1. Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT
- Author
-
Waseem Mandarawi, Jurgen Rottmeier, Milad Rezaeighale, and Hermann de Meer
- Subjects
VNE ,lcsh:T55.4-60.8 ,SFC ,Computer science ,Distributed computing ,Cloud computing ,02 engineering and technology ,Security policy ,lcsh:QA75.5-76.95 ,Theoretical Computer Science ,NFV ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,lcsh:Industrial engineering. Management engineering ,Asset management ,IIoT ,Virtual network ,Numerical Analysis ,Graph rewriting ,business.industry ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Computational Mathematics ,Computational Theory and Mathematics ,ddc:000 ,Embedding ,Random topology ,lcsh:Electronic computers. Computer science ,business - Abstract
The autonomic composition of Virtual Networks (VNs) and Service Function Chains (SFCs) based on application requirements is significant for complex environments. In this paper, we use graph transformation in order to compose an Extended Virtual Network (EVN) that is based on different requirements, such as locations, low latency, redundancy, and security functions. The EVN can represent physical environment devices and virtual application and network functions. We build a generic Virtual Network Embedding (VNE) framework for transforming an Application Request (AR) to an EVN. Subsequently, we define a set of transformations that reflect preliminary topological, performance, reliability, and security policies. These transformations update the entities and demands of the VN and add SFCs that include the required Virtual Network Functions (VNFs). Additionally, we propose a greedy proactive heuristic for path-independent embedding of the composed SFCs. This heuristic is appropriate for real complex environments, such as industrial networks. Furthermore, we present an Industrail Internet of Things (IIoT) use case that was inspired by Industry 4.0 concepts, in which EVNs for remote asset management are deployed over three levels, manufacturing halls and edge and cloud computing. We also implement the developed methods in Alevin and show exemplary mapping results from our use case. Finally, we evaluate the chain embedding heuristic while using a random topology that is typical for such a use case, and show that it can improve the admission ratio and resource utilization with minimal overhead.
- Published
- 2020
- Full Text
- View/download PDF