NET2

  • Tuesday, 13 June, 16:30-18:00, Room Theatre Small Stage
  • Session Chair: Marian Codreanu (University of Oulu, Finland)

 

 

16:30 First Demonstration of SDN-based Bit Index Explicit Replication (BIER) Multicasting

Alessio Giorgetti, Andrea Sgambelluri and Francesco Paolucci (Scuola Superiore Sant'Anna, Italy); Filippo Cugini (CNIT, Italy); Piero Castoldi (Scuola Superiore Sant'Anna, Italy)

The first SDN implementation of point-to-multipoint communication enabled by the novel Bit Index Explicit Replication (BIER) solution is proposed and experimentally evaluated. Results show automatic forwarding entries installation without involving the controller in transit nodes configurations.

 

16:48 A Customizable Agile Approach to Network Function Placement

Akshay Gadre, Anix Anbiah and Krishna M. Sivalingam (Indian Institute of Technology Madras, India)

This paper deals with servicing Virtual Network Function (VNF) chaining requests in a Network Function Virtualization (NFV) based system. This is also referred to as the Network Function Placement (NFP) problem. Existing solutions to this problem are slow and not suitable for deployment as dynamic NFP-solvers in networks. In this paper, we first propose an NFP solution that uses a divide-and-conquer approach, with a complexity similar to that of existing solutions. We show that the solution is complete and sound. Next, we propose ways to customize our solution to obtain an agile version that trades off precision for significantly lower time-complexity. The proposed algorithm is analyzed for various system parameters and it is shown to be scalable for large data center network (DCN) topologies.

 

17:06 Benefits of Multi-Layer Application-Aware Resource Allocation and Optimization

Marco Savi (Fondazione Bruno Kessler & CREATE-NET Research Center, Italy); Ćiril Rožić (Athens Information Technology, Greece); Chris Matrakidis (University of Peloponnese, Greece); Dimitrios Klonidis (AIT, Greece); Domenico Siracusa (Fondazione Bruno Kessler, Italy); Ioannis Tomkos (Athens Information Technology, Greece)

Internet traffic is generated by a multitude of applications, each one with diverse service requirements in terms of bandwidth, latency, reliability, etc. Today traffic engineering techniques can provide service differentiation at the IP/MPLS layer, but not at the optical layer. In this paper we propose a framework where application service requirements drive a dynamic multi-layer (IP/MPLS and optical) resource allocation and optimization. We compare by means of simulations such application-aware algorithmic framework with a multi-layer but application-unaware strategy. Results show that the application-aware approach, unlike the application-unaware one, is always able to guarantee the specified service requirements to those applications whose generated traffic is accepted by the network. In addition, the application-aware strategy does not consume more network resources than the application-unaware one, but only requires a network that is more dynamic and responsive.

 

17:24 5G NORMA: System Architecture for Programmable & Multi-Tenant 5G Mobile Networks

Christian Mannweiler (Nokia Bell Labs, Germany); Markus Breitbach (Deutsche Telekom, Germany); Heinz Droste (Deutsche telekom, Laboratories, Germany); Ignacio Labrador Pavon (ATOS, Spain); Iñaki Ucar (University Carlos III of Madrid, Spain); Peter Schneider (Nokia Bell Labs, Germany); Mark Doll (Nokia Bell Labs & Nokia, Germany); Jorge Rivas Sanchez (ATOS, Spain)

This paper describes the status of the 5G NORMA architecture after the second design iteration. It integrates the control and data layer functions developed in the project into a harmonized mobile network architecture, applying the paradigms of adaptive (de-)composition and allocation of network functions, programmable network control, and end-to-end network slicing. The paper depicts the design of a multi-service management & orchestration layer with dedicated interfaces for mobile network tenants. The security threats arising in virtualized multi-tenant networks are discussed and novel security solutions are presented. The architecture verification applies a methodology with three evaluation cases and the generic 5G services (eMBB, mMTC, and URLLC) to analyze to what extent the current architecture design meets the different requirements as defined in 5G NORMA and the overall ecosystem, including the 5G-PPP initiative and 3GPP.

 

17:42 Distributed Mobility Management Based on Centrality for Dense 5G Networks

Mourad Khanfouci (Mitsubishi electric research center Europe (MERCE), France)

This paper presents distributed mobility management techniques for 5G networks based on the centrality of the nodes in the network. This centrality concept is introduced for the 5G network as a mean for the definition of mobility anchors and the data forwarding nodes in the network. The corresponding distributed mobility management scheme is then simulated through simplified system level simulations. The performance of the proposed distributed mobility management is compared to that of legacy mobility management systems based on LTE and DMM. It is seen that the performance of the proposed system improves the performance of the legacy mobility management of about 14 %.