Conference PaperPDF Available

Energy-efficient Joint Computational and Network Resource Planning in Beyond 5G Networks

Authors:

Abstract and Figures

Network Function Virtualization (NFV) is expected to be a crucial enabler of Beyond 5G (B5G) networks, supporting new services with stringent requirements, while offering high flexibility and configurability. In this paper, we consider the joint problem of Virtual Network Function (VNF) placement alongside computational and communication resource allocation in a mobile network to minimize total power expenditure while satisfying the Service Function Chain (SFC), throughput and delay requirements. We explicitly account for the Access Network (AN) and formulate a general Mixed Integer Linear Program (MILP). Due to the high complexity of the latter, we propose an efficient heuristic, which is shown to significantly outperform the State-of-Art (SoA), while achieving up to 78% of the optimal energy efficiency with up to 742 times lower complexity.
Content may be subject to copyright.
Energy-efficient Joint Computational and Network
Resource Planning in Beyond 5G Networks
M. Gatzianas?,, A. Mesodiakaki?,, G. Kalfas?,, and N. Pleros?,
?Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece
Center for Interdisciplinary Research and Innovation, Thessaloniki, Greece
Email: {mgkatzia, amesodia, gkalfas, npleros}@csd.auth.gr
Abstract—Network Function Virtualization (NFV) is expected
to be a crucial enabler of Beyond 5G (B5G) networks, supporting
new services with stringent requirements, while offering high
flexibility and configurability. In this paper, we consider the
joint problem of Virtual Network Function (VNF) placement
alongside computational and communication resource allocation
in a mobile network to minimize total power expenditure while
satisfying the Service Function Chain (SFC), throughput and
delay requirements. We explicitly account for the Access Network
(AN) and formulate a general Mixed Integer Linear Program
(MILP). Due to the high complexity of the latter, we propose
an efficient heuristic, which is shown to significantly outperform
the State-of-Art (SoA), while achieving up to 78% of the optimal
energy efficiency with up to 742 times lower complexity.
Index Terms—Mobile Edge Computing, Virtual Network Func-
tion, Service Function Chaining, Mixed Integer Linear Program.
I. INTRODUCTION
Beyond 5G (B5G) networks are expected to meet a plethora
of service requirements supporting high resource and tech-
nology heterogeneity, while adopted architectural paradigms,
such as Centralized-Radio Access Network (C-RAN) and
Network Function Virtualization (NFV), have introduced new
challenges (e.g., Virtual Network Function (VNF) placement
[1]) to traditional user association and traffic routing problems.
A service can be viewed as an ordered set of VNFs
(e.g., firewall, NAT, etc.), referred to as Service Function
Chain (SFC), which should be deployed at the network so
that not only the correct VNF ordering is ensured (SFC
chaining) but the capacity constraints of the host nodes and
links are also satisfied [2]. The NFV-supporting physical
infrastructure contains a number of nodes, including traffic-
forwarding switches and computational nodes of different
capabilities able to host VNFs in the form of Virtual Machines
(VMs), containers or unikernels. Although traditional cellular
architectures were mainly equipped with cloud servers, located
at distant locations offering high computational power at low
cost, the need for supporting ultra-low latency B5G services
has motivated Multi-Access Edge Computing (MEC) [3].
MEC nodes offer computational capabilities very close to the
user, often being attached to Base Stations (BSs), and are able
to achieve ultra-low latency at the expense of high cost, thus
leading to a non-trivial cost/distance trade-off.
In addition, B5G is expected to include a variety of different
technologies of distinct characteristics that should be jointly
studied. Hence, apart from fiber links interconnecting the
physical machines, wireless links may also be deployed as an
X-haul transport solution, to offer high flexibility close to the
Access Network (AN). Millimeter wave (mmWave) constitutes
a very promising candidate to serve this purpose, due to its
very high bandwidth availability and antenna gains that are
able to compensate for the higher path loss in this band.
Moreover, for the AN, comprised of gNodeBs (gNBs) densely
overlaid with Small Cells (SCs), 5G-New Radio (5G-NR)
proposes the use of multiple frequencies (including mmWave).
In this context, network resource planning should jointly
consider i) all different types of technologies, e.g., 5G-NR,
mmWave, fiber, along with their benefits and constraints, and
ii) the allocation of all different resource types, i.e., com-
munication, computational and storage. It is also crucial to
consider the whole network path from the traffic source to the
destined User Equipment (UE), so as to satisfy the service
latency constraint and offer true End-to-End (E2E) optimality.
Furthermore, achieving high energy efficiency is of utmost
importance not only to limit the network operator’s operational
costs (thus, increasing its revenue) but also to decrease the
ICT carbon footprint, leading to eco-friendly B5G networks.
Consequently, energy-efficient network resource planning so-
lutions are needed that will jointly solve the user association,
VNF placement (SFC chaining) and traffic routing problem in
the highly heterogeneous B5G networks.
A. Related work and Contribution
The joint problem of VNF placement, SFC chaining and
routing in wired networks, mostly targeting cloud environ-
ments in the network core, has been widely studied with tools
such as Dynamic Programming [4], knapsack algorithms [5]
and Benders decomposition [6]. The above works, including
the recent ones in [7], [8], [2], formulate NP-hard Mixed
Integer Linear (MILP) and Non-Linear Programs, for which
heuristic algorithms are proposed and numerically evaluated.
Hence, their essential differences lie in the considered con-
straints and objectives (i.e., minimum total network power
consumption in [7], link utilization, overhead and server power
consumption in [8], monetary profit in [2]). However, most of
these works do not consider mobile networks and, even when
they do, they ignore the wireless AN segment. Models with a
distinct MEC/cellular flavor appear in [9], [10]; however, [9]
does not consider power consumption, while [10] models the
link constraints more abstractly than in our paper and uses a
different objective (i.e. minimize maximum link utilization).
The last remark motivates our paper, which also studies
joint VNF placement and routing in a MEC/cloud-enabled
heterogeneous mobile network consisting of macro BSs and
SCs. We explicitly include the AN, as well as potential wire-
less X-haul links, while accounting for the inherent wireless
channel fluctuations. Hence, this paper extends the concrete
and detailed communication model of [11] by adding all
necessary controls for the computational resources and by
modeling the associated delay and capacity constraints.
The paper’s contribution lies in the formulation of a con-
crete optimization problem, with minimal assumptions, that
accounts for both communication and computation resources
in the AN, edge and core segments of a mobile network. Due
to the NP-hardness of the resulting problem, we also propose
a heuristic algorithm, evaluate its performance via simulations
and demonstrate its superior performance compared with other
State-of-the-Art (SoA) algorithms. Our formulation and algo-
rithm can also be employed by a mobile network operator
as an offline tool, during the network planning stage, to
provide quantitative answers on the power expenditure and
computational resources (both of them major components of
OPEX/CAPEX) required to support a given set of services.
The rest of the paper is structured as follows: Section II
describes the system model and problem formulation, while
Section III presents the proposed heuristic, which is com-
pared to the optimal solution and other SoA algorithms in
Section IV. Section V concludes the paper. Notation-wise, sets
are denoted as V,Fetc. and M
=denotes equality by definition.
II. SY ST EM M OD EL A ND P ROB LE M STATE MENT
We consider the RAN and Core segments of a mobile
network and model them as a graph G(V,E), where Vis
the set of nodes (excluding mobile users) and Eis the set of
(non-access) edges/links among them, as illustrated in Fig. 1
(which also shows access links, for completeness). The nodes
in Vcomprise gNB and/or SCs (hereafter referred to as BSs)
in the RAN, as well as switches/routers and other middlebox
devices (e.g., load balancers, firewalls, etc.) in the Core. These
devices typically operate as VNFs running in virtual instances
(e.g., VMs, containers etc.) utilizing computational resources
collocated with network nodes.
Each link e= (u, v)∈ E , where u, v ∈ V, can be wired
or wireless (the latter enables wireless X-hauling, typically
mmWave), has a communication capacity ceand induces a
delay δe(the sum of transmission and propagation delays)
to all packets traversing it. We partition Einto the sets Ef i ,
Ewl of wired/fiber and wireless links, respectively, and denote
with Vsw ⊆ V the set of nodes in Vthat have at least one
incident link in Efi (i.e., u∈ Vsw iff there exists w∈ V
such that (u, w)∈ Ef i).1For modeling reasons, and although
all physical links are inherently bidirectional, we explicitly
distinguish between links (u, v)and (v, u)in E(and also for
Efi,Ewl ). We denote with h(e) = uand t(e) = vthe head
and tail, respectively, of directed link (u, v).
1We abstractly refer to these nodes as “switches” since most fiber links in
a mobile Core are typically Point-to-Point links among switches or routers.
: Middleboxes (VNF-
implemented)
: Fiber link
: gNB, SC : MEC resources
: Fog resources
: Switch
Aggreg.
Layer 1
Aggreg.
layer 2
: Cloud resources : X-haul
wireless link
: Access link
Fig. 1. Mobile network of heterogeneous communication and computation
nodes along with middlebox functionality offered by deployed VNFs. Dashed
color lines indicate 2 illustrative E2E paths selected for 2 highlighted UEs.
The UEs are not included in Vbut rather in J(we also
define ˜
VM
=V ∪ J ). Each UE j∈ J connects to a BS a
A(j)⊆ V, where the dependence on jcaptures the typical
signal level-based association rules. We define AM
=j∈J A(j)
as the set of all BSs and S(a)M
=j:a∈ A(j)⊆ J as the
set of UEs which may be served by BS a∈ A. We focus
on Downlink (DL) and consider the set of DL AN links EAN
M
=(a, j) : a∈ A, j ∈ S (a)with ˜
EM
=E ∪ EAN . We also
assume that each BS a∈ A has a maximum number of ¯
N(RB)
a
Resource Blocks (RBs) to allocate to the UEs in S(a).
Let Vc⊆ V be the set of network nodes which also have
computational (i.e., CPU2) resources able to host one or more
VNFs. For each node y∈ Vc, we denote with cythe amount
of CPU resources (measured in GFLOPS).
We denote with Fthe set of all available VNFs (viewed as
complete software stacks) that can be deployed and allow for
multiple instances of a given VNF in the same or different
nodes depending on network traffic. Each VNF f∈ F is
described by the tuple fM
= (Tf, πf, wf, τf), where Tfis an
identifier of the VNF’s functionality (e.g., NAT etc.), πf>0
is the data processing capacity of the VNF (in Mbps), wf>0
is the amount of CPU resources (in GFLOPS) required for
the VNF’s operation, and τf>0is the data processing
delay experienced by an individual data packet as it passes
through the VNF. To ensure proper service endpoints, we also
introduce the set Fdum
M
={fdum1, fdum2}of two “dummy”
VNFs and include it into F. The VNFs f∈ Fdum ⊆ F are
characterized by πf=,wf= 0,τf= 0, which implies
that the “dummy” VNFs work transparently w.r.t our model.
Let Cbe the set of SFCs, where SFC ρ∈ C is described
by the ordered sequence ρM
=hfdum1, f (ρ)
1, . . . , f (ρ)
Nρ, fdum2i,
where Nρis the number of non-dummy VNFs in ρand
f(ρ)
i F \Fdum. The traffic of ρis properly served only if it
passes through the VNFs in ρexactly matching the specified
order. We also write f ρto state that VNF fis contained
in ρand define Rρ
M
={f∈ F :f ρ}. An equivalent
description for ρis via a directed graph G(ρ)with the virtual
node set V(ρ)containing the VNFs in ρand the virtual edge
2Additional computational resources such as memory and storage can be
similarly handled and are omitted for simplicity and without loss of generality.
set E(ρ)describing the relative order of the VNFs (see, e.g.,
Fig. 2 of [10]). For any virtual edge e0∈ E(ρ), we denote
with h(e0),t(e0)∈ F the respective VNFs at the head and
tail of e0. Each UE j∈ J requests a service type qj∈ Q,
with qj
M
= (sqj, rqj, δqj, ρqj), where sqj∈ V is the “source”
node of the service (the “destination” node of service qjis
UE j), rqj>0is the E2E required throughput, δqj>0
is the E2E maximum allowed latency, and ρqj∈ C is the
required SFC. We explicitly allow for sharing a VNF instance
among two (or more) different SFCs.Also, for each UE j, we
use our knowledge (or estimates) of the SINR σa,j of link
(a, j)∈ EAN and the requested service rate rqjto compute
the number of RBs N(RB)
a,j needed to achieve this rate on link
(a, j). Assuming frequency-flat slow fading [11], we consider
the simple case of uniform BS power allocation among the
RBs, so that each RB is assigned a power of p(RB)
a.
A. Power consumption model and problem formulation
Unless otherwise stated, we consistently use the following
indices ranging over the respective sets: j∈ J ,a∈ A,q∈ Q,
y∈ Vc,˜y∈ Vc J ,f∈ F,q∈ Q,u, v, w ∈ V,m, n
Vsw. We introduce the decision variables xj,a as the Boolean
indicator of whether UE jattaches to BS a, and φ˜y,f,q as the
Boolean indicator of whether VNF frequested by service q
is deployed on node ˜y. Also, θe0,q
e(or θe0,q
u,v ) is the Boolean
indicator variable of whether the directed physical link e=
(u, v)∈ E belongs to the physical path in Gonto which the
virtual link e0∈ E(ρq)is mapped for SFC ρq. Finally, Nf, ˜y
is the number of instances of VNF fdeployed on node ˜y.
Towards superior energy-saving performance, we employ
resources, devices and links only when needed. Specifically,
collocated CPU resources at node yare employed only when
yactually runs deployed VNFs, as captured by the Boolean
indicator variable ξy. Hence, the power consumed by CPU
processing at node yis given by P(CP U )
y=P(CP U,i)
yξy+
P(CP U,m)
yP(CP U,i)
y·Uy, where P(CP U,m)
y,P(CP U,i)
yare
the maximum and idle power of the CPU deployed at yand
Uy
M
=Pf∈F
Nf,y wf
cvis the CPU load factor at y[7].
Similarly, for a fiber link (n, m)∈ Efi, the Boolean variable
zn,m indicates whether the link actually carries traffic, in
either link direction, for any request. To examine whether
link (n, m)∈ Efi carries any traffic in the specific direction
from nto m, we introduce the Boolean variable wn,m, which
implies that zm,n wm,n,zm,n wn,m for all (n, m)∈ Ef i.
We also denote with ψnthe Boolean variable of whether the
switch of node n∈ Vsw is actually used. There exist certain
consistency relations between these variables as shown in (1)
below, where C1>0is a sufficiently large constant.
X
q∈Q X
e0∈E(ρq)
θe0,q
eC1we,e∈ Efi,
X
e∈Efi :h(e)=n
we+X
e∈Efi :t(e)=n
weC1ψn,n∈ Vsw.(1)
The total power consumed by the switch in node nis
P(sw)
n=P(sw)
idle ψn+Pport Pm∈Vsw :(n,m)∈Ef i zn,m, where
P(sw)
idle denotes the switch idle power and the second term
accounts for the active fiber links of the switch, with Pport
being the power consumed by each active port [7].
The power expenditure model for the mmWave links in
Ewl follows [11] (see eq. 7-10 therein); specifically, the
power consumed on link e∈ Ewl is given by P(mmW)
e=
N(mmW )
RF χeP(mmW,i)
e+ ∆(mmW )
eF(`e), where N(mmW )
RF
is the number of RF chains in the link, P(mmW,i)
eis the idle
power of the link’s transmitter, `e
M
=Pq∈Q Pe0∈E(ρq)θe0,q
e/be
(where beis the utilized bandwidth of link e) is a load-
dependent variable, (mmW )
eis a slope parameter depending
on the power electronics used in the link’s transmitter, and
F(·)is a piecewise-linear function accounting for the non-
linear dependence between achieved throughput and power
expenditure. Finally, χeis a Boolean indicator variable for
whether link eis actually used to serve any traffic.
The power expenditure for the AN links in EAN
is similarly modeled as follows: the power expended
by a gNB BS a A is P(gNB)
a=N(gN B)
RF ·
µaP(gN B,i)
a+∆(gN B)
aPj∈S(a)xj,a p(RB)
aN(RB)
a,j , where
µais the Boolean indicator for whether BS ais deployed
and N(gN B)
RF , P (gN B,i)
a,(gN B)
ahave the same semantics as
in Ewl. For an SC BS, it similarly holds P(S C)
a=N(SC)
RF ·
µaP(SC,i)
a+ ∆(SC )
aPj∈S(a)xj,a p(RB)
aN(RB)
a,j . We use the
clever trick of [11] to convert the activation/power saving
constraints into a set of linear constraints by introducing
auxiliary Boolean variables χe, for e∈ Ewl, and νa, for a∈ A
χe+C2σe1,e∈ Ewl,
1C2χeX
q∈Q X
e0∈E(ρ)q
θe0,q
eC2(1 σe),e∈ Ewl (2)
1C1νaX
j∈J
xj,a C2(1 νa), µa+C1νa1,a∈ A.
In addition to basic self-consistency conditions (omitted here
due to lack of space), we also impose the constraints:
X
y∈Vc
φy,f,q = 1,q∈ Q,f∈ Rq\ Fdum ,
X
a∈A(j)
xj,a = 1, xj,b = 0,j J ,b6∈ A(j),(3)
X
q∈Q:f ρq
φy,f,q rqNf,y πf,f∈ F ,y∈ Vc,
X
f∈F
Nf,y wfcy,X
f∈F\Fdum
Nf,y C1ξy,y∈ Vc,(4)
X
q∈Q,
e0∈E(ρq)
θe0,q
erqce,e, X
j∈S(a)
N(RB)
a,j ¯
N(RB)
a,a(5)
X
v:(u,v)˜
E
θe0,q
u,v X
w:(w,u)˜
E
θe0,q
w,u =φu,h(e0),q φu,t(e0),q ,
q∈ Q,e0∈ E(ρq),u˜
V,
(6)
X
y∈Vc,
f∈Rqj
φy,f,qjτf+X
e∈E,
e0∈E(ρqj)
θe0,qj
eδe+X
a∈A(j)
xj,aδ(a,j )δqj,j
(7)
where (3) requires that each requested VNF must be deployed
and that each UE must properly attach to exactly one BS.
Eq. (4) ensures that the number of deployed VNF instances on
a node is sufficient to meet the data processing requirements
for the incoming traffic and does not exceed the amount of
available CPU resources, while ensuring that the computa-
tional node is deployed only when needed. The link and BS
capacity constraints are captured in (5), while (6) is a flow
conservation and routing condition which ensures that the
packets of each requested SFC meet the corresponding VNFs
in the correct order as they are routed through the selected
path. The E2E delay constraint is captured in (7).
Hence, the total power expenditure in the network
is Ptotal
M
=Pn∈Ssw P(sw)
n+Py∈VcP(CP U )
y+
Pe∈Ewl P(mmW )
e+Pa∈A P(gN B/SC )
aand we formulate our
problem as the following NP-hard MILP
minimize Ptotal,
s.t. (1)–(7),(8)
Due to the high complexity of solving (8), we next propose a
low-complexity heuristic algorithm and use (8) as a yardstick
against which the heuristic’s performance is evaluated.
III. PROP OS ED ENERGY-EFFIC IE NT VNF PLACEMENT,
TR AFFI C ROU TI NG A ND U SE R AS SO CI ATIO N (HERO)
Our proposed Heuristic for Energy-efficient VNF place-
ment, traffic Routing and user assOciation (HERO) aims at
maximizing the network energy efficiency while ensuring low
UE blocking probability. HERO consists of two stages, as
shown in Fig. 2. In the first stage, the traffic path is selected
(i.e., user association and routing), while in the second one
VNF placement takes place, ensuring correct VNF ordering.
Initially, to ensure high UE acceptance ratio, the UEs are
sorted based on their service demands, giving priority to the
UEs with the most delay-intolerant services. For UEs with the
same delay requirements, priority is given to the UEs with
higher rate demands. Then, for each UE, a weighted graph is
constructed from the service traffic source to the UE with all
feasible links and their respective power consumption acting
as weights. HERO calculates the kshortest-weighted paths and
starts with the first, as long as it satisfies the delay and link
capacity constraints, taking into account the decisions for the
already examined users. Otherwise, the next path is selected
until either a path that satisfies all constraints is found or there
are no other paths. In the latter case, the UE is blocked and
HERO proceeds with the next as long as there is one.
After a valid path is found for the current UE, HERO
proceeds to the second stage, where the UE VNFs are being
placed. To that end, for each VNF, following the order of
the UE SFC, a list is constructed with all the available
computational nodes based on a parameter, denoted by H. This
parameter is equal to the sum of the normalized node centrality
(closeness), the normalized node computational capabilities
(cy) and the node CPU utilization. The latter is equal to a)
1 when the studied VNF can be placed in the examined node
without initiating a new VNF instance, b) 0.1 when there is
Input
For each UE:
Construct a weighte d graph including:
Feasible AN links, X -haul transport links, and Fiber links
Edge weights: Link power consumption t aking into account any networ k change
Calculate the
k
shortest-weighted paths
First stage
Output
Move to the next
path
Satisfies
delay &
capacity
constraints?
Other
VNFs?
YES NO
Put UE to unsatisfied users
Define UE examination order
YES
NO
Other
paths
available?
User association &
traffic routing
We select the (next) node with the highest
H
to place the
VNF ensuring correc t VNF ordering
YES
YES
NO
Change
selected path
For each VNF of the UE we sort the computing nodes
of the path based on parameter
H
that considers:
Node centrality (Closeness)
Computational power
Utilization
Other nodes
available in
the path?
NO
Comp.
capacity
constraint
satisfied?
Place the
VNF
Second stage
VNF placement
Select t he (next) shortest-weighted path
Other
UEs?
NO
YES
NO
YES
NO NO
Update the networ k
conditions
Fig. 2. Flowchart of the proposed energy-efficient VNF placement, traffic
routing and user association algorithm (HERO).
enough computational capacity to host the studied VNF in
the examined node, but a new VNF instance is required, and
c) 0 otherwise. Subsequently, the node with the highest H
for the selected VNF is selected, as long as it has sufficient
computational resources to host it. Otherwise, the node with
the next highest His selected, until either the VNF is placed
or there is no other node to examine in the selected path. In the
latter case, the algorithm returns to stage 1 and the next path
out of the kcalculated is examined. The process is repeated for
the new path until either all VNFs of the UE are placed or there
is no other path to study and the UE is blocked. In case all
UE VNFs are placed the network conditions are updated, and
the algorithm proceeds to the next UE. The aforementioned
steps are repeated until all UEs are examined.
IV. PERFORMANCE EVALUATION
A. Simulation scenario
In our results, the heuristics have been developed in MAT-
LAB, while the optimal solution in IBM CPLEX. The simu-
lation scenarios consider a gNB sector area of 500 m radius
overlaid with two SC clusters [11], as shown in Fig. 3.
Each cluster consists of four possible SC positions, which
are uniformly dropped in an 100-m-radius from the cluster
centers. The minimum allowable distances are given in [11].
A subset of BSs, one SC (randomly selected) per cluster and
the gNB in this case, are assumed to be able to have fiber
access to the aggregation network. mmWave X-haul links can
be deployed among BSs as long as their distance is lower
than 200 m. The aggregation network consists of two layers
each one comprising four possible node positions, as shown in
Fig. 3. The aggregation layer nodes are fiber-connected among
TABLE I
SFC DE TAIL S [7]
Type VNF ordering Throughput Delay Share
(Mbps) (ms) (%)
Web NAT-FW-TM-WOC-IDPS [0.6-1] 500 20
VoIP NAT-FW-TM-FW-NAT [0.384-0.64] 100 20
Streaming NAT-FW-TM-VOC-IDPS [5-24] 100 39
Gaming NAT-FW-VOC-WOC-IDPS [0.24-0.5] 60 6
Ultra RT AI/ML NAT-NAT [15-25] 1 15
them and with the BSs having fiber access so that there is no
disconnected node. Hotspot UE traffic is also assumed [11].
We consider 5 different SFCs of specific VNF ordering
(NAT: Network Address Translator, FW: Firewall, TM: Traffic
Monitor, WOC: WAN Optimization Controller, IDPS: Intru-
sion Detection Prevention System, VOC: Video Optimization
Controller), data rate demand (uniformly distributed in the
provided set), E2E delay requirement and share of the total
requests, as shown in Table I. The data processing capacity as
well as the GFLOPS requirement of each VNF type are given
in Table II. For given number of UEs, we run 10 different
scenarios, with 5 different UE distribution snapshots each.
We assume 100 RBs allocated per gNB or SC (µ=0 in 5G
numerology). The operating frequency of the gNB and SCs is
2 GHz, assuming orthogonal channels between the gNB and
the SCs. However, the SCs of different clusters may interfere
with each other. The mmWave X-haul links operate at 60
GHz, with 200 MHz channel bandwidth. For the AN and the
mmWave links, we employ the link budget equation and the
related parameter values of [11]. The number of cores is equal
to 8, 24 and 48 for the MEC, 1st and 2nd Aggregation Layer
nodes, respectively. Parameter P(CP U,m)
yis selected randomly
from the set {55, 70}for the MEC nodes, from {150, 220}for
the 1st Aggregation Layer and from {200, 278}for the 2nd
Aggregation Layer nodes, while the idle power is assumed to
be equal to 10%of the assigned maximum power values. The
fiber link capacity is 10 Gbps, while the rest of the simulation
parameters are summarized in Table III.
The optimal solution and the proposed heuristic (HERO)
will be compared with the following SoA algorithms [7]:
a) Holu: This heuristic first performs the VNF place-
ment based on the node centrality (closeness) and the CPU
utilization of computing nodes and then decides upon traffic
routing targeting at minimizing the power consumption, while
satisfying the E2E service delay constraint.
b) BCSP: It considers node centrality (betweeness) for
the VNF placement and the shortest-path in terms of delay for
routing, while meeting the E2E service delay constraint.
Given that both reference algorithms do not handle user
association, we employ the default user association criterion
for both, i.e., the UEs are connected based on the highest
received signal. In addition, for a fair comparison, their UE
examination order is selected to be the same with HERO.
B. Simulation results
In Fig. 4 and 5, we show the energy efficiency (bits/Joule)
and the computational time (s, in logarithmic scale), respec-
1
2
3
45
67
8
9
10
11
12
13
14
15
16
17
Fig. 3. Simulation scenario example.
TABLE II
VNF DE TAIL S [7]
Type NAT FW TM VOC WOC IDPS
Process Capacity (Mbps) 500 400 200 578 300 600
GFLOPS Requirement 110 440 55 110 110 440
TABLE III
SIMULATION PARAMETERS [7], [11], [12]
Parameter Value Parameter Value Parameter Value
P(sw)
idle 315 W Pport 7 W Packet length 1.5 KB
N(gN B)
RF 8N(SC)
RF 4N(mmW )
RF 64
(gN B)
a4.7 (SC)
a4(mmW )
e100
P(gN B,i)
a6.8 W P(SC ,i)
a130 W P(mmW,i)
e3.9 W
tively, of all algorithms for different number of UEs. As can
be seen, HERO provides a very good trade-off between energy
efficiency and complexity compared to other approaches,
achieving up to 78%of the optimal value, with up to 742 times
lower complexity. All algorithms have 100%user acceptance
ratio in all cases except for BCSP that presents 96%for N=20,
93%for N=40, and 91%for N=40. This is due to the fact that
in BCSP the CPU utilization of the computing nodes is not
taken into account, resulting in less efficient VNF placement,
which under higher traffic load can lead to few UEs being
blocked. The inefficiency of BCSP VNF placement is also
shown in Fig. 6, where the power break down of all algorithms
under low and high traffic is presented. As shown, inefficient
BCSP VNF placement leads to a higher number of deployed
computational nodes, and thus, higher power consumption.
Compared to Holu and BCSP, HERO achieves up to 60%
and 86%higher energy efficiency, respectively, while keeping
the complexity low, as shown in Fig. 5. This is due to the
60%
86%
Fig. 4. Energy efficiency (bits/Joule) of all algorithms for different number
of UEs per gNB area.
Fig. 5. Execution time (s) in logarithmic scale of all algorithms for different
number of UEs per gNB area.
fact that HERO jointly considers user association leading to
higher flexibility at the expense of a little higher complexity.
On the other hand, in both Holu and BCSP, the serving BSs
are already decided (based on the best SINR criterion) and
then the optimal VNF placement and traffic routing from the
UE traffic source to its serving BS are performed. This is also
demonstrated in Fig. 6, where the Optimal and HERO do not
deploy the gNB in any case, but rather use SCs as serving
BSs (in contrast to Holu and BCSP), hence, leading to much
lower power consumption. We can also observe that the power
consumption of the Optimal and HERO are scaling better than
the SoA with increasing load (HERO still achieves 68%of
the Optimal energy efficiency value when N=40). This further
justifies the motivation of our work that user association, VNF
placement and traffic routing should be jointly considered to
guarantee true optimal E2E network performance.
V. CONCLUSION
In this paper, we studied the joint VNF placement, user
association and traffic routing in B5G networks targeting
at energy efficiency maximization, while ensuring high UE
acceptance ratio. We modeled the aforementioned problem as
a MILP with minimal assumptions, which captures all charac-
teristics of the employed technologies, resource and service
Fig. 6. Power (W) break down of all algorithms for low traffic (N=10) and
high traffic (N=40).
types as well as their constraints and power consumption.
To tackle the prohibitive complexity of the studied problem,
we proposed HERO, an energy-efficient resource planning
heuristic, which was shown to significantly outperform the
SoA, while achieving up to 78%of the optimal value, with
up to 742 times lower complexity.
ACKNOWLEDGMENT
This work is supported by H2020 5G-COMPLETE (GA
871900).
REFERENCES
[1] A. Laghrissi and T. Taleb, “A survey on the placement of virtual
resources and Virtual Network Functions,IEEE Commun. Surveys Tuts.,
vol. 1, no. 2, pp. 1409–1434, 2019.
[2] J. Liu et al., “On dynamic Service Function Chain deployment and
readjustment,” IEEE Trans. Netw. Service Manag., vol. 14, no. 3, pp.
543–553, Jun. 2017.
[3] N. Abbas et al., “Mobile edge computing: A survey,” IEEE Internet
Things J., vol. 5, no. 1, pp. 450–465, Sep. 2018.
[4] C. Ghribi, M. Mechtri, and D. Zeghlache, “A dynamic programming
algorithm for joint VNF placement and chaining,” in Proc. 2016 ACM
Workshop on Cloud-Assisted Networking, Dec. 2016.
[5] Y. Ma et al., “Virtual Network Function service provisioning in MEC
via trading off the usages between computing and communication
resources,” IEEE Trans. on Cloud Comput., Dec. 2020, early access.
[6] S. Ayoubi, S. Sebbah, and C. Assi, “A logic-based Benders decomposi-
tion approach for the VNF assignment problem,” IEEE Trans. on Cloud
Comput., vol. 7, no. 3, pp. 894–906, Dec. 2019.
[7] A. Varasteh et al., “Holu: power-aware and delay-constrained VNF
placement and chaining,” IEEE Trans. Netw. Service Manag., Jan. 2021,
early access.
[8] M. Tajiki et al., “Joint energy efficient and QoS-aware path allocation
and VNF placement for Service Function Chaining,” IEEE Trans. Netw.
Service Manag., vol. 16, no. 1, pp. 374–388, Mar. 2019.
[9] D. Dietrich et al., “Network function placement on virtualized cellular
cores,” in Proc. 9th Intl. Conference on Communication Systems and
Networks (COMSNETS), Jan. 2017.
[10] S. Yang et al., “Delay-aware Virtual Network Function placement and
routing in edge clouds,” IEEE Trans. Mobile Comput., vol. 20, no. 12,
pp. 445–459, Feb. 2021.
[11] A. Mesodiakaki et al., “Optimal user association, backhaul routing and
switching off in 5G heterogeneous networks with mesh millimeter wave
backhaul links,” Ad Hoc Networks, vol. 78, pp. 99–114, Sep. 2018.
[12] W. V. Heddeghem et al., “Power consumption modeling in optical
multilayer networks,” Photon. Netw. Commun., vol. 24, pp. 86–102,
2012.
... EdgeNet, or edge computing, processes data closer to its source, reducing latency and congestion, and supporting real-time analytics, AI, and IoT [68,65,69]. From the selected studies, we discuss research on VNF placement strategies aimed at reducing power consumption [68], resource crowdsourcing frameworks [70], and Mobile Edge Computing (MEC) deployment in 5G networks [69]. ...
... EdgeNet, or edge computing, processes data closer to its source, reducing latency and congestion, and supporting real-time analytics, AI, and IoT [68,65,69]. From the selected studies, we discuss research on VNF placement strategies aimed at reducing power consumption [68], resource crowdsourcing frameworks [70], and Mobile Edge Computing (MEC) deployment in 5G networks [69]. These studies also cover enhancements in gaming quality [65], optimization of caching [71], and improvements in edge computing migrations [72]. ...
... By examining these dimensions, we aim to highlight the specific roles that LP, ILP, and MILP play in optimizing network operations, ensuring efficient resource allocation, and meeting the stringent performance requirements of next-generation networks. Network Architecture References C-RAN [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35] Massive MIMO [36], [37], [38], [39] HetNet [27], [38], [39], [40], [41], [42], [43], [76], [44], [45], [46], [47], [77] 5G-NR architecture [48], [51], [52], [53], [54], [55], [56], [57], [58], [78], [43], [45], [40], [59], [49], [50], [67] Distributed Cloud [60], [61], [62], [55] F-RAN [67], [63], [64], [66], [65] Edge Computing [68], [65], [69], [79], [71], [72], [78], [75], [80], [81], [56], [73], [67], [82], [70] HAPS-MEC-Cloud system [74], [73] UAV Relay Network ...
Preprint
Full-text available
The introduction of 5G networks has significantly advanced communication technology, offering faster speeds, lower latency, and greater capacity. This progress sets the stage for Beyond 5G (B5G) networks, which present new complexity and performance requirements challenges. Linear Programming (LP), Integer Linear Programming (ILP), and Mixed-Integer Linear Programming (MILP) models have been widely used to model the optimization of resource allocation problems in networks. This paper reviews 103 studies on resource allocation strategies in 5G and B5G, focusing specifically on optimization problems modelled as LP, ILP, and MILP. The selected studies are categorized based on network architectures, types of resource allocation problems, and specific objective functions and constraints. The review also discusses solution methods for NP-hard ILP and MILP problems by categorizing the solution methods into different categories. Additionally, emerging trends, such as integrating AI and machine learning with optimization models, are explored, suggesting promising future research directions in network optimization. The paper concludes that LP, ILP, and MILP models have been widely adopted across various network architectures, resource types, objective functions, and constraints and remain critical to optimizing next-generation networks.
... The 6G transport network interconnecting the computation and communication nodes will consist of front/mid/backhaul (X-haul) links of different technologies and capabilities (i.e., both fiber and wireless links), calling for joint consideration of the Access Network (AN) and transport in the modeling process. For the wireless X-haul links, an attractive solution lies in the use of millimeter wave (mmWave) frequencies, due to their wide spectrum bands and high antenna gains to compensate for the increased path loss in these bands [3]. In the AN, a combination of gNodeBs (gNBs) and a dense overlay of Small Cells (SCs) employing 5G-New Radio (5G-NR) frequencies, including mmWave, is anticipated. ...
... Due to the high complexity of the developed optimal solution, a heuristic algorithm is also proposed and numerically evaluated. The challenging aspect of online sequential decision making is captured in the problem formulation and developed heuristics, while taking into account the duration of each SR, thus complementing previous works focusing exclusively on offline solutions [3], [10]. Our results demonstrate that the proposed heuristic can achieve up to 89% of the optimal performance with up to 90% lower complexity, while significantly outperforming the SoA. ...
... II. SYSTEM MODEL AND PROBLEM STATEMENT We extend the model of [3] by incorporating the temporal variation aspect of Service Requests (SRs) along with constraints due to previously allocated resources for still running services. The mobile network is modeled as a directed graph G(V, E), with V the set of non-UE nodes and E the set of links among them, as shown in Fig. 1. ...
Conference Paper
Full-text available
In this paper, we study the joint problem of real-time user association, traffic routing and Virtual Network Function (VNF) placement towards maximizing the mobile network's energy efficiency and user acceptance ratio. The studied problem is formulated as a Mixed Integer Linear Program (MILP), under various computational, capacity, and flow conservation constraints, while also meeting the Service Function Chain (SFC), throughput and delay requirements of each service request. In addition to the optimal solution of the MILP problem, an efficient low computational complexity heuristic (named as ONE) is also developed and evaluated via simulations. The proposed solutions are shown to significantly outperform the State-of-Art (SoA) in terms of energy efficiency, with ONE achieving up to 89% of the optimal energy efficiency value with up to 90% lower computational time even under heavy user traffic load scenarios.
... To this end, in this work, we advance the state-of-the-art (SoA) by proposing a novel resource management framework, developed within 5G-COMPLETE, for E2E network performance optimization incorporating the model and algorithms of [10]. We focus on the joint VNF placement and routing in a MEC/cloud-enabled mobile HetNet consisting of macro BSs and SCs. ...
... In this section, we present the employed system model and we discuss the studied problem, while analyzing the main aspects of its formulation (a complete description together with detailed formulas can be found in [10]). Due to the high complexity of the derived optimal solution, in this section, we also propose a low-complexity algorithm, which targets at high energy-efficiency, while ensuring high UE acceptance ratio. ...
... Other constraints include: a) the load of BSs, BH links, and CPUs can not be higher than their maximum respective capacity, b) each requested VNF within an SFC must be deployed in the exact order as defined by the required SFC, c) each UE must properly attach to exactly one BS, d) the number of deployed VNF instances on a node is sufficient to meet the data processing requirements for the incoming traffic, while ensuring that the computational node is deployed only when needed, e) the flow conservation and routing conditions are met, and f) the E2E delay constraints of the UEs are satisfied. Due to the high complexity of exactly solving the aforementioned problem via an Integer Linear formulation [10], we next propose a heuristic algorithm and use the former as a benchmark so as to evaluate its performance. ...
... When a network slice is not in use, the resources allocated to that slice can be de-allocated, which helps reduce the network's energy consumption. Additionally, dynamic resource allocation [55] can help avoid overprovisioning, where resources are provided with more than they demand, thereby reducing resource wastage [56,57]. ...
Article
Full-text available
This paper presents a comprehensive set of design methods for making future Internet networking fully energy-aware and sustainably minimizing and managing the energy footprint. It includes (a) 41 energy-aware design methods, grouped into Service Operations Support, Management Operations Support, Compute Operations Support, Connectivity/Forwarding Operations Support, Traffic Engineering Methods, Architectural Support for Energy Instrumentation, and Network Configuration; (b) energy consumption models and energy metrics are identified and specified. It specifies the requirements for energy-defined network compliance, which include energy-measurable network devices with the support of several control messages: registration, discovery, provisioning, discharge, monitoring, synchronization, flooding, performance, and pushback.
... The proposed solutions can be applied for internode network optimization, in conjunction with approaches targeting intranode optimization for maximum performance. • Expanding upon our previous work in [29], we also describe the proposed orchestration solution, which, integrated with the proposed algorithm, enables the automated and optimized provisioning and configuration of heterogeneous computational and network resources across all network segments, targeting the orchestration of virtualized services according to the expected performance requirements and the specified SFC. ...
Article
Full-text available
In order to cope with the ever-increasing traffic demands and stringent latency constraints, next generation, i.e., sixth generation (6G) networks, are expected to leverage Network Function Virtualization (NFV) as an enabler for enhanced network flexibility. In such a setup, in addition to the traditional problems of user association and traffic routing, Virtual Network Function (VNF) placement needs to be jointly considered. To that end, in this paper, we focus on the joint network and computational resource allocation, targeting low network power consumption while satisfying the Service Function Chain (SFC), throughput, and delay requirements. Unlike the State-of-the-Art (SoA), we also take into account the Access Network (AN), while formulating the problem as a general Mixed Integer Linear Program (MILP). Due to the high complexity of the proposed optimal solution, we also propose a low-complexity energy-efficient resource allocation algorithm, which was shown to significantly outperform the SoA, by achieving up to 78% of the optimal energy efficiency with up to 742 times lower complexity. Finally, we describe an Orchestration Framework for the automated orchestration of vertical-driven services in Network Slices and describe how it encompasses the proposed algorithm towards optimized provisioning of heterogeneous computation and network resources across multiple network segments.
Article
Mobile edge computing (MEC) and millimeter-wave 1 (mmWave) communication are promising techniques for future 2 cellular networks. MEC enables latency-critical tasks offloading 3 at the network edge, while mmWave provides an abundant spec-4 trum for gigabit-per-second data transmission. Dense deployment 5 of remote radio units (RRUs) is necessary due to high mmWave 6 signal path loss, and hence limiting the deployment cost becomes 7 a prime network design factor. Our work considers that RRUs are 8 deployed to provide mmWave access and to offload computation 9 requests to edge servers (ESs) via fronthaul links. We propose 10 an edge network (EN) deployment problem by jointly optimizing 11 the mmWave access and fronthaul networks. Converged fiber 12 and in-band mmWave techniques are utilized for flexible fron-13 thaul links deployment and cost reduction. The deployed EN is 14 expected to fulfill coverage, reliability and latency requirements 15 of ultra-reliable low-latency (uRLLC) services. We formulate the 16 optimization problem as an integer linear program (ILP) and 17 propose a multi-objective evolutionary algorithm to solve the 18 problem. The numerical results demonstrate that our proposed 19 algorithm can achieve close-to-optimal solutions compared with the 20 ILP formulation. We also comparatively evaluate the deployment 21 costs under different EN settings and show that our algorithm 22 provides up to 20.3% cost savings compared to non-converged 23 solutions. 24 Index Terms-Mobile edge computing, edge network deploy-25 ment, millimeter-wave communication, fronthaul network, cost 26 efficiency. 27
Book
While the 5th Generation (5G) system is being widely deployed across the globe, the information and communication technology (ICT) industry, research, standardization and consensus building for the 6th generation (6G) are already well underway with high expectations towards the merger of digital, physical, and human worlds. The main goal of this book is to introduce the upcoming 6G technologies and outline the foreseen challenges, enablers, and architectural design trends that will be instrumental in realizing a Sustainable and Trustworthy 6G system in the coming years. The envisioned 6G system promises to offer a more advanced and comprehensive user experience not only by achieving higher speeds, larger capacity, and lower latency, but also much more improved reliability, greater energy efficiency, and an enhanced security and privacy-preserving framework while natively integrating intelligence end-to-end (E2E). Achieving these goals will require innovative technological solutions and a holistic system design that considers the needs of various stakeholders and future 6G use cases. Capitalizing on the European 5G Public-Private-Partnership (5G PPP) Phase 3 projects working on 5G & Beyond and 6G research in recent years, and the join efforts between the Architecture Working Group (WG) and the 6G flagship Hexa-X project, this book delves into the critical challenges and enablers of the 6G system, including new network architectures and novel enhancements as well as the role of regulators, network operators, industry players, application developers, and end-users. Accordingly, this book provides a comprehensive landscape of the current research activities on 6G in Europe and sets a solid cornerstone on the 6G development towards a more connected, intelligent, and sustainable world. Furthermore, as 5G PPP Phase 3 consists of the last calls of the Horizon 2020 program, this book is aimed to lay the architectural foundation for the next European program towards 6G, i.e., Smart Networks & Services (SNS) Joint Undertaking (JU).
Article
Full-text available
Service function chains (SFCs) are an ordered set of virtual network functions (VNFs) which can realize a specific network service. Enabled by virtualization technologies, these VNFs are hosted on physical machines (PMs), and interconnected by network switches. In today networks, these resources are usually under-utilized and/or over-provisioned, resulting in power-inefficient deployments. To improve power-efficiency, SFCs should be deployed utilizing the minimum number of PMs and network equipment, which are not concomitant. Considering the existing PM and switch power consumption models and their resource constraints, we formulate the power-aware and delay-constrained joint VNF placement and routing (PD-VPR) problem as an Integer Linear Program (ILP). Due to the NP-completeness of the problem, we propose Holu, a fast heuristic framework that efficiently solves the PD-VPR problem in an online manner. Specifically, Holu decomposes the PD-VPR into two sub-problems and solve them sequentially: i) a VNF placement problem that consists of mapping the VNFs to PMs using a centrality-based ranking method, and ii) a routing problem that efficiently splits the delay budget between consecutive VNFs of the SFC, and finds a Delay-Constrained Least-Cost (DCLC) shortest-path through the selected PMs (hosting VNFs) using the Lagrange Relaxation based Aggregated Cost (LARAC) algorithm. Our simulation results indicate that Holu outperforms the state-of-the-art algorithms in terms of total power consumption and acceptance rate by 24.7% and 31%, respectively.
Article
Full-text available
Mobile Edge Computing (MEC) offers a way to shorten the cloud servicing delay by building the small-scale cloud infrastructures at the network edge, which are in close proximity to the end users. Moreover, Network Function Virtualization (NFV) has been an emerging technology that transforms from traditional dedicated hardware implementations to software instances running in a virtualized environment. In NFV, the requested service is implemented by a sequence of Virtual Network Functions (VNF) that can run on generic servers by leveraging the virtualization technology. Service Function Chaining (SFC) is defined as a chain-ordered set of placed VNFs that handles the traffic of the delivery and control of a specific application. NFV therefore allows to allocate network resources in a more scalable and elastic manner, offer a more efficient and agile management and operation mechanism for network functions and hence can largely reduce the overall costs in MEC. In this paper, we study the problem of how to place VNFs on edge and public clouds and route the traffic among adjacent VNF pairs, such that the maximum link load ratio is minimized and each user's requested delay is satisfied. We consider this problem for both totally ordered SFCs and partially ordered SFCs. We prove that this problem is NP-hard, even for the special case when only one VNF is requested. We subsequently propose an efficient randomized rounding approximation algorithm to solve this problem. Extensive simulation results show that the proposed approximation algorithm can achieve close-to-optimal performance in terms of acceptance ratio and maximum link load ratio.
Article
Full-text available
Next generation, i.e., fifth generation (5G), cellular networks will provide a significant higher capacity per area to support the ever-increasing traffic demands. In order to achieve that, many small cells need to be deployed that are connected using a combination of optical fiber links and millimeter-wave (mmWave) backhaul architecture to forward heterogeneous traffic over mesh topologies. In this paper, we present a general optimization framework for the design of policies that optimally solve the problem of where to associate a user, over which links to route its traffic towards which mesh gateway, and which base stations and backhaul links to switch off in order to minimize the energy cost for the network operator and still satisfy the user demands. We develop an optimal policy based on mixed integer linear programming (MILP) which considers different user distribution and traffic demands over multiple time periods. We develop also a fast iterative two-phase solution heuristic, which associates users and calculates backhaul routes to maximize energy savings. Our strategies optimize the backhaul network configuration at each timeslot based on the current demands and user locations. We discuss the application of our policies to backhaul management of mmWave cellular networks in light of current trend of network softwarization (Software-Defined Networking, SDN). Finally, we present extensive numerical simulations of our proposed policies, which show how the algorithms can efficiently trade-off energy consumption with required capacity, while satisfying flow demand requirements.
Conference Paper
Full-text available
The proliferation of mobiles devices, application sprawl, and the everincreasing data volume generates significant stress on cellular networks and particularly on the cellular core, also known as the Evolved Packet Core (EPC). This is further exacerbated by the deployment of hardware appliances for the implementation of a wide range of network functions (e.g., gateways, mobility management, firewalls, network address translation), hindering any opportunity for elastic provisioning, and eventually leading to high operational costs and a significant degree of load imbalance across the EPC. Network Function Virtualization (NFV) has been seen a promising solution in order to enable elasticity in the cellular core. Applying NFV to the EPC raises the need for network function (NF) placement, which in turn entails significant challenges, due to the stringent delay budgets among cellular core components and the coexistence of communicating data and control plane elements. To address these challenges, we present a linear programming (LP) formulation for the computation of NF placements that strikes a balance between optimality and time complexity. Our evaluation results show that the LP achieves significantly better load balancing, request acceptance rate, and resource utilization compared to a greedy algorithm that performs NF placement inline with carriers’ common practice today
Article
Mobile edge computing (MEC) has emerged as a promising technology that offers resource-intensive yet delay-sensitive applications from the edge of mobile networks. With the emergence of complicated and resource-hungry mobile applications, offloading user tasks to cloudlets of nearby mobile edge-cloud networks is becoming an important approach to leverage the processing capability of mobile devices, reduce mobile device energy consumptions, and improve experiences of mobile users. In this paper we first study the provisioning of virtualized network function (VNF) services for user requests in an MEC network, where each user request has a demanded data packet rate with a specified network function service requirement, and different user requests need different services that are represented by virtualized network functions instantiated in cloudlets. We aim to maximize the number of user request admissions while minimizing their admission cost, where the request admission cost consists of the computing cost on instantiations of requested VNF instances and the data packet traffic processing of requests in their VNF instances, and the communication cost of routing data packet traffic of requests between users and the cloudlets hosting their requested VNF instances. We study the joint VNF instance deployment and user requests assignment in MEC, by explicitly exploring a non-trivial usage tradeoff between different types of resources. To this end, we first formulate the cost minimization problem that admits all requests by assuming that there is sufficient computing resource in MEC to accommodate the requested VNF instances of all requests, for which we formulate an Integer Linear Programming solution and two efficient heuristic algorithms. We then deal with the problem under the computing resource constraint. We term this problem as the throughput maximization problem by admitting as many as requests, subject to computing resource capacity on each cloudlet, for which we formulate an ILP solution when the problem size is small; otherwise, we devise efficient algorithms for it. We finally evaluate the performance of the proposed algorithms through experimental simulations. Experimental results demonstrate that the proposed algorithms are promising. To the best of our knowledge, we are the first to explicitly explore the usage tradeoff between computing and communication resources in the admissions of user requests in MEC through introducing a novel load factor concept to minimize the request admission cost and maximize the network throughput.
Article
Cloud computing and network slicing are essential concepts of forthcoming 5G mobile systems. Network slices are essentially chunks of virtual computing and connectivity resources, configured and provisioned for particular services according to their characteristics and requirements. The success of cloud computing and network slicing hinges on the efficient allocation of virtual resources (e.g. VCPU, VMDISK) and the optimal placement of Virtualized Network Functions (VNFs) composing the network slices. In this context, this paper elaborates issues that may disrupt the placement of VNFs and VMs. The paper classifies the existing solutions for VM Placement (VMP) based on their nature, whether the placement is dynamic or static, their objectives, and their metrics. The paper then proposes a classification of VNF Placement (VNFP) approaches, first, regarding the general placement and management issues of VNFs, and second, based on the target VNF type.
Article
Service Function Chaining (SFC) allows the forwarding of a traffic flow along a chain of Virtual Network Functions (VNFs, e.g., IDS, firewall, and NAT). Software Defined Networking (SDN) solutions can be used to support SFC reducing the management complexity and the operational costs. One of the most critical issues for the service and network providers is the reduction of energy consumption, which should be achieved without impact to the quality of services. In this paper, we propose a novel resource (re)allocation architecture which enables energy-aware SFC for SDN-based networks. To this end, we model the problems of VNF placement, allocation of VNFs to flows, and flow routing as optimization problems. Thereafter, heuristic algorithms are proposed for the different optimization problems, in order find near-optimal solutions in acceptable times. The performance of the proposed algorithms are numerically evaluated over a real-world topology and various network traffic patterns. The results confirm that the proposed heuristic algorithms provide near optimal solutions while their execution time is applicable for real-life networks.
Article
Mobile Edge Computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors towards mobile subscribers, enterprises and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultra low latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.
Article
Middleboxes have gained popularity due to the significant value-added services these network elements provide to traffic flows, in terms of enhanced performance and security. Policy-aware traffic flows usually need to traverse multiple middleboxes in a predefined order to satisfy their associated policy, also known as Service Function Chaining. Typically, Middleboxes run on specialized hardware, which make them highly inflexible to handle the unpredictable and fluctuating-nature of traffic, and contribute to significant capital and operational expenditures (Cap-ex and Op-ex) to provision, accommodate, and maintain them. Network Function Virtualization is a promising technology with the potential to tackle the aforementioned limitations of hardware middleboxes. Yet, NFV is still in its infancy, and there exists several technical challenges that need to be addressed, among which, the Virtual Network Function assignment problem tops the list. The VNF assignment problem stems from the newly gained flexibility in instantiating VNFs (on-demand) anywhere in the network. Subsequently, network providers must decide on the optimal placement of VNF instances which maximizes the number of admitted policy-aware traffic flows across their network. Existing work consists of Integer Linear Program (ILP) models, which are fairly unscalable, or heuristic-based approaches with no guarantee on the quality of the obtained solutions. This work proposes a novel Logic-Based Benders Decomposition (LBBD) based approach to solve the VNF assignment problem. It consists of decomposing the problem into two subproblems: a master and a subproblem; and at every iteration constructive Benders cuts are introduced to the master to tighten its search space. We compared the LBBD approach against the ILP and a heuristic method, and we show that our approach achieves the optimal solution (as opposed to heuristic-based methods) 700 times faster than the ILP.
Article
Network Function Virtualization (NFV) is a promising technology to decouple the network functions from dedicated hardware elements, leading to the significant cost reduction in network service provisioning. As more and more users are trying to access their services wherever and whenever, we expect the NFV-related service function chains (SFCs) to be dynamic and adaptive, i.e., they can be readjusted to adapt to the service requests' dynamics for better user experience. In this paper, we study how to optimize SFC deployment and readjustment in the dynamic situation. Specifically, we try to jointly optimize the deployment of new users' SFCs and the readjustment of in-service users' SFCs while considering the trade-off between resource consumption and operational overhead. We first formulate an integer linear programming (ILP) model to solve the problem exactly. Then, to reduce the time complexity, we design a column generation (CG) model for the optimization. Simulation results show that the proposed CG-based algorithm can approximate the performance of the ILP and outperform an existing benchmark in terms of the profit from service provisioning.