A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding
Abstract
:1. Introduction
- 1.
- Creating a network orchestration framework for effective and easier network slicing by combining network isolation and management strategies;
- 2.
- Preparing slice isolation strategy for the optimal resource allocation of Network Requests (NRs) in the Physical Infrastructure (PI);
- 3.
- Proposing slice management strategy to enhance the performance of the created slices of PI by the introduction of dynamic provisioning concepts;
- 4.
- Investigating the behavior of the proposed framework in a variety of physical infrastructure settings and NRs, as well as comparing the proposed strategy with existing methodologies.
2. Related Works
2.1. Virtual Network Embedding Strategies
2.2. Fuzzy Based Strategies for Network Slicing
3. System Model and Mathematical Background
3.1. Physical Infrastructure and Network Request Model
3.2. Node Parameters
- Capacity of a Node: Equation (1) defines the capacity of a node ‘i’ in the given network. Each node of a network is specified with the CPU capacity value.
- Degree of a Node: It is determined by the number of adjacent links connected to any node ‘i’ in the given network. Equation (2) shows the expression for degree of a node.
- Available bandwidth of a node: It is determined by the sum of the bandwidth of each adjacent link connected to any node ‘i’ in the given network. Equation (3) shows the expression for determining the bandwidth of a node.
- Closeness Centrality of a Node: Determined by the shortest route between any two nodes, which is used to determine the global importance of any node. As a result, a node’s centrality is increased in direct proportion to its distance from other nodes. Equation (4) shows the expression for determining the closeness centrality of any node in the network.
3.3. Mathematical Model for Performance Measurement
- Average Acceptance Rate: This metric is calculated by dividing the number of successful NRs by the number of unsuccessful NRs during the specified transmission time interval , which yields the direct performance measurement for the provided physical infrastructure.
- Average CPU and Bandwidth Utilization: The total CPU and bandwidth utilized by the successful NRs in the given transmission time interval is determined by,
- Average Resource Efficiency: This metric is defined as the ratio of the amount of revenue generated to the amount of money spent on building the physical infrastructure. The revenue can be calculated by accurately calculating the amount of CPU and bandwidth used per NSR. The physical infrastructure provided by NSR determines the cost of investment. The following Equation (6) is used to calculate the network’s resource efficiency for the given transmission time interval .
3.4. Objective Function and Constraints
4. Proposed Strategy for Dynamic Virtual Network Embedding (DVNE)
4.1. Node Mapping for DVNE
- Membership function for CPU capacity: This membership function is used to determine how close a node’s CPU capacity is to the maximum capacity of the cluster. The highest priority in the ranking is assigned to the member with the highest membership value. and are the ranges of CPU capacity that have been specified for the process.
- Membership function for node degree: This membership function determines how close a node’s degree is to the node’s maximum degree. The degree range is determined using network information. The maximum limit () is determined by the node with the highest degree in the network, and the minimum limit () is determined by the node with the lowest degree in the network. As a result, a node with the highest degree in the network has the membership value ‘1’, while a node with the lowest degree in the network has the membership value ‘0’. The member with the highest membership value is given the highest priority in the ranking.
- Membership function for bandwidth: the available bandwidth of any node can be compared to the maximum bandwidth of the node using this membership function. This is similar to the way a node’s degree is determined by its location on the network. The maximum limit () is taken from the node that has the most bandwidth available in the network, and the minimum limit () is taken from the node that has the least bandwidth available. In this case, a node with the most bandwidth in the network is given the membership value of “1”, while a node with the least bandwidth is given the membership value of “0”. The member with the highest membership value is given the highest priority in the ranking.
- Membership function for closeness centrality: A node’s closeness centrality can be calculated using this membership function by comparing it to the node in an associated network with the highest closeness centrality. The range for the closeness centrality is selected from the network information in the same way as the degree and bandwidth of a node. After calculating the closeness centrality of every node in a network, the upper and lower bounds (() and ()) are immediately determined. This means that the network’s most central node receives the membership value ‘1’, while the network node with the lowest closeness centrality receives the membership value ‘0’. Priority is given to the most valuable member in terms of membership value when ranking.
Algorithm 1 Node mapping through FDA |
|
4.2. Link Mapping for DVNE
4.3. DVNE
Algorithm 2 Link mapping through DA |
|
Algorithm 3 DVNE |
|
5. Simulation Evaluation
5.1. Test Case Parameters
5.2. Simulation Results
5.2.1. Static Provisioning
- Average Resource Efficiency: Figure 3 depicts the resource efficiency that is achieved under a variety of operational conditions for the system. In terms of the overarching observation regarding resource efficiency and NRs, Figure 3 demonstrates that the resource efficiency of the network decreases as the number of NRs increases, whereas the efficiency improves with the number of nodes in the physical infrastructure. An increased number of nodes in a network will, as demonstrated by the resource efficiency equation, result in a shorter overall length of the shortest route, which in turn will lead to improved resource utilization. Additionally, because of the rise in the number of NRs, it is necessary to provide additional nodes that have adequate CPU capacity and bandwidth. According to Figure 3, the proposed method achieves a resource efficiency of 0.783, 0.765, and 0.753 for NRs 10, 20, and 30, respectively, when applied to an infrastructure with a total of 100 nodes. In addition, the efficiency of the resource improves as the number of nodes increases to 200 and 300, reaching a maximum of 0.8 under 5 NRs for a physical resource that has 300 nodes, as shown in Figure 3.
- Average Acceptance Ratio: NRs ranging from 5 to 35 are used in this investigation with the suggested method for calculating the acceptance ratio. The results obtained after successful execution of the algorithm under a variety of different conditions pertaining to the physical infrastructure are displayed in Figure 4. Despite the fact that the number of physical nodes is growing, the acceptance ratio will decrease as the total number of requests (NR) increases. Because there are now more nodes, a larger proportion of the population has come around to accepting it. The acceptance ratio increases concurrently with the increase in number of nodes of physical infrastructure. In Figure 4, the proposed method achieves a 100% acceptance rate when receiving 5 NRs, regardless of the number of nodes in its PI. In addition, Figure 4 shows that the requesting service for 35 NRs in PI with 100 nodes results in a poor acceptance rate of 0.4%.
- Average CPU and Bandwidth utilization: The amount of CPU and bandwidth used within an infrastructure consisting of 100, 200, and 300 nodes is also measured with a variety of request counts. The obtained results can be seen in Figure 5, which are categorized according to the number of PI nodes and total NR. The proposed system is capable of serving a maximum of 7265 CPUs and a minimum of 1236 CPUs, as well as having a maximum and minimum utilization of 21,186 and 4628 BW when operating under a PI that is equipped with 100 and 300 nodes, respectively.
5.2.2. Dynamic Provisioning
- Average resource efficiency: It is understandable that resource efficiency is measured in terms of the availability and utilization of the resources available to a given project. Static and dynamic provisioning yield nearly identical resource efficiency when using the proposed approach. Nodes in the PI and the number of requests they receive have an impact on the value, which varies with the number of nodes and requests. Figure 6 illustrates the proposed approach’s resource efficiency under both static and dynamic provisioning.
- Average acceptance ratio: When dynamic provisioning is carried out through the proposed strategy, it stands to reason that the acceptance ratio will increase. This is because the occupied resources will be freed up depending on how long the existing requests will remain active, so it is logical that this will cause the increase. Figure 7 provides a visual representation of the acceptance ratio in relation to a selection of possible infrastructure provision scenarios. According to the data, dynamic provisioning results in a greater improvement in the acceptance ratio, with a maximum and minimum percentage improvement of 37% and 19% under the PI equipped with 100 nodes and 300 nodes, respectively. This represents a significant leap from the previous level of improvement. It is abundantly clear from the findings that the greatest percentage of improvement can be accomplished when the network operates with the fewest possible resources.
- Average CPU and bandwidth utilization: Figure 8 illustrates the dynamic provisioning and shows the number of CPUs that are served as well as the bandwidth that is utilized. According to the figure, the provisioning chosen allows for the highest possible utilization of both the CPU and the bandwidth within the context of the system conditions. As with static provisioning, CPU and bandwidth utilization through dynamic provisioning increases as infrastructure and the number of requests increase.
5.2.3. Discussion
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Henry, S.; Alsohaily, A.; Sousa, E.S. 5G is real: Evaluating the compliance of the 3GPP 5G new radio system with the ITU IMT-2020 requirements. IEEE Access 2020, 8, 42828–42840. [Google Scholar] [CrossRef]
- Jain, A.; Lopez-Aguilera, E.; Demirkol, I. User association and resource allocation in 5G (AURA-5G): A joint optimization framework. Comput. Netw. 2021, 192, 108063. [Google Scholar] [CrossRef]
- Alliance, N. Description of network slicing concept. NGMN 5G P 2016, 1, 1–11. [Google Scholar]
- Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.H.; Leung, V.C. Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges. IEEE Commun. Mag. 2017, 55, 138–145. [Google Scholar] [CrossRef]
- 3GPP. Study on Management and Orchestration of Network Slicing for Next Generation Network; 3GPP: Valbonne, France, 2017. [Google Scholar]
- Ordonez-Lucena, J.; Ameigeiras, P.; Lopez, D.; Ramos-Munoz, J.J.; Lorca, J.; Folgueira, J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Commun. Mag. 2017, 55, 80–87. [Google Scholar] [CrossRef] [Green Version]
- Subedi, P.; Alsadoon, A.; Prasad, P.; Rehman, S.; Giweli, N.; Imran, M.; Arif, S. Network slicing: A next generation 5G perspective. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 102. [Google Scholar] [CrossRef]
- Chagdali, A.; Elayoubi, S.E.; Masucci, A.M. Slice Function Placement Impact on the Performance of URLLC with Multi-Connectivity. Computers 2021, 10, 67. [Google Scholar] [CrossRef]
- Alotaibi, D. Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges. Procedia Comput. Sci. 2021, 182, 38–45. [Google Scholar] [CrossRef]
- Sohaib, R.M.; Onireti, O.; Sambo, Y.; Imran, M.A. Network Slicing for Beyond 5G Systems: An Overview of the Smart Port Use Case. Electronics 2021, 10, 1090. [Google Scholar] [CrossRef]
- Ojijo, M.O.; Falowo, O.E. A survey on slice admission control strategies and optimization schemes in 5G network. IEEE Access 2020, 8, 14977–14990. [Google Scholar] [CrossRef]
- Chahbar, M.; Diaz, G.; Dandoush, A.; Cérin, C.; Ghoumid, K. A comprehensive survey on the e2e 5g network slicing model. IEEE Trans. Netw. Serv. Manag. 2020, 18, 49–62. [Google Scholar] [CrossRef]
- Cheng, X.; Su, S.; Zhang, Z.; Wang, H.; Yang, F.; Luo, Y.; Wang, J. Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Comput. Commun. Rev. 2011, 41, 38–47. [Google Scholar] [CrossRef]
- Zhang, P.; Yao, H.; Liu, Y. Virtual network embedding based on the degree and clustering coefficient information. IEEE Access 2016, 4, 8572–8580. [Google Scholar] [CrossRef]
- Cao, H.; Yang, L.; Zhu, H. Novel node-ranking approach and multiple topology attributes-based embedding algorithm for single-domain virtual network embedding. IEEE Internet Things J. 2017, 5, 108–120. [Google Scholar] [CrossRef]
- Guan, W.; Wen, X.; Wang, L.; Lu, Z.; Shen, Y. A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 2018, 6, 19691–19701. [Google Scholar] [CrossRef]
- Li, X.; Guo, C.; Gupta, L.; Jain, R. Efficient and secure 5G core network slice provisioning based on VIKOR approach. IEEE Access 2019, 7, 150517–150529. [Google Scholar] [CrossRef]
- Xu, Q.; Wang, J.; Wu, K. Learning-based dynamic resource provisioning for network slicing with ensured end-to-end performance bound. IEEE Trans. Netw. Sci. Eng. 2018, 7, 28–41. [Google Scholar] [CrossRef]
- Chien, H.T.; Lin, Y.D.; Lai, C.L.; Wang, C.T. End-to-end slicing with optimized communication and computing resource allocation in multi-tenant 5G systems. IEEE Trans. Veh. Technol. 2019, 69, 2079–2091. [Google Scholar] [CrossRef]
- Sun, Y.; Qin, S.; Feng, G.; Zhang, L.; Imran, M.A. Service provisioning framework for RAN slicing: User admissibility, slice association and bandwidth allocation. IEEE Trans. Mob. Comput. 2020, 20, 3409–3422. [Google Scholar] [CrossRef]
- Mekki, M.; Arora, S.; Ksentini, A. A Scalable Monitoring Framework for Network Slicing in 5G and Beyond Mobile Networks. IEEE Trans. Netw. Serv. Manag. 2021, 19, 413–423. [Google Scholar] [CrossRef]
- Dotcenko, S.; Vladyko, A.; Letenko, I. A fuzzy logic-based information security management for software-defined networks. In Proceedings of the 16th International Conference on Advanced Communication Technology, Pyeongchang, Korea, 16–19 February 2014; pp. 167–171. [Google Scholar]
- Wu, J.; Liu, J.; Huang, Z.; Zheng, S. Dynamic fuzzy Q-learning for handover parameters optimization in 5G multi-tier networks. In Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China, 15–17 October 2015; pp. 1–5. [Google Scholar]
- Albarracin-Sanchez, L.F.; Puerto-Leguizamón, G.A. Fuzzy systems: An approach to 5G networks under the software defined network paradigm. Rev. Científica 2018, 1, 96–110. [Google Scholar] [CrossRef]
- Zhang, M.; Dou, Y.; Chong, P.H.J.; Chan, H.C.; Seet, B.C. Fuzzy Logic-Based Resource Allocation Algorithm for V2X Communications in 5G Cellular Networks. IEEE J. Sel. Areas Commun. 2021, 39, 2501–2513. [Google Scholar] [CrossRef]
- Ampririt, P.; Qafzezi, E.; Bylykbashi, K.; Ikeda, M.; Matsuo, K.; Barolli, L. FSSLA: A Fuzzy-based scheme for slice service level agreement in 5G wireless networks and its performance evaluation. J. High Speed Netw. 2022, 28, 47–64. [Google Scholar] [CrossRef]
- Ampririt, P.; Qafzezi, E.; Bylykbashi, K.; Ikeda, M.; Matsuo, K.; Barolli, L. A Fuzzy-Based Scheme for Slice Priority Assessment in 5G Wireless Networks. In Proceedings of the International Conference on Advanced Information Networking and Applications, Sydney, Australia, 13–15 April 2022; pp. 651–661. [Google Scholar]
Physical Infrastructure | ||
---|---|---|
Definitions | Descriptions | Range |
Number of physical nodes | 100, 200, 300 | |
Distribution of CPU capacity for each node in unit | U[20,50] | |
Distribution of bandwidth for each link in unit | U[20,50] | |
Distribution of available security level for each node in in real number | (0–1) | |
Network Request | ||
Definitions | Descriptions | Range |
Total number of NRs arrived in the time frame | U[5,35] | |
Distribution of nodes for each NSR | 20 | |
Distribution of CPU capacity requirement for each node of a NR | U[5,25] | |
Distribution of bandwidth requirement for each link of a NR | U[5,25] | |
Distribution of required security level for each node in real number | (0–0.5) | |
Time duration of each NR | T[10,35] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Thiruvenkadam, S.; Sujitha, V.; Jo, H.-G.; Ra, I.-H. A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding. Appl. Sci. 2022, 12, 6942. https://doi.org/10.3390/app12146942
Thiruvenkadam S, Sujitha V, Jo H-G, Ra I-H. A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding. Applied Sciences. 2022; 12(14):6942. https://doi.org/10.3390/app12146942
Chicago/Turabian StyleThiruvenkadam, Srinivasan, Venkatapathy Sujitha, Han-Gue Jo, and In-Ho Ra. 2022. "A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding" Applied Sciences 12, no. 14: 6942. https://doi.org/10.3390/app12146942
APA StyleThiruvenkadam, S., Sujitha, V., Jo, H. -G., & Ra, I. -H. (2022). A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding. Applied Sciences, 12(14), 6942. https://doi.org/10.3390/app12146942