ArticlePDF Available

Abstract

In order to cope with the ever-increasing traffic demands and stringent latency constraints, next generation, i.e., sixth generation (6G) networks, are expected to leverage Network Function Virtualization (NFV) as an enabler for enhanced network flexibility. In such a setup, in addition to the traditional problems of user association and traffic routing, Virtual Network Function (VNF) placement needs to be jointly considered. To that end, in this paper, we focus on the joint network and computational resource allocation, targeting low network power consumption while satisfying the Service Function Chain (SFC), throughput, and delay requirements. Unlike the State-of-the-Art (SoA), we also take into account the Access Network (AN), while formulating the problem as a general Mixed Integer Linear Program (MILP). Due to the high complexity of the proposed optimal solution, we also propose a low-complexity energy-efficient resource allocation algorithm, which was shown to significantly outperform the SoA, by achieving up to 78% of the optimal energy efficiency with up to 742 times lower complexity. Finally, we describe an Orchestration Framework for the automated orchestration of vertical-driven services in Network Slices and describe how it encompasses the proposed algorithm towards optimized provisioning of heterogeneous computation and network resources across multiple network segments.
applied
sciences
Article
Offline Joint Network and Computational Resource Allocation
for Energy-Efficient 5G and beyond Networks
Marios Gatzianas 1,2,* , Agapi Mesodiakaki 1,2,* , George Kalfas 1,2 , Nikos Pleros 1,2 , Francesca Moscatelli 3,
Giada Landi 3and Nicola Ciulli 3and Leonardo Lossi 3


Citation: Gatzianas, M.;
Mesodiakaki, A.; Kalfas, G.;
Pleros, N.; Moscatelli, F.; Landi, G.;
Ciulli, N.; Lossi, L. Offline Network
and Computational Resource
Allocation for Energy-Efficient
beyond 5G Networks. Appl. Sci. 2021,
11, 10547. https://doi.org/10.3390/
app112210547
Academic Editor: Alberto Gatto
Received: 9 October 2021
Accepted: 5 November 2021
Published: 9 November 2021
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
1Department of Informatics, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece;
gkalfas@csd.auth.gr (G.K.); npleros@csd.auth.gr (N.P.)
2Center for Interdisciplinary Research and Innovation, 57001 Thessaloniki, Greece
3Nextworks, 56122 Pisa, Italy; f.moscatelli@nextworks.it (F.M.); g.landi@nextworks.it (G.L.);
n.ciulli@nextworks.it (N.C.); l.lossi@studenti.unipi.it (L.L.)
*Correspondence: mgkatzia@csd.auth.gr (M.G.); amesodia@csd.auth.gr (A.M.)
Abstract:
In order to cope with the ever-increasing traffic demands and stringent latency constraints,
next generation, i.e., sixth generation (6G) networks, are expected to leverage Network Function
Virtualization (NFV) as an enabler for enhanced network flexibility. In such a setup, in addition to
the traditional problems of user association and traffic routing, Virtual Network Function (VNF)
placement needs to be jointly considered. To that end, in this paper, we focus on the joint network and
computational resource allocation, targeting low network power consumption while satisfying the
Service Function Chain (SFC), throughput, and delay requirements. Unlike the State-of-the-Art (SoA),
we also take into account the Access Network (AN), while formulating the problem as a general
Mixed Integer Linear Program (MILP). Due to the high complexity of the proposed optimal solution,
we also propose a low-complexity energy-efficient resource allocation algorithm, which was shown
to significantly outperform the SoA, by achieving up to 78% of the optimal energy efficiency with up
to 742 times lower complexity. Finally, we describe an Orchestration Framework for the automated
orchestration of vertical-driven services in Network Slices and describe how it encompasses the
proposed algorithm towards optimized provisioning of heterogeneous computation and network
resources across multiple network segments.
Keywords:
multi-access edge computing; virtual network function; service function chaining; mixed
integer linear program; network orchestration
1. Introduction
Beyond 5G (B5G) and 6G networks are envisioned to meet a plethora of service require-
ments supporting high resource and technology heterogeneity, while adopted architectural
paradigms, such as Centralized-Radio Access Network (C-RAN) and Network Function
Virtualization (NFV), offer the necessary high flexibility and configurability to the network.
The increasing use of NFV, in particular, to “softwarize” functions and applications [
1
3
]
(i.e., decouple the function logic from the underlying hardware running the actual code)
in numerous Open System Interconnection (OSI) layers has transformed the majority
of “traditional” network functions (e.g., Network Address Translation (NAT), firewall,
load balancing, and Intrusion Detection/Prevention System (IDPS)) into Virtual Network
Functions (VNFs), which can run on generic computational infrastructure that can be
dynamically deployed. Although we use the generic term “Central Processing Unit (CPU)
resources” to refer to this computational infrastructure, our model and ensuing analysis
can capture any type of computational device, including Graphics Processing Units (GPUs),
Field Programmable Gate Arrays (FPGAs) and other computational acceleration platforms.
The NFV-supporting physical computational infrastructure contains a number of
nodes, including traffic-forwarding switches and computational nodes of different capabil-
Appl. Sci. 2021,11, 10547. https://doi.org/10.3390/app112210547 https://www.mdpi.com/journal/applsci
Appl. Sci. 2021,11, 10547 2 of 23
ities that can host VNFs in the form of Virtual Machines (VMs), containers, or unikernels.
Although traditional cellular architectures were mainly equipped with cloud servers, lo-
cated at distant locations offering high computational power at low cost, the need for
supporting ultra-low latency B5G services has motivated Multi-Access Edge Computing
(MEC) [
4
]. To this end, MEC nodes offer computational capabilities very close to the user,
often being attached to Base Stations (BSs), and are able to achieve ultra-low latency at the
expense of high cost, thus leading to a nontrivial cost/distance tradeoff that needs to be
quantitatively examined.
The above flexible deployment introduces a new exploitable “degree of freedom”
regarding the potential location of the deployed VNFs (referred to as the “VNF placement
problem” [
5
,
6
]) but also introduces new challenges to traditional user association and
traffic routing problems, since these problems are strongly coupled with the location of the
nodes running the VNFs. Furthermore, the VNFs themselves typically operate in synergy
with each other to form Service Function Chains (SFCs), i.e., ordered sequences of VNFs
which process packets in an End-to-End (E2E) manner, within the operator’s network,
and according to specific rules matching a given service request. This ordering adds a
crucial constraint to the routing problem, as the SFC is considered to successfully meet the
service request
only
when the selected routed path passes through the VNFs comprising
the specific SFC in exactly the order specified; for example, if an SFC is described by the
ordered sequence NAT
Firewall
NAT, then all packets belonging to this SFC must be
processed by only these three VNFs in the specified order.
The above discussion motivates the need to jointly study VNF placement alongside
computational and communication resource allocation in a mobile network, while satis-
fying the SFC, throughput, and delay requirements [
7
9
]. In addition, B5G is expected to
include a variety of different access and transport technologies with distinct characteristics
that should be jointly studied. Specifically, apart from fiber links interconnecting the physi-
cal nodes, wireless links may also be deployed as an X-haul transport solution, to offer high
flexibility close to the Access Network (AN) [
10
]. Millimeter wave (mmWave) constitutes
a very promising candidate to serve this purpose, due to its high bandwidth availability
and antenna gains that are able to compensate for the higher path loss in this band. More-
over, for the AN, comprised of gNodeBs (gNBs) densely overlaid with Small Cells (SCs),
5G-New Radio (5G-NR) proposes the use of multiple frequencies (including mmWave).
Hence, a holistic network resource planning study should jointly consider: (1) all types
of technologies, e.g., 5G-NR, mmWave, fiber, along with their benefits and constraints,
and (2) the allocation of all different resource types (i.e., communication, computational,
and storage).
It is also crucial to consider the whole network path from the traffic source to the
destined User Equipment (UE), so as to satisfy the service latency constraint and offer
true E2E optimality, within the operator’s network boundaries. Furthermore, achieving
high energy efficiency is of utmost importance not only to limit the network operator’s
operational costs (thus, increasing its revenue) but also to decrease the Information and
Communications Technology (ICT) carbon footprint, leading to eco-friendly B5G networks.
Hence, we focus on energy-efficient network resource planning solutions to jointly solve
the user association, VNF placement (SFC chaining), and traffic routing problem in the
highly heterogeneous B5G networks.
In addition, although the discussion so far has focused on (energy-optimal) estab-
lishment of the data plane to satisfy the requested services, there is a strong need for an
accompanying flexible management and control plane that supports the actual dynamic
provisioning and/or configuration of resources in B5G network infrastructures. Network
Slicing is considered as a key enabling concept for achieving a high degree of automation in
the provisioning of services in B5G networks, allowing, at the same time, resource sharing
within the operator’s network and the fulfilment of performance requirements depending
on the service type (i.e., enhanced Mobile Broadband eMBB, ultra Reliable Low Latency
Communication uRLLC, and massive Machine Type Communication mMTC). Network
Appl. Sci. 2021,11, 10547 3 of 23
Slicing improves the way network and computational resources are allocated and also of-
fers the possibility of performing runtime optimization that targets Quality of Service (QoS)
preservation as well as energy-efficient deployments and the reduction of operational cost.
Combining Network Slicing, Software Defined Networking (SDN), and NFV/MEC
orchestration techniques with advanced strategies for resource planning, VNFs of different
types, potentially belonging to different network segments (radio, core, and transport
network), can be placed and configured in an optimal manner, while the SFC connectivity
is guaranteed through the establishment of optimized jointly computed network paths.
1.1. Related Work
The joint problem of VNF placement, SFC chaining, and routing in wired networks,
mostly targeting cloud environments in the network core, has been widely studied with
tools such as Dynamic Programming [
11
], knapsack algorithms [
12
], Monte Carlo Tree
Search [
13
], and Benders decomposition [
14
]. The above works, including the recent ones
in [
7
,
15
,
16
], formulate NP-hard Mixed Integer Linear (MILP) and Nonlinear Programs, for
which heuristic algorithms are proposed and numerically evaluated. Hence, their essential
differences lie in the considered constraints and objectives (i.e., minimum total network
power consumption in [
15
], link utilization, overhead, and server power consumption
in [
16
], and monetary profit in [
7
]). Models with a distinct MEC/cellular flavor appear
in [
17
,
18
] (see also survey in [
19
]); however, [
17
] does not consider power consumption,
while [
18
] models the link constraints more abstractly than in our paper and uses a different
objective (i.e., minimize maximum link utilization).
Regarding Network Slicing, SDN, and NFV/MEC orchestration, many platforms,
both commercial and open-source, provide functionalities that target the management and
control of technology-specific resources. The Open Source Management and Orchestration
(MANO) framework proposed by the European Telecommunications Standards Institute
(ETSI), considered the most mature standardized solution for Network Service Lifecycle
Management (LCM) [
20
], also supports Network Slicing but is not currently targeting the
management of radio elements. On the other hand, O-RAN, being the most successful of
the open Radio Access Network (RAN) initiatives, targets specifically the virtualization and
management of radio functions [
21
]. During Horizon 2020 5G Infrastructure Public Private
Partnership (5G-PPP) phase 2, some research initiatives focused on prototyping Network
Slicing solutions considering (mostly) computational resources [
22
] and integrating, in
some cases, mechanisms for joint management of the transport [
23
] and radio network
segments [24].
1.2. Research Gap
Most of the work on resource allocation (i.e., VNF placement, SFC chaining and rout-
ing) mentioned in Section 1.1 does not consider mobile networks and, even when they
do, they ignore the wireless AN segment. The last remark motivates our paper, which
also studies joint VNF placement and routing in a MEC/cloud-enabled heterogeneous
mobile network consisting of macro BSs and SCs. We explicitly include the AN, as well as
potential wireless X-haul links, while accounting for the inherent wireless channel fluctua-
tions. Hence, this paper extends the concrete and detailed communication model of [
25
]
by adding all necessary controls for the computational resources and by modeling the
associated delay and capacity constraints. In addition, the extensive technical documen-
tation released by Standards Developing Organizations (SDOs) (such as ETSI) regarding
the E2E network efficiency of mobile networks in conjunction with the NFV-supporting
infrastructures
[26,27]
, indicate that solutions targeting E2E network energy efficiency are
of prime importance.
On the other hand, the multiplicity of technology-specific orchestration platforms
presents interoperability challenges, which motivates current research in 5G and B5G
networks towards delivery of E2E Network Slicing solutions that support the orchestration
and management of lheterogeneous resources in distributed edge to cloud infrastructures
Appl. Sci. 2021,11, 10547 4 of 23
and across the different network segments [
28
], i.e., radio, core, and transport. In addition,
although there are solutions that optimize the hardware (optimized design of dedicated
solutions) or the job allocation in the computing nodes, they provide local optimization
benefits, while overlooking the holistic network optimization. To this end, so far, there has
been no complete solution for a unified Orchestration Framework having a holistic view
of the entire network (potentially by integrating existing technology-specific platforms
such as ETSI MANO and O-RAN) and using it for the management and orchestration of
Vertical-driven services within E2E Network Slices provisioned and configured over multi-
technology components. The search for such a solution provides additional motivation for
our paper.
1.3. Our Contributions
The paper’s contributions are summarized as follows:
We formulate a concrete joint user association, traffic routing, and VNF placement
optimization problem targeting at the
overall
E2E network performance optimization,
with minimal assumptions, that accounts for both communication and computation
resources in
all
segments of a mobile network (i.e., AN, edge, and core) and explicitly
account for the AN segment, typically ignored in the literature.
Due to the NP-hardness of the resulting problem, we also propose a heuristic algo-
rithm, evaluate its performance via simulations and demonstrate its superior per-
formance compared with other State-of-the-Art (SoA) algorithms. The proposed
solutions can be applied for internode network optimization, in conjunction with
approaches targeting intranode optimization for maximum performance.
Expanding upon our previous work in [
29
], we also describe the proposed orches-
tration solution, which, integrated with the proposed algorithm, enables the auto-
mated and optimized provisioning and configuration of heterogeneous computational
and network resources across
all
network segments, targeting the orchestration of
virtualized services according to the expected performance requirements and the
specified SFC.
Our formulation and algorithm can also be employed by a mobile network operator
as an offline tool, during the network planning stage, to provide quantitative answers on
the power expenditure and computational resources (both of them major components of
Operational Expenditure (OPEX) and Capital Expenditure (CAPEX)) required to support a
given set of services.
The rest of the paper is structured as follows: Section 2describes the system model
and problem formulation, while the proposed heuristic and the employed Orchestration
Platform are presented in Sections 3and 4, respectively. Our performance evaluation
methodology and comparison between the optimal solution and other SoA algorithms
is described in Section 5with the actual results being presented in Section 6. Section 7
concludes the paper. Notation-wise, sets are denoted with calligraphic symbols
V
,
F
etc.
and M
=denotes equality by definition.
2. System Model and Problem Statement
We consider the RAN and Core segments of a mobile network and model them as
a graph
G(V
,
E)
, where
V
is the set of nodes (excluding mobile users) and
E
is the set of
non-access edges/links among them, as illustrated in Figure 1(which also shows access
links, for completeness). The nodes in
V
comprise gNB and/or SCs (hereafter referred to
as BSs) in the RAN, as well as switches/routers and other middlebox devices (e.g., load
balancers, firewalls, etc.) in the Core. These devices typically operate as VNFs running in
virtual instances (e.g., VMs, containers, etc.) utilizing computational resources collocated
with network nodes.
Appl. Sci. 2021,11, 10547 5 of 23
: Middleboxes (VNF-
implemented)
: Fiber link
: gNB, SC : MEC resources
: Fog resources
: Switch
Aggreg.
Layer 1
Aggreg.
layer 2
: Cloud resources : X-haul
wireless link
: Access link
Figure 1.
Mobile network of heterogeneous communication and computation nodes along with middlebox functionality
offered by deployed VNFs. Dashed color lines indicate 2 illustrative E2E paths selected for 2 highlighted UEs.
Each link
e= (u
,
v) E
, where
u
,
v V
, can be wired or wireless (the latter enables
wireless X-hauling, typically mmWave), has a communication capacity
ce
, and induces a
delay
δe
(being the sum of transmission and propagation delays) to all packets traversing
it. We partition
E
into the sets
Ef i
and
Ewl
of wired/fiber and wireless links, respectively,
and denote with
Vsw V
the set of nodes in
V
that have at least one incident link in
Ef i
(i.e.,
u Vsw
if there exists
w V
such that
(u
,
w) Ef i
). We abstractly refer to the nodes
in
Vsw
as “switches” since most fiber links in a mobile Core are typically Point-to-Point
links among switches or routers. For modeling reasons, and although all physical links are
inherently bidirectional, we explicitly distinguish between links
(u
,
v)
and
(v
,
u)
in
E
(and
also for
Ef i
,
Ewl
). We denote with
h(e) = u
and
t(e) = v
the head and tail, respectively, of
directed link (u,v).
The UEs are
not
included in
V
but rather in
J
(we also define
˜
VM
=V J
). Each
UE
j J
connects to a BS
a A(j) V
, where the dependence on
j
captures the typical
signal level-based association rules. We define
AM
=j∈J A(j)
as the set of all BSs and
S(a)M
=nj:a A(j)o J
as the set of UEs which
may
be served by BS
a A
. We focus
on Downlink (DL) and consider the set of DL AN links
EAN
M
=n(a,j):a A,j S(a)o
with
˜
EM
=E EA N
. To capture the underlying Physical layer constraints in the air interface,
we also assume that each BS
a A
has a
maximum
number of
¯
N(RB)
a
Resource Blocks
(RBs) to allocate to the UEs in S(a).
Let
Vc V
be the set of network nodes which also have computational (i.e., CPU)
resources able to host one or more VNFs. Additional computational resources such as
memory and storage can be similarly handled and are omitted for simplicity and without
loss of generality. For each node
y Vc
, we denote with
cy
the amount of CPU resources,
measured in Giga-Floating Point Operations per Second (GFLOPS). We denote with
F
the
set of all available VNFs (viewed as
complete software stacks
) that can be deployed and
allow for multiple
instances
of a given VNF in the same or different nodes depending on
Appl. Sci. 2021,11, 10547 6 of 23
network traffic. Each VNF
f F
is described by the tuple
fM
= (Tf
,
πf
,
wf
,
τf)
, where
Tf
is an identifier of the VNF’s functionality (e.g., NAT etc.),
πf>
0 is the data processing
capacity of the VNF (in Mbps),
wf>
0 is the amount of CPU resources (in GFLOPS)
required for the VNF’s operation, and
τf>
0 is the data processing
delay
experienced by
an individual data packet as it passes through the VNF. To ensure proper service endpoints,
we also introduce the set
Fdum
M
={fdum1
,
fdum2}
of two “dummy” VNFs and include it into
F
. The VNFs
f Fdum F
are characterized by
πf=
,
wf=
0,
τf=
0, which implies
that the “dummy” VNFs work transparently, w.r.t., our model.
Let
C
be the set of SFCs, where SFC
ρ C
is described by the
ordered
sequence
ρM
=hfdum1
,
f(ρ)
1
,
. . .
,
f(ρ)
Nρ
,
fdum2i
, where
Nρ
is the number of non-dummy VNFs in
ρ
and
f(ρ)
i F \ Fdum
. The traffic of
ρ
is
properly served only if
it passes through
the VNFs in
ρexactly matching the specified order
. We also write
f ρ
to state
that VNF
f
is contained in
ρ
and define
Rρ
M
={f F :f ρ}
. An equivalent
description for
ρ
is via a
directed
graph
G(ρ)(V(ρ)
,
E(ρ)
with the virtual node set
V(ρ)
M
={fdum1
,
f(ρ)
1
,
f(ρ)
2
,
. . .
,
f(ρ)
Nρ
,
fdum2}
(i.e., each VNF
f ρ
is a node of
V(ρ)
) and the virtual
edge set
E(ρ)=fdum1,f(ρ)
1,f(ρ)
i,f(ρ)
i+11iNρ1f(ρ)
Nρ,fdum2
describing the relative
order of the VNFs (see bottom part of Figure 2for an example of such a virtual graph). For
any virtual edge
e0 E(ρ)
, we denote with
h(e0)
,
t(e0) F
the respective VNFs at the head
and tail of e0.
FW
NAT
TM
NAT
FW
Aggreg.
layer 1 Aggreg.
layer 2
Src2
Dst2
Src2 Dst2
NAT FW TM
Src1 NAT FW TM IDS Dst1
Physical
network
Virtual
network
IDS
Dst1
Src1
Figure 2.
Embedding of virtual network (bottom part) into the physical network (top part). For illustration, 2 distinct SFCs
are shown (in green and red) corresponding to 2 different UE requests, and each SFC is described by its own virtual network.
G(ρ1)
(green color) contains 6 virtual nodes and 5 virtual edges, whereas
G(ρ2)
contains 5 virtual nodes and 4 virtual edges.
The virtual nodes will be mapped to actual physical nodes, while the virtual edges will be mapped to actual paths in the
physical network.
Appl. Sci. 2021,11, 10547 7 of 23
Each UE
j J
requests a service type
qj Q
, with
qj
M
= (sqj
,
rqj
,
δqj
,
ρqj)
, where
sqj V
is the “source” node of the service (the “destination” node of service
qj
is UE
j
),
rqj>
0 is the E2E required throughput,
δqj>
0 is the E2E maximum allowed latency, and
ρqj C
is the required SFC. We explicitly allow for sharing a VNF instance among two
(or more) different SFCs, provided the VNF can meet the requirements imposed by the
aggregate traffic of the services sharing this VNF. Furthermore, for each UE
j
, we use our
knowledge (or estimates) of the Signal to Interference plus Noise Ratio (SINR)
σa,j
of link
(a
,
j) EA N
and the requested service rate
rqj
to compute the number of RBs
N(RB)
a,j
needed
to achieve this rate on link
(a
,
j)
. Assuming frequency-flat slow fading [
25
], we consider
the simple case of uniform BS power allocation among the RBs, so that each RB is assigned
a power of p(R B)
a.
We can now succinctly state the problem to be solved as follows: for a set of service
requests
Q
generated by a set of UEs
J
, we seek to jointly determine the location of the VNFs
that must be deployed to
properly serve
the requested SFCs, as well as the E2E routing path for
each request, so that the total system power consumption is minimized (equivalently, the energy
efficiency in bits/Joule over all requests is maximized). Computation of the selected routing path
also includes determination of the BS to which each UE attaches to.
2.1. Power Consumption Model and Problem Formulation
Unless otherwise stated, we consistently use the following indices ranging over the
respective sets:
j J
,
a A
,
q Q
,
y Vc
,
˜
y Vc J
,
f F
,
q Q
,
u
,
v
,
w V
,
m
,
n Vsw
. We introduce the decision variables
xj,a
as the Boolean indicator of whether
UE
j
attaches to BS
a
, and
φ˜
y,f,q
as the Boolean indicator of whether VNF
f
requested by
service
q
is deployed on node
˜
y
. Furthermore,
θe0,q
e
(or its alias
θe0,q
u,v
) is the Boolean indicator
variable of whether the directed
physical
link
e= (u
,
v) E
belongs to the
physical
path
in
G
onto which the
virtual
edge
e0 E(ρq)
is mapped for SFC
ρq
. Finally,
Nf,˜
y
is the
number of instances of VNF fdeployed on node ˜
y.
Towards superior energy-saving performance, we employ resources, devices, and
links
only
when needed. Specifically, collocated CPU resources at node
y
are employed
only when
yactually
runs deployed VNFs, as captured by the Boolean indicator variable
ξy. Hence, the power consumed by CPU processing at node yis given by
P(CPU)
y=P(CPU,i)
yξy+P(CPU,m)
yP(CPU,i)
y·Uy, (1)
where
P(CPU,m)
y
,
P(CPU,i)
y
are the maximum and idle power of the CPU deployed at
y
and
Uy
M
=f∈F
Nf,ywf
cvis the CPU load factor at y[15].
Similarly, for a fiber link
(n
,
m) Ef i
, the Boolean variable
zn,m
indicates whether the
link
actually
carries traffic, in
either
link direction, for any request. To examine whether
link
(n
,
m) Ef i
carries any traffic in the
specific
direction from
n
to
m
, we introduce the
Boolean variable wn,m, which implies that it must hold
zm,nwm,n
zm,nwn,m
(n,m) Ef i . (2)
We denote with
ψn
the Boolean variable of whether the switch of node
n Vsw
is
actually
used. There exist certain consistency relations between these variables as shown
in (3) below, where C1>0 is a sufficiently large constant.
q∈Q
e0∈E (ρq)
θe0,q
eC1we,e Ef i,
e∈E f i :h(e)=n
we+
e∈E f i :t(e)=n
weC1ψn,n Vsw.
(3)
Appl. Sci. 2021,11, 10547 8 of 23
The above relations capture the fact that a node is active (i.e.,
ψn=
1) only if it has
active incident links carrying traffic and, similarly, a link is active only if it is carrying traffic
for one of the requested SFCs.
The total power consumed by the switch in node nis
P(sw)
n=P(sw)
idle ψn+Pport
m∈Vsw :(n,m)∈E f i
zn,m, (4)
where
P(sw)
idle
denotes the switch idle power and the second term accounts for the
active
fiber links of the switch, with Pport being the power consumed by each active port [15].
The power expenditure model for the mmWave links in
Ewl
follows [
25
] (see
Equations (7)–(10) therein); specifically, the power consumed on link e Ewl is given by
P(mmW)
e=N(mmW)
RF χeP(mmW ,i)
e+(mmW)
eF(`e), (5)
where
N(mmW)
RF
is the number of Radio Frequency (RF) chains in the link,
P(mmW,i)
e
is the idle
power of the link’s transmitter,
`e
M
=q∈Q e0∈E (ρq)θe0,q
e/be
is a load-dependent variable
(where
be
is the utilized bandwidth of link
e
),
(mmW)
e
is a slope parameter depending
on the power electronics used in the link’s transmitter, and
F(·)
is a
piecewise-linear
function accounting for the nonlinear dependence between achieved throughput and
power expenditure. Finally,
χe
is a Boolean indicator variable for whether link
e
is
actually
used to serve any traffic; if not, the link’s transceiver is turned off.
The power expenditure for the AN links in
EAN
is similarly modeled as follows: the
power expended by a gNB BS a A is
P(gN B)
a=N(gN B)
RF ·
µaP(gN B,i)
a+(gN B)
a
j∈S(a)
xj,ap(RB)
aN(RB)
a,j
, (6)
where
µa
is the Boolean indicator for whether BS
a
actually serves any UEs, and
N(gN B)
RF
,
P(gN B,i)
a, and (gN B)
ahave the same semantics as in (5). For an SC BS, it similarly holds
P(SC)
a=N(SC)
RF ·
µaP(SC,i)
a+(SC)
a
j∈S(a)
xj,ap(RB)
aN(RB)
a,j
. (7)
We use the clever trick of [
25
] to convert the activation/power saving constraints into
a set of linear constraints by introducing auxiliary Boolean variables
χe
, for
e Ewl
, and
νa
,
for a A
χe+C2σe1, e Ewl,
1C2χe
q∈Q
e0∈E (ρ)q
θe0,q
eC2(1σe),e Ewl, (8)
1C1νa
j∈J
xj,aC2(1νa),µa+C1νa1, a A.
Appl. Sci. 2021,11, 10547 9 of 23
In addition to the basic self-consistency conditions
φsqj,dum1,qj=φj,dum2,qj=1, j J ,
φ˜
y,fdum1,qj=0, j J ,˜
y Vc\ {sqj},
φ˜
y,fdum2,qj=0, j J ,˜
y Vc\ {j},
(9)
and
φj,f,q=0, j J ,q Q,f F \ { fdum2},
φ˜
y,f,q=0, q Q,f F \ Rρq,˜
y Vc J ,
θ
˙
e0
qj,qj
a,j=xj,a,j J ,a A,
(10)
following from the definitions, where
˙
e0
qj
is the “last” virtual edge in
E(ρq)
, i.e.,
t˙
e0
qj=1, we also impose the constraints:
y∈Vc
φy,f,q=1, q Q,f Rq\ Fdum,
a∈A(j)
xj,a=1, j J ,
xj,b=0, b6∈ A(j),
(11)
which require that each requested VNF must be deployed at a node and that each UE
must properly attach to exactly one of its allowable BSs (i.e., those BSs which can allocate a
sufficient number of Resource Blocks to serve its requested traffic).
The constraint
q∈Q:f ρq
φy,f,qrqNf,yπf,f F,y Vc,
f∈F
Nf,ywfcy,y Vc,
f∈F \Fdum
Nf,yC1ξy,y Vc,
(12)
ensures that the number of deployed VNF instances on a node is sufficient to meet the
data processing requirements for the incoming traffic and does not exceed the amount of
available CPU resources, while ensuring that the computational node is deployed only
when needed.
The link and BS capacity constraints are captured as follows:
q∈Q
e0∈E (ρq)
θe0,q
erqce,e˜
E,
j∈S(a)
N(RB)
a,j¯
N(RB)
a,a A
(13)
Appl. Sci. 2021,11, 10547 10 of 23
which restricts the total amount of traffic flowing through any link and the total number of
Resource Blocks allocated by any BS, while
v:(u,v)˜
E
θe0,q
u,v
w:(w,u)˜
E
θe0,q
w,u=φu,h(e0),qφu,t(e0),q,
q Q,e0 E(ρq),u˜
V,
(14)
is a flow conservation and routing condition, which ensures that the packets of each
requested SFC meet the corresponding VNFs in the correct order as they are routed through
the selected path. The above equation essentially ensures the “proper embedding of the
virtual graph
G(ρq)
, for each request
q Q
, into the physical graph (see Figure 2). Finally,
E2E delay constraint is captured by
y∈Vc,
f∈Rqj
φy,f,qjτf+
e∈E,
e0∈E (ρqj)
θe0,qj
eδe+
a∈A(j)
xj,aδ(a,j)δqj,j J . (15)
Hence, the total power expenditure in the network is
Ptot al
M
=
n∈Ssw
P(sw)
n+
y∈Vc
P(CPU)
y+
e∈Ewl
P(mmW)
e+
a∈A
P(gN B/SC)
a(16)
and we formulate our problem as the following NP-hard MILP
minimize Ptot al ,
s.t. (2), (3), (8)–(15), (17)
where the control variables in (17) are
Nf,v
,
ξy
,
zm,n
,
wm,n
,
ψn
,
θe0,q
e
,
χe
,
σe
,
µa
,
νa
,
φ˜
y,f,q
,
xj,a
,
N(RB)
a,j
with index semantics as previously described. The MILP property of (17) follows
from the simple observation (by visual inspection) that
all
of the above control variables
appear as linear terms in the constraints (2), (3), (8)–(15) and as linear (in (1), (4), (6), (7)) or
piecewise linear terms (in (5)) in the components of (16) comprising the objective function
of (17), combined with the fact that the control variables take only integer or Boolean
values. Note that a piecewise linear objective function can be readily converted into a
purely linear form by introducing auxiliary variables (see Section 4.3.1 of [
30
]). Due to the
high complexity of solving (17), we next propose a low-complexity heuristic algorithm
and use (17) as a yardstick against which the heuristic’s performance is evaluated. For the
reader’s convenience, we have collected all introduced notation into Table 1at the end of
the paper.
Appl. Sci. 2021,11, 10547 11 of 23
Table 1. List of Symbols and Notations.
Symbol Interpretation Notation for Element Symbol Interpretation Notation for Element
(In Case of Sets) (In Case of Sets)
Input parameters
VSet of network nodes u,vVsw Set of nodes u,v
(excluding mobile users) equipped with switch
ESet of network links e= (u,v)JSet of UEs j
(excluding access links)
Ef i,Ewl Set of fiber (resp. wireless) (u,v)EAN Set of access links (a,j)
non-access links
ceCommunication capacity NA δeDelay (i.e., transmission + propagation) NA
of link einduced by link e
A(j)Set of BSs that UE jaS(a)Set of UEs that can j
can connect to be served by BS a
VcSet of network nodes equipped y cyAmount of computational resources NA
with computational resources available at node y
FSet of available VNFs f= (Tf,πf,wf,τf)where Tf: VNF id, πf: VNF data processing capacity, wf: amount
of CPU resources required by VNF, τf: delay induced by VNF processing
CSet of available SFCs ρ=hfdum1,f(ρ)
1, . . . , f(ρ)
Nρ,fdum2i
Rρ
Set of VNFs
fG(ρ)
Virtual directed graph
NAcomprising describing SFC via virtual node
SFC ρset V(ρ)and virtual edge set E(ρ)
QSet of requests by UEs q= (sq,rq,δq,ρq)where s: source node of service request, rq: E2E requested rate,
δq: E2E requested latency, ρq: requested SFC
N(RB)
a,j
Number of RBs needed to be assigned by BS
a
to UE
j
to meet its re-
quested rate
P(sw)
idle Switch idle power NA P(mmW,i)
e
Idle power of transmitter NA
in mmWave link e
Appl. Sci. 2021,11, 10547 12 of 23
Table 1. Cont.
Symbol Interpretation Notation for Element Symbol Interpretation Notation for Element
(In Case of Sets) (In Case of Sets)
Input parameters
P(gN B,i)
aIdle power of gNB aNA P(SC,i)
aidle power of SC aNA
N(mmW)
RF
Number of RF chains used NA N(gN B)
RF ,N(SC)
RF
Number of RF chains NA
in transmitter of mmWave link used by gNB, SC
(mmW)
e
Slope parameter of transmitter NA (gN B)
a,(SC)
a
Slope parameter of transmitter NA
in mmWave link ein gNB, SC a
Decision variables
xj,aBoolean indicator of whether UE jφ˜
y,f,qBoolean indicator of whether VNF frequested
actually connects to BS aby service qis deployed on node ˜
y
θe0,q
e,θe0,q
u,v
Boolean indicator of whether physical link e= (u,v)
Nf,˜
y
Number of instances
belongs to the physical path onto which the of VNF f
virtual link e0 E(ρq)is mapped for SFC rhoqdeployed on node ˜
y
zn,mBoolean indicator of whether fiber link (n,m)actually we,wn,mBoolean indicator of whether fiber link e= (n,m)
carries traffic in either of its directions actually carries traffic from nto m
ξyBoolean indicator of whether the computational ψnBoolean indicator of whether the switch at node n
resources of node yare used is actually used to forward traffic
µaBoolean indicator for whether χeBoolean indicator of whether wireless link
BS aserves any UEs eis actually used to serve any traffic
νaAuxiliary variable for µa[25]σeAuxiliary variable for χe[25]
Appl. Sci. 2021,11, 10547 13 of 23
3. Proposed Energy-Efficient Vnf Placement, Traffic Routing, and User
Association (Hero)
Our proposed Heuristic for Energy-efficient VNF placement, traffic Routing, and user
assOciation (HERO) aims to maximize the network energy efficiency while ensuring low
UE blocking probability. HERO consists of two stages, as shown in Figure 3. In the first
stage, the traffic path is selected (i.e., user association and routing is performed), while in
the second stage VNF placement takes place, ensuring correct VNF ordering.
Input
For each UE:
Construct a weighted graph including:
Feasible AN links, X-haul transport links, and Fiber links
Edge weights: Link power consumption taking into account any network change
Calculate the
k
shortest-weighted paths
First stage
Output
Move to the next
path
Satisfies
delay &
capacity
constraints?
Other
VNFs?
YES NO
Put UE to unsatisfied users
Define UE examination order
YES
NO
Other
paths
available?
User association &
traffic routing
We select the (next) node with the highest
H
to place the
VNF ensuring correct VNF ordering
YES
YES
NO
Change
selected path
For each VNF of the UE we sort the computing nodes
of the path based on parameter
H
that considers:
Node centrality (Closeness)
Computational power
Utilization
Other nodes
available in
the path?
NO
Comp.
capacity
constraint
satisfied?
Place the
VNF
Second stage
VNF placement
Select the (next) shortest-weighted path
Other
UEs?
NO
YES
NO
YES
NO NO
Update the network
conditions
Figure 3.
Flowchart of the proposed energy-efficient VNF placement, traffic routing, and user association algorithm (HERO).
Appl. Sci. 2021,11, 10547 14 of 23
Initially, to ensure a high UE acceptance ratio, the UEs are sorted based on their service
demands, giving priority to the UEs with the most delay-intolerant services. For UEs with
the same delay requirements, priority is given to the UEs with higher rate demands. Then,
for each UE, a weighted graph is constructed from the service traffic source to the UE
with all feasible links and their respective power consumption acting as weights. HERO
calculates the
k
shortest-weighted paths and starts with the first, as long as it satisfies
the delay and link capacity constraints, taking into account the decisions for the already
examined users. Otherwise, the next path is selected until either a path that satisfies all
constraints is found or there are no other paths. In the latter case, the UE is blocked and
HERO proceeds with the next as long as there is one.
After a valid path is found for the current UE, HERO proceeds to the second stage,
where the UE VNFs are being placed. To that end, for each VNF, following the order
of the UE SFC, a list is constructed with all the available computational nodes based
on a parameter, denoted by
H
. This parameter is equal to the sum of the normalized
node centrality (closeness), the normalized node computational capabilities (
cy
), and the
node CPU utilization. The latter is equal to (a) 1 when the studied VNF can be placed in
the examined node without initiating a new VNF instance, (b) 0.1 when there is enough
computational capacity to host the studied VNF in the examined node, but a new VNF
instance is required, and (c) 0 otherwise. Subsequently, the node with the highest
H
for
the selected VNF is selected, as long as it has sufficient computational resources to host
it. Otherwise, the node with the next highest
H
is selected, until either the VNF is placed
or there is no other node to examine in the selected path. In the latter case, the algorithm
returns to stage 1 and the next path out of the
k
calculated is examined. The process is
repeated for the new path until either all VNFs of the UE are placed or there is no other
path to study and the UE is blocked. In the case where all UE VNFs are placed, the network
conditions are updated, and the algorithm proceeds to the next UE. The aforementioned
steps are repeated until all UEs are examined.
4. Interaction with Orchestration Framework
The proposed Orchestration Framework, whose high-level architecture is depicted
in Figure 4
, is based on the Vertical Slicer prototype
in [31]
. The Orchestration Framework
aims at integrating and coordinating technology-specific platforms (e.g., ETSI Open Source
MANO, SDN Controllers, O-RAN, etc.) to achieve the automated orchestration of E2E
Network Slices, including the joint provisioning and configuration of heterogeneous re-
sources, while considering the full chains of virtual functions associated with both mobile
connectivity and application logic. The Vertical Slicer follows a service-driven approach:
the high-level requirements provided by the Service Provider (e.g., number of expected
UEs, Ultra-High Definition (UHD) streaming type) are dynamically mapped into perfor-
mance requirements at the infrastructure layer in order to determine the characteristics of
the E2E Network Slice in terms of mobile connectivity (e.g., downlink throughput) and
the actual composition of the overall SFC (i.e., including network and application virtual
functions) along with the dimension of its included components.
In terms of E2E Network Slice modelling, the Vertical Slicer implements a Network
Slice Template where each SFC is split into three different Network Slice Subnets which
specify, respectively, the deployment characteristics for the RAN, the core, and the Vertical
service. The proposed modelling enhances the 3rd Generation Partnership Project (3GPP)
Network Slice Network Resource Model [
32
] by integrating the Vertical services’ compo-
nents. In addition, the Vertical Slicer also builds an overview of the needed connectivity
services to be established over the transport network to fulfil the SFC.
In the orchestration and provisioning of the needed resources, the Orchestration
Framework encompasses the resource allocation algorithm proposed in this paper. Specif-
ically, when the Orchestration Framework receives a request for instantiating a service,
the automated translation mechanism implemented at the Vertical Slicer determines the
performance requirements and the SFC to be orchestrated. Then, the Vertical Slicer triggers
Appl. Sci. 2021,11, 10547 15 of 23
a Placement Service, which calls the proposed algorithm, and provides as inputs both the
service requirements and the SFC. The Placement Service takes decisions about network
paths to be established at the data-plane and the placement of the different components in
the SFC. The result of the computation is returned to the Vertical Slicer, which proceeds with
the orchestration and configuration of the needed resources, in particular, by triggering and
coordinating the target technology-specific platforms: NFV/MEC Orchestrators for VNFs’
LCM and SDN Controllers for the management and control of the data-plane. Once the
service and the corresponding E2E Network Slice are properly instantiated and configured,
the Vertical Slicer continues coordinating the overall LCM, interacting as needed with the
technology-specific platforms for executing orchestration procedures.
Vertical Slicer
NFV / MEC
Orchestrator
Placement Service
RAN Ctrl SDN Ctrl VIM
Algorithm
Service Definition & Translation to Network Slice
Service Arbitration & Fulfillment Service Workflow Mgmt
NFV / MEC
Orchestrator
E2E Network Slice Mgmt Network Slice Subnet Coordination
Technology-specific Drivers
Figure 4. Orchestration Framework high-level architecture.
5. Evaluation Methodology and Simulation Scenarios
In our work, the heuristics were developed in MATLAB, while IBM CPLEX [
33
] was
used to compute the optimal solution of the MILP described in Section 2.1. The simulation
scenarios considered a gNB sector area of 500 m radius overlaid with two SC clusters [
25
],
as shown in Figure 5. Each cluster contained four possible SCs, which were randomly and
uniformly placed in an 100-m-radius from the cluster centers. The minimum allowable
distances are given in [
25
]. A subset of BSs, namely one SC (randomly selected) per cluster
and the gNB, was assumed to have fiber access to the aggregation network. mmWave
X-haul links could be deployed among BSs as long as their distance was lower than 200 m.
The aggregation network consisted of two layers each one comprising four possible node
positions, as shown in Figure 5. The aggregation layer nodes were connected among them
and with the BSs via fiber so that there was no disconnected node. Hotspot UE traffic was
also assumed [25].
We considered five different SFCs containing ordered combinations of the following
VNFs: NAT (Network Address Translation), FW (Firewall), TM (Traffic Monitor), WOC
(WAN Optimization Controller), IDPS (Intrusion Detection Prevention System), and VOC
(Video Optimization Controller). For each SFC, the corresponding ordered VNF combina-
tion, data rate demand (uniformly distributed in the provided set), E2E delay requirement
and share of the total SFC requests, are shown in Table 2. The data processing capacity as
well as the GFLOPS requirement of each VNF type are given in Table 3. For a given number
of UEs, we ran 10 different scenarios, with five different UE distribution snapshots each.
Appl. Sci. 2021,11, 10547 16 of 23
Figure 5. Simulation scenario example topology.
Table 2. SFC details [15].
Type VNF Ordering Throughput Delay Share
(Mbps) (ms) (%)
Web NATFWTMWOCIDPS [0.6–1] 500 20
VoIP NATFWTMFWNAT [0.404–0.64] 100 20
Streaming NATFWTMVOCIDPS [5–24] 100 39
Gaming NATFWVOCWOCIDPS [0.24–0.5] 60 6
Ultra RT AI/ML NATNAT [15–25] 1 15
Table 3. VNF details [15].
Type NAT FW TM VOC WOC IDPS
Process Capacity (Mbps) 500 400 200 578 300 600
GFLOPS Requirement 110 440 55 110 110 440
We assumed 100 RBs allocated per gNB or SC (corresponding to
µ
= 0 in 5G numerol-
ogy). The operating frequency of the gNB and SCs was 2 GHz, assuming orthogonal
channels between the gNB and the SCs. However, the SCs of different clusters could inter-
fere with each other. The mmWave X-haul links operated at 60 GHz, with 200 MHz channel
bandwidth. For the AN and the mmWave links, we employed the link budget equation and
Appl. Sci. 2021,11, 10547 17 of 23
related parameter values of [
25
]. The number of CPU cores was equal to 8, 24, and 48 for
each node at the MEC, 1st, and 2nd Aggregation layers, respectively. Parameter
P(CPU,m)
y
was selected randomly from the set
{
55, 70
}
for the MEC nodes, from
{
150, 220
}
for the
1st Aggregation Layer and from
{
200, 278
}
for the 2nd Aggregation Layer nodes, while
the idle power was assumed to be equal to 10% of the assigned maximum power values.
Each fiber link had a capacity of 10 Gbps, while the rest of the simulation parameters are
summarized in Table 4.
Table 4. Simulation Parameters [15,25,34].
Parameter Value Parameter Value Parameter Value
P(sw)
idle 315 W Pport 7 W Packet length 1.5 KB
N(gN B)
RF 8N(SC)
RF 4N(mmW )
RF 64
(gN B)
a4.7 (SC)
a4(mmW)
e100
P(gN B,i)
a130 W P(SC,i)
a6.8 W P(mmW,i)
e3.9 W
The optimal solution and the proposed heuristic (HERO) were compared with the
following SoA algorithms [15]:
Holu: This algorithm first performed the VNF placement based on the node centrality
(closeness) and the CPU utilization of computing nodes and then decided upon traffic
routing targeting the minimization of power consumption, while satisfying the E2E
service delay constraint.
BCSP: It considered node centrality (betweeness) for the VNF placement and the
shortest-path in terms of delay for routing, while meeting the E2E service delay
constraint.
Given that both reference algorithms did not handle user association, we employed
the default user association criterion for both, i.e., the UEs were connected to the BSs based
on the highest received signal-to-interference-plus-noise ratio (SINR), and consequently,
lowest number of required RBs. In addition, for a fair comparison, their UE examination
order was selected to be the same as HERO.
6. Simulation Results and Discussion
In Figures 6and 7, we show the normalized w.r.t. the Optimal solution of (17) energy
efficiency (in bits/Joule) and computational time (in logarithmic scale), respectively, for
all algorithms and different number of UEs. As can be seen, HERO provided a very good
tradeoff between energy efficiency and complexity compared to the other approaches,
achieving up to 78% of the Optimal value, with up to 742 times lower complexity. All
algorithms had a 100% user acceptance ratio in all cases, except for BCSP which achieved
96% for
N
= 20, 93% for
N
= 40, and 91% for
N
= 40. This is due to the fact that in BCSP
the CPU utilization of the computing nodes was not taken into account, resulting in less
efficient VNF placement, which under higher traffic load could lead to a few UEs being
blocked. The inefficiency of BCSP’s VNF placement is also shown in Figure 8, where the
power break down of all algorithms for different number of UEs per gNB sector area is
presented. As shown, inefficient BCSP VNF placement led to a higher number of deployed
computational nodes, and thus, higher power consumption.
Appl. Sci. 2021,11, 10547 18 of 23
Figure 6.
Energy efficiency (bits/Joule) of all algorithms for different numbers of UEs per gNB area.
Figure 7.
Execution time (s) in logarithmic scale of all algorithms for different numbers of UEs per
gNB area.
Compared to Holu and BCSP, HERO achieved up to 60% and 86% higher energy
efficiency, respectively, while keeping the complexity low, as shown in Figure 7. This is due
to the fact that HERO additionally considered user association as part of the optimization
problem leading to higher flexibility at the expense of a little higher complexity. On the
other hand, in both Holu and BCSP, the serving BSs were already decided (based on the
best SINR criterion) and then the optimal VNF placement and traffic routing from the
UE traffic source to its serving BS were performed. This is also demonstrated in Figure 8,
where the Optimal and HERO did not deploy the gNB in any case but used SCs as serving
BSs (in contrast to Holu and BCSP), hence, leading to much lower power consumption.
We also observed that the power consumption of the Optimal and HERO were scaling
better than the SoA with increasing load (HERO still achieved 68% of the Optimal energy
efficiency value when N= 40).
Appl. Sci. 2021,11, 10547 19 of 23
Figure 8. Power (W) breakdown of all algorithms for low traffic (N= 10) and high traffic (N= 40).
To further prove the improved performance of the proposed solutions (Optimal and
HERO), we show in Figure 9, the percentage of active nodes and links for all algorithms for
different number of UEs. As can be observed, Holu and BCSP, which did not optimize user
association, kept the gNB always active, thus resulting in much higher power consumption,
as shown in Figure 8. In addition, in Holu and BCSP, the number of active SCs, increased
at a much higher rate with increasing load compared to the proposed approaches, which
proves the scalability in terms of energy efficiency of the proposed solutions unlike the
SoA. Compared to Holu, HERO activated fewer BH and FB links, and consequently fewer
switches at the expense, however, of a higher number of active computational nodes.
This is due to the fact that, in the considered scenario, which, however, was an accurate
representation of actual networks of this type, the fiber links and switches had much higher
energy impact (
P(sw)
idle
=315 W) compared to the computational nodes, so that more efficient
user association and routing had a higher impact on the overall performance compared to
the VNF placement. As a result, Holu, which gave higher priority to VNF placement at
the expense of traffic routing efficiency, while not taking user association into account at
all, resulted, as already shown, in poorer overall performance. It is worth noting, however,
that the proposed solutions are independent of the power consumption values, since the
latter constitute the algorithms’s input, and thus, different values could lead to different
results always targeting high energy efficiency. As a final remark, the performance gains
of the proposed algorithms justify the motivation of our work that user association, VNF
placement, and traffic routing should be jointly considered to guarantee true optimal E2E
network performance.
Appl. Sci. 2021,11, 10547 20 of 23
Figure 9.
Percentage of active nodes and links of all algorithms for different numbers of UEs per
gNB area.
7. Conclusions
In this paper, we studied the joint VNF placement, user association, and traffic routing
in B5G networks targeting energy efficiency maximization, while ensuring a high UE
acceptance ratio. We modeled the aforementioned problem as a MILP with minimal
assumptions, which captured all characteristics of the employed technologies, resource,
and service types as well as their constraints and power consumption. To tackle the
prohibitive complexity of the studied problem, we proposed HERO, an energy-efficient
resource planning heuristic, which was shown to significantly outperform the SoA, while
achieving up to 78% of the optimal value, with up to 742 times lower complexity. Finally, we
described the Orchestration Framework that is responsible for the dynamic and automated
orchestration of Vertical-driven services in tailored E2E Network Slices, and explained
how such a framework is assisted by the proposed algorithms, which jointly compute
the optimal allocation of both network and compute resources across the radio, core, and
transport network segments.
Although the proposed formulation and heuristic algorithm can be extended to also
handle service requests dynamically arriving in time (i.e., they can be used to implement
an
online
joint computational and communications resource allocation policy), the compu-
tational complexity of the heuristic may still be too high to properly adapt to the small time
scale of request arrivals. To this end, in the future, we plan to explore learning-based tech-
niques (inspired from approximate reinforcement learning) to construct low-complexity
online energy-efficient resource allocation algorithms.
Author Contributions:
Conceptualization, M.G. and A.M.; architecture design, F.M. and G.L.;
methodology, A.M. and M.G.; prototype implementation, L.L.; validation, A.M. and M.G.; formal
analysis, M.G.; resources, G.K.; writing—original draft preparation, M.G. and A.M.; writing—review
and editing, G.K., N.P. and F.M.; visualization, A.M.; supervision, N.P. and N.C.; project adminis-
tration, G.K. and F.M.; funding acquisition, G.K. and N.C. All authors have read and agreed to the
published version of the manuscript.
Appl. Sci. 2021,11, 10547 21 of 23
Funding: This work was funded by H2020 5G-COMPLETE (GA 871900).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: No new data were created or analyzed in this study.
Conflicts of Interest:
The authors declare no conflict of interest. The funders had no role in the design
of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or
in the decision to publish the results.
Abbreviations
The following abbreviations are used in this manuscript:
3GPP 3rd Generation Partnership Project
5G Fifth Generation
5G-NR 5G-New Radio
5G-PPP 5G Infrastructure Public Private Partnership
6G Sixth Generation
B5G Beyond Fifth Generation
BS Base Station
AN Access Network
CAPEX Capital Expenditure
CPU Central Processing Unit
C-RAN Centralized-Radio Access Network
DL Downlink
E2E End-to-end
eMBB Enhanced Mobile Broadband
ETSI European Telecommunications Standards Institute
FPGA Field Programmable Gate Array
FW Firewall
gNB gNodeB
GPU Graphics Processing Unit
ICT Information and Communications Technology
IDPS Intrusion Detection/Prevention System
LCM Lifecycle Management
MANO Management and Orchestration
MEC Multi-Access Edge Computing
MILP Mixed Integer Linear Program
mMTC Massive Machine Type Communication
NAT Network Address Translation
NFV Network Function Virtualization
OPEX Operational Expenditure
OSI Open System Interconnection
QoS Quality of Service
RAN Radio Access Network
RB Resource Block
RF Radio Frequency
SINR Signal to Interference plus Noise Ratio
State-of-the-Art SoA
SC Small Cell
SDN Software Defined Networking
SDO Standards Developing Organization
SFC Service Function Chain
TM Traffic Monitor
uRLLC Ultra Reliable Low Latency Communication
UE User Equipment
Appl. Sci. 2021,11, 10547 22 of 23
UHD Ultra-High Definition
VM Virtual Machine
VNF Virtual Network Function
VOC Video Optimization Controller
WOC WAN Optimization Controller
References
1.
Ali, J.; Roh, B.H.; Lee, S. QoS improvement with an optimum controller selection for software-defined networks. PLoS ONE
2019
,
14, e0217631. [CrossRef] [PubMed]
2.
Ali, J.; Roh, B.H. Quality of Service improvement with optimal software-defined networking controller and control plane
clustering. Comput. Mater. Contin. 2021,67, 849–875. [CrossRef]
3.
Barakabitze, A.; Ahmad, A.; Mijumbi, R.; Hines, A. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures
and future challenges. Comput. Netw. 2020,167, 106984. [CrossRef]
4.
Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A survey. IEEE Internet Things J.
2018
,5, 450–465.
[CrossRef]
5.
Tang, L.; Yang, H.; Ma, R.; Hu, L.; Wang, W.; Chen, Q. Queue-aware dynamic placement of virtual network functions in 5G access
network. IEEE Access 2018,6, 44291–44305. [CrossRef]
6.
Laghrissi, A.; Taleb, T. A survey on the placement of virtual resources and Virtual Network Functions. IEEE Commun. Surv. Tutor.
2019,1, 1409–1434. [CrossRef]
7.
Liu, J.; Lu, W.; Zhou, F.; Lu, P.; Zhu, Z. On dynamic Service Function Chain deployment and readjustment. IEEE Trans. Netw.
Serv. Manag. 2017,14, 543–553. [CrossRef]
8.
Dong, L.; da Fonseca, N.; Zhu, Z. Application-Driven provisioning of Service Function Chains over heterogeneous NFV platforms.
IEEE Trans. Netw. Serv. Manag. 2021,18, 3037–3048. [CrossRef]
9.
Cao, H.; Du, J.; Zhao, H.; Luo, D.; Kumar, N.; Yang, L.; Yu, F. Resource-Ability assisted Service Function Chain embedding and
scheduling for 6G networks With virtualization. IEEE Trans. Veh. Technol. 2021,70, 3846–3859. [CrossRef]
10.
Cudak, M.; Ghosh, A.; Ghosh, A.; Andrews, J. Integrated access and backhaul: A key enabler for 5G millimeter-wave deployments.
IEEE Commun. Mag. 2021,59, 88–94. [CrossRef]
11.
Ghribi, C.; Mechtri, M.; Zeghlache, D. A dynamic programming algorithm for joint VNF placement and chaining. In Proceedings
of the 2016 ACM Workshop on Cloud-Assisted Networking, Irvine, CA, USA, 12 December 2016.
12. Ma, Y.; Liang, W.; Huang, M.; Xu, W.; Guo, S. Virtual Network Function service provisioning in MEC via trading off the usages
between computing and communication resources. (early access). IEEE Trans. Cloud Comput. 2020. [CrossRef]
13.
Soualah, O.; Mechtri, M.; Ghribi, C.; Zeghlache, D. Energy efficient algorithm for VNF placement and chaining. In Proceedings of
the 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, 14–17
May 2017.
14.
Ayoubi, S.; Sebbah, S.; Assi, C. A logic-based Benders decomposition approach for the VNF assignment problem. IEEE Trans.
Cloud Comput. 2019,7, 894–906. [CrossRef]
15.
Varasteh, A.; Madiwalar, B.; van Bemten, A.; Kellerer, W.; Mas–Machuca, C. Holu: Power-aware and delay-constrained VNF
placement and chaining. IEEE Trans. Netw. Serv. Manag. 2021,18, 1524–1539. [CrossRef]
16.
Tajiki, M.; Salsano, S.; Chiaraviglio, L.; Shojafar, M.; Akbari, B. Joint energy efficient and QoS-aware path allocation and VNF
placement for Service Function Chaining. IEEE Trans. Netw. Serv. Manag. 2019,16, 374–388. [CrossRef]
17.
Dietrich, D.; Papagianni, C.; Papadimitriou, P.; Baras, J. Network function placement on virtualized cellular cores. In Proceedings
of the 2017 9th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 4–8
January 2017.
18.
Yang, S.; Li, F.; Trajanovski, S.; Chen, X.; Wang, Y.; Fu, X. Delay-aware Virtual Network Function placement and routing in edge
clouds. IEEE Trans. Mobile Comput. 2021,20, 445–459. [CrossRef]
19.
Spinelli, F.; Mancuso, V. Toward enabled industrial verticals in 5G: A survey on MEC-based approaches to provisioning and
flexibility. IEEE Commun. Surv. Tutor. 2021,23, 596–630. [CrossRef]
20. Open Source MANO. 2021. Available online: https://osm.etsi.org/ (accessed on 7 October 2021).
21. O-RAN Alliance. 2021. Available online: https://www.o-ran.org/ (accessed on 7 October 2021).
22.
Casetti, C.; Chiasserini, C.; Martín-Pérez, J.; Molner, N.; Deiss, T. The Vertical Slicer: Verticals’ Entry Point to 5G Networks. In
Proceedings of the 27th European Conference on Networks and Communications (EuCNC 2018), Ljubljana, Slovenia, 18–21
June 2018.
23.
Perez, M.G.; Perez, G.M.; Giardina, P.; Bernini, G.; Neves, P.; Alcaraz-Calero, J.; Wang, Q.; Koutsopoulos, K. Self-Organizing
Capabilities in 5G Networks: NFV & SDN Coordination in a Complex Use Case. In Proceedings of the 27th European Conference
on Networks and Communications (EuCNC 2018), Ljubljana, Slovenia, 18–21 June 2018.
24.
Khalili, H.; Papageorgiou, A.; Siddiqui, M.; Meixner, C.C.; Carrozzo, G.; Nejabati, R.; Simeonidou, D. Network Slicing-aware
NFV Orchestration for 5G Service Platforms. In Proceedings of the 28th European Conference on Networks and Communications
(EuCNC 2019), Valencia, Spain, 18–21 June 2019.
Appl. Sci. 2021,11, 10547 23 of 23
25.
Mesodiakaki, A.; Zola, E.; Santos, R.; Kassler, A. Optimal user association, backhaul routing and switching off in 5G heterogeneous
networks with mesh millimeter wave backhaul links. Ad Hoc Netw. 2018,78, 99–114. [CrossRef]
26.
ETSI ES 203 228: Environmental Engineering (EE): Assessment of Mobile Network Energy Efficiency, November 2020. v.1.3.1.
Available online: https://www.etsi.org/deliver/etsi_es/203200_203299/203228/01.03.01_60/es_203228v010301p.pdf (accessed
on 7 October 2021).
27.
ETSI EN 303 471: Energy Efficiency Measurement Methodology and Metrics for Network Function Virtualisation (NFV), January
2019. v.1.1.1. Available online: https://www.etsi.org/deliver/etsi_en/303400_303499/303471/01.01.01_60/en_303471v010101p.
pdf (accessed on 7 October 2021).
28.
Li, X.; Garcia-Saavedra, A.; Costa-Perez, X.; Bernardos, C.; Guimaraes, C.; Antevski, K.; Mangues-Bafalluy, J.; Baranda, J.; Zeydan,
E.; Corujo, D.; et al. 5Growth: An End-to-End Service Platform for Automated Deployment and Management of Vertical Services
over 5G Networks. IEEE Commun. Mag. 2012,59, 84–89. [CrossRef]
29.
Gatzianas, M.; Mesodiakaki, A.; Kalfas, G.; Pleros, N. Energy-efficient joint computational and network resource planning in
Beyond 5G networks. Proc. IEEE Globecom. 2021, to appear.
30. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004.
31. Vertical Slicer. Available online: https://github.com/nextworks-it/slicer (accessed on 7 October 2021).
32.
TR 28.541: Management and Orchestration; 5G Network Resource Model (NRM); Stage 2 and Stage 3 (Rel. 17), 2020. v. 17.0.0.
Available online: https://www.3gpp.org/ftp//Specs/archive/28_series/28.541/28541-h01.zip (accessed on 7 October 2021).
33.
ILOG CPLEX Optimization Studio. 2020. Available online: https://www.ibm.com/products/ilog-cplex-optimization- studio
(accessed on 7 October 2021).
34.
Heddeghem, W.V.; Idzikowski, F.; Vereecken, W.; Colle, D.; Pickavet, M.; Demeester, P. Power consumption modeling in optical
multilayer networks. Photon. Netw. Commun. 2012,24, 86–102. [CrossRef]
... Due to the high complexity of the developed optimal solution, a heuristic algorithm is also proposed and numerically evaluated. The challenging aspect of online sequential decision making is captured in the problem formulation and developed heuristics, while taking into account the duration of each SR, thus complementing previous works focusing exclusively on offline solutions [3], [10]. Our results demonstrate that the proposed heuristic can achieve up to 89% of the optimal performance with up to 90% lower complexity, while significantly outperforming the SoA. ...
Conference Paper
Full-text available
In this paper, we study the joint problem of real-time user association, traffic routing and Virtual Network Function (VNF) placement towards maximizing the mobile network's energy efficiency and user acceptance ratio. The studied problem is formulated as a Mixed Integer Linear Program (MILP), under various computational, capacity, and flow conservation constraints, while also meeting the Service Function Chain (SFC), throughput and delay requirements of each service request. In addition to the optimal solution of the MILP problem, an efficient low computational complexity heuristic (named as ONE) is also developed and evaluated via simulations. The proposed solutions are shown to significantly outperform the State-of-Art (SoA) in terms of energy efficiency, with ONE achieving up to 89% of the optimal energy efficiency value with up to 90% lower computational time even under heavy user traffic load scenarios.
... User-BS selection, aiming to associate a user with a particular serving BS, is a critical procedure in wireless networks that substantially affects network performance [13]. In traditional LTE systems, the radio admission control entity is located in the radio resource control layer of the protocol stack, which decides whether a new radio-bearer admission request is admitted or rejected [14]. ...
Article
Full-text available
Although fifth-generation (5G) wireless communication can ] support well a high data rate of transmission, issues such as base station (BS) failure and poor BS signals may cause serious interruption problems. This paper studies the user-BS selection strategy with received signal strength indication (RSSI)-based reliability in 5G wireless networks. First, reliability is defined on the basis of the RSSI and failure probability of the BS. The problem is modeled as a selection strategy optimization problem with BS capacity and receiving sensitivity as constraints. Second, the original problem can be transformed into a resource allocation problem with probabilistic constraints. For the situation where user distribution is known, we used dynamic programming to obtain the optimal BS selection strategy. For the situation where user distribution is unknown, starting from user trajectory data, we used the space–time density estimation method based on the Epanechnikov kernel to estimate user density and bring it into dynamic programming to obtain the optimal selection strategy. Simulation results show that our density estimation algorithm is more accurate than the commonly used density estimation algorithm. Compared with the distance-based optimization method, our RSSI-based optimization method also improved the communication signal quality under different scenarios.
... The widely deployed fifth generation (5G) and the coming sixth (6G) communication networks are believed to offer a large amount of network services for growing diverse demands, such as high-definition video playing, vehicular networks, massive Internet of Things, and telemedicine [1][2][3]. These demands are generated by traditional mobile communication applications and vertical market segments with different requirements for quality of service (QoS) and key performance indicators (KPI) [4][5][6][7]. It is challenging to achieve novel communication performance by a "one-size-fits-all" network infrastructure for various requirements of QoS and KPI. ...
Article
Full-text available
With the rapid growth of users and sustained network demands powered by different industries, the quality of service (QoS) of the cellular network is affected by network traffic and computing loads. The current solutions of QoS improvement in academia focus on the fundamental algorithms within the physical and medium access control (MAC) layer. However, traffic features of various scenarios extracted from field data are rarely addressed for practical network configuration refinement. In this paper, we identify significant indicators of high traffic load cells according to the field data provided by telecommunication operators. Then, we propose the analysis flow of high traffic load cells with basic principles of network configuration refinement for QoS improvement. To demonstrate the proposed analysis flow and the refinement principles, we consider three typical scenarios of high traffic load cells, including high population density, emergency, and high-speed mobility. For each scenario, we discuss traffic features with field data. The corresponding performance evaluation demonstrates that the proposed principle can significantly enhance the network performance and user experience in terms of access success rate, downlink data rate, and number of high traffic load cells.
Article
Full-text available
5G/6G networks offer high-capacity, low-latency and high-speed communications to new services associated with vertical industries like smart cities, automotive and energy sectors. To achieve this objective, new networking and computing paradigms such as Network Function Virtualization (NFV), Multi-access Edge Computing (MEC) and Software Defined Networking (SDN) are required to bring flexibility and adaptability to networks, while optical networks are envisioned to build the backhaul of 5G/6G networks thanks to their high capacity. Current studies on NFV-5G network planning with MEC resources follow either the online trend or the offline trend. In the online trend, resource allocation to service connection requests is determined upon request arrival based on the available resources. Conversely, in the offline trend, network planning is conducted assuming that the expected traffic (or the full set of service requests) is known in advance. However, to the best of our knowledge, previous works have not assessed the performance of these static offline network plannings when operating under dynamic traffic. In this paper, we evaluate the performance of a previously proposed static planning algorithm for NFV-5G networks under dynamic traffic conditions and analyze the impact of dynamic traffic on the request blocking ratio. Moreover, we also examine the performance of the static planning for each individual service type in a dynamic network scenario with three different available services. The simulation results show that overdimensioning is necessary when planning NFV-5G networks statically, and that the overdimensioning should consider different criteria based on the network expected performance objectives.
Article
Mobile edge computing (MEC) and millimeter-wave 1 (mmWave) communication are promising techniques for future 2 cellular networks. MEC enables latency-critical tasks offloading 3 at the network edge, while mmWave provides an abundant spec-4 trum for gigabit-per-second data transmission. Dense deployment 5 of remote radio units (RRUs) is necessary due to high mmWave 6 signal path loss, and hence limiting the deployment cost becomes 7 a prime network design factor. Our work considers that RRUs are 8 deployed to provide mmWave access and to offload computation 9 requests to edge servers (ESs) via fronthaul links. We propose 10 an edge network (EN) deployment problem by jointly optimizing 11 the mmWave access and fronthaul networks. Converged fiber 12 and in-band mmWave techniques are utilized for flexible fron-13 thaul links deployment and cost reduction. The deployed EN is 14 expected to fulfill coverage, reliability and latency requirements 15 of ultra-reliable low-latency (uRLLC) services. We formulate the 16 optimization problem as an integer linear program (ILP) and 17 propose a multi-objective evolutionary algorithm to solve the 18 problem. The numerical results demonstrate that our proposed 19 algorithm can achieve close-to-optimal solutions compared with the 20 ILP formulation. We also comparatively evaluate the deployment 21 costs under different EN settings and show that our algorithm 22 provides up to 20.3% cost savings compared to non-converged 23 solutions. 24 Index Terms-Mobile edge computing, edge network deploy-25 ment, millimeter-wave communication, fronthaul network, cost 26 efficiency. 27
Article
Full-text available
This paper presents a comprehensive set of design methods for making future Internet networking fully energy-aware and sustainably minimizing and managing the energy footprint. It includes (a) 41 energy-aware design methods, grouped into Service Operations Support, Management Operations Support, Compute Operations Support, Connectivity/Forwarding Operations Support, Traffic Engineering Methods, Architectural Support for Energy Instrumentation, and Network Configuration; (b) energy consumption models and energy metrics are identified and specified. It specifies the requirements for energy-defined network compliance, which include energy-measurable network devices with the support of several control messages: registration, discovery, provisioning, discharge, monitoring, synchronization, flooding, performance, and pushback.
Article
Full-text available
With the increased penetration of cloud computing and virtualization, a plethora of internet of things devices have been deployed globally. As a result, computationally intensive tasks are transmitted from the edge towards the centralized cloud for processing that leads to increased energy utilization in the cloud data centers while at the same increasing significant latency for critical applications. Recent years have witnessed a paradigm shift from centralized cloud computing towards mobile edge computing (MEC), where computational tasks are offloaded at the edge servers near user equipment (UE). This paradigm leads to lowering the energy utilization in the cloud data centers, along with low latency for UE and efficient resource utilization at the edge. In this context, the scale and complexity of the MEC networks is drastically increasing and, consequently, finding effective energy-efficient solutions for computational task offloading and resource allocation in MEC networks has become an ambitious task. To address the aforementioned challenges, this work surveys the state of the art in different categorizations of algorithm-based computational task offloading and resource allocation strategies focusing on energy utilization. It also provides a detailed cross-comparison of existing strategies in terms of their implementation specifications. Additionally, this paper also highlights open challenges and potential future research directions to facilitate efficient task offloading and resource allocation at the edge with reduced energy consumption at the centralized data centers. Our work also paves the way for the deployment of critical applications at the edge that require low latency and high service quality guarantees.
Book
While the 5th Generation (5G) system is being widely deployed across the globe, the information and communication technology (ICT) industry, research, standardization and consensus building for the 6th generation (6G) are already well underway with high expectations towards the merger of digital, physical, and human worlds. The main goal of this book is to introduce the upcoming 6G technologies and outline the foreseen challenges, enablers, and architectural design trends that will be instrumental in realizing a Sustainable and Trustworthy 6G system in the coming years. The envisioned 6G system promises to offer a more advanced and comprehensive user experience not only by achieving higher speeds, larger capacity, and lower latency, but also much more improved reliability, greater energy efficiency, and an enhanced security and privacy-preserving framework while natively integrating intelligence end-to-end (E2E). Achieving these goals will require innovative technological solutions and a holistic system design that considers the needs of various stakeholders and future 6G use cases. Capitalizing on the European 5G Public-Private-Partnership (5G PPP) Phase 3 projects working on 5G & Beyond and 6G research in recent years, and the join efforts between the Architecture Working Group (WG) and the 6G flagship Hexa-X project, this book delves into the critical challenges and enablers of the 6G system, including new network architectures and novel enhancements as well as the role of regulators, network operators, industry players, application developers, and end-users. Accordingly, this book provides a comprehensive landscape of the current research activities on 6G in Europe and sets a solid cornerstone on the 6G development towards a more connected, intelligent, and sustainable world. Furthermore, as 5G PPP Phase 3 consists of the last calls of the Horizon 2020 program, this book is aimed to lay the architectural foundation for the next European program towards 6G, i.e., Smart Networks & Services (SNS) Joint Undertaking (JU).
Conference Paper
Full-text available
Network Function Virtualization (NFV) is expected to be a crucial enabler of Beyond 5G (B5G) networks, supporting new services with stringent requirements, while offering high flexibility and configurability. In this paper, we consider the joint problem of Virtual Network Function (VNF) placement alongside computational and communication resource allocation in a mobile network to minimize total power expenditure while satisfying the Service Function Chain (SFC), throughput and delay requirements. We explicitly account for the Access Network (AN) and formulate a general Mixed Integer Linear Program (MILP). Due to the high complexity of the latter, we propose an efficient heuristic, which is shown to significantly outperform the State-of-Art (SoA), while achieving up to 78% of the optimal energy efficiency with up to 742 times lower complexity.
Article
Full-text available
This article introduces the key innovations of the 5Growth service platform to empower vertical industries with an AI-driven automated 5G end-to-end slicing solution that allows industries to achieve their service requirements. Specifically, we present multiple vertical pilots (Industry 4.0, transportation, and energy), identify the key 5G requirements to enable them, and analyze existing technical and functional gaps as compared to current solutions. Based on the identified gaps, we propose a set of innovations to address them with: (i) support of 3GPP-based RAN slices by introducing a RAN slicing model and providing automated RAN orchestration and control; (ii) an AI-driven closed-loop for automated service management with service level agreement assurance; and (iii) multi-domain solutions to expand service offerings by aggregating services and resources from different provider domains and also enable the integration of private 5G networks with public networks.
Article
Full-text available
Service function chains (SFCs) are an ordered set of virtual network functions (VNFs) which can realize a specific network service. Enabled by virtualization technologies, these VNFs are hosted on physical machines (PMs), and interconnected by network switches. In today networks, these resources are usually under-utilized and/or over-provisioned, resulting in power-inefficient deployments. To improve power-efficiency, SFCs should be deployed utilizing the minimum number of PMs and network equipment, which are not concomitant. Considering the existing PM and switch power consumption models and their resource constraints, we formulate the power-aware and delay-constrained joint VNF placement and routing (PD-VPR) problem as an Integer Linear Program (ILP). Due to the NP-completeness of the problem, we propose Holu, a fast heuristic framework that efficiently solves the PD-VPR problem in an online manner. Specifically, Holu decomposes the PD-VPR into two sub-problems and solve them sequentially: i) a VNF placement problem that consists of mapping the VNFs to PMs using a centrality-based ranking method, and ii) a routing problem that efficiently splits the delay budget between consecutive VNFs of the SFC, and finds a Delay-Constrained Least-Cost (DCLC) shortest-path through the selected PMs (hosting VNFs) using the Lagrange Relaxation based Aggregated Cost (LARAC) algorithm. Our simulation results indicate that Holu outperforms the state-of-the-art algorithms in terms of total power consumption and acceptance rate by 24.7% and 31%, respectively.
Article
Full-text available
The controller is indispensable in software-defined networking (SDN). With several features, controllers monitor the network and respond promptly to dynamic changes. Their performance affects the quality-of-service (QoS) in SDN. Every controller supports a set of features. However, the support of the features may be more prominent in one controller. Moreover, a single controller leads to performance, single-point-of-failure (SPOF), and scalability problems. To overcome this, a controller with an optimum feature set must be available for SDN. Furthermore, a cluster of optimum feature set controllers will overcome an SPOF and improve the QoS in SDN. Herein, leveraging an analytical network process (ANP), we rank SDN controllers regarding their supporting features and create a hierarchical control plane based cluster (HCPC) of the highly ranked controller computed using the ANP, evaluating their performance for the OS3E topology. The results demonstrated in Mininet reveal that a HCPC environment with an optimum controller achieves an improved QoS. Moreover, the experimental results validated in Mininet show that our proposed approach surpasses the existing distributed controller clustering (DCC) schemes in terms of several performance metrics i.e., delay, jitter, throughput, load balancing, scalability and CPU (central processing unit) utilization.
Article
Full-text available
Although network function virtualization (NFV) has been proven to be beneficial in terms of equipment cost, service delivery flexibility, and time-to-market, most of the studies in this area only addressed homogeneous NFV platforms (e.g., with virtual machines (VMs) only). In this work, we argue that by leveraging heterogeneous NFV platforms such as VMs, docker containers, and programmable hardware accelerators (e.g., SmartNICs), one could achieve better flexibility and cost-effectiveness to support virtual network function service chains (vNF-SCs) with various quality-of-service (QoS) requirements. Therefore, we study application-driven provisioning of vNF-SCs over heterogeneous NFV platforms, and design a polynomial-time approximation algorithm to tackle the problem for near-optimal solutions. We first introduce a layered auxiliary graph (LAG) based approach to model the problem of vNF-SC provisioning, and then formulate a novel integer linear programming (ILP) model based on it. Specifically, the ILP model minimizes the total cost of vNF-SC deployment while ensuring that the QoS requirements of all the vNF-SCs are satisfied. To solve the ILP time-efficiently, we propose an approximation algorithm based on linear programming (LP) relaxation and randomized rounding. Extensive simulations confirm that with significantly improved time-efficiency, our proposed algorithm can provide near-optimal solutions whose gaps to the exact ones are bounded.
Article
Full-text available
The increasing consumption of multimedia services and the demand of high-quality services from customers has triggered a fundamental change in how we administer networks in terms of abstraction, separation, and mapping of forwarding, control and management aspects of service. The industry and the academia are embracing 5G as the future network capable to support next generation vertical applications with different service requirements. To realize this vision in 5G network, the physical network has to be sliced into multiple isolated logical networks of varying sizes and structures which are dedicated to different types of services based on their requirements with different characteristics and requirements(e.g., a slice for massive IoT devices, smartphones or autonomous cars, etc.). Softwarization using Software-Defined Networking (SDN) and Network Function Virtualization (NFV)in 5G networks are expected to fill the void of programmable control and management of network resources. In this paper, we provide a comprehensive review and updated solutions related to 5G network slicing using SDN and NFV. Firstly, we present 5G service quality and business requirements followed by a description of 5G network softwarization and slicing paradigms including essential concepts, history and different use cases. Secondly, we provide a tutorial of 5G network slicing technology enablers including SDN, NFV, MEC, cloud/Fog computing, network hypervisors, virtual machines & containers. Thidly, we comprehensively survey different industrial initiatives and projects that are pushing forward the adoption of SDN and NFV in accelerating 5G network slicing. A comparison of various 5G architectural approaches in terms of practical implementations, technology adoptions and deployment strategies is presented.. Moreover, we provide discussion on various open source orchestrators and proof of concepts representing industrial contribution.. The work also investigates the standardization efforts in 5G networks regarding network slicing and softwarization. Additionally, the article presents the management and orchestration of network slices in a single domain followed by a comprehensive survey of management and orchestration approaches in 5G network slicing across multiple domains while supporting multiple tenants. Furthermore, we highlight the future challenges and research directions regarding network softwarization and slicing using SDN and NFV in 5G networks.
Article
Full-text available
Mobile Edge Computing (MEC) offers a way to shorten the cloud servicing delay by building the small-scale cloud infrastructures at the network edge, which are in close proximity to the end users. Moreover, Network Function Virtualization (NFV) has been an emerging technology that transforms from traditional dedicated hardware implementations to software instances running in a virtualized environment. In NFV, the requested service is implemented by a sequence of Virtual Network Functions (VNF) that can run on generic servers by leveraging the virtualization technology. Service Function Chaining (SFC) is defined as a chain-ordered set of placed VNFs that handles the traffic of the delivery and control of a specific application. NFV therefore allows to allocate network resources in a more scalable and elastic manner, offer a more efficient and agile management and operation mechanism for network functions and hence can largely reduce the overall costs in MEC. In this paper, we study the problem of how to place VNFs on edge and public clouds and route the traffic among adjacent VNF pairs, such that the maximum link load ratio is minimized and each user's requested delay is satisfied. We consider this problem for both totally ordered SFCs and partially ordered SFCs. We prove that this problem is NP-hard, even for the special case when only one VNF is requested. We subsequently propose an efficient randomized rounding approximation algorithm to solve this problem. Extensive simulation results show that the proposed approximation algorithm can achieve close-to-optimal performance in terms of acceptance ratio and maximum link load ratio.
Article
Integrated access and backhaul (IAB) is an important new feature in 5G NR that enables rapid and cost-effective millimeter-wave (mmWave) deployments through self-backhauling in the same spectrum. IAB deployments can achieve excellent cell edge coverage, for example, uplink rates above 100 Mb/s, while significantly reducing the amount of required fiber. This article provides a primer on IAB, contrasting it with the many failed multihop systems that preceded it. We conduct a large-scale study of coverage and rate performance based on a plausible deployment in Chicago's Lincoln Park neighborhood, utilizing ray tracing in the 39 GHz band. The study demonstrates that, as theory predicts, an IAB solution provides a massive coverage advantage for early mmWave rollouts with only a small number of fiber-connected (donor) base stations, for example, less than 10/km 2 . We show that as the UE and traffic loads increase over time as the 5G eco-system matures, the per user throughput can be maintained by replacing IAB (relay) nodes with donor nodes, that is, slowly extending the fiber network.
Article
While 5G is being deployed all around the world, the industry and academia start the investigation of 6G. Network function virtualization (NFV) is seen as the key enabler towards the flexible resource management and sharing of 6G networks. The main idea of NFV is to decouple the physical devices from the specific functions that run on them. In NFV, virtual network service (NS) is modeled as a service function chain (SFC). The challenges in SFC description, composition, embedding, and scheduling are key issues in NFV. In this paper, we focus on the joint SFC embedding and scheduling for NFV in 6G networks. With the assistance of sensing the physical node resource abilities, we propose a novel SFC embedding and scheduling algorithm, which is named as RA-SFC-6G. A new service is first composed as an SFC which is an ordered sequence of virtual network functions (VNFs). Afterwards, our RA-SFC-6G algorithm will select the physical nodes with stronger resource abilities and abundant resources to accommodate the SFC. In addition, the NS is guaranteed to be implemented without violating the NS maximum allowed scheduling time. If violated, our RA-SFC-6G can re-embed and re-schedule the violated VNFs to suitable positions. In order to validate our RA-SFC-6G performance, we do the experiment work. Experiment results show that our RA-SFC-6G achieves at least 10% higher SFC acceptance ratio than the previous counterparts and the typical heuristics.
Article
The increasing number of heterogeneous devices connected to the Internet, together with tight 5G requirements have generated new challenges for designing network infrastructures. Industrial verticals such as automotive, smart city and eHealthcare (among others) need secure, low latency and reliable communications. To meet these stringent requirements, computing resources have to be moved closer to the user, from the core to the edge of the network. In this context, ETSI standardized Multi-Access Edge Computing (MEC). However, due to the cost of resources, MEC provisioning has to be carefully designed and evaluated. This survey firstly overviews standards, with particular emphasis on 5G and virtualization of network functions, then it addresses flexibility of MEC smart resource deployment and its migration capabilities. This survey explores how the MEC is used and how it will enable industrial verticals.