Integrated Network and End-host Policy Management for Network Slicing

被引:0
|
作者
Rabitsch, Alexander [1 ]
Anagnostopoulos, Themistoklis [2 ]
Grinnemo, Karl -Johan [1 ]
McNamara, Joseph [3 ]
Bosneag, Anne -Marie [3 ]
Kourtis, Michail Alexandros [2 ]
Xilouris, George [2 ]
Alay, Ozgu [4 ]
Brunstrom, Anna [1 ]
机构
[1] Karlstad Univ, Karlstad, Sweden
[2] NCSR Demokritos, Athens, Greece
[3] Ericsson, Athlone, Ireland
[4] Univ Oslo, Oslo, Norway
来源
2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES | 2022年
关键词
5G; network slicing; transport services; user equipment; policy system;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G mobile networks introduce the concept of network slicing, the functionality of creating virtual networks on top of shared physical infrastructure. Such slices can be tailored to various vertical services. A single User Equipment (UE) may be served by multiple network slice instances simultaneously, which opens up the possibility of dynamically steering traffic in response to the specific needs of individual applications - and as a reaction to events inside the network, e.g., network failures. This paper presents the PoLicy-based Architecture for Network Slicing (PLANS). In this policy framework, the network slice management entity in the 5G core and the UE can cooperatively optimize the usage of the available network slices via policy systems installed both inside the network and on the UE. The PLANS architecture has been implemented and evaluated in a 5G testbed. For two different case studies, we show how such a system can be leveraged to provide optimized services and increased robustness against network failures. First, we consider a drone autopilot scenario, and demonstrate how PLANS can reduce network-slice recovery time by more than 90%. Second, we illustrate for a 360. video streaming scenario how PLANS can help prevent video quality degradation when a network slice becomes unavailable.
引用
收藏
页码:226 / 232
页数:7
相关论文
共 50 条
  • [41] Wireless Network Security Policy Based on Integrated Vulnerability Management
    Gu Yue-sheng
    Zhang Bao-jian
    Yu zhou
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 225 - 228
  • [42] Resource management policy orienting IETF integrated services network
    Hua, B.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (10):
  • [43] Service-Aware Design Policy of End-to-End Network Slicing for 5G Use Cases
    Wang, Ranyin
    Aghvami, Abdol-Hamid
    Friderikos, Vasilis
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 962 - 975
  • [44] Multi-Agent Reinforcement Learning-Based Resource Management for End-to-End Network Slicing
    Kim, Yohan
    Lim, Hyuk
    IEEE ACCESS, 2021, 9 : 56178 - 56190
  • [45] Network Slicing
    Ksentini, Adlen
    PROCEEDINGS OF THE 2019 2ND LATIN AMERICAN CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITS LATAM), 2019,
  • [46] QoE Inference and Improvement Without End-Host Control
    Nikravesh, Ashkan
    Chen, Qi Alfred
    Haseley, Scott
    Zhu, Xiao
    Challen, Geoffrey
    Mao, Z. Morley
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 43 - 57
  • [47] Utilizing binary rewriting for improving end-host security
    Song, Yougang
    Fleisch, Brett D.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (12) : 1687 - 1699
  • [48] An efficient end-host architecture for cluster communication services
    Qi, X
    Parmer, G
    West, R
    2004 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING, 2004, : 83 - 92
  • [49] End-host architecture for QoS-adaptive communication
    Abdelzaher, T
    Shin, KG
    FOURTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM - PROCEEDINGS, 1998, : 121 - 130
  • [50] Integrated network management
    Chodos, Mark
    Elektron, 1993, 10 (09):