Computer Science ›› 2020, Vol. 47 ›› Issue (9): 246-251.doi: 10.11896/jsjkx.190800008

• Computer Network • Previous Articles     Next Articles

NFV Memory Resource Management in 5G Communication Network

SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya   

  1. Chongqing Key Laboratory of Computer Network and Communication Technology,Chongqing University of Posts and
    Telecommunications,Chongqing 400000,China
  • Received:2019-08-02 Published:2020-09-10
  • About author:SU Chang,born in 1979,Ph.D,professor,is a member of China Computer Federation (CCF).Her main research interests include QoS prediction,resource management,recommendation and prediction in location-based social network.
    XIE Xian-zhong,born in 1966,Ph.D,professor.His main research interests include cognitive radio network,interference cancellation and MIMO techno-logy,green communication network.
  • Supported by:
    Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K201800603).

Abstract: ith the deepening of 5G research and the advancement of commercialization,it also brings various challenges.Among them,the resource management of 5G communication system is a key challenge for the research of 5G network.Network Function Virtualization (NFV) technology provides key support for 5G implementation,and it also introduces new research directions for 5G resource management issues.However,resource management in network function virtualization scenarios is a more complex issue.In particular,different placements of virtual network functions have different effects on their performance.Firstly,this paper analyzed and studied the impact of NFV resource allocation methods and NFV placement on performance.On this basis,this paper mainly discussed machine learning based on the example proposed by Knowledge Definition Network (KDN).The technology is applied to the study of virtual network function memory resource management,constructing a neural network learning model,and predicting memory resource consumption.Secondly,the focus of this paper is on the extraction of the characteristics of the input traffic.The traffic is mainly represented by a set of features,which represent small batches of information from the data link layer to the transport layer,where the memory consumption is from the hypervisor.The average memory consumption of the batch is obtained on the performance monitoring tool.Finally,this paper aimed to manage memory resources by using neural networks to predict memory resource consumption.

Key words: 5G Communication network, Machine learning, Memory consumption, Network function virtualization, Resource management

CLC Number: 

  • TP183
[1] NGMN A.5G White Paper[OL].NGMN Industry Conferenceand Exhibition.https://www.ngmn.org/work-programme/5g-white-paper.html.
[2] GARNER J,MESTRES A,ALARCON E,et al.Machine learning-based network modeling:An artificial neural network model vs a theoretical inspired model[C]//Ninth International Conference on Ubiquitous & Future Networks.IEEE,2017:522-524.
[3] LIOTOU E,ELSHAER H,SCHATZ R,et al.Shaping QoE in the 5G ecosystem[C]//7th International Workshop on Quality of Multimedia Experience (IEEE QoMEX).IEEE,2015:1-6.
[4] ZHANG X X,WU C,LI Z P,et al.Proactive VNF Provisioning with Multi-timescale Cloud Resources:Fusing Online Learning and Online Optimization[C]//IEEE Conference on Computer Communications.IEEE,2017.
[5] AKYILDIZ I F,NIE S,LIN S C,et al.5G Roadmap:10 Key Enabling Technologies[J].Computer Networks,2016,106:17-48.
[6] MESTRES A,HIBBETT M J,ESTRADA G,et al.Knowledge-Defined Networking[J].ACM SIGCOMM Computer Communication Review,2017,47(3):2-10.
[7] NGUYEN T M,FDIDA S,PHAM T M.A comprehensive resource management and placement for network function virtualization[C]//Network Softwarization.IEEE,2017:1-9.
[8] MOENS H,TURCK F D.VNF-P:A model for efficient placement of virtualized network functions[C]//2014 10th International Conference on Network and Service Management (CNSM).IEEE Computer Society,2014:418-423.
[9] COHEN R,LEWIN-EYTAN L,NAOR J S,et al.Near optimal placement of virtual network functions[C]//IEEE Conference on Computer Communications.IEEE,2015:1346-1354.
[10] MENG X,PAPPAS V,ZHANG L.Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement[C]//2010 Proceedings IEEE on INFOCOM.IEEE,2010:1154-1162.
[11] MAO H,ALIZADEH M,ISHAIMENACHE,et al.ResourceManagement with Deep Reinforcement Learning[C]//15th ACM Workshop.ACM,2016:50-56.
[12] GHAZNAVI M,KHAN A,SHAHRIAR N,et al.Elastic virtual network function placement[C]//IEEE International Conference on Cloud Networking.IEEE,2015:255-260.
[13] KULKARNI S G,ZHANG W,HWANG J H,et al.NFVnice:Dynamic Backpressure and Scheduling for NFV Service Chains[C]//the Conference of the ACM Special Interest Group.ACM,2015:71-84.
[14] SUBRAMANYA T,RIGGIO R,RASHEED T.Intent-basedmobile backhauling for 5G networks[C]//International Conference on Network & Service Management.IEEE,2017:348-352.
[15] TSUZAKI Y,OKABE Y.Reactive configuration updating forIntent-Based Networking[C]//2017 International Conference on Information Networking (ICOIN).IEEE,2017:97-102.
[16] HYUN J,HONG J.Knowledge-defined networking using in-band network telemetry[C]//Asia-Pacific Network Operations and Management Symposium (APNOMS).2017:54-57.
[17] RUELAS A M R,ROTHENBERG C E.A Load BalancingMethod based on Artificial Neural Networks for Knowledge-defined Data Center Networking[C]//ACM Press the 10th Latin America Networking Conference.ACM,2018:106-109.
[18] RIOS L M,SAHINIDIS N V.Derivative-free optimization:a review of algorithms and comparison of software implementations[J].Journal of Global Optimization,2013,56(3):1247-1293.
[19] NAWI N M,KHAN A,REHMAN M Z.A New LevenbergMarquardt based Back Propagation Algorithm Trained with Cuckoo Search[J].Procedia Technology,2013,11:18-23.
[20] CHO K,MITSUYA K,KATO A.Traffic data repository at the WIDE Project[C]//Project Usenix Freenix Track.2000:263-270.
[1] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[2] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[3] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
[4] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[5] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[6] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[7] LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92.
[8] ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99.
[9] XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406.
[10] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[11] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[12] XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286.
[13] LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262.
[14] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
[15] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!