-
Toward a UTM-based Service Orchestration for UAVs in MEC-NFV Environment
Authors:
O. Bekkouche,
M. Bagaa,
T. Taleb
Abstract:
The increased use of Unmanned Aerial Vehicles (UAVs) in numerous domains will result in high traffic densities in the low-altitude airspace. Consequently, UAVs Traffic Management (UTM) systems that allow the integration of UAVs in the low-altitude airspace are gaining a lot of momentum. Furthermore, the 5th generation of mobile networks (5G) will most likely provide the underlying support for UTM…
▽ More
The increased use of Unmanned Aerial Vehicles (UAVs) in numerous domains will result in high traffic densities in the low-altitude airspace. Consequently, UAVs Traffic Management (UTM) systems that allow the integration of UAVs in the low-altitude airspace are gaining a lot of momentum. Furthermore, the 5th generation of mobile networks (5G) will most likely provide the underlying support for UTM systems by providing connectivity to UAVs, enabling the control, tracking and communication with remote applications and services. However, UAVs may need to communicate with services with different communication Quality of Service (QoS) requirements, ranging form best-effort services to Ultra-Reliable Low-Latency Communications (URLLC) services. Indeed, 5G can ensure efficient Quality of Service (QoS) enhancements using new technologies, such as network slicing and Multi-access Edge Computing (MEC). In this context, Network Functions Virtualization (NFV) is considered as one of the pillars of 5G systems, by providing a QoS-aware Management and Orchestration (MANO) of softwarized services across cloud and MEC platforms. The MANO process of UAV's services can be enhanced further using the information provided by the UTM system, such as the UAVs'flight plans. In this paper,we propose an extended framework for the management and orchestration of UAVs'services in MECNFV environment by combining the functionalities provided by the MEC-NFV management and orchestration framework with the functionalities of a UTM system. Moreover, we propose an Integer Linear Programming (ILP) model of the placement scheme of our framework and we evaluate its performances.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
A Queuing based Dynamic Auto Scaling Algorithm for the LTE EPC Control Plane
Authors:
J. Prados,
A. Laghrissi,
M. Bagaa,
T. Taleb
Abstract:
Network Slicing (NS) is expected to be a key functionality of the upcoming 5G systems. Coupled with Software Defined Networking (SDN) and Network Function Virtualization (NFV),NS will enable a flexible deployment of Network Functions belonging to multiple Service Function Chains (SFC) over a shared infrastructure. To address the complexities that arise from this new environment, we formulate a MIL…
▽ More
Network Slicing (NS) is expected to be a key functionality of the upcoming 5G systems. Coupled with Software Defined Networking (SDN) and Network Function Virtualization (NFV),NS will enable a flexible deployment of Network Functions belonging to multiple Service Function Chains (SFC) over a shared infrastructure. To address the complexities that arise from this new environment, we formulate a MILP optimization model that enables a cost-optimal deployment of network slices, allowing a Mobile Network Operator to efficiently allocate the underlying layer resources according to the users' requirements. For each network slice, the proposed solution guarantees the required delay and the bandwidth, while efficiently handling the usage of underlying nodes, which leads to reduced cost. The obtained results show the efficiency of the proposed solution in terms of cost and execution time for small-scale networks, while it shows an interesting behavior in the large-scale topologies.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems
Authors:
Y. Dang,
C. Benzaid,
B. Yang,
T. Taleb
Abstract:
Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat for UAV's position. To enable safe and secure UAV navigation BVLoS, this paper proposes a cellular network assisted UAV position monitoring and anti-GP…
▽ More
Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat for UAV's position. To enable safe and secure UAV navigation BVLoS, this paper proposes a cellular network assisted UAV position monitoring and anti-GPS spoofing system, where deep learning approach is used to live detect spoofed GPS positions. Specifically, the proposed system introduces a MultiLayer Perceptron (MLP) model which is trained on the statistical properties of path loss measurements collected from nearby base stations to decide the authenticity of the GPS position. Experiment results indicate the accuracy rate of detecting GPS spoofing under our proposed approach is more than 93% with three base stations and it can also reach 80% with only one base station.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Deterministic Service Function Chaining over Beyond 5G Edge Fabric
Authors:
H. Yu,
T. Taleb,
J. Zhang
Abstract:
Along with the increasing demand for latencysensitive services and applications, Deterministic Network (DetNet) concept has been recently proposed to investigate deterministic latency assurance for services featured with bounded latency requirements in 5G edge networks. The Network Function Virtualization (NFV) technology enables Internet Service Providers (ISPs) to flexibly place Virtual Network…
▽ More
Along with the increasing demand for latencysensitive services and applications, Deterministic Network (DetNet) concept has been recently proposed to investigate deterministic latency assurance for services featured with bounded latency requirements in 5G edge networks. The Network Function Virtualization (NFV) technology enables Internet Service Providers (ISPs) to flexibly place Virtual Network Functions (VNFs) achieving performance and cost benefits. Then, Service Function Chains (SFC) are formed by steering traffic through a series of VNF instances in a predefined order. Moreover, the required network resources and placement of VNF instances along SFC should be optimized to meet the deterministic latency requirements. Therefore, it is significant for ISPs to determine an optimal SFC deployment strategy to ensure network performance while improving the network revenue. In this paper, we jointly investigate the resource allocation and SFC placement in 5G edge networks for deterministic latency assurance. We formulate this problem as a mathematic programming model with the objective of maximizing the overall network profit for ISP. Furthermore, a novel Deterministic SFC deployment (Det-SFCD) algorithm is proposed to efficiently embed SFC requests with deterministic latency assurance. The performance evaluation results show that the proposed algorithm can provide better performance in terms of SFC request acceptance rate, network cost reduction, and network resource efficiency compared with benchmark strategy.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Efficient Steering Mechanism for Mobile Network-enabled UAVs
Authors:
H. Hellaoui,
A. Chelli,
M. Bagaa,
T. Taleb
Abstract:
HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligen…
▽ More
HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligence given to the player. Another limitation is the bottleneck link that could happen at any time during the streaming session and anywhere in the network. These issues may result in wobbling bandwidth perception by the players and could lead to missing the deadline for chunk downloads, which result in the most annoying issue consisting of rebuffering events. In this paper, we leverage the SoftwareDefined Networking paradigm to take advantage of the global view of the network and its powerful intelligence that allows reacting to the network changing conditions. Ultimately, we aim at preventing the re-buffering events, resulting from deadline misses, and ensuring high QoE for the accepted clients in the system. To this end, we use Deterministic Network Calculus (DNC) to guarantee a maximum delay for the download of the video chunks while maximizing the perceived video quality. Simulation results show that the proposed solution ensures high efficiency for the accepted clients without any rebuffering events which result in high user QoE. Consequently, it might be highly useful for scenarios where video chunks should be strictly downloaded on-time or ensuring low delay with high user QoE such as serving video premium subscribers or remote control/driving of an autonomous vehicle in future 5G mobile networks.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Network Slice Instantiation for 5G Micro-Operator Deployment Scenario
Authors:
Idris Badmus,
Marja Matinmikko-Blue,
Jaspreet Singh Walia,
Tarik Taleb
Abstract:
The concept of network slicing is considered as a key part in the development of 5G. Network slicing is the means to logically isolate network capabilities in order to make each slice responsible for specific network requirement. In the same light, the micro-operator concept has emerged for local deployment of 5G for vertical specific service delivery. Even though microoperator networks are expect…
▽ More
The concept of network slicing is considered as a key part in the development of 5G. Network slicing is the means to logically isolate network capabilities in order to make each slice responsible for specific network requirement. In the same light, the micro-operator concept has emerged for local deployment of 5G for vertical specific service delivery. Even though microoperator networks are expected to be deployed using 5G, most research on network slicing has been directed towards the description on the traditional (MNO) networks with little emphasis on slicing in local 5G networks deployed by different stakeholders. In order to achieve slicing in a micro-operator network, it is of vital importance to understand the different deployment scenarios that can exist and how slicing can be realized for each of these deployments. In this paper, the microoperator networks described include closed, open and mixed network, and for each of these network, different deployment scenarios are established. The paper further proposes approaches for the configuration of Network Slice Instances (NSIs) using the Network Slice Subnet Instances (NSSIs) and other Network Functions (NFs) in a micro-operator network while considering the different deployments. The results highlight the possible deployment scenarios that can be established in a micro-operator network and how network slicing can be efficiently realized for the various local deployments.
△ Less
Submitted 30 May, 2019; v1 submitted 6 May, 2019;
originally announced May 2019.
-
Ready Player One: UAV Clustering based Multi-Task Offloading for Vehicular VR/AR Gaming
Authors:
Long Hu,
Yuanwen Tian,
Jun Yang,
Tarik Taleb,
Lin Xiang,
Yixue Hao
Abstract:
With rapid development of unmanned aerial vehicle (UAV) technology, application of the UAVs for task offloading has received increasing interest in the academia. However, real-time interaction between one UAV and the mobile edge computing (MEC) node is required for processing the tasks of mobile end users, which significantly increases the system overhead and is unable to meet the demands of large…
▽ More
With rapid development of unmanned aerial vehicle (UAV) technology, application of the UAVs for task offloading has received increasing interest in the academia. However, real-time interaction between one UAV and the mobile edge computing (MEC) node is required for processing the tasks of mobile end users, which significantly increases the system overhead and is unable to meet the demands of large-scale artificial intelligence (AI) based applications. To tackle this problem, in this article, we propose a new architecture for UAV clustering to enable efficient multi-modal multi-task task offloading. By the proposed architecture, the computing, caching and communication resources are collaboratively optimized using AI based decision-making. This not only increases the efficiency of UAV clusters, but also provides insight into the fusion of computation and communication.
△ Less
Submitted 8 April, 2019;
originally announced April 2019.
-
Survey on Multi-Access Edge Computing for Internet of Things Realization
Authors:
Pawani Porambage,
Jude Okwuibe,
Madhusanka Liyanage,
Mika Ylianttila,
Tarik Taleb
Abstract:
The Internet of Things (IoT) has recently advanced from an experimental technology to what will become the backbone of future customer value for both product and service sector businesses. This underscores the cardinal role of IoT on the journey towards the fifth generation (5G) of wireless communication systems. IoT technologies augmented with intelligent and big data analytics are expected to ra…
▽ More
The Internet of Things (IoT) has recently advanced from an experimental technology to what will become the backbone of future customer value for both product and service sector businesses. This underscores the cardinal role of IoT on the journey towards the fifth generation (5G) of wireless communication systems. IoT technologies augmented with intelligent and big data analytics are expected to rapidly change the landscape of myriads of application domains ranging from health care to smart cities and industrial automations. The emergence of Multi-Access Edge Computing (MEC) technology aims at extending cloud computing capabilities to the edge of the radio access network, hence providing real-time, high-bandwidth, low-latency access to radio network resources. IoT is identified as a key use case of MEC, given MEC's ability to provide cloud platform and gateway services at the network edge. MEC will inspire the development of myriads of applications and services with demand for ultra low latency and high Quality of Service (QoS) due to its dense geographical distribution and wide support for mobility. MEC is therefore an important enabler of IoT applications and services which require real-time operations. In this survey, we provide a holistic overview on the exploitation of MEC technology for the realization of IoT applications and their synergies. We further discuss the technical aspects of enabling MEC in IoT and provide some insight into various other integration technologies therein.
△ Less
Submitted 17 May, 2018;
originally announced May 2018.
-
On Performance Modeling for MANETs under General Limited Buffer Constraint
Authors:
Jia Liu,
Yang Xu,
Yulong Shen,
Xiaohong Jiang,
Tarik Taleb
Abstract:
Understanding the real achievable performance of mobile ad hoc networks (MANETs) under practical network constraints is of great importance for their applications in future highly heterogeneous wireless network environments. This paper explores, for the first time, the performance modeling for MANETs under a general limited buffer constraint, where each network node maintains a limited source buff…
▽ More
Understanding the real achievable performance of mobile ad hoc networks (MANETs) under practical network constraints is of great importance for their applications in future highly heterogeneous wireless network environments. This paper explores, for the first time, the performance modeling for MANETs under a general limited buffer constraint, where each network node maintains a limited source buffer of size $B_s$ to store its locally generated packets and also a limited shared relay buffer of size $B_r$ to store relay packets for other nodes. Based on the Queuing theory and birth-death chain theory, we first develop a general theoretical framework to fully depict the source/relay buffer occupancy process in such a MANET, which applies to any distributed MAC protocol and any mobility model that leads to the uniform distribution of nodes' locations in steady state. With the help of this framework, we then derive the exact expressions of several key network performance metrics, including achievable throughput, throughput capacity, and expected end-to-end delay. We further conduct case studies under two network scenarios and provide the corresponding theoretical/simulation results to demonstrate the application as well as the efficiency of our theoretical framework. Finally, we present extensive numerical results to illustrate the impacts of buffer constraint on the performance of a buffer-limited MANET.
△ Less
Submitted 1 June, 2017; v1 submitted 7 September, 2016;
originally announced September 2016.
-
Cost-Efficient Data Backup for Data Center Networks against ε-Time Early Warning Disaster
Authors:
Lisheng Ma,
Xiaohong Jiang,
Bin Wu,
Tarik Taleb,
Achille Pattavina,
Norio Shiratori
Abstract:
Data backup in data center networks (DCNs) is critical to minimize the data loss under disaster. This paper considers the cost-efficient data backup for DCNs against a disaster with $\varepsilon$ early warning time. Given geo-distributed DCNs and such a $\varepsilon$-time early warning disaster, we investigate the issue of how to back up the data in DCN nodes under risk to other safe DCN nodes wit…
▽ More
Data backup in data center networks (DCNs) is critical to minimize the data loss under disaster. This paper considers the cost-efficient data backup for DCNs against a disaster with $\varepsilon$ early warning time. Given geo-distributed DCNs and such a $\varepsilon$-time early warning disaster, we investigate the issue of how to back up the data in DCN nodes under risk to other safe DCN nodes within the $\varepsilon$ early warning time constraint, which is significant because it is an emergency data protection scheme against a predictable disaster and also help DCN operators to build a complete backup scheme, i.e., regular backup and emergency backup. Specifically, an Integer Linear Program (ILP)-based theoretical framework is proposed to identify the optimal selections of backup DCN nodes and data transmission paths, such that the overall data backup cost is minimized. Extensive numerical results are also provided to illustrate the proposed framework for DCN data backup.
△ Less
Submitted 10 March, 2016; v1 submitted 27 December, 2015;
originally announced December 2015.