Traffic matrix estimation with software-defined NFV: Challenges and opportunities

Traffic matrix estimation with software-defined NFV: Challenges and opportunities

Accepted Manuscript Title: Traffic matrix estimation with Software-Defined NFV: challenges and opportunities Author: Ugo Fiore Paolo Zanetti Francesco...

1MB Sizes 0 Downloads 60 Views

Accepted Manuscript Title: Traffic matrix estimation with Software-Defined NFV: challenges and opportunities Author: Ugo Fiore Paolo Zanetti Francesco Palmieri Francesca Perla PII: DOI: Reference:

S1877-7503(17)30240-5 http://dx.doi.org/doi:10.1016/j.jocs.2017.03.001 JOCS 623

To appear in: Received date: Revised date: Accepted date:

4-11-2016 19-2-2017 1-3-2017

Please cite this article as: Ugo Fiore, Paolo Zanetti, Francesco Palmieri, Francesca Perla, Traffic matrix estimation with Software-Defined NFV: challenges and opportunities, (2017), http://dx.doi.org/10.1016/j.jocs.2017.03.001 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.



Traffic matrix estimation from link-level measurements is a central issue in modeling complex networking systems.

• In modern networks, the offloading many functions to a cloud, proactive caching, dynamic network reconfiguration, may boost in the ability of controlling traffic and the stringent need to protect assets and guarantee isolation are among the factors that will affect traffic matrices

ip t

cr us an M d te ce p



We listed the principal transformations induced by virtualization technologies NFV and SDN and their potential effect for Traffic matrix estimation, the problem is analyzed from several points of view, including modeling engineering and econometric perspectives.

Ac



Page 1 of 31

ip t

Traffic matrix estimation with Software-Defined NFV: challenges and opportunities Ugo Fiorea,∗, Paolo Zanettib , Francesco Palmieric , Francesca Perlab a Department

of Molecular Medicine and Medical Biotechnologies, Federico II University of Business and Quantitative Studies, Parthenope University c Department of Computer Science, University of Salerno

us

cr

b Department

Abstract

an

Traffic matrices, abstract representations of demand, are essential for network operators endeavoring to model, measure, maintain, and improve the efficiency of their complex and heterogeneous architectures. Traffic matrix estimation

M

consists in inferring a traffic matrix from link-level measurements. Provoked by the need to enable agile deployment of new services while, at the same time, slashing operating expenditure and energy consumption, the trend in telecom-

d

munications is to shift functionality from physical appliances to virtualized ser-

te

vices. We analyze the effects of this landscape change on traffic matrices, their dynamics, and their estimation, indicating some new challenges and problems

Ac ce p

that will arise in all the associated modeling, analysis and evaluation activities. Keywords: traffic matrix, network function virtualization, complex systems, virtual network embedding, modeling

1. Introduction

In an increasingly network-centric connected world, knowledge of traffic is

essential for network operators that need to effectively and efficiently satisfy current demands, as well as prepare for future needs, adjusting the architecture

5

of their complex networks and planning the procurement of additional capacity. Entries of traffic matrices represent the volume of traffic flowing between ∗ Corresponding

author Email address: [email protected] (Ugo Fiore)

Preprint submitted to Journal of Computational Science

February 19, 2017

Page 2 of 31

an origin and a destination, abstract network entities (usually nodes or sets thereof), hence, an accurate estimation of traffic matrices is a prerequisite of

10

ip t

paramount importance for reliably modeling complex network organizations for both simulation and traffic engineering purposes. An important feature of traf-

cr

fic matrices is that, as an abstract representation of consumer demand, they are

expected to be largely invariant with respect to network topology, in the sense

us

that they should be insensitive to small topological changes that do not cause significant diversions in network paths [1]. Conversely, the topological structure 15

of a network and its routing policies can be expected to have been tailored to the

an

traffic matrix. From the point of view of an operator that builds and operates its network, the guiding principle is to carry in the most efficient way the traffic that is (or is forecast) to be serviced. The anticipated traffic matrix is therefore

20

M

supposed to have determined and oriented many, if not all, of the decision in the design of advanced network architectures. The same is true in general for all complex, large-scale communication networks.

d

Traffic can be described at various levels of aggregation, and between logical

te

or physical endpoints. The simplest and straightforward approach for building a traffic matrix is direct measurement, by reliably collecting flow-level statistics at the network ingress and egress points. However, direct measurement of point-to-

Ac ce p

25

point traffic flows, while technically feasible in principle, requires the deployment of complex and expensive equipment at the infrastructure level and may affect forwarding performance on the involved nodes. Consequently, this is seldom implemented in practice due to the performance degradation it would cause.

30

Estimating the traffic matrix by starting on some available link-level statistics and leveraging reliable traffic models will be a much better solution. The key insight of traffic matrix estimation (TME) is that a traffic matrix

can be inferred from link-level measurements, which are readily available to network operators [2]. If the traffic matrix were known, it would determine the link 35

counts through the routing matrix, which describes the utilization of links by Origin-Destination (OD) flows. The inverse inference (sometimes known as deconvolution) is difficult, because the number of links is usually much lower than 2

Page 3 of 31

the number of OD pairs, resulting in an ill-posed, highly undetermined, system of equations. Estimation techniques include gravity models, network tomography, and hybrid methods (Section 3). Models such as the gravity one are based

ip t

40

on the assumption of independence between the volumes of traffic entering or

cr

exiting a network at each of its endpoints. Such an assumption has been shown

to not hold in practice for Internet traffic, according to several considerations

45

us

[3]. These include the connection-based, asymmetric nature of protocols such as HTTP, and the presence, at an Internet-wide scale, of content-heavy Internet Service Providers (ISPs) and access-heavy (Eyeball) ISPs with different traffic

an

profiles [4]. Changing trends in consumer demands, such as online video coupled with the emergence of Content Distribution Networks (CDNs), cloud services, and the shift of prevalence from wired traffic to mobile, also produce effects that should be accounted for in adapting existing models and designing new ones.

M

50

Recently, a new paradigm is emerging in the telecommunications industry. Motivated by the need to cut on operating expenditure and energy consump-

d

tion, operators consider moving functionality from physical network appliances

55

te

to virtualized services. The proprietary nature and diversity of purpose-built middle-boxes that operators used to rely upon have been hampering the flex-

Ac ce p

ibility to adapt to quickly-changing demand, also making deployment of new services slow and costly (network ossification). With Network Function Virtualization (NFV) [5], which leverages upon virtualization technology, the functions realized by middle-boxes are implemented by software subsystems running

60

on commodity hardware, allowing a reduction in costs along with agile provisioning, deployment, and centralized management of virtual network functions. A virtual network function1 is the software instance in NFV that consists of one or more Virtual Machines (VMs) running different processes supporting a network function. Virtual network functions can be instantiated when needed,

65

using VMs, without having to install new hardware. In synthesis, functionality 1 The

acronym VNF is sometimes used. We preferred not to adopt that convention in order

to avoid possible confusion with NFV.

3

Page 4 of 31

is thus decoupled from location, and software is decoupled from the hardware platform. Operators get the ability to rapidly introduce—and dismiss—highly

ip t

tailored services while reaping the benefits of reduction in costs due to consolidation of hardware.

Latency and throughput, and especially the stability of these performance

cr

70

indicators, are issues that have often been raised with NFV. Certainly, NFV

us

would be losing much of its attractiveness, had its adoption brought a slump in performance respect to the one achievable with specialized, purpose-built, hardware. Another major aspect that needs careful consideration by operators is how to smoothly migrate from their existing legacy infrastructure to an NFV-enabled

an

75

one. In addition, the possibility of instantiating virtual appliances dynamically, and placing them optimally, requires the network infrastructure to support this

M

ability. These reflections suggest the integration of NFV with Software-Defined Network (SDN), an emerging framework focused on decoupling the network 80

control plane from the data plane, providing programmable connectivity and

d

centralized control. SDN complements NFV by providing traffic engineering

te

and flexible connectivity between virtual network functions, while NFV can serve SDN by virtualizing the SDN controller (which can be regarded as a net-

Ac ce p

work function) to run on cloud, thus allowing dynamic migration of controllers 85

to optimal locations.

Besides the objectives detailed above, ISPs might leverage upon SDN and

NFV to transfer some traffic off their network, and in general to increase their control over the inbound and outbound traffic volumes exchanged at interconnection points. In the complex context of peering agreements, traffic ratios

90

(between the volumes of incoming and outgoing traffic) are of the essence when determining whether settlement-free peering agreements are viable or paid peering is to be sought [6]. Imbalances between incoming and outgoing traffic has, in fact, led to sharp contrasts between interconnected ISPs. The economic effects of changes in traffic volumes may be felt at two different timescales. When pro-

95

visioning, operators may need to augment the capacity of their network to meet a raising quantity of traffic, while traffic declines would induce them to devise 4

Page 5 of 31

ways to prevent the resulting unused (but paid for) capacity from turning into a loss. On a faster timescale, congestion due to increments in traffic volume will

100

ip t

drive operating and management costs up. In this framework, operators may

wish to exert as much control as possible over their traffic. A relevant part can

cr

be played by the movement of content caches to locations closer to end users, so as to reduce the associated inbound traffic.

us

A factor which has to be accounted for is how users will respond to pricing changes, and to changes in the cost of forwarding. Pricing models may need 105

revision, in order to reflect the changes brought about by NFV. Finally, new

an

paradigms emerging in the Internet scenario, such as next generation mobile communication systems (5G) or fog computing [7] may also have an impact on the estimation of traffic matrices. All these factors produce interesting effects

110

M

on the estimation of traffic matrices, which we describe and analyze. After a review of related work in Sec. 2, some detail about the traffic matrix, the problem of its estimation, and an outline of NFV, SDN, and peering practices

d

are given in Sec. 3. The effects of SDN and NFV are discussed in Sec. 5.

te

Conclusions, along with directions for future work, are reported in Sec. 6.

Ac ce p

2. Related Work 115

The TME problem has been studied in the literature in two main different

flavors, according to the considered time scale: for long time intervals, a purely spatial, static notion, modeling the average traffic demand, and a temporal sequence of values, describing the dynamical evolution of traffic over short time frames.

120

However, a limited number of techniques are available, until now, for the

traffic matrix estimation in large-scale network infrastructures. Since the TME problem is characterized by a set of linear relationships, the basic problem of maximizing the total traffic routed throughout the network, constrained by the trivial flow conservation criterion, can be easily formulated

125

using a Linear Programming model and standard techniques can be used to

5

Page 6 of 31

solve it. This problem was first formulated as such in [8]. Another approach, proposed in [9], relies on Bayesian methods to determine

ip t

the conditional probability distributions for elements in the traffic matrix, given the observed link loads. This approach typically uses Markov-chain Monte Carlo simulation techniques for calculating the posterior probabilities needed.

cr

130

Alternatively, the Expectation Maximization (EM) approach [10] is able to

us

consider multiple sets of link-level measurements and is based on an expectation maximization algorithm for calculating the maximum likelihood estimate for the traffic matrix based on the link loads.

Time series traffic matrices show both spatial and temporal correlation, and

an

135

good models have exploited both [11]. Methods that tackle the dimension of the traffic estimation search space by leveraging upon their spatio-temporal

estimation of TM elements [13]. 140

M

structure (e.g. [12]) often have high complexity, due to simultaneous constrained

When particular network environments are considered, their specific charac-

d

teristics affect traffic matrices and their estimation in subtle ways. At a global

te

scale, the traffic exchanged between pairs of Autonomous Systems (ASes) is elusive, due to the reluctance of ASes to reveal data that might be useful to

Ac ce p

their competitors, motivating researchers to adopt model-based approaches [14] 145

and look for surrogate measurements that could be used to obtain reasonable estimates for AS-level traffic matrices [15]. A wide survey of research about Software Defined Optical Networks (SDONs), outlining ten directions for further study, can be found in [16]. The estimation of traffic flows in data center networks (DCNs) has been undertaken by Hu et al. [13]. In DCN, there can be

150

many different, redundant paths between node pairs, and the choice of a specific path can be determined by the need to avoid congestion. By decomposing the DCN topology into several clusters based on local structure, the complexity of the inference problem is reduced, and intra-cluster as well as inter-cluster traffic can be estimated. A different approach to the complexity of the estima-

155

tion problem was proposed by Airoldi and Blocker [17], who explicitly modeled traffic dynamics, so as to constrain the solution space to be explored. Basi6

Page 7 of 31

cally, the projection of aggregate traffic volumes onto the latent space of OD traffic is made under a given probabilistic model, i.e., the expectation of OD

160

ip t

traffic is estimated given the observed measurements and their distributions. The resulting multilevel model for traffic combines a heavy-tailed process, in

cr

which the amount of traffic on each OD route is proportional to its variability up to a scaling factor shared by all OD routes, and error process for better

us

capturing near-zero traffic volumes. The problem of sampling from the resulting highly constrained solution space is tackled via model-based regularization 165

and a sequential sample-importance-resample-move (SIRM) particle filter that

an

is statistically efficient, numerically stable, and scales well. One might expect that blind-source separation methods such as Independent Component Analysis (ICA) [18] might shed some light on the estimation of traffic matrices, since the

170

M

observed traffic volumes are the superposition of different OD flows. However, as pointed out by Airoldi and Blocker, strong correlation can be observed in

d

traffic volumes and ICA is of little use in this context [17].

te

3. Model

The fundamental concept behind to the generation of a traffic matrix is

Ac ce p

communication demand, representing the amount of traffic potentially flowing 175

between any pair (i, j) of network endpoints, i.e. entering the network at i and leaving it at j.

We are interested in a set V of nodes, labeled {1, . . . , n}. Suppose that two

n-vectors, d = (di ) and s = (si ) specify the overall demand and supply, i.e. the aggregate amount of traffic exiting (resp., entering) node i. Assume that traffic P P is conserved, that is, i∈V di = i∈V si = X tot , with X tot denoting the overall amount of traffic in the network. All nodes act as source or sink. Denote as X = (xij ) the traffic matrix. Thus, xij is the amount of traffic that goes from node i to node j. Hence, X

xij = si and

j∈V

X

xij = dj

(1)

i∈V

. 7

Page 8 of 31

3.1. Gravity model Under the gravity model, the source and destination are assumed to be

ip t

independent [19]. Traffic between any two nodes is proportional to the total

traffic flowing out of the source node and to the total traffic going into the

xij =

cr

destination node. Entries of the traffic matrix have the form si dj fij

(2)

us

where the friction factors fij express the different conditions that may exist among node pairs. The form of (2) resembles Newton’s law of gravitation, where

an

the gravitational force between two bodies is proportional to the product of their

the fanouts are obtained: si pi = P

M

masses divided by their distance squared. In computer networks, friction factors si dj are usually taken as constant, and it is convenient to write (2) as xij = tot , X so that (1) will be verified. Normalizing the aggregate demands and supplies,

sk

dj and qj = P

d

k∈V

dk

(3)

k∈V

180

te

Fanouts have been shown to exhibit a more stationary behavior as compared to traffic volumes. By dividing traffic in classes and substituting the notion of

Ac ce p

independence with conditional independence, a generalized gravity model has been obtained [12] that outperforms the regular gravity model. Precisely the assumption from which the gravity model derives its principal

strength, i.e., the independence of source and destination nodes, has elicited

185

some criticism [3]. The session-oriented nature of TCP, for example, as well as the dropping of packets because of congestion at routers, induce observable dependency between nodes. In addition, traffic is not necessarily equal in both directions. Some applications, notably HTTP traffic, are inherently asymmetric, with small requests in one direction and large responses in the opposite direction.

190

A consequence is that forward and reverse traffic are not independent. While the reasoning above applies locally, to a single client-server pair, the presence of popular content providers and, on an Internet-wide scale, of Content ISPs and Eyeball ISPs [4], makes the dependence evident also at the aggregate level. 8

Page 9 of 31

Other factors that conflict with the gravity model include the effects of traffic 195

ratio thresholds in peering agreements [20], and asymmetries due to Hot-potato

ip t

routing. Peering is an interconnection whereby two networks agree to mutually

carry traffic destined to each other’s network, as opposed to Transit, a customer-

cr

supplier arrangement where an ISP buys from another ISP the connectivity to the global Internet. Peering is typically done at an Internet Exchange Point (IXP), which provides a shared switching fabric to enable the mutual inter-

us

200

connection of ISPs. Settlement-free peering involves no payments, while paid peering is a customer-provider business relationship where the customer pays

an

the provider in order to gain access to the networks of the provider and of its customers. Not much details are publicly known about paid peering, as such 205

contracts are often subject to nondisclosure agreements. Central to peering is

M

the notion of mutual benefit. On the assumption that the costs an ISP has to carry are proportional to the volume of traffic on its network, the ratio between inbound and outbound traffic has often been taken as a measure of fairness in

centiles on 5-minute traffic distributions (this is true in particular for Tier 1 ISPs [21]).

te

210

d

the sharing of costs in peering [20]. Volumes are usually taken as 95th per-

Ac ce p

When two ISPs peer, each of them has a selfish interest to limit the resources consumed to forward the traffic destined to the peer’s network. Each ISP has thus an incentive to force traffic into its destination network as quickly and

215

cheaply as possible. When there are multiple interconnection points (as it often is the case) packets are then delivered to the peer at the nearest peering interface, which might not be the optimal one from the point of view of the overall network. The expected deviation from the globally optimum routing (the cost of anarchy in game theory parlance) has been shown to be a factor of three [22].

220

3.2. Network tomography Network tomography infers the internal structure of a network using information derived from end nodes [1]. Active methods use probes, whereas passive techniques do not require network elements to perform additional actions other 9

Page 10 of 31

than the usual packet forwarding. The phrase network tomography was coined 225

by Vardi [23], who started the first rigorous study about topology inference, by

ip t

analogy with tomographic methods used in medicine. Network tomography is

by no means specific to computer networks: It has also been studied in the con-

cr

text of transportation, and it still receives consistent attention (see, e.g., [24]).

From an information-theoretic point of view, the improvements achievable in network tomography through Network Coding have been studied. Interested

us

230

readers may refer to [25] for a survey.

The vector of link loads y can be obtained from the vectorized2 traffic matrix

an

x = vec X and the routing matrix A

y = Ax

(4)

235

M

The network tomography problem consists in estimating x given y. Note that typically the measured link counts are low-dimensional while the latent

d

point-to-point traffic volumes are high-dimensional. Network tomography is not relying on the assumption that the route along which traffic on a given

te

origin-destination (OD) pair is directed is unique [26]. Entries of the routing matrix can be imagined as modeling the fraction of traffic belonging to the OD pair k that is routed to link h, or as binary values ahk ∈ {0, 1} as in [27],

Ac ce p

240

expressing the circumstance that traffic relative to the OD pair k is routed onto the link h.

Figure 1 shows the load yAB over the link AB and the traffic matrix entries

xAB and xAC relative to the traffic exchanged between A and B and between

245

A and C. In addition, traffic which is local to A, denoted as xAA , is also shown. Note that literals have been used instead of number for the sake of clarity. A general and accessible formulation of regularized models for the tomogra-

phy as optimization problem was given in [1]. The best estimate of the vectorized 2 The

vec operator acts on a matrix by stacking its columns onto one another.

10

Page 11 of 31

ip t cr us an

M

Figure 1: A simple sketch of traffic matrix entries

d

traffic matrix is given by

x∗ = arg min2 R(x, y) + λd(x, M)

(5)

te

x∈Rn

where R(·, ·) is the deviation of a feasible solution x from the observations

Ac ce p

y, d(·, ·) is the deviation of the solution from the model M, and λ ≥ 0 is a regularization parameter penalizing solutions which deviate from the model. A

250

good choice for the prior model x(0) is the generalized gravity model, whereas alternatives for the penalty function include the mutual information between the estimated and the prior models.

4. The importance of traffic matrices in modern networks A reliable traffic matrix is able to explain us why the distribution of traffic

255

within the network behaves in a certain way, and more useful, it allows us to perform some kind of prediction on the evolution of the network, in presence of changes in its topology, traffic patterns and functional roles in network nodes. Topological changes may be caused by failure events, routing metric changes, 11

Page 12 of 31

creation of traffic engineering tunnels by using Multi-Protocol Label Switching 260

(MPLS) label switched paths (LSPs) [28], as well as by the introduction of new

ip t

network entities or the disposal of already existing ones. Modifications in traffic patterns may be due to the growth or reduction of the users’ volumes in specific

cr

areas within the network, whereas the change of roles within the network may

reflect the relocation of transit peering connections or specific network services. Clearly, in lack of a clear and stable formulation of the traffic matrix, it is not

us

265

easy to perform any kind of prediction on the network’s response to the above changes, since in order to gain a good understanding of the underlying network

an

dynamics we need estimate in advance what will be the effects on the traffic distribution when modifications occur in the network topology. For example, 270

when a communication link goes out of service some amount of traffic, previously

M

flowing through it, may move on a specific alternate path and some other may be diverted through another one, depending on the source and destination points characterizing such traffic.

also for the optimal placement of specific functional components within the net-

te

275

d

Accurate estimation of a traffic matrix becomes of paramount importance

work, mainly in presence of network virtualization practices. In such scenarios,

Ac ce p

traffic engineered tunnels can be set-up to encapsulate traffic between different hypervisors empowering virtualization services on different sites by allowing the realization of fully virtualized network infrastructures between virtual machines

280

that are independent on the underlying physical network. In addition, some basic networking components needed to support a modern infrastructure can be further consolidated and delivered in a virtualized way by decoupling the network functions, such as network address translation (NAT), firewalling, intrusion detection, domain name (DNS), load balancing and caching services, from

285

proprietary hardware appliances so that they can be fully managed as software applications and dynamically moved from site to site according to evolving traffic demands. Virtualized network-level services, supporting control plane function in Software Defined Networks, as well as security and content distribution have to be located in strategic places within the communication infrastructure and 12

Page 13 of 31

290

dynamically moved, thanks to the enhanced mobility features provided by stateof-the-art virtualization technologies, according to sudden changes in topology

ip t

and traffic dynamics. For each specific traffic-demand matrix, we can determine

a near-optimal virtual network topology and virtual network service placement

295

cr

that minimizes communication resource waste by fairly balancing the network

load towards virtualized network function provisioning points while satisfying

us

the performance and flexibility requirements of a modern virtual network infrastructure.

an

5. NFV and its effects on traffic 5.1. NFV

Competition in the telecommunications market is a powerful driver for op-

M

300

erators to reduce costs and improve agility. Traditional carrier networks rely upon dedicated hardware middleboxes, often provided by a single vendor, with

d

standardized network interfaces and behavior. These boxes implement network functions on top of proprietary operating systems and specialized hardware platforms. leading to a complex, rigid, and costly lifecycle management. With NFV,

te

305

a service component can be decomposed into a set of virtual network functions,

Ac ce p

which could then be separately implemented as software instances on commercial off-the-shelf (COTS) hardware. To adapt to changes in traffic, operators will no longer necessarily need to provision and deploy new middleboxes. They

310

only have to focus on the resources needed to run network functions adequate to support user demand. Carrier-grade networks can be thus built flexibly, provisioning connectivity as a service [29]. Seven telco operators formed an European Telecommunications Standards Institute (ETSI) specifications group for NFV [30]. NFV is expected to cut the total cost of ownership (TCO) by reducing

315

both equipment cost (CAPEX) and operational cost (OPEX). Architecturally, SDN can be viewed as an enabler to NFV. The two technologies complement each other, especially within a widely-spanned mobile network. NFV involves the separation of network functions from the underly-

13

Page 14 of 31

ing proprietary appliances, running network functions as software instances on 320

commodity equipment or in the cloud, whereas SDN support the decoupling

ip t

of control-plane and data-plane functions, enabling logically centralized control

over multi-layered, multi-vendor, networks. These concepts are being considered

cr

as promising tools towards a programmable, flexible, and cost-efficient mobile network architectures, the Software Defined Mobile Network (SDMN)[31]. De-

spite that, not excessive attention has been drawn to the network load and

us

325

data-plane delay implied by introducing NFV and SDN [32]. Considerable volumes of traffic will be involved and models for TME will need to reflect the

an

new context, considering the role played by the entities involved. In addition, during the adoption of NVF, it is reasonable to expect an extended migration 330

stage, where virtualized functions coexist with legacy hardware (so as to pre-

M

serve the return on investment on traditional systems). The shape of traffic during migration should reflect a steady transition from the legacy situation to the NFV-enabled one, since the effects of the transition add up linearly.

test network environments where new ideas can be safely tested in realistic

te

335

d

Entities with various roles in the business model may also wish to realize

conditions without causing any harm to customers [33]. The ease with which

Ac ce p

such laboratories can be set up and deployed will make likely that the impact of them on traffic matrices will be non-negligible. The IaaS (Infrastructure as a Service) business model decouples the roles of

340

Service Providers (SPs), who offer customer services and deploy the necessary support systems, and Infrastructure Providers (InPs), who are in charge of provisioning, operating, and maintaining physical resources. Within the business model for NFV (described e.g., in [34]), new roles are introduced. In particular, Virtual Network Function Providers (VnfP) can be expected to offer virtual

345

network functions. For the latter role, traditional vendors of network equipment are in the advantageous position of being able to evolve their portfolio, providing software implementations of their products, provided that they pay special attention to the adaptation of components originally designed for a single-tenant, static network, to the dynamic and scaling carrier cloud. NFV also opens the 14

Page 15 of 31

350

opportunity for other entities to specialize with innovative, niche services (which may include, e.g., tailored content filtering or malware protection) and act as

ip t

advanced service providers for those specific services. The virtualized network structure of NFV will create a network of relationships between stakeholders.

355

cr

Some of these relationships are many-to-many, in the sense that, for example, a virtual network operator (VNO) can rely on resources from different InPs,

us

and the infrastructure of a single InP can host multiple independent virtual networks. All the involved parties will want to protect their respective assets. An InP will have an interest in ensuring that malfunctions (or deliberate at-

360

an

tacks) within a single VNO are not disruptive of the smooth functioning of the entire infrastructure. On the other hand, a VNO will likely distrust its competitors and request that the separation with other tenants operating on the

M

same infrastructure be as thorough as possible. In addition, VNOs will regard the details of their traffic measurements and estimates as sensitive data and will attempt to prevent competitors to have access to them. They might be even attempt to interfere with the collection of measurement data, by either blocking

d

365

te

it, transmitting false readings, or injecting fake traffic for the sole purpose of masquerading the correct volumes.

Ac ce p

5.2. Evolved Packet Core (EPC)

Mobile networks have naturally been in the focus of research work inves-

370

tigating the introduction of NFV, SDN, and both [35]. The EPC is the core transport network for Long Term Evolution (LTE) networks as specified by 3GPP. The EPC performs essential functions that can be implemented as virtual network functions, including subscriber tracking, mobility management and session management.

375

Placement of components such as Serving Gateways (S-GWs) is usually done

statically, with reference to the forecast traffic demand, with about 10 S-GWs serving 106 subscribers [36]. The flexibility brought in by NFV will enable, however, on-demand adaptation to quickly variable demand, also with potentially large traffic volumes. For example, to provide convenient service in case 15

Page 16 of 31

380

of events with massive attendance, new SGWs could be activated and operated for the duration of the event. Basta et al. [35] investigated the performance

ip t

effect, in terms of network load and delay, brought about by virtualizing the

S-GW and Packet Gateway (P-GW) functions. A fully virtualized EPC would

385

cr

involve the instantiation of all virtual network functions into one or more data centers and the use of SDN-enabled switches to handle data traffic. Service

us

requirements (e.g., time-criticality or desire to guarantee tenant isolation) may, however, induce operators to deploy virtual network functions to locations close to end users, or even at customer premises. In such cases, the data traffic could

390

an

be offloaded to dedicated nodes across the core transport network, while the control plane logic could be centralized [32]. This way, the advantages of a global, unified view of the network would be retained. Substantial differences (up to

M

8x) were found between separation of control plane and data plane and full virtualization [32]. The authors also proposed a function placement scheme that minimizes the SDN-induced overhead. Issues opened to further study include the need to ensure that the centralized control in the carrier cloud complies with

d

395

bottleneck.

te

the regulatory delay requirements and to avoid that it becomes a performance

Ac ce p

5.3. 5G and Cloud Radio Access Network (C-RAN) Next generation mobile networks (5G) are envisioned to increase area capac-

400

ity by three orders of magnitude with respect to 4G, and be extremely reliable [37]. Their peak rates should be in the range of tens of Gbps, with millisecond round-trip latency, and they are expected to support the connection of a trillion devices, supporting the Internet of Things (IoT) paradigm. To reduce network costs and meet the future requirements of high spectral efficiency coupled

405

with a low power footprint, advanced wireless network architectures are sought. Since Base Stations consume substantial energy, virtualizing their functions in a Cloud Radio Access Network (C-RAN) is an appealing perspective [37]. Important aspects of C-RAN that can generate significant traffic and need thus to be considered for accurate TME include the placement of controller(s) and 16

Page 17 of 31

410

the edge cache. Since latency and other network performance metrics depend significantly on the location of controllers, their placement should be carefully

ip t

looked after. With edge caching, content that is determined as likely to be mas-

sively requested is downloaded to the periphery and cached there. Edge caching

415

cr

also needs to deal with the problems raised by encrypted content. 5.4. Network function placement

us

With NFV, network functions can be instantiated in the locations which are most convenient for the operator. Eligible locations include datacenters,

an

network nodes, specific geographic locations, and end-user premises [34], with effects on the distribution of traffic flows which need to be reflected in estimation 420

models.

M

In a bird’s eye view, two conflicting groups of objectives affect the placement of virtual network functions: reduction of costs by consolidation of hardware and workforce competence calls for centralization, while decentralization

functions at customer premises can be motivated by subscribers asking for ded-

te

425

d

is motivated by performance and security reasons [38]. Placing virtual network

icated service, requiring that their functions are protected and isolated from the ones dedicated to other customers. In addition, the need to efficiently manage

Ac ce p

the Network Function Virtualization Infrastructure (NFVI) and protect it from the delivered subscriber services is likely to introduce a further layer of functions

430

(mostly firewalls) and associated traffic. Placement of virtual network functions in distinct fault domains to increase resilience is also likely with NFV, also inducing possible alterations in traffic patterns. When the temporal dimension is taken into account, virtual network functions may be dynamically relocated and instantiated to meet the demand with fine granularity.

435

Network functions cannot be embedded freely, because of strict chaining

requirements that exist for service components. Localization of the virtual network functions supporting service components needs to ensure compliance with chaining requirements, as well as be feasible given the network topology and the desired performance. Sequencing requirements in virtual network functions 17

Page 18 of 31

440

are expressed with the Virtual Network Functions Forwarding Graph (VNFFG)

able to an InP is an interesting research problem in itself.

ip t

[34]. Inferring an unknown topology given the VNFFG and information avail-

Allocating virtual network functions into an entirely operator-owned cloud

445

cr

is a solution bringing many advantages, including cost containment, dynamic migration, flexible upgrades, and complete control over the infrastructure. How-

us

ever, not all operators are already equipped with their own cloud infrastructure or are willing to invest to build one. Therefore, as a consequence of NFV, an increase of traffic exchanged between different entities (operators and cloud

450

an

providers) is expected, with many issues and open problems still to be solved, including the need for new dedicated links and peerings as well as more awkward aspects such as lawful interception that is likely to cause a further growth

M

in traffic volumes.

The optimal placement of NFV components has been the subject of several research works. More generally, the problem of embedding virtual networks in a substrate network is usually referred to as the Virtual Network Embedding

d

455

te

(VNE) problem [39]. The VNE problem is NP-hard and many heuristics have been put forward to address it. Also, the notion of optimality has been de-

Ac ce p

clined in several ways. Criteria that have been suggested to precisely specify optimal allocation in the VNE problem include setup cost, latency, economical

460

profit, resilience, risk exposure, energy-related considerations, and acceptance rate (defined as the fraction of virtual network requests that are accepted). As VNE deals with the allocation of the nodes and links of a virtual network, two subproblems can be identified: Virtual Node Mapping (VNoM), concerning the allocation of virtual nodes into physical ones, and Virtual Link Mapping

465

(VLiM), which is about the choice of paths in the substrate network to implement the virtual links. These subproblems can be addressed separately or in a combined way.

18

Page 19 of 31

5.5. Monitoring and security

470

ip t

A logically centralized network architecture facilitates monitoring and analysis, as well as prompt reaction to failures and attacks, provided that the control point has accurate, complete, and up to date information about the network

cr

state. Centralized control and global view of the network, two features of SDN, may also be leveraged upon to retrieve and gather measurements of network traf-

475

us

fic, to aid in traffic engineering. Software Defined Monitoring (SDM) consists of harvesting information from high-speed networks in an efficient and dynamical way. According to the SDM paradigm, SDN network elements report packet

an

and flow data and metadata, along with failure status, to the controller [31], which may in turn offload them to big data analytics systems aimed at correlating heterogeneous and complex data, profiling them and analyzing them, in support of both the regulation of network operation and anomaly detection

M

480

[40]. The adequacy and effectiveness of security policies can be effectively verified and the network can be quickly reprogrammed to reflect policy updates.

d

Having said that, management and synchronization of security policies and traf-

485

te

fic forwarding policies at a network-wide scale requires a global analysis of all elements within the network and of the mutual relationships between them, to

Ac ce p

identify and correct inconsistencies, conflicts, or performance bottlenecks [31]. The overhead generated by such activities may be not negligible, especially for forensic applications. As far as filtering is concerned, the sheer amount of traffic to be inspected with high-speed networks implies the recourse to specialized

490

hardware. Field-Programmable Gate Arrays (FPGAs) combine power and flexibility and might be advantageously used to this purpose [41]. This will create additional constraints for network function placement which can be exploited to reduce the complexity of TME. 5.6. Peering and topology

495

The Internet is the interconnection of over 40,000 sovereign entities known as Autonomous Systems (ASes). Traffic is routed in accordance with the complex routing policies of each participating network, along with the topological 19

Page 20 of 31

structure of the interdomain network. It should be kept in mind that the abstraction of ASes as atomic nodes in a network hides a lot of significant detail about the real routing structure, which depends on finer-grained aspects [42].

ip t

500

The different connectivity structures associated with virtual or logical connec-

cr

tions are shaped by technological, economic, and societal forces and evolve in response to external and internal signals and responses. Obtaining a complete

505

us

picture of such elements is difficult, because ASes are reluctant to divulge what they consider privileged information providing competitive advantages, including both technological choices (the internal topological structure, availability of

an

backup paths, routing strategies) and commercial details (customers and their contracts).

An important goal that ISPs may wish to pursue is control and optimization of routing in order to allow them to shift the traffic inside and outside

M

510

their network in the most efficient way. Lutu et al. [43] showed that customer ISPs can control traffic by strategic disaggregation, that consists in selectively

d

announcing different fragments of the assigned address block to disjoint subsets

515

te

of neighbors. Due to asymmetries in traffic sources and to the 95th percentile billing, customer ISPs can even reduce the monthly bill paid to their transit

Ac ce p

providers.

NVF and SDN increase the degree of control that operators may exercise

over their traffic, even though offloading it to other network may raise security concerns. The diffusion of NVF-based SDN-enabled networks may affect the

520

global network topology. In this respect, a reflection on a trend that is being observed in the Internet may be insightful. The evolution in the Internet economic ecosystem includes two trends: One is toward a surge in the recourse to peering and the other is toward a reduction in the number of intermediary organizations on Internet paths (a phenomenon known as flattening). The re-

525

lated issues have been raised in the context of peering, in a thorough discussion of remote peering [44], where a network whose infrastructure does not reach a shared location for interconnection uses a layer-2 intermediary to connect and peer with other networks. When layer-2 connections are used to remotize links, 20

Page 21 of 31

it is worth noticing that pure layer-3 modeling ignores the presence of some 530

of the intermediaries, although explicit discovery mechanism may be used to

ip t

reveal otherwise hidden Multiprotocol Label Switching (MPLS) tunnels [45].

Among the considerations made by Castro et al. in this respect, we report here

cr

two, which are relevant to the context discussed here. First, the hidden layer-2 intermediaries might not be easily accountable for delaying or dropping traffic,

monitoring of it, attempt to retrieve privileged information about the structure

us

535

and organization of tenants’ networks, or, much worse, expose traffic to other entities. Moreover, the analysis at layer 3 makes difficult to assess the real de-

an

gree of reliability of a network structure, since the same resources may be used to provide interconnection at both layers. 5.7. Traffic matrix completion

M

540

The notion of independence of traffic matrix entries, implicit in gravity models, has been questioned in real interdomain traffic. A line of research has used

d

the observation that static traffic matrices have been empirically shown to have

545

te

low effective rank, and hence high spatial correlation. In other words, knowledge of a few entries may be sufficient to infer the entire matrix. Consequently, techniques such as Principal Components Regression could be advantageously

Ac ce p

used in the inference. In particular, an interesting application involves inferring characteristics of traffic that an ISP cannot observe (because it flows entirely outside its network), starting from link measurements [46]. This problem is

550

termed traffic matrix completion [47]. This is especially important since many of the factors an ISP has to evaluate when deciding whether a new peering agreement should be initiated involve knowledge of traffic that the ISP is unable to see [6]. The extent to which the introduction of NFV and SDN will influence the degree of independence between traffic matrix entries is a significant factor

555

worth of investigation. As an example of the aspects related to NFV which should be taken account when estimating a traffic matrix, Fig. 2 portrays two different scenarios for Customer Premises Network Virtualization, where the traffic matrix will most likely have different characteristics in the two imple21

Page 22 of 31

mentations. In the upper scenario, VNFs are allocated at the SP level, whereas 560

in the lower scenario, VNFs are allocated entirely within customer premises.

ip t

The traffic exchanged will be different in quantity and quality, because in the

first case filters will operate upstream while in the second case all traffic will

LAN

us

cr

cross the link.

NID

VNF VNF Branch

an

VNF VNF

VNF VNF

VNF

M

LAN

Service Provider

VNF VNF

d

Branch

te

Figure 2: Two possible implementations for Customer Premises Network Virtualization.

Ac ce p

5.8. Pricing models 565

Understanding how traffic matrices—and methods for their estimation—will

evolve with SDN-supported NVF-based networks is also important because traffic volumes are one of the factors influencing transport pricing. In turn, pricing levels determine whether or not new connections and peering agreements are establishment or not, shaping the network topology. An extensive literature dis-

570

cusses pricing models and tactics and their impact on network topology. Faratin et al. [4] introduced the classical distinction of ISPs into Eyeball ISPs–those providing last-mile access–and Content ISPs, specialized in providing connectivity (and hosting) to content providers. Ma et al. [48] devised a game-theoretic approach and extended the pricing model to encompass Transit ISPs. In an

575

effort to explain the evolution of the Internet topology as the result of a revenue

22

Page 23 of 31

optimization process on part of the ASes, Corbo et al. [49] suggested a diffusion process based on an utility function that incorporates benefits for traffic

ip t

routed, congestion costs, and payment transfers. In [50], the economics of ex-

change points were analyzed with reference to volumes and QoS requirements. An investigation of the profits yielded by tiered pricing in the wholesale tran-

cr

580

sit market, and of whether better bundling strategies might exist has been the

us

subject of [51]. A noteworthy finding is that the practice of pricing traffic in contractual tiers based only on the cost of carrying the traffic (e.g., offering a discount for local traffic) is suboptimal. ISPs can achieve near-optimal profits by structuring tiered contracts with a few tiers according to both traffic cost

an

585

and demand. The raising demand for end-to-end connections with guaranteed quality stimulated also a line of research in terms of contract types. Karaoglu

contracts with bailout options. 590

M

et al. [52], for example, suggested a contracting mechanism based on forward

When evaluating the pricing policies in the business ecosystem enabled by

d

NFV, results established by analyzing the relationship between pricing and de-

te

mand in cloud services can point to interesting direction for research, since many of these results are likely to hold also in the NFV business model. Optimally

Ac ce p

pricing cloud resources to improve revenue while not discouraging demand is a 595

challenging task, especially in consideration of the need to dynamically adjust prices to meet sudden changes in demand and of the perishable nature of resources [53]. For an IaaS provider, the optimal allocation of available resources to pricing plans has been recently examined in [54]

6. Conclusions

600

Decisions that network operators have to make regarding the evolution of

their infrastructure depend on detailed and accurate predictions of the traffic that will be carried. An increase in volume and complexity of traffic demand can have substantial effects on the architecture of the network that will service it. Estimation of traffic quantities is a complicated task that has required the

23

Page 24 of 31

605

development of advanced traffic models to reduce complexity to a manageable level. The information available within a traffic matrix is extremely valuable

ip t

for many traffic engineering tasks such as routing and load balancing, network

provisioning and dimensioning, as well as restoration/failover strategies. A clear

610

pacity planning network growth and fault diagnosis.

cr

knowledge on both the size and locality of traffic flows is fundamental for ca-

us

With the advent of NFV and SDN, traffic flows may change dramatically, as entirely new actors enter the business ecosystem and traditional players may exchange traffic between them in unprecedented ways. Offloading of functions

615

an

to a cloud, proactive caching, dynamic network reconfiguration, a boost in the ability to control traffic (to various purposes, including expenditure cuts), and the stringent need to protect assets and guarantee isolation are among the fac-

M

tors that will affect traffic matrices. The assumptions of at least some of the estimation models may need to be revisited in the light of these changes. In addition, to validate the evolved models, the scientific community will need new datasets, which may be difficult to obtain given the unwillingness of operators

d

620

te

to reveal traffic details. We listed the principal transformations induced by NFV and SDN and discussed their potential effect for TME, looking at the problem

Ac ce p

from several points of view, including engineering and econometric perspectives.

References

625

[1] P. Tune, M. Roughan, Internet traffic matrices: A primer, Vol. 1 of ACM SIGCOMM, Springer, 2013.

[2] D. Alderson, H. Chang, M. Roughan, S. Uhlig, W. Willinger, The many facets of Internet topology and traffic, Networks and Heterogeneous Media 1 (4) (2006) 569–600.

630

[3] V. Erramill, M. Crovella, N. Taft, An independent-connection model for traffic matrices, in: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ACM, 2006, pp. 251–256.

24

Page 25 of 31

[4] P. Faratin, D. Clark, P. Gilmore, S. Bauer, A. Berger, W. Lehr, Complexity of Internet interconnections: Technology, incentives and implications for policy, in: in Proc. 35th Res. Conf. Commun., Inf. Internet Policy (TPRC,

ip t

635

2007.

cr

[5] R. Guerzoni, et al., Network Functions Virtualisation: an introduction,

benefits, enablers, challenges and call for action – introductory white paper,

640

us

in: SDN and OpenFlow World Congress, 2012.

[6] A. Lodhi, N. Laoutaris, A. Dhamdhere, C. Dovrolis, Complexities in Inter-

an

net peering: Understanding the “black” in the “black art”, in: 2015 IEEE Conference on Computer Communications (INFOCOM), IEEE, 2015, pp. 1778–1786.

645

M

[7] S. Yi, C. Li, Q. Li, A survey of fog computing: concepts, applications and issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, ACM,

d

2015, pp. 37–42.

[8] O. Goldschmidt, Isp backbone traffic inference methods to support traffic

te

engineering, in: Internet Statistics and Metrics Analysis (ISMA) Workshop,

Ac ce p

2000, pp. 1063–1075. 650

[9] C. Tebaldi, M. West, Bayesian inference on network traffic using link count data, Journal of the American Statistical Association 93 (442) (1998) 557– 573.

[10] J. Cao, D. Davis, S. Vander Wiel, B. Yu, Time-varying network tomography: router link data, Journal of the American statistical association

655

95 (452) (2000) 1063–1075.

[11] M. Roughan, Y. Zhang, W. Willinger, L. Qiu, Spatio-temporal compressive sensing and Internet traffic matrices (extended version), IEEE/ACM Transactions on Networking 20 (3) (2012) 662–676. [12] Y. Zhang, M. Roughan, C. Lund, D. L. Donoho, Estimating point-to-

660

point and point-to-multipoint traffic matrices: an information-theoretic 25

Page 26 of 31

approach, IEEE/ACM Transactions on Networking (TON) 13 (5) (2005)

ip t

947–960. [13] Z. Hu, Y. Qiao, J. Luo, Coarse-grained traffic matrix estimation for data

665

cr

center networks, Computer Communications 56 (2015) 25–34.

[14] E. Barbierato, G.-L. D. Rossi, M. Gribaudo, M. Iacono, A. Marin, Exploiting product forms solution techniques in multiformalism modeling,

us

Electronic Notes in Theoretical Computer Science 296 (0) (2013) 61 – 77. doi:http://dx.doi.org/10.1016/j.entcs.2013.07.005.

670

an

[15] H. Chang, S. Jamin, Z. M. Mao, W. Willinger, An empirical approach to modeling inter-AS traffic matrices, in: Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, USENIX Association, 2005,

M

pp. 12–12.

[16] A. Thyagaturu, A. Mercian, M. P. McGarry, M. Reisslein, W. Kellerer,

IEEE Communications Surveys Tutorials.

te

675

d

Software Defined Optical Networks (SDONs): A comprehensive survey,

[17] E. M. Airoldi, A. W. Blocker, Estimating latent processes on a network

Ac ce p

from indirect measurements, Journal of the American Statistical Association 108 (501) (2013) 149–164.

[18] A. Hyv¨ arinen, E. Oja, Independent component analysis: algorithms and

680

applications, Neural networks 13 (4) (2000) 411–430.

[19] A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, C. Diot, Traffic matrix estimation: Existing techniques and new directions, ACM SIGCOMM Computer Communication Review 32 (4) (2002) 161–174.

[20] W. B. Norton, Internet service providers and peering. 685

URL http://drpeering.net [21] P. Gill, M. Schapira, S. Goldberg, A survey of interdomain routing policies, ACM SIGCOMM Computer Communication Review 44 (1) (2013) 28–34. 26

Page 27 of 31

[22] R. Johari, J. N. Tsitsiklis, Routing and peering in a competitive Internet,

690

ip t

LIDS 2570, MIT (2003). [23] Y. Vardi, Network tomography: Estimating source-destination traffic in-

91 (433) (1996) 365–377.

cr

tensities from link data, Journal of the American statistical association

[24] M. L. Hazelton, et al., Network tomography for integer-valued traffic, The

695

us

Annals of Applied Statistics 9 (1) (2015) 474–506.

[25] P. Qin, B. Dai, B. Huang, G. Xu, K. Wu, A survey on network tomography

an

with network coding, IEEE Communications Surveys & Tutorials 16 (4) (2014) 1981–1995.

M

[26] M. Rabbat, R. Nowak, M. Coates, Multiple source, multiple destination network tomography, in: INFOCOM 2004. Twenty-third AnnualJoint Con700

ference of the IEEE Computer and Communications Societies, Vol. 3, IEEE,

d

2004, pp. 1628–1639.

te

[27] E. Zhao, L. Tan, A PCA based optimization approach for IP traffic matrix estimation, Journal of Network and Computer Applications 57 (2015) 12–

Ac ce p

20. 705

[28] F. Palmieri, An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks, Computer Networks 47 (2) (2005) 257–269.

[29] T. Taleb, Toward carrier cloud: Potential, challenges, and solutions, IEEE Wireless Communications 21 (3) (2014) 80–91.

710

[30] H. Hawilo, A. Shami, M. Mirahmadi, R. Asal, NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC), IEEE Network 28 (6) (2014) 18–26. [31] M. Liyanage, I. Ahmed, M. Ylianttila, J. L. Santos, R. Kantola, O. L. Perez, M. U. Itzazelaia, E. M. de Oca, A. Valtierra, C. Jimenez, Security 27

Page 28 of 31

715

for future software defined mobile networks, in: Next Generation Mobile Applications, Services and Technologies, 2015 9th International Conference

ip t

on, IEEE, 2015, pp. 256–264.

[32] A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, K. Hoffmann, Applying

720

cr

NFV and SDN to LTE mobile core gateways, the functions placement prob-

lem, in: Proceedings of the 4th workshop on All things cellular: operations,

us

applications, & challenges, ACM, 2014, pp. 33–38.

[33] A. Blenk, A. Basta, M. Reisslein, W. Kellerer, Survey on network virtual-

an

ization hypervisors for software defined networking, IEEE Communications Surveys & Tutorials 18 (1) (2016) 655–685. 725

[34] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, R. Boutaba,

M

Network function virtualization: State-of-the-art and research challenges, IEEE Communications Surveys & Tutorials 18 (1) (2015) 236–262.

d

[35] A. Basta, W. Kellerer, M. Hoffmann, K. Hoffmann, E.-D. Schmidt, A virtual SDN-enabled LTE EPC architecture: a case study for S-/P-Gateways functions, in: Future Networks and Services (SDN4FNS), 2013 IEEE SDN

te

730

Ac ce p

for, IEEE, 2013, pp. 1–7.

[36] S. Gebert, D. Hock, T. Zinner, P. Tran-Gia, M. Hoffmann, M. Jarschel, E.D. Schmidt, R.-P. Braun, C. Banse, A. K¨opsel, Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd

735

events, in: ACM SIGCOMM Computer Communication Review, Vol. 44, ACM, 2014, pp. 359–360.

[37] M. Peng, Y. Sun, X. Li, Z. Mao, C. Wang, Recent advances in cloud radio access networks: System architectures, key techniques, and open issues, IEEE Communications Surveys Tutorials PP (99).

740

[38] P. Iovanna, F. Ubaldi, T. Pepe, L. M. Contreras, V. Lopez, J. P. F.-P. Gimenez, Main challenges on WAN due to NFV and SDN: Multi-layer and multi-domain network virtualization and routing, in: Optical Network 28

Page 29 of 31

Design and Modeling (ONDM), 2015 International Conference on, IEEE,

745

ip t

2015, pp. 74–79. [39] A. Fischer, J. F. Botero, M. T. Beck, H. De Meer, X. Hesselbach, Virtual network embedding: A survey, IEEE Communications Surveys & Tutorials

cr

15 (4) (2013) 1888–1906.

[40] L. Cui, F. R. Yu, Q. Yan, When big data meets software-defined network-

750

us

ing: SDN for big data and big data for SDN, IEEE Network 30 (1) (2016) 58–65.

an

[41] L. Kekely, J. Kuˇcera, V. Puˇs, J. Koˇrenek, A. V. Vasilakos, Software defined monitoring of application protocols, IEEE Transactions on Comput-

M

ers 65 (2) (2016) 615–626.

[42] M. Roughan, W. Willinger, O. Maennel, D. Perouli, R. Bush, 10 lessons 755

from 10 years of measuring and modeling the Internet’s autonomous sys-

te

1810–1821.

d

tems, IEEE Journal on Selected Areas in Communications 29 (9) (2011)

[43] A. Lutu, M. Bagnulo, C. Pelsser, K. Cho, R. Stanojevic, An analysis of the

Ac ce p

economic impact of strategic deaggregation, Computer Networks 81 (2015) 760

147–163.

[44] I. Castro, J. C. Cardona, S. Gorinsky, P. Francois, Remote peering: More peering without Internet flattening, in: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, ACM, 2014, pp. 185–198.

765

[45] B. Donnet, M. Luckie, P. M´erindol, J.-J. Pansiot, Revealing mpls tunnels obscured from traceroute, ACM SIGCOMM Computer Communication Review 42 (2) (2012) 87–93. [46] V. Bharti, P. Kankar, L. Setia, G. G¨ ursun, A. Lakhina, M. Crovella, Inferring invisible traffic, in: Proceedings of the 6th International Conference

29

Page 30 of 31

770

on emerging Networking EXperiments and Technologies (CoNEXT), ACM,

ip t

2010, p. 22. [47] G. G¨ ursun, M. Crovella, On traffic matrix completion in the Internet, in:

Proceedings of the 2012 ACM conference on Internet measurement confer-

775

cr

ence, ACM, 2012, pp. 399–412.

[48] R. T. Ma, D. M. Chiu, J. C. Lui, V. Misra, D. Rubenstein, On cooper-

us

ative settlement between Content, Transit, and Eyeball Internet service providers, IEEE/ACM Transactions on networking 19 (3) (2011) 802–815.

an

[49] J. Corbo, S. Jain, M. Mitzenmacher, D. C. Parkes, An economicallyprincipled generative model of AS graph connectivity, in: INFOCOM 2009, IEEE, IEEE, 2009, pp. 2941–2945.

M

780

[50] S. Shakkottai, R. Srikant, Economics of network pricing with multiple ISPs, IEEE/ACM Transactions on Networking (TON) 14 (6) (2006) 1233–1245.

d

[51] V. Valancius, C. Lumezanu, N. Feamster, R. Johari, V. V. Vazirani, How

785

te

many tiers? Pricing in the Internet transit market, in: ACM SIGCOMM Computer Communication Review, Vol. 41, ACM, 2011, pp. 194–205.

Ac ce p

[52] H. T. Karaoglu, A. Gupta, M. Yuksel, W. Liu, K. Kar, Bailout forward contracts for edge-to-edge Internet services, Computer Communications 36 (17) (2013) 1708–1725.

[53] H. Xu, B. Li, et al., Dynamic cloud pricing for revenue maximization, in:

790

IEEE Trans. Cloud Comput, Citeseer, 2013.

[54] A. N. Toosi, K. Vanmechelen, K. Ramamohanarao, R. Buyya, Revenue maximization with optimal capacity control in infrastructure as a service cloud markets, IEEE Transactions on Cloud Computing 3 (3) (2015) 261– 274.

30

Page 31 of 31