Professional Documents
Culture Documents
An Efficient Approach
For Mobile Core Services Placement On
Network Function Virtualization
A thesis submitted in partial fulfillment of the requirements for Master
By
Basheer Ameen Raddwan
Supervisor
Prof. Dr. Khalil Al-Wagih
January 2019
Republic of Yemen
Ministry of High Education
University of Modern Sciences
Deanship of Graduate Studies
Program: Information Technology
An Efficient Approach
For Mobile Core Services Placement On
Network Function Virtualization
A thesis submitted in partial fulfillment of the requirements for Master
By
Basheer Ameen Raddwan
Supervisor
Prof. Dr. Khalil Al-Wagih
January 2019
Acknowledgment
In the first place I am thankful to God almighty praise be to him for fulfilling this
humble effort for the sake of his satisfaction.
Then I am thankful to my supervisor Prof. Khalil Al-Wagih for his highly appre-
ciated mentoring, guiding, and vital motivation. And to the dean of the Deanship
of Graduate Studies and the head of Department of Information Technology and all
the staff of University of Modern Sciences.
Also, I am thankful to Yemen Mobile Co. represented by Eng. Amer Haza’a ex-
ecutive manager and Eng. Ali Aziz, core network manager, for supporting this
work.
iii
List of abbreviations
Abbriviation Meaning
3GPP Third Generation Partner ship Project
ARPU Average Revenue Per User
BLP Binary Linear Programming
CAPEX Capital Expense
CDN Content Delivery Network
COTS Commercial off-the-shelf
DcPSM Decomposition Path Selection Mapping
DSBM Decompostion Selection Back-track Mapping
E2E End-to-End
EM Element Management
EMS Element Management System
EPC Evolved Packet Core
ETSI European Telecommunications Standards Insti-
tute
ETSI-MANO ETSI Management and Orchestration framework
EvoVNFP Evolvable VNF Placement
FCAPS Fault Management, Configuration Management,
Accounting Management, Performance Manage-
ment, and Security Management
GA Genetic Algorithms
IETF Internet Engineering Task Force
ILP Integer Linear Programming
ISG Industry Standard Group
iv
IT Information Technology
LP Linear Program
LXC Linux Container
LXD Linux Container guest (Docker like containers)
M2M Machine to Machine
MANO Management and Orchestration
MILP Mixed Integer Linear Programming
MIP Mixed Integer Programming
MVG Modularly Varying Goals
NF Network Function
NFV Network Function Virtualization
NFVO NFV Orchestrator
NFV-RA Network Function Virtualization Resource
Allocation problem
NS Network Service
OPEX Operational Expense
PoC Proof of Concept
PoP Present of Position
QoS Quality of Service
RL Reenforcement Learning
RO Resource Orchestrator
SDN Software Defined Networking
SFC Service Function Chaining
SFC-RA Service Function Chaining Resource Allocation
problem
( similar to NFV-RA)
SG Service Graph
SO Service Orchestrator
VIM Virtualized Infrastructure Manager
VM Virtual Machine
VM-PP Virtual Machine Placement problem
VNF Virtual Network Function
v
VNF-FG VNF Forwarding Graph
VNF-FGE VNF Forwarding Graph Embedding
VNF-P Virtual Network Function Placement problem
VNFc Virtual Network Function component
VNFM VNF Manager
vi
List of Figures
Figure 1.1 Top level design of virtualized Telecom 4G, 5G, and 5G-IoT
networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Figure 1.2 ETSI NFV Architectural Framework . . . . . . . . . . . . . . . 5
Figure 1.3 NFVI node components . . . . . . . . . . . . . . . . . . . . . . 8
Figure 1.4 Service decomposition example . . . . . . . . . . . . . . . . . . 10
Figure 1.5 Path types result from service decomposition . . . . . . . . . . . 11
Figure 3.1 Top level design of virtualized Telecom 4G, 5G, and 5G-IoT
networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Figure 3.2 Path identificaition and candidate paths grouping . . . . . . . . 40
Figure 3.3 Clustering Factor (CF) as proposed by Sahhaf . . . . . . . . . . 41
vii
Figure A.4Ten paths large scenario . . . . . . . . . . . . . . . . . . . . . . 94
Figure A.5Twenty paths small scenario . . . . . . . . . . . . . . . . . . . . 95
Figure A.6Twenty paths large scenario . . . . . . . . . . . . . . . . . . . . 96
viii
List of Tables
ix
Contents
Acknowledgment iii
List of abbreviations iv
List of tables ix
Table of contents x
Abstract xiv
1 Introduction 1
1.1 Virtualizing Telecom Network Services . . . . . . . . . . . . . . . . . 1
1.2 ETSI NFV Architectural Framework . . . . . . . . . . . . . . . . . . 3
1.2.1 NFV Management and Orchestration . . . . . . . . . . . . . . 5
1.2.2 Network Function Virtualization Infrastructure (NFVI) . . . . 7
1.3 Network Function Decomposition . . . . . . . . . . . . . . . . . . . . 9
1.4 The Use Case of the Study . . . . . . . . . . . . . . . . . . . . . . . . 12
1.5 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.6 Research Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.7 The Significance of the Study . . . . . . . . . . . . . . . . . . . . . . 13
1.8 Research Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . 13
x
1.9 Scope of the Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.10 Benchmark Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.11 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
xi
3.4 Catalogue of Physical Paths . . . . . . . . . . . . . . . . . . . . . . . 39
3.5 Heuristic Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.5.1 Decomposition Selection Algorithm . . . . . . . . . . . . . . . 40
3.5.2 Service Mapping Algorithm . . . . . . . . . . . . . . . . . . . 42
3.5.3 Path Mapping Algorithm . . . . . . . . . . . . . . . . . . . . 43
3.5.4 Check Node Validation Algorithm . . . . . . . . . . . . . . . . 45
3.5.5 Check Links Validation Algorithm . . . . . . . . . . . . . . . 46
References 74
xii
Appendices 89
A Additional Results 90
xiii
Abstract
xiv
Chapter 1
Introduction
1
link, and topology abstraction. Abstraction of physical node resource where the
hypervisor abstracts the physical resources of the physical node. Abstraction of
Physical Link Resources where the hypervisor abstracts the physical link resources,
such as bandwidth and attributes, such as, bit rate, delay, as well as the available
link queues and link buffers define the level of virtualization. Topology abstrac-
tion where virtual nodes and virtual links define the level of virtualization while
the hypervisor can abstract an end-to-end (E2E) network path traversing multiple
physical links as one end-to-end virtual link [4]. Whereas IT data centers and cloud
computing basically consider the abstraction of physical nodes and physical links,
Network function virtualization considers end-to-end chains of services, which are
considered in this study. In consequence, the concept of traditional Network Service
(NS) is going to be re-designed [5] in order to realize end-to-end network service
chaining.
For example, Figure (1.1) shows a distributed network function in three scenar-
ios; 4G slice, 5G slice, and 5G Internet of Things (5g-IoT) [6]. IoT is available with
4G mobile network [7] while in 5G it will have massive deployment. Virtual environ-
ment enables telecom operators to deploy totally separated network slices [8, 9] as
shown in Figure (1.1) where in 4G slice there is a direction that separated the Base
Band Unit (BBU) from the Evolved Node B (eNB). Then BBU pool implemented
on Edge cloud datacenter [10, 11].Another direction is previsioning 4G core network
functions in virtualized environment as in [12]. 5G slice is the implementation of 5G
mobile services for ordinary users is another trend of virtualizing telecom infrastruc-
ture and distribute network function to Mobile Edge Cloud [13, 14]. 5G-IoT was
proposed from service attributes point of view where the services that are sesitive
to latency proposed to be placed in MEC such as the Vehicle-to-Vehicle (V2V) or
Vehicle-to-Anything (V2X) [15]. 5G networks were studied for multi-tenants [12],
multi-domain [16], multi-services [17], and mobile services [18].
2
BSS/OSS
Core Cloud
5G Core 5G Core
4G Core
(CP) (CP)
5G-IoT Slice
Cloud/Datacenter
5G Slice
4G Slice
NFV/SDN Orchestrator
Datacenter Networking Switch
Gateway and Routing
Access Node
Edge Cloud
App.
V2X SRV
IoT SRV
Control/Signaling DU
(BBU) 5G Core DU (IoT)
User Data (UP)
5G Core
Configuration and Monitoring (UP)
VNF
Network
Access
UE UE IOT Device
Figure 1.1: Top level design of virtualized Telecom 4G, 5G, and 5G-IoT networks
3
emerging concept that refers to a chain of VNFs that are connected in specific se-
quence to provide one or more services, which is usually called Service Function
Chains (SFCs) [25]. SFC also known as Service Chain (SC) and/or Network Service
(NS) are placed and managed through Virtual Network Function (VNF) lifecycle
management by NFV Management and Orchestration (MANO) framework.
4
Figure 1.2: ETSI Reference NFV Architectural Framework (depicted from [28])
ETSI NFV MANO consists of three main functional blocks and four data repos-
itories. The MANO blocks are: NFV Orchestrator (NFVO), VNF Manager (VNFM)
and Virtualized Infrastructure Manager (VIM) and the data repositories are: NS
Catalog, VNF Catalog, NFV Instances and NFVI Resources.
The NFVO aims to combined NFs to realize End-to-End service chains. Func-
tionally, The NFVO orchestrates resources through Resource Orchestrator (RO)
and services through Service Orchestrator (SO). Resource Orchestrator manages
the NFV Infrastructure (NFVI) resources across multiple VIMs. Service Orchestra-
tor (SO) manages the lifecycle of VNFs and guest network services. SO also provides
policy management and evaluation for the network service and VNF instances (e.g.
policies related with affinity/anti-affinity placement, scaling, fault and performance,
regulatory rules, NS topology, etc.).
5
VNF Manager (VNFM)
Mobile operators who aim to migrate some of their services to the NFV environ-
ment, intends to gradually transit from network infrastructures based on physical
nodes to the NFV. Also, operators may need to integrate the NFV with their cur-
rent existing Operation System Support (OSS), and Business System Support (BSS).
The NFV-MANO provides reference interfaces to connect with operators OSS/BSS,
which can provide management system for both the physical NSs and virtual NSs.
The VNFM controls the VNF through Element Management System (EMS). The
EMS is responsible for FCAPS management functionality for a VNF. FCAPS is a
short name for Fault Management, Configuration Management, Accounting Man-
agement, Performance Management, and Security Management functionality for a
VNF.
The VIM manages and controls NFVI physical and virtual resources in a single
domain. An NFV architecture may contain more than one VIM, which can manage
and control NFVI from multiple vendors and multiple purposes, such as compute,
storage, compute only or storage only. The VIM orchestrates, with the RO, the allo-
6
cation, upgrade, release, reclamation of NFVI resources including the optimization
of resources usage. It manages the association of virtualized resources to the physical
compute, storage and networking resources. For resiliency purposes, VIM manages,
with support of VNFM, the virtualized resource capacity, fault management cycle,
VNF Forwarding Graph (VNFs and virtual and/or physical network links), VNF
images and performance information collection. It is important to mention that the
VIM implementation is out of scope for NFV-MANO [27]. OpenStack controller
and openVIM are examples of the VIMs that can be used in the NFV-MANO.
Data Repositories
Data repositories are shown in Figure (1.2) in the block named ”Service, VNF
and Infrastructure Description”. Data repositories are databases that keep informa-
tion about NFV-MANO catalogs, which there are four of them:
2. The VNF catalog is a set of templates which describe the deployment and
operational characteristics of available VNFs.
4. The NFV instances repository holds information about all function and service
instances throughout their lifetime.
7
Figure 1.3: NFVI node components (depicted from [34])
virtualization environment is called NFVI node. NFVI node consists of the hardware
servers, the virtualized layer of compute, storage, and virtualized network resources
[34]. Each NFVI node has input gateway and output gateway. NFVI node is
illustrated in Figure (1.3).
8
1.3 Network Function Decomposition
However, the migration from traditional mobile network functions to the NFV
requires re-implementing those functions to be deployable on the NFV environment.
That re-implementation is important for the management and orchestration automa-
tion during the VNF lifecycle operations, such as instantiation, scaling, migration,
updating, recovery from failure state and termination. From the perspective of SDN
network, the network functions are re-implemented by separating the control plane
from the user plane [37]. In industry, the 3rd generation partnership project (3GPP)
has introduced the same concept of separating the control plane from user plane of
evolved packet core (EPC) functions [38]. A reference architecture for mobile core
on NFV/SDN is introduced in [17], which allocates the control plane in the central
and user plane to the edge of NFV virtual infrastructure managers.
From the academic point of view, the network function decomposition concept
is used to describe the network function re-implementation in order to deploy them
on NFV flexibly. Function decompositions is defined in [39] as an approach to sep-
arate out the tightly coupled network sub-functions within a network entity. This
definition implies that; the network decompositions can be separated in a manner
that fulfills the economic objectives. The motivation of network function decom-
position is to introduce independent scalability of NF decompositions, controlling
the traffic on the network links by placing NFs in central or in mobile edge net-
works near to the user equipment, and enhancing function separation using network
slices. Whereas, the NF decomposition is important for the VNF resilience, reliable
operation, and flexible management of NFV resources. Nevertheless, it is likely to
produce additional virtual links in the VNF forwarding graphs (VNF-FG).
9
Service Graph (SG)
in NF2 out
NF2
NF4 NF5
NF4
line of the figure with NF6 and NF7. For diversity, a network function can be re-
implemented in N-version of virtualization types as illustrated with NF4, which can
be re-implemented in NF6, which is the first version or NF8 and NF9, which both
represent the second version.
The VNF-FG is known also as Service Function Chaining (SFC), which is the
terminology of the Internet Engineering Task Force (IETF) [41]. However, in this
study, the term Service Graph (SG) is used to refer to the service requests in which
those requests are compliant to the SFC definition and the ETSI carrier grade re-
quirements. The SG is a connected NFs in an end-to-end directed acyclic graph,
where the NFs in each path have specific order to work together to provide a service.
For mobile services, the network functions might serve millions of users and requires
large process capacity; however, the service decomposition may result in a multiple
paths of SG, which will increase the management and orchestration of the service
on NFV.
For example, Figure (1.5) shows that the network function NF0 can be decom-
posed in three forms of service graphs. Figure (1.5)-(a) shows a service graph that
starts at one sub-function and ends at other one, and all the sub-functional nodes
have one input edge and one output edge. Figure (1.5)-(b) shows a service graph
10
NF0
NF1 NF2
Figure 1.5: Network function decomposition might result in (a) simple path service
graph; (b) forking path service graph; (c) multiple paths service graph
that starts at one sub-functional node and ends at more than one sub-functional
nodes. That means some nodes have more than one output edges. The graph in
Figure (1.5)-(c) shows the multiple paths service graph, which starts at more than
one sub-functional nodes and ends at more than one sub-functional nodes. In multi-
ple paths SGs, nodes in the middle might have more than one input edges and more
than one output edges. This manner of connection is not violating the ordering
characteristic of the SFC, that is because the order can be linear or non-linear [41].
11
1.4 The Use Case of the Study
One of the use cases of service function chaining is traffic engineering which is
usually applicable on mobile core network functions [43]. In addition, the mobile core
network function is one of the use cases of the ETSI NFV architecture [44]. These
two use cases are valid use cases in current literature for academic and industry
researches.
The problem of embedding multiple paths SGs has two aspects. The first aspect
is mapping the service with longer paths than required, which it was proved in [45].
The second aspect is the complexity of the placement problem, which it was proved
to be a NP-hard problem, where the execution time increases as the dimensions of
the service graph or the physical network increase. The proposed solutions in [46]
and [47] used the back-track mechanism. The back-track mechanism could find a
solution by trying all candidate nodes while it consumes much time before it gives
negative response. It is possible that the back-track mechanism finds solutions that
maps virtual links to long physical paths which increases the embedding cost and
consumes resources.
This study assumes that mapping service requests on physical network based
on the path identification of both (service and physical) would potentially enhance
the execution time and the embedding cost. whereas the current literature shows
that the increase of physical nodes results in a significant increasing in execution
time and embedding cost, this study focus on the impact of increasing physical links
for multiple paths service requests on execution time and embedding cost.
12
1.6 Research Objective
The goal of this study is to solve the NFV-RA problem with service decomposi-
tion support for simple/forking and multiple paths SGs on small and large physical
networks. In order to achieve the goal, the study introduced a path identification
method, which was used to minimize the input size to the placement algorithm to
reduce execution time and minimize the embedding cost, too.
13
5
scheme was solved in COIN-OR CBC solver.
The scope of the study is to optimize the NFV-RA problem for multiple paths
service chains, which can be result from network function decomposition of mobile
core network function. The study considered mobile (telecom) operator network
with ETSI NFV Infrastructure (NFVI) architecture.
For the best of our knowledge, the embedding of multiple paths service graphs
with joint of path mapping is not studied in the current literature. In addition,
resiliency of virtualized network function can be enhanced by using network function
decomposition to re-implement mobile core network functions. This study aimed to
develop an efficient placement approach that can be used to map mobile core network
functions on NFVI. The NFV-RA problem was solved for mobile operator network
scenario with the following attributes:
Then, the closely related work to this study was the work in [46], which solved
the NFV-RA problem with network function decomposition support. It also used
the virtualization technique types. Therefore, that work has been selected to be the
benchmark of this study.
5
https://projects.coin-or.org/Cbc.
14
1.11 Contributions
This thesis proposes the path mapping approach, which considers to map end-
to-end paths of service chains request instead of mapping node by node which pro-
posed in the literature. Physical and service chain networks are modeled with path
identifications, which used virtualization technique types to identify virtual nodes
in end-to-end paths. The main contribution is formulating NFV-RA problem with
network function decomposition support in ILP-based scheme (exact scheme). ILP
formulation identifies simple physical paths for each virtual links. In order to in-
vestigate the possibility of mapping the whole virtual path to exact match physical
path, we proposed a heuristic scheme, which is named Decomposition Path Selection
Mapping (DcPSM).
The results of the proposed approach using both the exact and the heuristic
schemes proved that the proposed path mapping approach is efficient in minimizing
execution time and embedding cost in large physical network with multiple paths
service graph.
The rest of this thesis is organized as follows. The litrature review and related
work is discussed in chapter 2. The proposed approach including path identifi-
cation, exact scheme and heuristic scheme are discribed in chapter 3. Simulation
environment, performance metrics, simulation expriments, and results discussion are
described in chapter 4. Finally, conclusion and future work are in chapter 5.
15
Chapter 2
Despite the success sounding the NFV, Mijumbi, et. al [31] reported three
aspects of NFV resource management problem including, NFV points-of-presence,
function placement, and dynamic resources management. By examining the liter-
ature, the placement problem is divided into three main problems, namely, virtual
network embedding [50–54] Virtual Network Function Placement (VNF-P) [55–58],
and Service Function Chaining Placement Problem (SFC-PP) [45, 47, 59–65].
The VNE considers the embedding of virtual network in the physical substrate
and focuses on resource allocation for virtual nodes and virtual links [66]. Most of
the proposed approaches that attempted to improve VNE is surveyed and discussed
in [54, 67].
16
2.1.2 Virtual Network Function Placement
Moens et al. [68] decoupled the VNE problem into VNF chaining and VM
embedding problems. VM embedding considers the placement of VNFs on their
corresponding virtual machines (VMs), while the VNF chaining can be a mapping,
an assignment or scheduling of NFs in their corresponding VNFs and links that
connecting them in network substrate. The VNF chaining is known as Service
Chaining and formally as Service Function Chaining (SFC). Nonetheless, the focus
of VNF-P is to know where to deploy virtual machine placement [54, 69] and how
to schedule the required VNFs [58, 70, 71].
The work in [75] reviews the Service Function Chaining Resource Allocation
(SFC-RA) problem. They classified the placement work in literature into six ap-
proaches as follows:
1. Basic approach, that decomposes the placement problem into three steps,
which are placement of VNFs, assigning VNFs to service requests, and chain-
ing the VNFs;
2. Dynamic approaches, which consider how to allocate resource at run time due
to changes in service requests;
17
3. Online approaches, which is the same as dynamic approaches but utilizing
online algorithms;
6. Mobile network approaches, which consider the mobile network functions place-
ment.
The work in this study is classified under the mobile network approach with consid-
ering online and dynamic uses of the proposed solution during design.
VNF-PR has been solved in literature with multi objective goal as in [76, 77].
Solving placement problem as VNF-PR is much similar to NFV-P but it consider
additional objectives related to service provider requirements.
In [76], a joint problem of admission control and SFC has been formulated in
Mixed Integer Linear Programming (MILP) for service provider. That formulation
encompasses splittable VNF and multipath routing scenarios. It employ relaxation,
reformulation, and successive convex approximation (SCA) methods to solve the
problem. The work in [76] considered the forking service graph with split data flow
and with routing. In [77], the VNF-PR was formulated as MILP with two objectives
the first is to minimize link utilization which is Traffic Engineering (TE) objective.
The second is minimize CPU utilization in NFVI.
18
centers [51, 61], operator networks [45, 55–57, 71, 78], wireless network [58], service
provider networks [50, 60], and NFV network [59]. For operator networks, the service
chaining might involve legacy middle boxes functions and virtual network functions,
this scenario is known as hybrid network [62].
In NFV, the placement problem usually has further constraints. Of these con-
strains are, the policy-based constraints which are required to meet Carrier-Grade
requirements, such as affinity and anti-affinity constraints [79], migration policy [63],
network management during run time [64], [80], and other regulatory or Quality of
Service (QoS) constraints. Although, the description of the policy constraints has
been described based on VNF Forwarding Graph (VNF-FG) [27]. Another scenario
for describing the service request structure for SDN/NFV network is introduced in
[81].
19
2.3.1 Integer Linear Programming
Integer Linear Programming (ILP) based approaches aim to optimize the map-
ping of NS to NFVI PoPs (Point-of-presence) and having as objective the mini-
mization of mapping costs and service delay in respect of infrastructure and services
constraints. ILP approach takes decisions based on the current state of the network
(as provided by the network monitoring) and on the NS requirements and specifica-
tions (as gathered from the NS catalogue in NFV repository). ILP approach related
work as in [62, 84–86].
20
addition, game theory was used as in [88] while two stage heuristic was proposed by
[89].
The work in [88] focused on the third use case of NFV [44], which is end-to-end
services supported by network service providers which involve cross-administrative-
boundary operation, inter-working, and migration to/from physical NF implementa-
tions. They proposed an integrated design for network function instance allocation
and end-to-end demand realization sharing the same physical substrate network
and demonstrate that the corresponding network design problem is NP complete.
A Mixed Integer Programming (MIP) formulation is proposed to find its optimal
solution, followed by a two-player pure-strategy game model which captures the
competition on physical resources between network function instance allocation and
routing. Then they design an algorithm based on iterative weakly dominated elim-
ination in Game Theory. Computational results demonstrate experimentally the
value of the integrated approach and its ability to allocate network function in-
stances supporting end-to-end requests with limited physical resources in optical
networks.
21
2.3.5 Evolvable Approach
This approach aimed to reduce the cost for dynamic placement, such as re-
configurations of virtual machines (VMs) after changes of processing requests for
VNF by tenant management system. The author of [83] proposed Modularly Vary-
ing Goals (MVG), which was based on genetic algorithms (GAs) and two evolvable
VNF placement methods named Evolvable VNF Placement (EvoVNFP) and Evolv-
able VNF Placement-2 (EvoVNFP-2). Those placement algorithms used the GA to
reduce the number of reconfiguration after the changes of processing requests from
tenant while minimizing delay on traffic routing.
22
environment. They have experimentally tested their suggestion and compared the
resource consumption to the VM deployment over hypervisor. They claim that
using container-based NFs is significantly improves the performance in terms of
lower memory usage and lower computational resources overhead to improve load
balancing, redundancy and NF availability. We may consider the work in [91] as
Proof-of-Concept (PoC) put it is out of the scope of this study because the placement
and configuration have been done manually. In this study we consider placement of
a NF on container based virtualization as defined in section 3.4.
23
2.5 Placement with Service Decomposition Sup-
port
24
Service Graph (SG) of a Network Service (NS)
in NF2 out
Decompositions of NF3
in NF5 out
Also, NF can be decomposed to its control plane (CP) and user plan (UP)
NF2 CP/UP Decompositions
in NF2 out
Control Plane (CP)
in NF2 out
The work in [61] aimed to minimize cost of solving the VNF-P on NFV. It
considered one measure of the efficiency, which is the reducing the cost by 19% of
the previous work. Reducing scheduling time span was considered as and efficiency
metric in [70] and [57]. Efficient use of resources were considered in [80]. In con-
sequence, we considered the enhancement in execution time and embedding cost
as the metric of the efficiency of this study. The acceptance ratio is going to be
a metric for the efficiency of the exact scheme, while the embedding cost trade off
with acceptance ratio in heuristic.
25
Table 2.1: Comparison of related works for VNE and VNF-P
Related Strategy Scenario Contribution
work
26
Table 2.2: Comparison of NFV-RA related work
Related Strategy Scenario Contribution
work
[20] Description- Telecom Proposed a descriptive data model that present con-
based operator current users of generic services on multiple layered
architecture.
[45] Heuristic Operator Proposed a primary backup redundant scheme map-
network ping to maximize the service continuity.
[46] Exact, Service Proposed NF decomposition selection based on VNF
Heuristic provider clustering using virtualization technique type to min-
network imize mapping cost.
[47] Exact, Operator Proposed a SFC placement with function scalability
Heuristic network to realize the dynamic operations on NFV.
[63] Heuristic Operator Proposed a consolidation algorithm based on migra-
network tion policy to reduce the cost of QoS degradation dur-
ing VNF migration.
[64] Heuristic NFV net- Presented an automatic policy-based approach to
work solve service chain composition on NFV ot reduce op-
erational cost.
[80] Heuristic Service Proposed SDN-based NFV orchestration to imple-
provider ment policy
[81] Heuristic Service Presented a YANG model to describe the service
provider structure and solve the first stage by selecting a Par-
ito set of possible compositions.
[86] Exact, Operator Proposed a NF Consolidation on NFV to minimize
Heuristic network resource occupation by reducing the number of VNF.
[88] Exact, Optical Proposed placement algorithm based on game theory
Heuristic network to minimize mapping cost.
[61] Heuristic Data cen- Optimized VNF placement and service chaining using
ter a Markov approximation with many-to-one matching
theory in coordinated approach to minimize the cost.
[73] Exact, NFVI Proposed a coordinated approach to jointly optimize
Heuristic NFV-RA in the three stages of the problem.
[62] Exact Hybrid Proposed a customizable SFC composition to mini-
network mize the mapping and the management cost.
[60] Exact, Service Proposed a survivability for SFC with multi-path link
Heuristic provider mapping in order to maximize survivability and min-
network imize resource redundancy
[65] Heuristic Cloud Proposed an eigendecomposition based approach to
maximize revenues.
[59] Heuristic NFV net- Proposed a coordinated placement algorithm that
work solves service chain composition and embedding with
reasonable execution time in large-scale physical net-
works.
[76] Exact, Service Considered the joint problem of admission control and
Heuristic provider SFC to enhance resource allocation.
[89] Exact, cloud dat- Considered solving the placement problem for SFC to
Heuristic acenter minimize resource allocation during VNF instantia-
tion and with time-varying workloads.
[77] Exact Service Solved the VNF-PR problem as a multiple objectives
provider then showed a trade-off between classical Traffic En-
gineering (TE) and NFVI efficiency.
[95] Heuristic Service propose a distributed search method for ordered
provider VNFs to suppress delays while considering the control
server load, with an in-network guidance technology
for query messages
[96] Heuristic Datacenter Proposed a joint problem of the VNF placement and
path selection to minimize server and link utilization.
[74] Metaheuristic Service Solved the VNF-FG composition stage to minimize
provider bandwidth demand.
[97] Heuristic Service Proposed a fix-and-optimize-based heuristic algo-
and Meta- provider rithm and Variable Neighborhood Search (VNS) to
heuristic minimize resource allocation.
[98] Exact, Service Solved VNF-PR considering to improve disaster re-
Heuristic provider covery with minimizing cost.
[99] Exact, Service Consider dynamic reconfiguration with carrier grade
Heuristic provider constraints.
[100] Exact Multiple Solved VNF-PR problem to minimize resource utiliza-
tion.
27
Chapter 3
This chapter models the physical network and service request with path identi-
fication. Then, it formulates the problem of network service resource allocation with
support of network service decomposition. Next, the NVF-RA problem is solved us-
ing path mapping with two schemes, the exact is ILP-based scheme and the heuristic
scheme Decomposition Path Selection Mapping (DcPSM). Figure (3.1) is a simple
example of mapping virtual service requests with 4 VNFs on physical network that
consists of 7 physical nodes with different virtualization types. Next sections explain
the terminology and notations that are used to model the physical network, service
request, problem objective, problem variables, and mapping constraints.
28
Service Request (Decomposition)
NF0 NF1 NF2 NF4
in out
HW I/O VM PRC
1: HW 2: I/O 3:PRC
4:VM
Physical Network
Figure 3.1: Simple example of a physical network and a service request. Red lines
represents NF mapping when YNfu = 1 and blue lines presents link mapping when
e
ZLijuv = 1
29
Table 3.1: Physical Network Model
Notation Description
G = (N, L) physical network graph.
N set of physical nodes.
L set of physical links.
Nu physical nodes.
m number of nodes in N .
T set of virtualization technique types.
t a virtualization technique type.
t
RN u
Virtualization technique type of physical node Nu .
K set of resource types.
t,k
RN u
resource k of physical node Nu that has t virtualization type.
CNt,ku embedding cost of resource k in node Nu of type t.
Luv physical link between Nu and Nv .
BLuv bandwidth of Luv .
DLuv delay of Luv .
CLuv cost of embedding on Luv .
Puv path between Nu and Nv .
Iuv identification of the path Puv .
CP Catalogue of physical paths.
k and Nu has a virtualization type t is denoted by CNt,ku . Each physical link between
Nu and Nv is denoted by Luv ∈ L where u, v ∈ [1, m]. Luv has a bandwidth BLuv
and a propagation delay DLuv . The embedding cost of a bandwidth unit is denoted
as CLuv . A summary of notations used in modeling physical Network is shown in
Table (3.1).
Path identification has two purpose, one is to minimize the number of candidate
physical links in the input of the placement algorithm in order to enhance the
execution time. The other is to avoid mapping virtual links to long physical paths
30
in order to minimize and control the embedding cost. Therefore, path identification
is formulated as follows.
where u, x1 , x2 , xn−1 , xn , v ∈ m.
While the edge Euv can be expressed as a tuple of nodes at both ends of the
edges, then it can be expressed by Euv = (Nu , Nv ) and Puv as in Equation (3.2).
where tu , tx1 , tx2 , txn−1 , tn , and tv are the virtualization technique types of Nu , Nx1 ,
Nx2 , Nxn−1 , Nn , and Nv respectively.
31
The data set of path identifications is denoted by CP . Each entry of CP contains
a data set of all paths, which have the same path identification of the entry as
expressed in Equation (3.4).
where Ipath can be any unique sequence of available virtualization types with variable
length in the range of 2 nodes to the number of nodes in the longest simple path
in the physical network. If a is the maximum number of available unique path
identifications, the data set of CP is expressed as in Equation (3.5).
Given that traditional network function can be mapped to one VNF or VNFs
chain where those VNFs might be implemented with different virtualization tech-
nique types. Then it is possible to compose several combinations of the service
chains. In addition, the service request might contain further policy-based con-
straints, such as the life time of the service or affinity and anti-affinity constraints.
Therefore, the service request is denoted by S and expressed in Equation (3.6)
where rid is the service request identification. sdc is the set of possible service
decompositions. Thus,
32
Table 3.2: Service Request Model
Notation Description
S Service request where S = {rid , sdc , Ψ }
rid request id
sdc set of decompositions.
sdc = (dc1 , dc2 , . . . , dcx ); x ∈ N
dcx = Gs
Ψ set of constraints.
Gs = (F, E) graph of service chain.
F set of VNFs in Gs .
E set of virtual links in Gs .
f ∈F virtualized network function.
eij ∈ E virtual link between functions i and j.
Rfk the k resource of the function f .
Rft virtualization type t of function f .
Rft,k resource k for function f that has virtualization type t.
Beij required bandwidth for eij .
Deij maximum allowed delay for eij .
Pe2e set of end-to-end virtual paths in Gs .
p an end-to-end path where p ∈ Pe2e
33
However, Each service decomposition is a VNF-FG for a service chain. The
service chain is modeled as a directed graph Gs = (F, E). F is the set of virtualized
network functions and E is the set of links between them. Each network function
{f |f ∈ F } has a resource set denoted by {Rft,k |k ∈ Kandt ∈ T } where K is a
resource set and the function f is implemented by a virtualization technique type t.
Each virtual link between two functions i and j is denoted by eij ∈ E and i, j ∈ F .
The eij requires a bandwidth resource, which denoted by Beij and it has a maximum
allowed delay that denoted by Deij .
The service chain may contain one end-to-end path or more. Each end-to-end
path starts at a source function and ends at a destination one. End-to-end virtual
path is denoted by p. The set of all end-to-end paths in the service chains is denoted
by Pe2e . A network function in p is denoted by {fnp |n ∈ m} and m is the number
of network functions in p. The virtualization technique type of the fnp is denoted
by tfnp . All paths of the service is identified by an ordered set of types of functions
in paths. Path identification was denoted by Ip = (tf1p , tf2p , . . . , tfnp ). Ip is a unique
identification and it is possible to address more than one end-to-end virtual paths
that have the same length and the same order of virtualization type.
During the embedding stage of NFV-RA problem, only one service decompo-
sition is selected to be mapped on the physical network. A binary variable Xdc is
used to indicate whether a decomposition is mapped or not. The Xdc is expressed
in Equation (3.7).
1 if dc is mapped.
Xdc = ; ∀dc ∈ sdc . (3.7)
0 otherwise.
34
node Nu . The YNfu is expressed in Equation (3.8).
1 if f is mapped on Nu .
f
YN u = ; ∀dc ∈ sdc , ∀f ∈ Gdc , ∀Nu ∈ N. (3.8)
0 otherwise.
e
The binary variable ZLijuv indicates if the virtual link eij is mapped on physical
link Luv . For the best of our knowledge, this variable was expressed in the literature
as in Equation (3.9).
1 if eij is mapped on Luv .
eij
ZLuv = ; ∀dc ∈ sdc , ∀eij ∈ E, ∀Luv ∈ L. (3.9)
0 otherwise.
In large physical networks, the Equation (3.9) would generate large number of vari-
ables, which increased the execution time in consequence. In order to minimize
the number of variables, the path identifications Ip of end-to-end paths of the ser-
e
vice request is used to retrieve possible candidate physical paths. Then the ZLijuv is
expressed again in Equation (3.10).
1 if eij is mapped on Luv .
e
ZLijuv =
0 otherwise.
Assuming that different resource type has different embedding costs. Then, the
amount of required resource type k to embed f on Nu is denoted by Rft,k→Nu . Where
f and Nu have the same virtualization technique t.
X X X XX
A= (CNt,ku × Rft,k→Nu × Xdc × YNfu ) (3.11)
dc∈sdc f ∈F Nu ∈N t∈T k∈K
35
e
X X X X X
B= (CLuv × Beij × Xdc × ZLijuv ) (3.12)
dc∈sdc p∈Pe2e eij ∈p Puv ∈CP (Ip ) Luv ∈Puv
Minimize A + B (3.13)
Decomposition Constraint
Only one decomposition of the service request should be embedded. This con-
straint is expressed in Equation (3.14).
X
Xdc = 1 (3.14)
dc∈sdc
36
Nu has enough resources and the function has the same virtualization type of the
physical node t = t1.
P ft
t YNut1 = 0 ; t 6= t1.
f ∈F
, ∀Nut1 ∈ N, ∀dc ∈ sdc , ∀t, t1 ∈ T. (3.16)
P ft
t YNut1 ≥ 0 ; t = t1.
f ∈F
X
Rfk × YNfu ≤ RN
k
u
; ∀Nu ∈ N, ∀dc ∈ sdc , ∀k ∈ K. (3.17)
f ∈F
For mobile network the connections between virtual functions of the service
might traverse through transmission mediums, which might be with high cost. The
path length embedding constraint in Equation (3.18) determines if it is allowed to
embed end-to-end paths on longer than required physical paths. One of the reasons
behind high embedding cost is mapping virtual links to more than one hub physical
links, in one hand. In the other hand mapping virtual links to more than one
hub physical links might improve the acceptance ratio. This trade-off between the
embedding cost and the acceptance ratio can be controlled by the network operator
through determining the value of h|h ∈ 0, 1, 2, . . . in Equation (3.18) where h value
should equal to the maximum allowed additional hubs to the length of the virtual
path.
e
X
ZLijuv ≤ len(p) + h; ∀dc ∈ sdc , ∀p ∈ Pe2e , ∀Luv ∈ L (3.18)
eij ∈p
where len(p) is the number of virtual links in p. In case, there is a link in p where
both nodes at the two ends of that link have the same virtualization type, both
can be embedded to the same physical node. Then, the embedding will be in lower
number of physical links than len(p).
When a virtual link is mapped to more than one physical links, the traffic on
that link should not be split in more than one path. Then, if we assume that the
37
outgoing link from a node to next node has a positive sign and the incoming link
from a previous node to a node has a negative sign. Unsplittable path flow constraint
is expressed in Equation (3.19).
e e
X X
ZLijuv + −ZLijuv = YNi u − YNj u ; ∀dc ∈ sdc , ∀eij ∈ E, ∀Nu ∈ N.
Luv ∈L,Nu =src Luv ∈L,Nu =dst
(3.19)
Bandwidth Constraint
The sum of bandwidth for all virtual links that are mapped to a physical link
should not exceed the bandwidth capacity of that link and this constraint expressed
in Equation (3.20).
e
X
Beij × ZLijuv ≤ BLuv ; ∀Luv ∈ L, ∀dc ∈ sdc . (3.20)
eij ∈E
The end-to-end delay for all the physical links which the virtual link mapped
to, should not exceed the allowed delay for that virtual link, as in Equation (3.21).
e
X
DLuv × ZLijuv ≤ Deij ; ∀dc ∈ sdc , ∀eij ∈ E. (3.21)
Luv ∈L
38
3.4 Catalogue of Physical Paths
Each simple path in the physical network Puv is identified using an ordered
set of virtualization technique types ( Equation (3.2)). Path identified by Iuv (
Equation (3.3)).
For all simple path in the physical network and the path starts at node u
and ends at node v, the identification Iuv for that path is composed as a tuple
of virtualization technique types for all nodes in the path with the same sequence
from u to v. All paths that have the same length (number of nodes) and same
sequence of virtualization type (same identification) are added to the same entry of
that identification in CP . In service request, paths identification of end-to-end paths
are done in the same way. The number of path identification in a service request
is equal or lesser than the number of end-to-end paths in its service graph. For
example, if a service graph of the request consists of 2 end-to-end paths, the number
of identification for that request will be 2 also unless there are two end-to-end paths
with the same sequence of virtualization types. Figure Figure (3.2) shows in (a) an
example of a service request graph and in (b) show how each path in the graph is
identified.
39
Service Request
Two paths SG:
in
NF0 NF1 NF2 NF4
out Path 1: (NF0, NF1, NF2, NF4)
HW I/O VM PRC
IP1 : (HW, I/O, VM, PRC)
Path 2: (NF0, NF3, NF4)
NF3
IP2: (HW, VM, PRC)
VM
1: HW 2: I/O 3:PRC
Candidate paths:
For IP1: (HW, I/O, VM, PRC)
4:VM Candidate path 1 in Iuv1: (1, 2, 4, 6)
For IP2: (HW, VM, PRC)
Candidate path 2 in Iuv2: (1, 5, 6)
Figure 3.2: Labeling and candidate paths grouping example; (a) example of two
paths service request, (b) path identification of the service request in a, (c) example
of a physical network, (d) candidate physical paths and candidate paths grouping.
This section describes the Decomposition Path Selection Mapping (DcPSM) al-
gorithms. DcPSM consists of decomposition selection, service mapping, path map-
ping, check node validation, and check links validation algorithms.
Where Pdc is the minimum number of candidate physical nodes which is used to
map NFs of dc, CF dc is the clustering factor, and ndc is the number of NFs in dc.
40
Figure 3.3: Clustering Factor (CF) as proposed by Sahhaf et. al. [46]
The constants a, b, g are used for weighting cost parameters. The clustering in [46]
considers that it is possible to combined any two NFs in sides of virtual edge inside
one physical node if both NFs have the same virtualization type. While a VNF
can contain more than on NF, clustering factor (CF) proposed in [46] is roughly
the number of VNFs in a dc as shown in Figure (3.3). Clustering is not effectively
reduce embedding cost in small number of NFs, as we can see in the results of this
study. Therefore, this study used different cost function as in Equation (3.23) to
determine which decomposition is going to be selected.
The cost function has three selection factors, which are number of edges ne (dc),
number of nodes nf (dc), and number of paths np (dc). Each factor has a weighting
parameter that is used to control the impact of the factor. Weighting parameters
are we , wp , and wn , which are for number of edges, paths, and nodes factors, re-
spectively. The pseudo code of the decomposition selection algorithm is illustrated
in Algorithm (1).
41
Algorithm 1: Decomposition Selection Algorithm
Data: sdc : Service request decomposition set, we : edges weighting
parameter,wp : paths weighting parameter, wn : nodes weighting
parameter
Result: Service graph of selected decomposition with minimum cost
1 begin
2 minCost ← inf inity
3 for Gs ∈ sdc do
4 cost = we ∗ ne (Gs ) + wp ∗ np (Gs ) + wn ∗ nf (Gs )
5 if minCost > cost then
6 minCost = cost
7 SelectedDc = Gs
8 end
9 end
10 Return: SelectedDc
11 end
while
P athGroupList = ((Pab , Pef ), (Pab , Pgh ), (Pcd , Pef ), (Pcd , Pgh ))
42
Algorithm 2: Service Mapping Algorithm
Data: S: Service request contains few decompositions, G: Physical
network graph, CP : Catalogue of physical paths.
Result: service mapping success state.
1 begin
2 ReqP athsList ← φ
3 CandidateP athsList ← φ
4 Gs = DecompositionP athSelection(sdc )
5 Pe2e ← end-to-end paths of Gs
6 for path ∈ Pe2e do
7 IP ath ← V irtT ype(path) /* virtualization technique
types for nodes in path */
S
8 CandidateP athsList Cp (IP ath )
9 end
10 Generate path Group list:
P athGroupList = pathGroupGenerator(CandidateP athsList)
11 for CandidateP athsGroup ∈ P athGroupList do
12 Success = PathMapping(Pe2e , CandidateP athsGroup)
13 if Success == T rue then
14 Path mapping success
15 break
16 end
17 end
18 if Path mapping success then
19 Return: Mapping Success
20 end
21 else
22 Return: Mapping Fails
23 end
24 end
Path mapping algorithm tries to map Pe2e to their candidate physical path
group. Given that the end-to-end paths in Pe2e have shared virtual nodes because
the service graph Gs is connected. Thus, we used a simple method to check if
candidate paths have shared physical nodes too. That method is comparing the
number of physical nodes to the number of virtual nodes. If the physical less or
equal, then the algorithm continue. Otherwise it returns negative response. That
check method is stated in line 2 of path mapping (Algorithm (3)).
43
Algorithm 3: Path Mapping Algorithm
Data: Pe2e : a set of end-to-end paths of the service request,
CandidateP athsGroup: A list of candidate paths.
Result: T rue/F alse
1 begin
2 if The number of unique nodes in the CandidateP athsGroup more
than the number of nodes in Gs then
3 Return F alse
4 end
5 make a SavePoint /* save a copy of the physical network.
*/
6 mappedN odes = φ mappedEdges = φ
7 for Puv ∈ CandidateP athsGroup do
8 for p ∈ Pe2e do
9 for Nu ∈ Puv do
10 for f ∈ p do
11 if f ∈
/ mappedN odes then
12 checkN ode = CheckNodeValidation(f, Nu )
13 if checkN ode == F alse then
14 Role Back to SavePoint
15 Return F alse
16 end
17 checkLinks = CheckLinksValidation(f, Nu ,
mappedN odes, mappedEdges)
18 if checkLinks == F alse then
19 Role Back to SavePoint
20 Return F alse
21 end
S
22 mappedN odes (f, Nu )
23 end
24 end
25 end
26 end
27 end
28 Return T rue
29 end
The rest of pseudo code of the path mapping algorithm is described in Al-
gorithm (3) where it saves a the physical network state to a save point in or-
der to rolls back if the mapping fails. Next, it checks the virtualization tech-
nique type and available resources to map f on Nu using a validation function
44
named CheckNodeValidation. Whenever a new function is processed for map-
ping the links between the mapped nodes and that function is checked for avail-
able bandwidth and end-to-end link delay. Links validation function is named
CheckLinksValidation.
45
Algorithm 4: CheckNodeValidation Algorithm
Data: Gs : A service graph, G: Physical network, N F : Virtual node
in Gs , P node: Physical node to be checked.
Result: T rue/F alse
1 begin
2 if virtT ype(N F )! = virtT ype(P node) then
3 Return F alse
4 end
5 else if available resource of P node not enough to host N F then
6 Return F alse
7 end
8 else
9 Return T rue
10 end
11 end
The CheckLinksV alidation algorithm (in Algorithm (5)) checks the end-to-
end delay for links between N F and previously mapped N F s, then it checks if
the physical edges that mapped before to the virtual links have enough bandwidth
to host them. It returns true if the check of end-to-end delay and bandwidth is
positive otherwise it returns f alse. The assignment of virtual links is done in the
CheckLinksV alidation algorithm where each physical edge used in mapping of the
virtual link vLink and it appends to its entry in the mappedEdges. Using the
mappedN odes and the mappedEdges registries enable better controlling of resources
and rolling back.
46
Algorithm 5: CheckLinksValidation Algorithm
Data: Gs : A service graph, G: Physical network, N F : Virtual node
in Gs , P node: Physical node to be checked, mappedN odes:
Mapped nodes data set.
Result: T rue/F alse
1 begin
2 for (fi , Nv ) ∈ mappedN odes do
3 if (fi , u)OR(u, f ) ∈ edgesof Gs then
4 vLink = (f, fi )OR(fi , f )
5 PhyPath = ShortestP athBetween(P node, u)
6 if DelayOf E2E(P hyP ath) > DelayOf (vLink) then
7 Return F alse
8 end
9 for edge ∈ P hyP ath do
10 if BandwidthOf (edge) < BandwidthOf (vLink) then
11 Return F alse
12 end
13 else
14 BandwidthOf (edge)− = BandwidthOf (vLink)
S
15 mappedEdges (vLink, edge)
16 end
17 end
18 end
19 end
20 Return T rue
21 end
47
Chapter 4
48
ulation is stored in the storage repository. Then, the results are analyzed and
draw using python matplotlib and numpy packages.
Physical Network
Generator Plot
Results
Service Request
Generator Storage
Repository
Control Panel
This study considered the similar environment setup to the works in [101] [102],
which claimed that the actual characteristics of substrate and virtual networks are
not well understood since network virtualization is still an open field. This claim
has been adopted by recent works, such as [47]. In consequence, Synthetic service
requests are used in this study following to previous works in literature while physical
networks are depicted from real network topologies. Synthetic physical networks
have been used in this study to investigate the performance of compared schemes in
various scenarios.
The conducted experiments in this thesis has two simulation run types, which
are long simulation runs and short simulation runs. The long simulation runs are
conducted for 200 time window with total 20000 time units with average 800 service
requests in each run. The short runs are executed with 2.5 time window with average
10 service requests in each run and total 250 time units. The environment setup is
described in details in the following sub-sections. Summary of simulation parameters
have listed in Table (4.1) while environment setup for service requests is shown in
Table (4.2).
49
Table 4.1: Environment Setup: Simulation Parameters
Parameter Value Unit Remarks
h 1 link
a 0.25
b 0.25
g 0.50
we 0.60
wp 0.30
wn 0.10
The service requests are generated in Poisson process with average equals to
4 services per time window, which equals 100 time units. Each service has a few
decompositions, which are uniformly distributed between 2 to 5 decompositions in
a service. Each decomposition has 2 to 10 NFs uniformly distributed. Each NF
has CPU, memory and storage capacity, which are uniformly distributed between
1 and 20 capacity unit. Every pair of NFs in the decomposition is connected with
0.5 chance to generated the links between NFs. The bandwidth of those links is
uniformly distributed between 1 and 50 bandwidth units. The delay of virtual links
50
is assigned to 1000 time units. The life time of each service request is exponentially
distributed with average equals to 1000 time units. The generated service decom-
positions are verified to be directed acyclic graph. The service graph is verified to
be in the simple path or in the forking path SG forms for the Simple-Small and
Simple-Large scenarios; whereas it verified to be in the multiple paths SG form for
the Multiple-Small and Multiple-Large scenarios. The virtualization technique type
of nodes is random select of available virtualization technique types.
NFV physical network uses real topologies of two real networks, which were
obtained from Internet Topology Zoo1 and they are the BT Europe network and
1
http://www.topology-zoo.org
51
Interoute network. The BT Europe network consists of 24 nodes and 37 edges and
the Interoute network consists of 110 nodes and 148 edges. The CPU, memory and
storage of physical nodes and the edge bandwidth are uniformly distributed between
100 and 150 capacity units, while the bandwidth of edges are uniformly distributed
between 100 and 150 bandwidth units. The delay of each edge is calculated pro-
portionally to the real geographical distance between nodes is between 1 and 30
time units. The embedding cost of physical nodes and physical edges is equals to 1
cost unit. The virtualization technique type of nodes is random select of available
virtualization technique types. Summary of physical network parameters is shown
in Table (4.3).
In order to evaluate the execution time, Synthetic physical networks were gen-
erated with number of nodes that ranges between 10 and 150. The physical edges
between nodes are generated randomly between any pair of nodes in chance of 0.5.
The resources of nodes, delay of edges, and bandwidth of edges are generated as
described above.
52
4.2.4 Hardware and Software Description
1. Execution time (ET ): This metric measures the spent time by an algorithm
to find the embedding solution [46], [47]. Execution time is an important
metric to evaluate the placement algorithm where developing rapid algorithms
is important for resiliency mechanisms in NFV.
2. Acceptance ratio (AR = RA /RT ): This metric measures the accepted ser-
vice requests (RA ), which are successfully mapped, to the total number of
arrived requests (RT ) [46]. High acceptance ratio might be an indicator of
high revenues. But some mechanism, such as the back track, might consume
much resources to increase the acceptance ratio, which in consequence increase
the embedding cost too. This trade off can be determined by the NFVI oper-
ator where lower acceptance ratio with reasonable use of resources might be
satisfying.
3. Embedding cost (Cavg ): The embedding cost is the average of total used re-
sources for mapping service requests on 100 time unit[46], [47]. The embedding
cost is calculated as in the objective equations (3.11-3.13).
53
Ravg of a service requests in 100 time units [46]. Revenue of a service request is
calculated by multiplying total resources of virtual nodes by average physical
nodes cost then sum it with the multiplying of total bandwidth of virtual links
by average cost of physical links.
The experiment procedure has been conducted according to the following steps:
Step 1: Generate Service Graphs with Poisson Process. Each service has a few
decompositions and number of network functions in each decomposition which
are uniformly distributed. Capacity of resources in each network function are
uniformly distributed.
Step 2: Using a real network topologies for small and large physical networks. The
Capacity of CPU, memory and storage, and edges bandwidth is generated
in uniform distribution. Delay of each physical edge in the topology will be
distributed proportionally to the calculated distance between physical nodes
with its geographical coordinates.
Step 3: Formulate Integer Linear Programming to find the optimal solution of ser-
vice chains embedding as in [46].
Step 4: Develop the proposed decomposition path selection mapping approach and
algorithms to realize it.
Step 5: Develop simulation scenarios to show the impact of the proposed approach
in small and large physical network for simple/forking and multiple paths
service graphs.
54
Step 6: Record measurements for performance metrics.
The experiment is conducted with four scenarios, which are (1) Simple-Small,
(2) Simple-Large, (3) Multiple-Small and (4) Multiple-Large. The name of each
scenario is composed of two parts. The first part describes the form of the service
request which can be simple or multiple. The simple means that the service requests
are generated in the form of simple or forking path SGs. The multiple means the
service requests are multiple paths SGs. The second part of the scenario name
describes the size of physical network where small is a small physical network and
large is a large physical network.
The evaluation results are compared against the results of the benchmark [46].
The benchmark schemes were reimplemented from the scratch. The schemes of the
benchmark were denoted by ILP-A for the ILP-based and DSBM for the heuristic.
The suffix A of ILP-A means that all edges in the physical network have link variable
as described in [46], which is similar to binary variable ZLeijev in Equation (3.9). The
proposed schemes of our approach are denoted by ILP-P for the ILP-based and
DcPSM for the heuristic. The suffix P of ILP-P means that part of physical edges
were given variables ZLeijev as as in Equation (3.10).
Given that, ILP-A has long execution time as claimed in [46]. Then, ILP-A was
tested in short runs to compare the execution time. Whereas the acceptance ratio
of ILP-P was measured almost 100% in Simple-Small and Multiple-Small scenarios,
the results of ILP-A only reported for the execution time. Short run simulation
considered 250 time units for each simulation run.
55
table Table (4.4) and a list of reported scenarios are in table Table (4.5).
The SPE53 is the service graph of each service decomposition of each request has
5 paths and the synthetic physical network was generated with maximum 3 edges at
each node. SPE54 has 5 paths and physical network was genetated with maximum 4
edges at each node. In the same manner the execution time was measured for SPE103 ,
SPE104 , SPE203 , and SPE204 scenarios.
56
Table 4.5: Experiment scenarios
Run Notation Description
Long Simple-Small Simple/forking requests on small-scale topology
Long Simple-Large Simple/forking requests on large-scale topology
Long Multiple-Small Multiple paths requests and small-scale topology
Long Multiple-Large Multiple paths requests on large-scale topology
Short, Long SPE53 Requests with 5 paths and maximum 3 edges at
each physical node in physical network.
Short, Long SPE103 Requests with 10 paths and maximum 3 edges at
each physical node in physical network.
Short, Long SPE203 Requests with 20 paths and maximum 3 edges at
each physical node in physical network.
Short, Long SPE54 Requests with 5 paths and maximum 4 edges at
each physical node in physical network.
Short, Long SPE104 Requests with 10 paths and maximum 4 edges at
each physical node in physical network.
Short, Long SPE204 Requests with 20 paths and maximum 4 edges at
each physical node in physical network.
lesser number of edges than the average number of edges of the physical network.
In case of testing the impact on execution time, synthetic physical networks with
different number of edges were generated as in table Table (4.6). The fields of the
table is denoted by P hN for the number of physical nodes, P hE3 for the maximum
edges at each node equal 3, and P hE4 for maximum edges at each node equal to 4.
Unlike the work in [46], the ILP-based scheme in this study did not used any
selection function. The reason is to find the best solution to compare both heuristic
schemes (our heuristic and benchmark one).
As the heuristic (DSBM and DcPSM) uses weighting parameter in their decom-
57
Table 4.6: List of synthetic physical network
P hN P hE3 P hE4
10 14 21
30 50 64
60 98 133
90 156 198
120 227 265
150 265 333
position selection procedure, specifically in the cost functions, the reported results
were measured using the following weighting parameters. The cost function of the
decomposition selection of the DSBM uses the weighting parameters of selection
factors, which are a = 0.25, b = 0.25 and g = 0.50. These parameters are recom-
mended in [46]. The cost function of the path selection of DcPSM uses the weighting
parameters of selection factor, which are we = 0.60, wp = 0.30 and wn = 0.10. The
weighting parameters of the path selection of DcPSM are selected experimentally as
discussed in Section 4.5.5.
Comparing our proposed approach with previous work involves the network
topologies, service requests, problem formulation, and evaluation method.
In this thesis, we used teal telecom operator network for small-scale and large-
scale (the BT-Europe and Interout networks from Internet Topology Zoo), which
were used in [46] and [47]. The synthetic topologies are used in this study with
reasonable number of attached physical links to each node. In real networks, high
volume servers usually contains small number of network adapters, which might
range from 2 adapters to few folds of 2 and usually 4 network adapters in each
58
server (node). Thus, synthetic topologies were generated with maximum number
of attached links to each node equals to 3 or 4 links. The implementation in [47]
considered 100 nodes and 570 links in the synthetic network, which we think that
such physical network would increase capital and operational cost because of the
high number of physical links. In addition, compared schemes were evaluated using
topologies with higher number of nodes up to 150 nodes (Table (4.6)) comparing to
50 nodes in [46] and 100 nodes in [47].
Service Requests
Problem Formulation
59
identification of the virtual links (Equation (3.10)), which indicate that ILP-P is
more efficient in using space. Moreover, ILP-P scheme gibes the network operator
the ability to control the trade off between the embedding cost and the acceptance
ratio where the length constraint in Equation (3.18) ensure lower embedding cost
with lower value of h while the higher values improves the acceptance ratio by
mapping longer paths. Most of the work in literature considered the embedding
cost for measuring the efficiency of the placement algorithm. We also give the
advantage to the embedding cost over the acceptance ratio because our proposed
solution focus on mobile networks. Mapping virtual paths to shorter of equal length
of physical paths is important to enhance end-to-end latency and user quality of
experience.
Evaluation Method
60
requests in this setup consider the real network configuration and reasonable cost
of the physical topologies where much physical links in synthetic network might be
unnecessary. Distribution of service requests with specific attributes is counted and
plotted in Figure (4.2).
DcPSM DcPSM
ILP-P ILP-P
DSBM
12000 DSBM
16000
10000 14000
8000 12000
10000
Count
Count
6000 8000
4000 6000
2000 4000
2000
25 30ges 7080
20 5060f paths
2 3 4 15 f ed 0 5 10 40 o
Numb5er of6 7 8 10 er o Numbe15 2030mber
nodes 9 10 5 Numb r of ed20ges 25 30 0 10 Nu
0
(a) Counts of request (nodes, edges) (b) Counts of request (paths, nodes)
Figure 4.2: The counters for service requests with: (a) specific number of nodes and
specific number of edges; (b) specific number of virtual paths and specific number
of nodes.
61
8 ILP-A 17.5 ILP-A
ILP-P ILP-P
DSBM 15.0 DSBM
Execution time (s)
40
12 ILP-A ILP-A
ILP-P 35 ILP-P
10 DSBM 30 DSBM
Execution time (s)
DcPSM DcPSM
8 25
6 20
15
4
10
2 5
0 0
10 30 60 90 120 150 10 30 60 90 120 150
Number of nodes in physical network Number of nodes in physical network
25 ILP-A 80 ILP-A
ILP-P ILP-P
DSBM DSBM
Execution time (s)
20 DcPSM 60 DcPSM
15
40
10
20
5
0 0
10 30 60 90 120 150 10 30 60 90 120 150
Number of nodes in physical network Number of nodes in physical network
Figure 4.3: Execution time of six scenarios with 3 types of service requests and 2
types of physical networks. The average of 10 simulation runs is reported.
62
with the increasing size in physical and/or virtual networks. ILP-P and DcPSM are
more efficient than the ILP-A and DSBM in the large-scale (range [120, 150] nodes
and P20 ) where the increasing of execution time with the increasing of physical nodes
or edges is less as described in Table (4.7).
In large scenario where physical network ranging between 120 to 150 physical
nodes and the service request have 20 paths. If the physical nodes or the physical
edges increased with 25% of the original number of nodes of edges, the physical
nodes has more impact on the the exact algorithms. The increase in physical edges
impacts the execution time of the heuristic more than the increase of physical nodes.
Percentage of the increasing ratio in execution time is shown in table Table (4.7).
Table 4.7: Comparing the increasing of execution time regarding to the increase in
physical nodes or physical edges
Algorithm Increase of 25% Increase 25%
of Nodes of edges
ILP-A 58% 48%
ILP-P 48% 46%
DSBM 206% 208%
DcPSM 62% 66%
To evaluate the impact service request attributes, the average execution time for
requests with specific number of nodes, links, and paths is reported in Figure (4.4).
For small-scale physical network average execution time of ILP-P for all service
63
request from all service types was reduced to 58% of the execution time of ILP-A and
to 57% of average execution time of DSBM in all physical network scenarios. Path
mapping approach is also efficiently reduced average execution time ratio between
heuristic and exact schemes where the ratio between average execution of DcPSM
to average execution of ILP-P was 1 to 6.2, which is much better than the ratio in
the literature.
DcPSM DcPSM
ILP-P ILP-P
DSBM DSBM
17.5
14
Execution time, s
Execution time, s
12 15.0
10 12.5
8 10.0
6 7.5
4 5.0
2 2.5
0 0.0
80
25 30ges 50 6070ths
2 3 4 15 20r of ed 0 5 10 40 of p a
Numb5er of6 7 8 10 e
5 mb Numbe15
r of ed20ges 25 30 10 2030umber
nodes 9 10 0 Nu 0 N
Figure 4.4: Average execution time for service requests with: (a) specific number of
nodes and specific number of links; (b) specific number of paths and specific number
of links.
From these results it can be conclude that the impact of increasing the number
of physical nodes or increasing the number of physical edges impacts the execution
time grater than the increase on number of nodes or edges of the service request.
Furthermore, the algorithms proposed approach (ILP-P and DcPSM) are more effi-
cient in consuming time than the benchmark algorithms (ILP-A and DSBM).
Long run for service requests with five, ten, and twenty paths have been sim-
ulated on small (BT Europe) and large (Interoute) physical networks. the results
confirms the reported results where the ILP-P and DcPSM are more efficient than
the benchmark algorithms. Therefore, minimizing the input of the placement algo-
rithm minimize the execution time and the embedding cost in long run, too. The
results of these scenarios are reported in the additional results (Appendix-A).
64
4.5.2 Acceptance Ratio
The acceptance ratio is evaluated in long simulation run for all schemes on
small-scale physical network. In the large-scale, ILP-A was not evaluated because
it requires long execution time. The results of ILP-P in Simple-Small and Multiple-
Small are better than the ILP-A. In consequence, we expect that the ILP-P will be
more efficient in Simple-Large and Multiple-Large. The acceptance ratio is reported
in Figure (4.5). The ILP-P has a little improvement in the acceptance ratio over
the ILP-A in long simulation run because ILP-P minimize the use of physical links
which enhance the acceptance in long run. Unlike the ILP-P, the DcPSM maps
long paths of service requests where the possibility that long paths with the same
path identification is low in small-scale physical network. Then, DcPSM shows
low acceptance ratio in Simple-Small and Multiple-Small while in it has higher
acceptance ratio in Simple-Large and Multiple-Large.
As expected, the number of links in the service request impacts the acceptance
ratio more than the number of nodes. Figure (4.6)-(a) shows that the low acceptance
ratio is distributed over the number of nodes (x-axis) and over number of edges
for both DSBM and DcPSM. Moreover, low acceptance ratio is concentrating for
service request with high number of edges and high number of paths as shown in
Figure (4.6)-(b). For all service request from all service request types the average
acceptance ratio of DcPSM equals to 84% of the average acceptance ratio of DSBM,
which point out that path mapping can map end-to-end paths efficiently and it
worths to improve heuristic algorithms that more efficient than the DcPSM.
65
1.0 1.0
0.9 0.9
Acceptance ratio
Acceptance ratio
0.8 0.8
0.7 0.7
ILP-A
0.6 ILP-P 0.6 ILP-P
0.5 DSBM 0.5 DSBM
DcPSM DcPSM
0.4 0.4
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
Acceptance ratio
0.8 0.8
0.7 0.7
ILP-A
0.6 ILP-P 0.6 ILP-P
0.5 DSBM 0.5 DSBM
DcPSM DcPSM
0.4 0.4
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
Figure 4.5: Average acceptance ratio for: (a) Simple-Small, (b) Simple-Large, (c)
Multiple-Small, and (d) Multiple-Large scenarios. The shaded background behind
each curve represents the 95% confidence interval on the reported average values.
66
DcPSM DcPSM
ILP-P ILP-P
DSBM DSBM
1.0 1.0
Acceptance ratio
Acceptance ratio
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0.0 0.0
80
20 25 30ges 506070ths
2 3 4 15 f ed 0 a
10 er o
5 10 3040 er of p
Numb5er of6 7 8 5 Numb Numbe15
r of ed20ges 25 30 1020 Numb
nodes 9 10 0 0
Figure 4.6: Average acceptance ratio for service requests with: (a) specific number
of nodes and specific number of edges; (b) specific number of paths and specific
number of edges.
average of embedding cost of ILP-P was lower than the average embedding cost
of ILP-A with 4% in small-scale while in all scenarios ILP-P cost was 29% fo the
DSBM cost. In addition, the cost of DcPSM was equal to 1.09 of the optimal cost
in ILP-P, which is more efficient than the best ratio in the literature.
The curves of average embedding cost of ILP-P and DcPSM is lower than DSBM
for all four scenarios as shown in Figure (4.7). It worth to mention that the ILP-P
behaves similar to the reported figure of the ILP algorithm in benchmark for the
Simple-Small scenario. In Simple-Large and Multiple-Large, the DcPSM algorithm
shows near to optimal average embedding cost. In Multiple-Small the heuristic
algorithms (DSBM and DcPSM) curve down with the time because these algorithms
selects small decompositions and in consequence few of them are accepted.
67
250 500
ILP-A ILP-P
ILP-P 400 DSBM
200 DSBM DcPSM
Avg. cost
Avg. cost
DcPSM
300
150
200
100
100
50
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
Avg. cost
DcPSM
300
600
200
400
100
200
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
Figure 4.7: Average embedding cost for: (a) Simple-Small, (b) Simple-Large, (c)
Multiple-Small, and (d) Multiple-Large scenarios. The shaded background behind
each curve represents the 95% confidence interval on the reported average values.
68
DcPSM DcPSM
ILP-P ILP-P
DSBM DSBM
3500 3000
Embedding cost
Embedding cost
3000 2500
2500 2000
2000
1500 1500
1000 1000
500 500
0 0
30 50
25 s 40 s
20 e 30 of path
2 3 4 15 edg 0
Numb5er of6 7 8 10 ber of 5
Nu10 20 r
5 m mber o15
f edges20 10 Numbe
nodes 9 10 0 Nu 25 30 0
(a) Cavg by request (nodes, edges) (b) Cavg by request (paths, edges)
Figure 4.8: Average embedding cost for service requests with: (a) specific number
of nodes and specific number of edges; (b) specific number of paths and specific
number of edges.
The larger number of edges in the service request the larger it possible to cluster
nodes and to embed them in one physical node. Clustering nodes in DSBM results
in lower average embedding cost to average revenue. This behavior is shown in
Figure (4.10) where the lower number of nodes and edges in the service request
cause higher cost to revenue ratio. The proposed approach is efficient in embedding
the service request with lower cost in low and high number of nodes and edges of
the service request regardless of the possible clustering of nodes.
The DcPSM use a cost function to select the service decomposition with the
least number of edges, number of paths and number of nodes. These selection
parameters are weighted and experimentally studied the impact of the weighting
69
2.5
1.2
Avg. cost/avg. revenue
ILP-P 2.0
1.0 DSBM
DcPSM ILP-P
0.8 1.5 DSBM
DcPSM
0.6 1.0
0.4 0.5
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
Figure 4.9: Average cost to average revenue for: (a) Simple-Small, (b) Simple-Large,
(c) Multiple-Small, and (d) Multiple-Large scenarios. The shaded background be-
hind each curve represents the 95% confidence interval on the reported average
values.
70
DcPSM DcPSM
ILP-P ILP-P
DSBM4.0 DSBM3.5
3.5 3.0
Cost to revenue
Cost to revenue
3.0 2.5
2.5 2.0
2.0 1.5
1.5
1.0 1.0
0.5 0.5
0.0 0.0
80
20 25 30ges 70
5060f paths
2 3 4 15 f ed 0 5 10 40
30 er o
Numb5er of6 7 8 10 er o Numbe15
nodes 9 10 0
5 Numb r of ed20ges 25 30 0 1020 Numb
(a) Rc/r by request (nodes, edges) (b) Rc/r by request (paths, edges)
Figure 4.10: Average embedding cost to average revenue for service requests with:
(a) specific number of nodes and specific number of edges; (b) specific number of
paths and specific number of edges.
parameters. It is found that the DcPSM performs well when the weights of the edges
factor and the paths factor are higher than the weight of nodes factor. The DcPSM
performs the best when the weights equal to the values we = 1.0, wp = 0.0, wn = 0.0
then it degraded a little when the weights equal to the values we = 0.0, wp =
1.0, wn = 0.0 while the DcPSM performs bad when the weights equal to the values
we = 0.0, wp = 0.0, wn = 1.0. Therefore, the selection factors are sorted by their
impact on the performance of the DcPSM from the most to the least in this order:
The number of edges, the number of paths and the number of nodes of the service
graph.
71
Chapter 5
5.1 Conclusion
The work in this thesis considers the placement of service chains on NFV en-
vironment focusing on the mobile cloud scenario. We proposed path mapping ap-
proach with exact and heuristic schemes to solve the NFV-RA problem. Path map-
ping aims to optimize the NFV resource allocation execution time and embedding
cost by minimizing the input size of the placement algorithm using end-to-end path
identification of the service chains and using catalog of physical paths.
The proposed approach was simulated and the results evaluation indicates that
the proposed approach is an efficient in minimizing the execution time of the exact
scheme to 57% of the execution time of the heuristic of the benchmark while average
embedding cost of proposed exact was minimized by 4% of the embedding cost of
the exact of the benchmark. Thus, the proposed path mapping is more efficient
than the solution in previous work because it prevents embedding on long physical
paths.
72
5.2 Future Work
For future work, we are planning to study the impact of path mapping approach
on the dynamic management on NFV by implementing the approach in service
chains life-cycle management, such as scale in/out, migration. Also it is possible
to improve the acceptance of heuristic DcPSM by modifying the path mapping
algorithm to work on identifying the edges of service request instead of end-to-end
paths. This suggestion would improve the acceptance ratio of the proposed approach
in small physical network.
73
References
[6] S. Li, L. D. Xu, and S. Zhao, “5g internet of things: A survey,” Journal of
Industrial Information Integration, vol. 10, pp. 1 – 9, 2018. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S2452414X18300037
74
[7] P. Ray, “A survey on internet of things architectures,” Journal of King
Saud University - Computer and Information Sciences, vol. 30, no. 3, pp.
291 – 319, 2018. [Online]. Available: http://www.sciencedirect.com/science/
article/pii/S1319157816300799
[8] A. Nakao and P. Du, “Application and device specific slicing for mvno,” in
2014 International Science and Technology Conference (Modern Networking
Technologies) (MoNeTeC), Oct 2014, pp. 1–5, slicing Mechanism.
[11] G. Lu, C. Liu, L. Li, and Q. Yuan, “A dynamic allocation algorithm for phys-
ical carrier resource in bbu pool of virtualized wireless network,” in Cyber-
Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015 In-
ternational Conference on, Xi’an, China, Sept. 17-19, 2015, Sept 2015, pp.
434–441.
75
H. Schotten, J. M. Alcaraz-Calero, Q. Wang, and M. J. Barros, “SELFNET
Framework self-healing capabilities for 5G mobile networks,” Transactions on
Emerging Telecommunications Technologies, vol. 27, no. 9, pp. 1225–1232,
2016, ett.3049. [Online]. Available: http://dx.doi.org/10.1002/ett.3049
[15] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Etsi white paper
no. 11, mobile edge computinga key technology towards 5g,” ETSI, Sophia
Antipolis CEDEX, France, Tech. Rep. 11, 2015.
[19] IMT Vision Framework and overall objectives of the future development of
IMT for 2020 and beyond, RECOMMENDATION ITU-R M.2083-0 Std., Sep.
2015.
76
[21] J. Costa-Requena, J. L. Santos, V. F. Guasch, K. Ahokas, G. Premsankar,
S. Luukkainen, O. L. Prez, M. U. Itzazelaia, I. Ahmad, M. Liyanage, M. Yliant-
tila, and E. M. de Oca, “Sdn and nfv integration in generalized mobile network
architecture,” in Networks and Communications (EuCNC), 2015 European
Conference on, Paris, France, June 29- July 2, 2015, June 2015, pp. 154–158.
[27] ETSI NFV ISG, “GS NFV-MAN 001 V1.1.1 Network Functions Virtualisation
(NFV); Management and Orchestration,” European Telecommunications
Standards Institute, Cedex - FRANCE, Tech. Rep., 2014. [Online].
Available: http://www.etsi.org/deliver/etsi gs/NFV-MAN/001 099/001/01.
01.01 60/gs NFV-MAN001v010101p.pdf
77
[28] ETSI NFV ISG, “GS NFV 002 V1.1.1 Network Functions Virtuali-
sation (NFV); Architectural Framework,” European Telecommunications
Standards Institute, Cedex - FRANCE, Tech. Rep., oct 2013. [On-
line]. Available: http://www.etsi.org/deliver/etsi gs/nfv/001 099/002/01.01.
01 60/gs nfv002v010101p.pdf
[29] ETSI NFV ISG, “GS NFV-REL 001 V1.1.1 Network Functions Virtu-
alisation (NFV); Resiliency Requirements,” European Telecommunication
Standards Institute, Cedex - FRANCE, Tech. Rep., 2015. [Online].
Available: http://www.etsi.org/deliver/etsi gs/NFV-REL/001 099/001/01.
01.01 60/gs NFV-REL001v010101p.pdf
[30] ETSI NFV ISG, “GS NFV-REL 003 V1.1.2 Network Functions Vir-
tualisation (NFV); Reliability; Report on Models and Features for
End-to-End Reliability Disclaimer,” European Telecommunication Stan-
dards Institute, Cedex - FRANCE, Tech. Rep., jul 2016. [Online].
Available: http://www.etsi.org/deliver/etsi gs/NFV-REL/001 099/003/01.
01.02 60/gs nfv-rel003v010102p.pdf
[32] ETSI NFV ISG, “ETSI GS NFV-IFA 009 V1.1.1 Network Functions
Virtualisation (NFV); Management and Orchestration; Report on Archi-
tectural Options,” European Telecommunication Standards Institute, Cedex
- FRANCE, Tech. Rep. DGS/NFV-IFA009, jul 2016. [Online]. Avail-
able: https://www.etsi.org/deliver/etsi gs/nfv-ifa/001 099/009/01.01.01 60/
gs nfv-ifa009v010101p.pdf
78
Conference on, Pisa, Italy, Oct. 3-5, 2016, 2016, check this later. it was
preprint. [Online]. Available: https://arxiv.org/pdf/1608.05869v2.pdf
[34] ETSI NFV ISG, “ETSI GS NFV-EVE 003 V1.1.1 Network Functions Virtu-
alisation (NFV); Ecosystem; Report on NFVI Node Physical Architecture
Guidelines for Multi-Vendor Environment,” European Telecommunication
Standards Institute, Cedex - FRANCE, Tech. Rep. DGS/NFV-EVE003, jan
2016, nFVI specifications. [Online]. Available: https://www.etsi.org/deliver/
etsi gs/NFV-EVE/001 099/003/01.01.01 60/gs nfv-eve003v010101p.pdf
[38] P. Schmitt, B. Landais, and F. Y. Yang, “Control and user plane separation
of epc nodes (cups), july 03,” 3rd Generation Partnership Project (3GPP),
Tech. Rep., 2017. [Online]. Available: http://www.3gpp.org/news-events/
3gpp-news/1882-cups
[39] M. R. Sama, X. An, Q. Wei, and S. Beker, “Reshaping the Mobile core net-
work via function decomposition and network slicing for the 5G era,” in 2016
IEEE Wireless Communications and Networking Conference Workshops (WC-
NCW), Doha, Qatar, April 3-4, 2016, April 2016, pp. 90–96.
79
[41] J. Halpern and C. Pignataro, “Service function chaining (sfc) architecture;
draft-merged-sfc-architecture-00,” Internet Engineering Task Force (IETF),
Internet-Draft, July 3, 2014, 2014, july 3, 2014. [Online]. Available:
https://tools.ietf.org/html/draft-merged-sfc-architecture-00
[44] ETSI NFV ISG, “GS NFV 001 V1.1.1 Network Functions Virtualisation
(NFV); Use Cases,,” European Telecommunication Standards Institute, Cedex
- FRANCE, Tech. Rep., oct 2013. [Online]. Available: http://www.etsi.org/
deliver/etsi gs/nfv/001 099/001/01.01.01 60\/gs nfv001v010101p.pdf
80
2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/
S1084804517302102
[50] S. Haeri and L. Trajkovi, “Virtual network embedding via monte carlo tree
search,” IEEE Transactions on Cybernetics, vol. PP, no. 99, pp. 1–12, Febru-
ary 2017.
[51] T. Truong-Huu and M. Gurusamy, “Markov chain based algorithm for virtual
network embedding in optical data centers,” in 2016 IEEE 18th International
Conference on High Performance Computing and Communications; IEEE 14th
International Conference on Smart City; IEEE 2nd International Conference
on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, Australia,
Dec 2016, pp. 899–906, 12-14 December.
[53] Y. Li, Y. Li, M. Shu, J. Tang, and Y. Peng, “An efficient vne algorithm via
preferentially mapping important nodes,” in 2016 IEEE 41st Conference on
Local Computer Networks Workshops (LCN Workshops), Dubai, United Arab
Emirates, Nov 2016, pp. 34–41, 7-10 November 2016.
81
[55] F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, and O. C. M. B. Duarte,
“Orchestrating virtualized network functions,” IEEE Transactions on Network
and Service Management, vol. 13, no. 4, pp. 725–739, Dec 2016.
82
[63] V. Eramo, E. Miucci, M. Ammar, and F. G. Lavacca, “An approach for ser-
vice function chain routing and virtual function network instance migration in
network function virtualization architectures,” IEEE/ACM Transactions on
Networking, vol. 25, no. 4, pp. 2008–2025, Aug 2017.
[65] M. Mechtri, C. Ghribi, and D. Zeghlache, “A scalable algorithm for the place-
ment of service function chains,” IEEE Transactions on Network and Service
Management, vol. PP, no. 99, pp. 1–1, 2016, 03 August 2016.
[68] H. Moens and F. D. Turck, “Vnf-p: A model for efficient placement of virtu-
alized network functions,” in 10th International Conference on Network and
Service Management (CNSM) and Workshop, Nov 2014, pp. 418–423.
[70] L. Qu, C. Assi, and K. Shaban, “Delay-aware scheduling and resource opti-
mization with network function virtualization,” IEEE Transactions on Com-
munications, vol. PP, no. 99, pp. 1–1, 2016.
83
network functions,” in Network Softwarization (NetSoft), 2015 1st IEEE Con-
ference on, London, UK, April 2015, pp. 1–9, 13-17 April 2015.
[75] Y. Xie, Z. Liu, S. Wang, and Y. Wang, “Service function chaining resource
allocation: A survey,” eprint arXiv:1608.00095, jul 2016. [Online]. Available:
http://arxiv.org/pdf/1608.00095v1
84
2016 IEEE NetSoft Conference and Workshops (NetSoft). Seoul, Korea, June
6-10, 2016: IEEE, June 2016, pp. 202–210.
[80] X. Li and C. Qian, “An nfv orchestration framework for interference-free pol-
icy enforcement,” in 2016 IEEE 36th International Conference on Distributed
Computing Systems (ICDCS). Nara, Japan, June 27-30, 2016: IEEE, June
2016, pp. 649–658.
[83] M. Otokura, “An evolvable approach for the virtual network function place-
ment problem in varying environments,” Master’s thesis, Information Science
and Technology, Osaka University, feb 2016.
[86] T. Wen, H. Yu, G. Sun, and L. Liu, “Network function consolidation in service
function chaining orchestration,” in 2016 IEEE International Conference on
Communications (ICC), May 2016, pp. 1–6.
85
[87] R. Mijumbi, J. L. Gorricho, J. Serrat, M. Claeys, F. D. Turck, and S. Latr,
“Design and evaluation of learning algorithms for dynamic resource manage-
ment in virtual networks,” in 2014 IEEE Network Operations and Management
Symposium (NOMS), May 2014, pp. 1–9.
[89] D. Li, P. Hong, K. Xue, and j. Pei, “Virtual network function placement
considering resource optimization and sfc requests in cloud datacenter,” IEEE
Transactions on Parallel and Distributed Systems, vol. 29, no. 7, pp. 1664–
1677, July 2018.
[90] T.-W. Um, H. Lee, W. Ryu, and J. K. Choi, “Dynamic resource allocation and
scheduling for cloud-based virtual content delivery networks,” ETRI Journal,
vol. 36, no. 2, Apr. 2014.
86
[95] Y. Oda, Y. Tanigawa, and H. Tode, “Distributed search for ordered vnfs config-
uring service chaining based on in-network guidance,” in 2018 15th IEEE An-
nual Consumer Communications Networking Conference (CCNC), Jan 2018,
pp. 1–4.
[96] T.-W. Kuo, B.-H. Liou, K. C.-J. Lin, and M.-J. Tsai, “Deploying chains of
virtual network functions: On the relation between link and server usage,”
IEEE/ACM Trans. Netw., vol. 26, no. 4, pp. 1562–1576, Aug. 2018. [Online].
Available: https://doi.org/10.1109/TNET.2018.2842798
87
[102] M. Chowdhury, M. R. Rahman, and R. Boutaba, “Vineyard: Virtual
network embedding algorithms with coordinated node and link mapping,”
IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 206–219, Feb. 2012. [Online].
Available: http://dx.doi.org/10.1109/TNET.2011.2159308
88
Appendices
89
Appendix A
Additional Results
This appendix shows the results of long run of the following scenarios.
• Figure (A.1) shows the results of measured metrics on small physical network
(BT Europe) for all requests with five paths.
• Figure (A.2) shows the results of measured metrics on large physical network
(Interoute) for all requests with five paths.
• Figure (A.3) shows the results of measured metrics on small physical network
(BT Europe) for all requests with ten paths.
• Figure (A.4) shows the results of measured metrics on large physical network
(Interoute) for all requests with ten paths.
• Figure (A.5) shows the results of measured metrics on small physical network
(BT Europe) for all requests with twenty paths.
• Figure (A.6) shows the results of measured metrics on large physical network
(Interoute) for all requests with twenty paths.
90
Execution Time
5 2.5
ILP-A ILP-P
Execution Time, s
4 ILP-P 2.0 DSBM
Execution Time, s
DSBM DcPSM
3 DcPSM 1.5
2 1.0
1 0.5
0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Acceptance ratio
1.0 1.0
0.8 0.8
Acceptance ratio
Acceptance ratio
0.6 0.6
0.4 ILP-A 0.4
ILP-P ILP-P
0.2 DSBM 0.2 DSBM
DcPSM DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Embedding cost
1200 1200 ILP-P
1000 1000 DSBM
ILP-A DcPSM
800 800
Avg. cost
Avg. cost
ILP-P
600 DSBM 600
DcPSM
400 400
200 200
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Embedding cost to revenue
2.5 2.5
ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Small physical network (b) Small with 25% additional edges
Figure A.1: Long run results for requests with 5 paths on (a) Small physical network
and (b) Small physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
91
values.
Execution Time
4 4
ILP-P ILP-P
Execution Time, s
DSBM DSBM
Execution Time, s
3 DcPSM 3 DcPSM
2 2
1 1
0 0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Acceptance ratio
1.0 1.0
0.8 0.8
Acceptance ratio
Acceptance ratio
0.6 0.6
0.4 0.4
ILP-P ILP-P
0.2 DSBM 0.2 DSBM
DcPSM DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Embedding cost
1500 1500
ILP-P ILP-P
1250 DSBM 1250 DSBM
DcPSM DcPSM
1000 1000
Avg. cost
Avg. cost
750 750
500 500
250 250
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Embedding cost to revenue
2.5 2.5
ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Large physical network (b) Large with 25% additional edges
Figure A.2: Long run results for requests with 5 paths on (a) Large physical network
and (b) Large physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
92
values.
Execution Time
10 5
ILP-A ILP-P
8 ILP-P 4 DSBM
Execution Time, s
Execution Time, s
DSBM DcPSM
6 DcPSM 3
4 2
2 1
0 0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Acceptance ratio
1.0 1.0
ILP-P
0.8 0.8 DSBM
Acceptance ratio
Acceptance ratio
DcPSM
0.6 0.6
0.4 ILP-A 0.4
ILP-P
0.2 DSBM 0.2
DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Embedding cost
2000 2000
ILP-A ILP-P
ILP-P DSBM
1500 DSBM 1500 DcPSM
Avg. cost
Avg. cost
DcPSM
1000 1000
500 500
(a) Small physical network (b) Small with 25% additional edges
Embedding cost to revenue
1.50 2.0
ILP-A ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Small physical network (b) Small with 25% additional edges
Figure A.3: Long run results for requests with 10 paths on (a) Small physical network
and (b) Small physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
93
values.
Execution Time
10 5
ILP-P
8 DSBM 4
Execution Time, s
Execution Time, s
DcPSM
6 3 ILP-P
DSBM
4 2 DcPSM
2 1
0 0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Acceptance ratio
1.0 1.0
ILP-P
0.8 0.8 DSBM
Acceptance ratio
Acceptance ratio
DcPSM
0.6 0.6
0.4 0.4
ILP-P
0.2 DSBM 0.2
DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Embedding cost
2000 2000
ILP-P ILP-P
DSBM DSBM
1500 DcPSM 1500 DcPSM
Avg. cost
Avg. cost
1000 1000
500 500
(a) Large physical network (b) Large with 25% additional edges
Embedding cost to revenue
1.50 2.0
ILP-P ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Large physical network (b) Large with 25% additional edges
Figure A.4: Long run results for requests with 10 paths on (a) Large physical network
and (b) Large physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
94
values.
Execution Time
15.0
10
12.5
Execution Time, s
Execution Time, s
8
10.0 ILP-A
ILP-P ILP-P
7.5 6 DSBM
DSBM DcPSM
5.0 DcPSM 4
2.5 2
0.0 0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Acceptance ratio
1.0 1.0
ILP-P
0.8 0.8 DSBM
Acceptance ratio
Acceptance ratio
DcPSM
0.6 0.6
0.4 ILP-A 0.4
ILP-P
0.2 DSBM 0.2
DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Small physical network (b) Small with 25% additional edges
Embedding cost
Avg. cost
DcPSM
1500 1500
1000 1000
500 500
(a) Small physical network (b) Small with 25% additional edges
Embedding cost to revenue
1.0 1.0
ILP-A ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Small physical network (b) Small with 25% additional edges
Figure A.5: Long run results for requests with 20 paths on (a) Small physical network
and (b) Small physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
95
values.
Execution Time
15.0 15.0
ILP-P
Execution Time, s 12.5 12.5 DSBM
Execution Time, s
10.0 10.0 DcPSM
ILP-P
7.5 DSBM 7.5
DcPSM
5.0 5.0
2.5 2.5
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Acceptance ratio
1.0 1.0
0.8 0.8
Acceptance ratio
Acceptance ratio
0.6 0.6
0.4 0.4
ILP-P ILP-P
0.2 DSBM 0.2 DSBM
DcPSM DcPSM
0.0 0.0
0 5000 10000 15000 20000 0 5000 10000 15000 20000
Time, (time units) Time, (time units)
(a) Large physical network (b) Large with 25% additional edges
Embedding cost
Avg. cost
1500 1500
1000 1000
500 500
(a) Large physical network (b) Large with 25% additional edges
Embedding cost to revenue
1.0 1.0
ILP-P ILP-P
Avg. cost/avg. revenue
Avg. cost/avg. revenue
(a) Large physical network (b) Large with 25% additional edges
Figure A.6: Long run results for requests with 20 paths on (a) Large physical network
and (b) Large physical network with 25% additional edges. The shaded background
behind each curve represents the 95% confidence interval on the reported average
96
values.
الـمـلـخــص
اخلدمات ( )NSCعيل بيئضضة ضلكة وضضضع سالسضضل شضضباكت 4 جديد يسىم رمس املسار( )Path Mappingخلل مشض
اخلطيضضة ( )ILPومت حلهضضا بطر يقض 4 3
ضتني: االفرتاضضضية .وقضضد صضيغت املشض
ضلكة ابسضضتخدمام الرت جمة العدديضضة 4 NFV
ِ
يض الضضضدقيق ( )Exact Schemeوطريقضضضة الرت 4اب جم ¢االرشضضضادي اب 4خلوارزميضضضة (Heuristic طريقضضضة الرت 4اب جم 4 3
الراب 3
.)Schemeومت إثبضضات حصة وكفضضاءة 4الهنج املقضضدم 3 4يف هضضذه الدراسضضة ابسضضتخدام احملا اكة لعضضدد ( )22سضضيناريو.
املعاخلة وتاكليف توضيع 4 K K 4
اخلدمات. نتاجئ احملا اكة ابن 4الهنج املقدم خفض بشلك كفؤ زمن
وأهظرت
الجمهورية اليمنية
وزارة التعليم العالي والبحث العلمي
جامعة العلوم الحديثة
عمادة الدراسات العليا
برنامج تقنية معلومات
من الطالب
بشير أمين رضوان
المشرف
أستاذ دكتور خليل سعيد الوجيه