Traditional, slow and error-prone human-driven methods to configure and manage Internet service r... more Traditional, slow and error-prone human-driven methods to configure and manage Internet service requests are proving unsatisfactory. This is due to an increase in Internet applications with stringent quality of service (QoS) requirements. Which demands faster and fault-free service deployment with minimal or without human intervention. With this aim, intent-driven service management (IDSM) has emerged, where users express their service level agreement (SLA) requirements in a declarative manner as intents . With the help of closed control-loop operations, IDSM performs service configurations and deployments, autonomously to fulfill the intents. This results in a faster deployment of services and reduction in configuration errors caused by manual operations, which in turn reduces the SLA violations. This article is an attempt to provide a systematic review of How the IDSM systems manage and fulfill the SLA requirements specified as intents. As an outcome, the review identifies four in...
To automate network operations and deployment of compute services, intent-driven service manageme... more To automate network operations and deployment of compute services, intent-driven service management (IDSM) is essential. It enables network users to express their service requirements in a declarative manner as intents. To fulfill the intents, closed control-loop operations carry out required configurations and deployments without human intervention. Despite the fact that intents are fulfilled automatically, conflicts may arise between user’s and service provider’s intents due to limited resources availability. This triggers IDSM system to initialize an intent negotiation process among conflicting actors. Intent negotiation involves generating one or more alternate intents based on the current state of the underlying physical/virtual resources, which are then presented to the intent creator for acceptance or rejection. In this way, the quality of services (QoS) can be improved significantly by maximizing the acceptance rate of service requests in the scenario of limited resources. H...
Internet traffic has grown at the rate of 40-100% per year and is only expected to grow at the sa... more Internet traffic has grown at the rate of 40-100% per year and is only expected to grow at the same rate or more aggressively in the future. Due to the enormous growth in IP traffic volume, network operators are confronted by the unprecedented challenge of accommodating the IP traffic volume in already deployed networks in a short time-span. In addition to this, network operators are observing stringent latency and reliability requirements. The overall effect of these problems has been sub-optimal utilization of network resources resulting in higher network-wide capital and operational expenditures, along with lesser revenues. Hence, there is a need to optimize network cost while accommodating maximum traffic volume in the network and simplify the existing Carrier Ethernet Networks. In this thesis, we analyze high-speed telecommunication networks, with a focus on cost and performance optimization of high-speed Carrier Ethernet Networks. The first problem we focus on is that of optim...
Service Function Chaining (SFC) is the problem of deploying various network service instances ove... more Service Function Chaining (SFC) is the problem of deploying various network service instances over geographically distributed data centers and providing inter-connectivity among them. The goal is to enable the network traffic to flow smoothly through the underlying network, resulting in an optimal quality of experience to the end-users. Proper chaining of network functions leads to optimal utilization of distributed resources. This has been a de-facto model in the telecom industry with network functions deployed over underlying hardware. Though this model has served the telecom industry well so far, it has been adapted mostly to suit the static behavior of network services and service demands due to the deployment of the services directly over physical resources. This results in network ossification with larger delays to the end-users, especially with the data-centric model in which the computational resources are moving closer to end users. A novel networking paradigm, Network Function Virtualization (NFV), meets the user demands dynamically and reduces operational expenses (OpEx) and capital expenditures (CapEx), by implementing network functions in the software layer known as virtual network functions (VNFs). VNFs are then interconnected to form a complete end-to-end service, also known as service function chains (SFCs). In this work, we study the problem of deploying service function chains over network function virtualized architecture. Specifically, we study virtual network function placement problem for the optimal SFC formation across geographically distributed clouds. We set up the problem of minimizing inter-cloud traffic and response time in a multi-cloud scenario as an ILP optimization problem, along with important constraints such as total deployment costs and service level agreements (SLAs). We consider link delays and computational delays in our model.
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), 2017
Cloud computing is gaining significant attention and virtualized data-centers are becoming popula... more Cloud computing is gaining significant attention and virtualized data-centers are becoming popular as cost-effective infrastructure. Recently, there has been a trend to collocate the baseband unit (BBU) functionalities and services from multiple cellular base stations into centralized BBU pool for statistical multiplexing gain. The technology is known as Cloud Radio Access Network (C-RAN). C-RAN is a novel mobile network architecture that can address a number of challenges the mobile operators face while trying to support growing end users' needs. The idea is to virtualize BBU pools, which can be shared by different cellular network operators, allowing them to rent radio access network (RAN) as a cloud service. However, manual configuration of the BBU services over the virtualized infrastructure may be inefficient and error-prone with the increasing mobile traffic. In this work, we propose development of a novel automated service deployment platform, which will help to automate ...
2019 28th International Conference on Computer Communication and Networks (ICCCN), 2019
Network Function Virtualization (NFV) with minimum-delay service function chains will be a key en... more Network Function Virtualization (NFV) with minimum-delay service function chains will be a key enabling technology for next generation mobile networks, such as 5G. In this paper, we present a new approach to generate problem instances for the cost optimized delay sensitive Virtualized Network Function (VNF) placement and routing problem, where we know by construction the optimal solution for the given objective function. Our approach produces problem instances, which can be used to test and benchmark heuristic algorithms against. We then implement an Affinity based simulated annealing (ABSA) heuristic approach for cost optimized delay aware placement of VNFs along with a set of greedy approaches. We evaluate the implemented approaches against the optimal solution by generating several problem instances using our proposed method.
2019 28th International Conference on Computer Communication and Networks (ICCCN)
Cloud computing is gaining significant traction and virtualized data centers are becoming popular... more Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) are being widely deployed and utilized by end users, including many private as well as public organizations. Despite its wide-spread acceptance, security is still the biggest threat in cloud computing environments. Users of cloud services are under constant fear of data loss, security breaches, information theft and availability issues. Recently, learning-based methods for security applications are gaining popularity in the literature with the advents in machine learning (ML) techniques. In this work, we explore applicability of two well-known machine learning approaches, which are, Artificial Neural Networks (ANN) and Support Vector Machines (SVM), to detect intrusions or anomalous behavior in the cloud environment. We have developed ML models using ANN and SVM techniques and have compared their performances. We have used UNSW-NB-15 dataset to train and test the models. In addition, we have performed feature engineering and parameter tuning to find out optimal set of features with maximum accuracy to reduce the training time and complexity of the ML models. We observe that with proper features set, SVM and ANN techniques have been able to achieve anomaly detection accuracy of 91% and 92% respectively, which is higher compared against that of the one achieved in the literature, with reduced number of features needed to train the models.
Network Function Virtualization (NFV) is an emerging technology to consolidate network functions ... more Network Function Virtualization (NFV) is an emerging technology to consolidate network functions onto high volume storages, servers and switches located anywhere in the network. Virtual Network Functions (VNFs) are chained together to provide a specific network service, called Service Function Chains (SFCs). Regarding to Quality of Service (QoS) requirements and network features and states, SFCs are served through performing two tasks: VNF placement and link embedding on the substrate networks. Reducing deployment cost is a desired objective for all service providers in cloud/edge environments to increase their profit form demanded services. However, increasing resource utilization in order to decrease deployment cost may lead to increase the service latency and consequently increase SLA violation and decrease user satisfaction. To this end, we formulate a multi-objective optimization model to joint VNF placement and link embedding in order to reduce deployment cost and service late...
Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3
Traditionally, in cellular networks, users communicate with the base station that serves the part... more Traditionally, in cellular networks, users communicate with the base station that serves the particular cell under coverage. The main functions of a base station can be divided into two, which are the baseband unit (BBU) functionalities and the remote radio head (RRH) functionalities. The RRH module is responsible for digital processing, frequency filtering and power amplification. The main sub-functions of the baseband processing module are coding, modulation, Fast Fourier Transform (FFT) and others. Data generally flows from RRH to BBU for further processing. Such BBU functionalities may be shifted to the cloud based resource pool, called as the Cloud-Radio Access Network (C-RAN) to be shared by multiple RRHs. Advancements in the field of cloud computing, software defined networking and virtualization technology may be leveraged by operators for the deployment of their BBU services, reducing the total cost of deployment. Recently, there has been a trend to collocate the baseband uni...
Traditional, slow and error-prone human-driven methods to configure and manage Internet service r... more Traditional, slow and error-prone human-driven methods to configure and manage Internet service requests are proving unsatisfactory. This is due to an increase in Internet applications with stringent quality of service (QoS) requirements. Which demands faster and fault-free service deployment with minimal or without human intervention. With this aim, intent-driven service management (IDSM) has emerged, where users express their service level agreement (SLA) requirements in a declarative manner as intents . With the help of closed control-loop operations, IDSM performs service configurations and deployments, autonomously to fulfill the intents. This results in a faster deployment of services and reduction in configuration errors caused by manual operations, which in turn reduces the SLA violations. This article is an attempt to provide a systematic review of How the IDSM systems manage and fulfill the SLA requirements specified as intents. As an outcome, the review identifies four in...
To automate network operations and deployment of compute services, intent-driven service manageme... more To automate network operations and deployment of compute services, intent-driven service management (IDSM) is essential. It enables network users to express their service requirements in a declarative manner as intents. To fulfill the intents, closed control-loop operations carry out required configurations and deployments without human intervention. Despite the fact that intents are fulfilled automatically, conflicts may arise between user’s and service provider’s intents due to limited resources availability. This triggers IDSM system to initialize an intent negotiation process among conflicting actors. Intent negotiation involves generating one or more alternate intents based on the current state of the underlying physical/virtual resources, which are then presented to the intent creator for acceptance or rejection. In this way, the quality of services (QoS) can be improved significantly by maximizing the acceptance rate of service requests in the scenario of limited resources. H...
Internet traffic has grown at the rate of 40-100% per year and is only expected to grow at the sa... more Internet traffic has grown at the rate of 40-100% per year and is only expected to grow at the same rate or more aggressively in the future. Due to the enormous growth in IP traffic volume, network operators are confronted by the unprecedented challenge of accommodating the IP traffic volume in already deployed networks in a short time-span. In addition to this, network operators are observing stringent latency and reliability requirements. The overall effect of these problems has been sub-optimal utilization of network resources resulting in higher network-wide capital and operational expenditures, along with lesser revenues. Hence, there is a need to optimize network cost while accommodating maximum traffic volume in the network and simplify the existing Carrier Ethernet Networks. In this thesis, we analyze high-speed telecommunication networks, with a focus on cost and performance optimization of high-speed Carrier Ethernet Networks. The first problem we focus on is that of optim...
Service Function Chaining (SFC) is the problem of deploying various network service instances ove... more Service Function Chaining (SFC) is the problem of deploying various network service instances over geographically distributed data centers and providing inter-connectivity among them. The goal is to enable the network traffic to flow smoothly through the underlying network, resulting in an optimal quality of experience to the end-users. Proper chaining of network functions leads to optimal utilization of distributed resources. This has been a de-facto model in the telecom industry with network functions deployed over underlying hardware. Though this model has served the telecom industry well so far, it has been adapted mostly to suit the static behavior of network services and service demands due to the deployment of the services directly over physical resources. This results in network ossification with larger delays to the end-users, especially with the data-centric model in which the computational resources are moving closer to end users. A novel networking paradigm, Network Function Virtualization (NFV), meets the user demands dynamically and reduces operational expenses (OpEx) and capital expenditures (CapEx), by implementing network functions in the software layer known as virtual network functions (VNFs). VNFs are then interconnected to form a complete end-to-end service, also known as service function chains (SFCs). In this work, we study the problem of deploying service function chains over network function virtualized architecture. Specifically, we study virtual network function placement problem for the optimal SFC formation across geographically distributed clouds. We set up the problem of minimizing inter-cloud traffic and response time in a multi-cloud scenario as an ILP optimization problem, along with important constraints such as total deployment costs and service level agreements (SLAs). We consider link delays and computational delays in our model.
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), 2017
Cloud computing is gaining significant attention and virtualized data-centers are becoming popula... more Cloud computing is gaining significant attention and virtualized data-centers are becoming popular as cost-effective infrastructure. Recently, there has been a trend to collocate the baseband unit (BBU) functionalities and services from multiple cellular base stations into centralized BBU pool for statistical multiplexing gain. The technology is known as Cloud Radio Access Network (C-RAN). C-RAN is a novel mobile network architecture that can address a number of challenges the mobile operators face while trying to support growing end users' needs. The idea is to virtualize BBU pools, which can be shared by different cellular network operators, allowing them to rent radio access network (RAN) as a cloud service. However, manual configuration of the BBU services over the virtualized infrastructure may be inefficient and error-prone with the increasing mobile traffic. In this work, we propose development of a novel automated service deployment platform, which will help to automate ...
2019 28th International Conference on Computer Communication and Networks (ICCCN), 2019
Network Function Virtualization (NFV) with minimum-delay service function chains will be a key en... more Network Function Virtualization (NFV) with minimum-delay service function chains will be a key enabling technology for next generation mobile networks, such as 5G. In this paper, we present a new approach to generate problem instances for the cost optimized delay sensitive Virtualized Network Function (VNF) placement and routing problem, where we know by construction the optimal solution for the given objective function. Our approach produces problem instances, which can be used to test and benchmark heuristic algorithms against. We then implement an Affinity based simulated annealing (ABSA) heuristic approach for cost optimized delay aware placement of VNFs along with a set of greedy approaches. We evaluate the implemented approaches against the optimal solution by generating several problem instances using our proposed method.
2019 28th International Conference on Computer Communication and Networks (ICCCN)
Cloud computing is gaining significant traction and virtualized data centers are becoming popular... more Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) are being widely deployed and utilized by end users, including many private as well as public organizations. Despite its wide-spread acceptance, security is still the biggest threat in cloud computing environments. Users of cloud services are under constant fear of data loss, security breaches, information theft and availability issues. Recently, learning-based methods for security applications are gaining popularity in the literature with the advents in machine learning (ML) techniques. In this work, we explore applicability of two well-known machine learning approaches, which are, Artificial Neural Networks (ANN) and Support Vector Machines (SVM), to detect intrusions or anomalous behavior in the cloud environment. We have developed ML models using ANN and SVM techniques and have compared their performances. We have used UNSW-NB-15 dataset to train and test the models. In addition, we have performed feature engineering and parameter tuning to find out optimal set of features with maximum accuracy to reduce the training time and complexity of the ML models. We observe that with proper features set, SVM and ANN techniques have been able to achieve anomaly detection accuracy of 91% and 92% respectively, which is higher compared against that of the one achieved in the literature, with reduced number of features needed to train the models.
Network Function Virtualization (NFV) is an emerging technology to consolidate network functions ... more Network Function Virtualization (NFV) is an emerging technology to consolidate network functions onto high volume storages, servers and switches located anywhere in the network. Virtual Network Functions (VNFs) are chained together to provide a specific network service, called Service Function Chains (SFCs). Regarding to Quality of Service (QoS) requirements and network features and states, SFCs are served through performing two tasks: VNF placement and link embedding on the substrate networks. Reducing deployment cost is a desired objective for all service providers in cloud/edge environments to increase their profit form demanded services. However, increasing resource utilization in order to decrease deployment cost may lead to increase the service latency and consequently increase SLA violation and decrease user satisfaction. To this end, we formulate a multi-objective optimization model to joint VNF placement and link embedding in order to reduce deployment cost and service late...
Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3
Traditionally, in cellular networks, users communicate with the base station that serves the part... more Traditionally, in cellular networks, users communicate with the base station that serves the particular cell under coverage. The main functions of a base station can be divided into two, which are the baseband unit (BBU) functionalities and the remote radio head (RRH) functionalities. The RRH module is responsible for digital processing, frequency filtering and power amplification. The main sub-functions of the baseband processing module are coding, modulation, Fast Fourier Transform (FFT) and others. Data generally flows from RRH to BBU for further processing. Such BBU functionalities may be shifted to the cloud based resource pool, called as the Cloud-Radio Access Network (C-RAN) to be shared by multiple RRHs. Advancements in the field of cloud computing, software defined networking and virtualization technology may be leveraged by operators for the deployment of their BBU services, reducing the total cost of deployment. Recently, there has been a trend to collocate the baseband uni...
Uploads
Papers by deval bhamare