, S. 2016. A SDN-IoT architecture with NFV implementation. In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 16.Google Scholar
Pham, C., Tran, N. H., Ren, S., Saad, W. and Hong, C. S. 2018. Traffic-aware and energy-efficient VNF placement for service chaining: Joint sampling and matching approach. IEEE Transactions on Services Computing, 11.Google Scholar
Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A. and Rana, O. 2019. Fog computing for the internet of things: A survey. ACM Transactions on Internet Technology 19, 2, 18:1–18:41.Google Scholar
Rametta, C. and Schembra, G. 2017. Designing a softwarized network deployed on a fleet of drones for rural zone monitoring. Future Internet 9, 1.Google Scholar
Riguzzi, F. 2018. Foundations of Probabilistic Logic Programming. River Publishers.Google Scholar
Shameli Sendi, A., Jarraya, Y., Pourzandi, M. and Cheriet, M. 2018. Efficient provisioning of security service function chaining using network security defense patterns. IEEE Transactions on Services Computing, 11.Google Scholar
Sun, Q., Lu, P., Lu, W. and Zhu, Z. 2016. Forecast-assisted NFV service chain deployment based on affiliation-aware VNF placement. In 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, 16.Google Scholar
Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S. and Sabella, D. 2017. On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Communications Surveys & Tutorials 19, 3, 16571681.CrossRefGoogle Scholar
van Lingen, F., Yannuzzi, M., Jain, A., Irons-Mclean, R., Lluch, O., Carrera, D., Perez, J. L., Gutierrez, A., Montero, D., Marti, J., Maso, R. and Rodriguez, A. J. P. 2017. The Unavoidable Convergence of NFV, 5G, and Fog: A Model-Driven Approach to Bridge Cloud and Edge. IEEE Communications Magazine 55, 8, 2835.CrossRefGoogle Scholar
Wang, J., Qi, H., Li, K. and Zhou, X. 2018. PRSFC-IoT: A performance and resource aware Orchestration system of service function chaining for Internet of Things. IEEE Internet of Things Journal 5, 30, 14001410.CrossRefGoogle Scholar
Yala, L., Frangoudis, P. A. and Ksentini, A. 2018. Latency and availability driven VNF placement in a MEC-NFV environment. In 2018 IEEE Global Communications Conference (GLOBECOM), 17.Google Scholar
Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., Kong, J. and Jue, J. P. 2019. All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture 98, 289330. ISSN 1383-7621. https://doi.org/10.1016/j.sysarc.2019.02.009.CrossRefGoogle Scholar
Zhu, H. and Huang, C. 2018. Edgeplace: Availability-aware placement for chained mobile edge applications. Transactions on Emerging Telecommunications Technologies 29, 11, e3504.CrossRefGoogle Scholar
Supplementary material: PDF

Forti et al. supplementary material

Appendix A

Download Forti et al. supplementary material(PDF)
PDF 131 KB