Ashwin Gumaste’s research while affiliated with Indian Institute of Technology Bombay and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (157)


P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams
  • Article

November 2024

·

8 Reads

Computer Networks

Sidharth Sharma

·

·

Ashwin Gumaste

·


A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers

October 2024

·

4 Reads

ACM Transactions on Internet Technology

Network Function Virtualization (NFV) is a promising technology that can transform how internet service providers deliver their services. However, recent studies have identified several challenges in adopting NFV. Two key challenges are central to the operation and capacity planning of NFV Data Centers (DCs): (i) Service Function Chain (SFC) realization – determining if a new request with a known profile can be accommodated, and (ii) Network Function Virtualization (NFV) traffic bounds estimation – estimating the total traffic that a data center can handle considering all service requests and their performance constraints. To address these challenges, we propose a model that leverages stochastic network calculus to effectively dimension an NFV DC while ensuring delay and availability bounds for all service requests. Our theoretical model provides a mathematical framework to assess the realization of a single SFC request without delving into the specifics of the realization process. We utilize established availability-aware Virtual Network Function (VNF) placement patterns to obtain traffic bounds essential to planning data center capacity. We analyze NFV data center traffic under various scenarios over a Fat-tree DC topology. The results demonstrate that data center capacity is significantly influenced by the VNF placement strategy. Additionally, for data centers hosting latency-sensitive services, Service Level Objective (SLO) constraints on availability and delay are crucial in determining the number of such requests that can be accommodated.


Fig. 1: (a) A toy network of 4 routers in which a new rule at router Q is being inserted in its forwarding table (shown in dashed block). Vercel represents all rules in a binary tree and after insertion of a new rule, identifies 3 headers whose reachability might be affected. (b) An example to demonstrate reachability between router Y and R along the path Y − U − R with least squares. Vercel represents 3 headers in 3-dimension with the orthogonal vectors. Forwarding rules of routers Y and U are represented in x-y and y-z planes, respectively. Vercel computes reachability by sequentially projecting a point in 3-dimension to the subspace created for router Y and U .
Fig. 2: Steps for Vercel's handling of user-specified intent related to service configuration (in the network shown on the right side of the figure).
Fig. 3: Example demonstrating internals of Vercel's rectification system. Initially, R is not reachable from Y . However, after applying Vercel's rectification at Q, reachability till R is ensured along the path Y − U − Q − R.
Fig. 4: Vercel components.
Fig. 5: CDF of the verification time of Vercel on 8 datasets [31], [26] during a rule update.
VERCEL: Verification and Rectification of Configuration Errors with Least Squares
  • Preprint
  • File available

September 2024

·

24 Reads

We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet headers into standard basis vectors that are used to create a port-specific forwarding matrix A\mathcal{A}, representing a set of packet headers/prefixes that a router forwards along a port. By equating this matrix A\mathcal{A} and a vector b (that represents the set of all headers under consideration), we are able to apply \textit{least squares} (which produces a column rank agnostic solution) to compute which headers are reachable at the destination. Reachability now simply means evaluating if vector b is in the column space of A\mathcal{A}, which can efficiently be computed using least squares. Further, the use of vector representation and least squares opens new possibilities for understanding network behavior. For example, we are able to map rules, routing policies, what-if scenarios to the fundamental linear algebraic form, Ax=b\mathcal{A}x=b, as well as determine how to configure forwarding tables appropriately. We show Vercel is faster than the state-of-art such as NetPlumber, Veriflow, APKeep, AP Verifier, when measured over diverse datasets. Vercel is almost as fast as Deltanet, when rules are verified in batches and provides better scalability, expressiveness and memory efficiency. A key highlight of Vercel is that while evaluating for reachability, the tool can incorporate intents, and transform these into auto-configurable table entries, implying a recommendation/correction system.

Download

VERCEL: Verification and Rectification of Configuration Errors With Least Squares

January 2024

IEEE/ACM Transactions on Networking

We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet headers into standard basis vectors that are used to create a port-specific forwarding matrix A\mathcal{A} , representing a set of packet headers/prefixes that a router forwards along a port. By equating this matrix A\mathcal{A} and a vector b (that represents the set of all headers under consideration), we are able to apply least squares (which produces a column rank agnostic solution) to compute which headers are reachable at the destination. Reachability now simply means evaluating if vector b is in the column space of A\mathcal{A} , which can efficiently be computed using least squares. Further, the use of vector representation and least squares opens new possibilities for understanding network behavior. For example, we are able to map rules, routing policies, what-if scenarios to the fundamental linear algebraic form, Ax=b\mathcal{A}x=b , as well as determine how to configure forwarding tables appropriately. We show Vercel is faster than the state-of-art such as NetPlumber, Veriflow, APKeep, AP Verifier, when measured over diverse datasets. Vercel is almost as fast as Deltanet, when rules are verified in batches and provides better scalability, expressiveness and memory efficiency. A key highlight of Vercel is that while evaluating for reachability, the tool can incorporate intents, and transform these into auto-configurable table entries, implying a recommendation/correction system.


Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency

December 2022

·

22 Reads

·

2 Citations

ACM Transactions on Internet Technology

·

·

Mohammad Alizadeh

·

[...]

·

Ashwin Gumaste

We examine how to provide applications with dedicated bandwidth and guaranteed latency in a programmable mission-critical network. Unlike other SDN approaches such as B4 or SWAN, our system Tuneman optimizes both routes and packet schedules at each node to provide flows with sub-second bandwidth changes. Tuneman uses node-level optimization to compute node schedules in a slotted switch, and does dynamic routing using a search procedure with QoS-based weights. This allows Tuneman to provide an efficient solution for mission-critical networks that have stringent QoS requirements. We evaluate Tuneman on a telesurgery network using a switch prototype built using FPGAs, and also via simulations on India’s Tata Network. For mission-critical networks with multiple QoS levels, Tuneman has comparable or better utilization than SWAN while providing delay bounds guarantees.



Light-Trail Design for 5G Backhaul: Architecture, SDN Impact and Coordinated Multipoint

June 2021

·

11 Reads

·

4 Citations

Journal of Lightwave Technology

5G promises to be revolutionary from the perspective of offering unprecedented bandwidth to the end user. In this pursuit, the limited spectrum of the wireless overlay, further constricted by distance, requires strong support from a backhaul network. Such a strong backhaul network should provide large bandwidth pipes with near proximity to the end user at low costs and using pragmatic technology. Naturally, an optical solution is best suited to meet the voluminous bandwidth requirements of the backhaul. This optical solution has to cater to dynamic bandwidth needs among base stations and provide rapid and smart provisioning to meet the requirement of new features such as Coordinated Multipoint (CoMP) among base stations, and yet be low cost. To this end, we propose the use of light-trails (LTs), which are a generalization of a lightpath that provides for dynamic bandwidth communication, sub-wavelength optical grooming and optical layer multicasting using contemporary optics. We observe that each feature of a LT, i.e., dynamic provisioning, optical multicast, and sub-wavelength grooming is strongly desired by the 5G backhaul, implying a clear mapping between them. We investigate the usage of light-trails as a 5G backhaul solution. We discuss the proposed architecture of light-trails for micro cells, pico cells, and femto cells. We present the LT design problem for 5G backhaul as a constrained optimization problem. We also present a mechanism to achieve coordinated multipoint using light-trails. A dynamic virtual topology growth algorithm for the backhaul is also presented and extensively evaluated. The light-trails approach is compared to other approaches, the use of an SDN controller is discussed and significant performance benefits are observed.



Decoding Imagined Speech and Computer Control using Brain Waves

April 2021

·

82 Reads

·

19 Citations

Journal of Neuroscience Methods

Background: . In this work, we explore the possibility of decoding Imagined Speech (IS) brain waves using machine learning techniques. Approach: . We design two finite state machines to create an interface for controlling a computer system using an IS-based brain-computer interface. To decode IS signals, we propose a covariance matrix of Electroencephalogram channels as input features, covariance matrices projection to tangent space for obtaining vectors from matrices, principal component analysis for dimension reduction of vectors, an artificial neural network (ANN) as a classification model, and bootstrap aggregation for creating an ensemble of ANN models. Result: . Based on these findings, we are first to use an IS-based system to operate a computer and obtain an information transfer rate of 21-bits-per-minute. The proposed approach can decode the IS signal with a mean classification accuracy of 85% on classifying one long vs. short word. Our proposed approach can also differentiate between IS and rest state brain signals with a mean classification accuracy of 94%. COMPARISON: . After comparison, we show that our approach performs equivalent to the state-of-the-art approach (SOTA) on decoding long vs. short word classification task. We also show that the proposed method outperforms SOTA significantly on decoding three short words and vowels with an average margin of 11% and 9%, respectively. Conclusion: . These results show that the proposed approach can decode a wide variety of IS signals and is practically applicable in a real-time environment.


Grafnet: Using Graph Neural Networks to Create Table-Less Routers

January 2021

·

9 Reads

·

3 Citations

IEEE Transactions on Network Science and Engineering

Grafnet, a Graph Neural-Network (GNN)-based scheme learns IP-address-to-port mapping, leading to forwarding table-less routers. GNNs allow mapping network-wide features like adjacencies and addresses to generate new representations. Grafnet converts network-wide IP addresses to a feature space using GNNs. GNNs extrapolate node adjacencies onto a feature matrix, whose output tells which address/subnet is connected to a node and port. To do so, we use a GNN in conjunction with an Artificial Neural Network (ANN), whose output transforms graph adjacencies to address-based adjacencies. We exploit the fact that IP addresses are present in contiguous groups (subnets) or ‘ranges’. Large range sizes imply a better likelihood of Grafnets’ approximation, though with enough learning Grafnet learns just about all network-wide IP addresses, irrespective of range sizes. Grafnet is evaluated as an SDN scheme on (1) 75-node US-core network and (2) 2000-node, 5 million IP address-based random WAN topology. Analytically, we show equivalence between Grafnet and a Feed-forward neural network implying exhaustiveness and correctness. The proposed Grafnet model is able to work as a direct address translator without the need for tables in the forwarding plane of a router. Engineering considerations to implement Grafnet are also discussed.


Citations (59)


... The algorithm should determine the task and resource distribution as fast as possible and with as low energy consumption as possible. The scheduling may apply quality of services (QoS) if service differentiation is demanded (Sharma et al., 2023). Scheduling aims to determine which resource and task to execute for a given time slot. ...

Reference:

Impact Analysis of CLAHE and UM-Based Image Quality Improvement on Diabetic Retinopathy Disease Classification
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency
  • Citing Article
  • December 2022

ACM Transactions on Internet Technology

... GNN was proposed to generate table-less routers, termed Grafnet, in [70]. The authors formulated an interesting environment architecture to support the applicability of GNN and artificial feedforward neural network deployment in the routing optimization use case. ...

Grafnet: Using Graph Neural Networks to Create Table-Less Routers
  • Citing Article
  • January 2021

IEEE Transactions on Network Science and Engineering

... The advent of 5G technology and related studies concerning its potential latency and bandwidth performance in mobile networks have demonstrated that it is possible to attain a good level of Quality of Service (QoS), especially if predictive approaches are integrated into the system (Fazio et al., 2017;Fazio et al., 2023) after correctly modeling traffic flows (Kromer et al., 2020;Kromer et al., 2018;De Rango et al., 2005). Machine and deep learning applications (Martin et al., 2021;Singh et al., 2021;Xu et al., 2021) have also steeply proliferated in the last few years and added enormous value to the software which can exploit them. In the current work, we especially highlight the possibility of using well-known Convolutional Neural Networks (CNNs) (Khan et al., 2018) to classify mobility after transposing the mobility data into suitable mobility images (instead of realworld images). ...

Using Deep Reinforcement Learning for Routing in IP Networks

... This also provides a certain level of redundancy for other connections in that, should one connection falter or go down, multiple others could take any redirected traffic onward to its destination. • Intelligent and Application-Based Routing: One of the lesser celebrated but essential benefits of SDN solutions are their application-based routing [61] and intelligence capabilities [62]. This allows operators to build intelligence into their networks in order to understand the applications they run and their particular bandwidth requirements. ...

IPv6 Flow-Label based Application Aware Routing in SDNs
  • Citing Conference Paper
  • May 2021

... Similarly, the study [180] presents an Entropy-based simple additive weighting decision-making method for multi-criteria handover in SDN-based 5G. Light-trails (LTs) architecture-based dynamic bandwidth communication, sub-wavelength optical grooming and optical layer multicasting are novel implementations in 5G backhaul [181]. The authors in [182] proposed a metaheuristic approach for optimal performance with low complexity for the joint controller and gateway placement in 5G-Satellite SDN. ...

Light-Trail Design for 5G Backhaul: Architecture, SDN Impact and Coordinated Multipoint
  • Citing Article
  • June 2021

Journal of Lightwave Technology

... EEG, a non-invasive method that provides insight into how the human brain works, can also be used to interpret what happens when one sees something. Specifically, this paper explores the feasibility of predicting visual stimuli through EEG signals, hence enhancing BCI technology [2]. ...

Decoding Imagined Speech and Computer Control using Brain Waves
  • Citing Article
  • April 2021

Journal of Neuroscience Methods

... Although network services executed as virtualised software offer several advantages, it is undeniable that they are more susceptible to failures than traditional specialised hardware alternatives (Han et al., 2017). The transition from hardware devices to virtualised platforms brings several challenges regarding dependability (Sharma et al., 2020;Li et al., 2020). Factors such as the integration complexity of multiple software systems in different layers, the interoperability of hardware and software components provided by different vendors, and the limited experience in operating virtualised network environments are some of the challenges that make it difficult to ensure the dependability of NFV-based networks. ...

VNF Availability and SFC Sizing Model for Service Provider Networks

IEEE Access

... According to the overall structure model in Figure 1, information fusion and process combination control of portable multidimensional control software testing are carried out. e time distribution sequence of the portable multidimensional control software test was carried out in heterogeneous space, and the semantic search method was adopted to obtain the text distribution sequence of the portable multidimensional control software test as follows (1) [11]: ...

Design, Analysis, and a Terabit Implementation of a Source-Routing-Based SDN Data Plane
  • Citing Article
  • June 2020

IEEE Systems Journal

... It differs from our work in that they consider individual availability requirements for servers and virtual machines running over datacenter nodes; however, our goal is to design a slice topology that satisfies the overall availability requirement of the SFC request. The work in [27] addresses the problem of mapping service chains on an NFV infrastructure dynamically with delay and availability requirements. In [28], an SFC provisioning technique is proposed with backup sharing to reduce the backup resource overhead. ...

High-Availability Service Chain Realization Theory
  • Citing Conference Paper
  • March 2020