多级隔离的网络切片可用性保障方法
作者:
作者简介:

王颖(1976-),女,博士,副教授,博士生导师,主要研究领域为网络管理与通信软件,软件化网络,算力网络;陈可(1997-),女,硕士,主要研究领域为网络功能虚拟化;喻鹏(1986-),男,博士,副教授,博士生导师,CCF专业会员,主要研究领域为5G/6G网络智能管控;李文璟(1973-),女,博士,教授,博士生导师,CCF专业会员,主要研究领域为无线网络管理,自组织网络;邱雪松(1973-),男,博士,教授,博士生导师,主要研究领域为网络管理,通信软件;孟洛明(1955-),男,博士,教授,博士生导师,CCF高级会员,主要研究领域为通信网,网络管理

通讯作者:

喻鹏,E-mail:yupeng@bupt.edu.cn

中图分类号:

TP393

基金项目:

国家重点研发计划(2018YFE0205502)


Network Slice Availability Guarantee Based on Multi-level Isolation
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [40]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    核心网络切片通过虚拟网络功能(VNF)的组合链接实现灵活组网. 软件故障和硬件故障均会导致VNF失效, 从而导致切片服务中断. 由于网络切片共享资源, 需要特定的隔离机制以满足切片健壮性需求. 现有的可用性保障机制大多面向随机VNF故障, 一些涉及外部攻击的研究很少考虑网络切片特殊的隔离需求. 为了在隔离机制下实现切片可用性保障, 提出一种基于多级隔离的网络切片可用性保障方法. 首先, 建立核心网切片资源感知的可用性保障问题模型, 旨在满足隔离需求的同时, 消耗最少的备份资源来达到可用性目标. 然后, 提出一种隔离级别评估模型对VNF的隔离级别进行评估. 最后, 提出一种基于多级隔离的备份算法MLIBA解决所提出的可用性保障问题. 此外, 针对共享备份可用性计算这一PP-complete问题, 提出一种基于等效备份实例的计算方法. 仿真结果表明, 所提可用性计算方法具有较高的准确性, 引入多级隔离的可用性保障方法可以使切片的健壮性提高一倍. 与现有研究的对比表明, 在相同的隔离约束和可用性目标下, 所提方法可减少20%–70%资源消耗, 提高5%–30%的有效资源占比.

    Abstract:

    Core network slicing achieves flexible networking by combining virtualized network functions (VNFs). However, the failure of any VNF due to software and hardware failures will cause an interruption of the slice service. Since network slices share resources, a specific isolation mechanism is required to meet slice robustness demands. Most of the existing availability guarantee mechanisms focus on random VNF failures, and some of them involving external attacks rarely consider special isolation requirements of network slices. To realize slice availability guarantee under isolation mechanisms, this study proposes a method to guarantee network slice availability based on multi-level isolation. First, an availability guarantee model of core network resource awareness is built to meet the isolation requirements with consuming the least number of backup resources. Then, an isolation level assessment model is proposed to evaluate the isolation level of VNFs. Finally, a multi-level isolated backup algorithm (MLIBA) is proposed to solve the availability guarantee problem. In addition, an equivalent backup instance-based calculation method is put forward to address the PP-complete problem of availability calculation for a shared backup. Simulation results show that the proposed availability calculation method has high accuracy, and the introduction of multi-level isolation can double the robustness of slices. The comparison with existing studies shows that under the same isolation constraints and availability targets, the proposed method can reduce resource consumption by 20%–70% and increase the proportion of effective resources by 5%–30%.

    参考文献
    [1] Raza MR, Natalino C, Öhlen P, Wosinska L, Monti P. Reinforcement learning for slicing in a 5G flexible RAN. Journal of Lightwave Technology, 2019, 37(20): 5161–5169. [doi: 10.1109/JLT.2019.2924345]
    [2] Ghosh A, Maeder A, Baker M, Chandramouli D. 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access, 2019, 7: 127639–127651. [doi: 10.1109/ACCESS.2019.2939938]
    [3] Sattar D, Matrawy A. Optimal slice allocation in 5G core networks. IEEE Networking Letters, 2019, 1(2): 48–51. [doi: 10.1109/LNET.2019.2908351]
    [4] Raza MR, Fiorani M, Rostami A, Öhlen P, Wosinska L, Monti P. Dynamic slicing approach for multi-tenant 5G transport networks [invited]. Journal of Optical Communications and Networking, 2018, 10(1): A77–A90. [doi: 10.1364/JOCN.10.000A77]
    [5] Nguyen VG, Brunstrom A, Grinnemo KJ, Taheri J. SDN/NFV-based mobile packet core network architectures: A survey. IEEE Communications Surveys & Tutorials, 2017, 19(3): 1567–1602. [doi: 10.1109/COMST.2017.2690823]
    [6] Popovski P, Trillingsgaard KF, Simeone O, Durisi G. 5G wireless network slicing for eMBB, URLLC, and mMTC: A communication-theoretic view. IEEE Access, 2018, 6: 55765–55779. [doi: 10.1109/ACCESS.2018.2872781]
    [7] Fan JY, Ye ZL, Guan CW, Gao XJ, Ren K, Qiao CM. GREP: Guaranteeing reliability with enhanced protection in NFV. In: Proc. of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization. London: Association for Computing Machinery, 2015. 13–18.
    [8] Zhang J, Wang ZN, Peng CY, Zhang LQ, Huang T, Liu YJ. RABA: Resource-aware backup allocation for a chain of virtual network functions. In: Proc. of the 2019 IEEE INFOCOM Conf. on Computer Communications. Paris: IEEE, 2019. 1918–1926.
    [9] Ding WR, Yu HF, Luo SX. Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme. In: Proc. of the 2017 IEEE Int’l Conf. on Communications (ICC). Paris: IEEE, 2017. 1–6.
    [10] Li J, Liang WF, Huang MT, Jia XH. Reliability-aware network service provisioning in mobile edge-cloud networks. IEEE Transactions on Parallel and Distributed Systems, 2020, 31(7): 1545–1558. [doi: 10.1109/TPDS.2020.2970048]
    [11] Wang M, Cheng B, Chen JL. Joint availability guarantee and resource optimization of virtual network function placement in data center networks. IEEE Transactions on Network and Service Management, 2020, 17(2): 821–834. [doi: 10.1109/TNSM.2020.2978910]
    [12] Fan JY, Guan CW, Zhao YM, Qiao CM. Availability-aware mapping of service function chains. In: Proc. of the 2017 IEEE INFOCOM Conf. on Computer Communications. Atlanta: IEEE, 2017. 1–9.
    [13] Li DF, Hong PL, Xue KP, Pei JN. Availability aware VNF deployment in datacenter through shared redundancy and multi-tenancy. IEEE Transactions on Network and Service Management, 2019, 16(4): 1651–1664. [doi: 10.1109/TNSM.2019.2936505]
    [14] Potharaju R, Jain N. Demystifying the dark side of the middle: A field study of middlebox failures in datacenters. In: Proc. of the 2013 Conf. on Internet Measurement. Barcelona: Association for Computing Machinery, 2013. 9–22.
    [15] Thiruvasagam PK, Kotagi VJ, Murthy CSR. The more the merrier: Enhancing reliability of 5G communication services with guaranteed delay. IEEE Networking Letters, 2019, 1(2): 52–55. [doi: 10.1109/LNET.2019.2902720]
    [16] Xie JC, Yi P, Zhang Z, Zhang CH, Gu YJ. A service function chain deployment scheme based on heterogeneous backup. In: Proc. of the 18th IEEE Int’l Conf. on Communication Technology (ICCT). Chongqing: IEEE, 2018. 1096–1103.
    [17] 汤红波, 邱航, 游伟, 季新生. 基于联合备份的服务功能链可靠性保障的部署方法. 电子与信息学报, 2019, 41(12): 3006-3013. [doi: 10.11999/JEIT190013]
    Yang HB, Qiu H, You W, Ji XS. A reliability-guarantee method for service function chain deployment based on joint backup. Journal of Electronics & Information Technology, 2019, 41(12): 3006–3013 (in Chinese with English abstract). [doi: 10.11999/JEIT190013]
    [18] 赵国繁, 唐伦, 胡彦娟, 赵培培, 陈前斌. 面向可靠性的5G网络切片重构及映射算法. 电子与信息学报, 2020, 42(6): 1478-1485. [doi: 10.11999/JEIT190500]
    Zhao GF, Tang L, Hu YJ, Zhao PP, Chen QB. A reliability-aware 5G network slice reconfiguration and embedding algorithm. Journal of Electronics & Information Technology, 2020, 42(6): 1478–1485 (in Chinese with English abstract). [doi: 10.11999/JEIT190500]
    [19] 王兆堃. 网络切片场景下的异常检测与服务功能链愈合技术研究 [硕士学位论文]. 重庆: 重庆邮电大学, 2020.
    Wang ZK. Anomaly detection and service function chain healing techniques in network slicing [MS. Thesis]. Chongqing: Chongqing University of Posts and Telecommunications, 2020 (in Chinese with English abstract).
    [20] Xu SL, Ji XS, Liu WY. Enhancing the reliability of NFV with heterogeneous backup. In: Proc. of the 3rd IEEE Information Technology, Networking, Electronic and Automation Control Conf. (ITNEC). Chengdu: IEEE, 2019. 923–927.
    [21] 孙志勇, 季新生, 游伟, 袁泉. 基于安全分级的网络切片备份与重映射方法研究. 网络与信息安全学报, 2018, 4(11): 49-57. [doi: 10.11959/j.issn.2096-109x.2018088]
    Sun ZY, Ji XS, You W, Yuan Q. Research on backup and remapping of network slice based on security classification. Chinese Journal of Network and Information Security, 2018, 4(11): 49–57 (in Chinese with English abstract). [doi: 10.11959/j.issn.2096-109x.2018088]
    [22] 龚水清, 陈靖, 黄聪会, 朱清超. 信任感知的安全虚拟网络映射算法. 通信学报, 2015, 36(11): 180-189. [doi: 10.11959/j.issn.1000-436x.2015272]
    Gong SQ, Chen J, Huang CH, Zhu QC. Trust-aware secure virtual network embedding algorithm. Journal on Communications, 2015, 36(11): 180–189 (in Chinese with English abstract). [doi: 10.11959/j.issn.1000-436x.2015272]
    [23] Kazmi SMA, Khan LU, Tran NH, Hong CS. Network slicing for 5G and Beyond Networks. Cham: Springer, 2019.
    [24] 3GPP. 3GPP TS 33.501 Security architecture and procedures for 5G system. 2019. https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/
    [25] Sattar D, Matrawy A. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proc. of the 2019 IEEE Conf. on Communications and Network Security (CNS). Washington: IEEE, 2019. 82–90.
    [26] Yang X, Liu Y, Wong IC, Wang YP, Cuthbert L. Genetic algorithm for inter-slice resource management in 5G network with isolation. In: Proc. of the 2020 Int’l Conf. on Software, Telecommunications and Computer Networks (SoftCOM). Split: IEEE, 2020. 1–6.
    [27] Yu H, Musumeci F, Zhang JW, Tornatore M, Ji YF. Isolation-aware 5G RAN slice mapping over WDM metro-aggregation networks. Journal of Lightwave Technology, 2020, 38(6): 1125–1137. [doi: 10.1109/JLT.2020.2973311]
    [28] 毛玉欣, 陈林, 游世林, 闫新成, 吴强. 5G网络切片安全隔离机制与应用. 移动通信, 2019, 43(10): 31-37. [doi: 10.3969/j.issn.1006-1010.2019.10.006]
    Mao YX, Chen L, You SL, Yan XC, Wu Q. 5G network slicing security isolation mechanism and application. Mobile Communications, 2019, 43(10): 31–37(in Chinese with English abstract). [doi: 10.3969/j.issn.1006-1010.2019.10.006]
    [29] Gill P, Jain N, Nagappan N. Understanding network failures in data centers: Measurement, analysis, and implications. In: Proc. of the 2011 ACM SIGCOMM Conf. Toronto: ACM, 2011. 350–361.
    [30] Bari F, Chowdhury SR, Ahmed R, Boutaba R, Duarte OCMB. Orchestrating virtualized network functions. IEEE Transactions on Network and Service Management, 2016, 13(4): 725–739. [doi: 10.1109/TNSM.2016.2569020]
    [31] Google APPs service level agreement. 2021. https://workspace.google.com/intl/en/terms/sla.html
    [32] Wang Y, Zhang LY, Yu P, Chen K, Qiu XS, Meng LM, Kadoch M, Cheriet M. Reliability-oriented and resource-efficient service function chain construction and backup. IEEE Transactions on Network and Service Management, 2021, 18(1): 240–257. [doi: 10.1109/TNSM.2020.3045174]
    [33] Orlowski S, Wessäly R, Pióro M, Tomaszewski A. SNDlib 1.0-survivable network design library. Networks, 2010, 55(3): 276–286. [doi: 10.1002/net.20371]
    [34] Fang DF, Qian Y, Hu RQ. Security for 5G mobile wireless networks. IEEE Access, 2018, 6: 4850–4874. [doi: 10.1109/ACCESS.2017.2779146]
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

王颖,陈可,喻鹏,李文璟,邱雪松,孟洛明.多级隔离的网络切片可用性保障方法.软件学报,2023,34(12):5757-5772

复制
分享
文章指标
  • 点击次数:591
  • 下载次数: 2204
  • HTML阅读次数: 1062
  • 引用次数: 0
历史
  • 收稿日期:2021-10-14
  • 最后修改日期:2022-04-14
  • 在线发布日期: 2023-04-13
  • 出版日期: 2023-12-06
文章二维码
您是第20059630位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号