簡易檢索 / 詳目顯示

研究生: 黃志楷
Chih-Kai Huang
論文名稱: 邊緣雲中基於網路功能虛擬化之服務緩存
Enabling NFV-based Service Cache in Edge Clouds
指導教授: 沈上翔
Shan-Hsiang Shen
口試委員: 沈上翔
Shan-Hsiang Shen
金台齡
Tai-Lin Chin
黃琴雅
Chin-Ya Huang
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 51
中文關鍵詞: 軟體定義網路5G行動網路多重接取邊緣運算網路功能虛擬化暫存替換策略
外文關鍵詞: Software-defined Networking, 5th Generation Mobile Networks, Multi-access Edge Computing, Network Functions Virtualization, Cache Replacement Policy
相關次數: 點閱:337下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在下一代5G網路中,網路組件和服務被虛擬化並在虛擬機或容器中運行。此外,利用將網路服務運行在更接近終端用戶的邊緣雲來減少端對端延遲。但是,邊緣雲中的計算資源有限,因此為了最大限度地減少總體服務的延遲,必須仔細決定在邊緣雲中應該提供哪些服務。在本文中,我們提出了一個名為Service Cache(S-Cache)的新框架,它自動暫存邊緣雲中流行的服務。此外,我們設計了一個新的暫存替換策略,來最大化暫存命中率。在我們的評估中,我們使用來自Google的真實日誌文件並選擇這些文件形成兩個數據集來評估性能。將我們的暫存替換策略與Greedy-Dual-Size-Frequency(GDSF),Least-Frequently-Used(LFU)和其他暫存策略進行了比較。實驗結果表明,暫存命中率平均提高了39%,並且暫存替換策略的平均延遲在這兩個數據集中平均降低了41%和38%,因此我們的方法優於其他現有的暫存策略,更適用於Multi-access Edge Computing的環境中。在實作中,S-Cache依靠OpenStack將服務克隆到邊緣雲,並使用OpenFlow來引導網路流量。我們還評估了將服務克隆到邊緣雲的成本,此實驗是使用我們所提出的框架和不同真實的服務下所測量出來之克隆成本並討論了從實驗結果中得出的結果。


    In next-generation 5G cellular networks, network components and services are virtualized and run either in virtual machines (VMs) or containers. Moreover, edge clouds (which are closer to end users) are leveraged to reduce end-to-end latency. However, the computational resources are limited in edge clouds. To minimize overall service latency, it is crucial to determine carefully which services should be provided in edge clouds. In this paper, we propose a novel framework named Service Cache (S-Cache), which automatically caches popular services in edge clouds. In addition, we design a new cache replacement policy to maximize the cache hit rates. Our evaluation used real log files from Google to form two datasets to evaluate the performance. The proposed cache replacement policy was compared with other policies such as greedy-dual-size-frequency (GDSF) and least-frequently-used (LFU). The experimental results show that the cache hit rates are improved by 39\% on average, and the average latency of our cache replacement policy decreases 41\% and 38\% on average in these two datasets. This indicate that our approach is superior to other existing cache policies and is more suitable in multi-access edge computing environments. In the implementation, S-Cache relies on OpenStack to clone the service to edge clouds and uses OpenFlow to direct network traffic. We also evaluate the cost of cloning the service to an edge cloud. The cloning cost of various real applications is studied by experiments under the presented framework and different physical environments.

    中文摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Table of contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3 Efficient Caching in S-Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.1 Overview of S-Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.2 Problem Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.3 Timing to Clone Services . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.4 Cache Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.5 An example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4 Evaluations of Cache Policy Performance . . . . . . . . . . . . . . . . . . . . 16 4.1 Test Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4.2 Experiment Setup of Cache Policy Performance . . . . . . . . . . . . . . 17 4.3 Evaluation Results of Cache Policy Performance . . . . . . . . . . . . . 19 5 Cost of Cloning Services with Real Implementation . . . . . . . . . . . . . . . 24 5.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.2 Experimental Setup of Cloning Cost . . . . . . . . . . . . . . . . . . . . 26 5.3 Experimental Results of Cloning Cost . . . . . . . . . . . . . . . . . . . 30 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    [1] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, and R. Boutaba,
    “Network function virtualization: State-of-the-art and research challenges,” IEEE
    Communications Surveys & Tutorials, vol. 18, no. 1, pp. 236–262, 2016.
    [2] S. Sezer, S. Scott-Hayward, P. K. Chouhan, B. Fraser, D. Lake, J. Finnegan,
    N. Viljoen, M. Miller, and N. Rao, “Are we ready for sdn? implementation challenges
    for software-defined networks,” IEEE Communications Magazine, vol. 51,
    no. 7, pp. 36–43, 2013.
    [3] Next Generation Mobile Networks Alliance, “5g white paper,” 2015.
    [4] S. Kekki, W. Featherstone, Y. Fang, P. Kuure, A. Li, A. Ranjan, D. Purkayastha,
    F. Jiangping, D. Frydman, G. Verin, K.-W. Wen, K. Kim, R. Arora, A. Odgers,
    L. M. Contreras, and S. Scarpina, “MEC in 5G networks,” ETSI white paper, pp. 1–
    28, 2018.
    [5] A. Gember, R. Viswanathan, C. Prakash, R. Grandl, J. Khalid, S. Das, and A. Aditya,
    “OpenNF: Enabling innovation in network function control,” in ACM SIGCOMM
    Computer Communication Review, vol. 44, pp. 163–174, 2014.
    [6] A. Gember, A. Krishnamurthy, S. S. John, R. Grandl, X. Gao, A. Anand, T. Benson,
    V. Sekar, and A. Akella, “Stratos: A network-aware orchestration layer for virtual
    middleboxes in clouds,” arXiv preprint arXiv:1305.0209, 2013.
    [7] A. Shrivastwa, S. Sarat, K. Jackson, C. Bunch, E. Sigler, and T. Campbell, Open-
    Stack: Building a Cloud Environment. Packt Publishing, 2016.
    [8] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford,
    S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation in Campus Networks,”
    ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
    [9] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,”
    IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
    [10] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “Mobile edge computing:
    Survey and research outlook,” arXiv preprint arXiv, vol. 1701, 2017.
    [11] T. Zhao, S. Zhou, X. Guo, Y. Zhao, and Z. Niu, “A cooperative scheduling scheme of
    local cloud and internet cloud for delay-aware mobile cloud computing,” in Globecom
    Workshops (GC Wkshps), 2015 IEEE, pp. 1–6, IEEE, 2015.
    [12] Y. Ge, Y. Zhang, Q. Qiu, and Y.-H. Lu, “A game theoretic resource allocation for
    overall energy minimization in mobile cloud computing system,” in Proceedings of
    the 2012 ACM/IEEE international symposium on Low power electronics and design,
    pp. 279–284, ACM, 2012.
    [13] T. Q. Dinh, J. Tang, Q. D. La, and T. Q. Quek, “Offloading in mobile edge computing:
    Task allocation and computational frequency scaling,” IEEE Transactions on
    Communications, vol. 65, no. 8, pp. 3571–3584, 2017.
    [14] J. Xu, L. Chen, and S. Ren, “Online learning for offloading and autoscaling in energy
    harvesting mobile edge computing,” IEEE Transactions on Cognitive Communications
    and Networking, vol. 3, no. 3, pp. 361–373, 2017.
    [15] Y. Sun, S. Zhou, and J. Xu, “Emm: Energy-aware mobility management for mobile
    edge computing in ultra dense networks,” IEEE Journal on Selected Areas in
    Communications, vol. 35, no. 11, pp. 2637–2646, 2017.
    [16] L. Chen, S. Zhou, and J. Xu, “Energy efficient mobile edge computing in dense cellular
    networks,” in 2017 IEEE International Conference on Communications (ICC),
    pp. 1–6, May 2017.
    [17] R. Kaewpuang, D. Niyato, P. Wang, and E. Hossain, “A framework for cooperative
    resource management in mobile cloud computing,” IEEE Journal on Selected Areas
    in Communications, vol. 31, no. 12, pp. 2685–2700, 2013.
    [18] M. S. Elbamby, M. Bennis, and W. Saad, “Proactive edge computing in latencyconstrained
    fog networks,” in Networks and Communications (EuCNC), 2017 European
    Conference on, pp. 1–6, IEEE, 2017.
    [19] R. Yu, J. Ding, S. Maharjan, S. Gjessing, Y. Zhang, and D. H. Tsang, “Decentralized
    and optimal resource cooperation in geo-distributed mobile cloud computing,” IEEE
    Transactions on Emerging Topics in Computing, vol. 6, no. 1, pp. 72–84, 2018.
    [20] D. Huang, P. Wang, and D. Niyato, “A dynamic offloading algorithm for mobile
    computing,” IEEE Transactions on Wireless Communications, vol. 11, no. 6,
    pp. 1991–1995, 2012.
    [21] J. Liu, Y. Mao, J. Zhang, and K. B. Letaief, “Delay-optimal computation task
    scheduling for mobile-edge computing systems,” in Information Theory (ISIT), 2016
    IEEE International Symposium on, pp. 1451–1455, IEEE, 2016.
    [22] J. Xu, L. Chen, and P. Zhou, “Joint service caching and task offloading for mobile
    edge computing in dense networks,” arXiv preprint arXiv:1801.05868, 2018.
    [23] J. Poderys, M. Artuso, C. M. O. Lensbøl, H. L. Christiansen, and J. Soler, “Caching
    at the Mobile Edge: A Practical Implementation,” Ieee Access, vol. 6, pp. 8630–
    8637, 2018.
    [24] S. Mller, O. Atan, M. van der Schaar, and A. Klein, “Context-aware proactive content
    caching with service differentiation in wireless networks,” IEEE Transactions
    on Wireless Communications, vol. 16, pp. 1024–1036, Feb 2017.
    [25] T. Wang, L. Song, and Z. Han, “Dynamic femtocaching for mobile users,” in 2015
    IEEEWireless Communications and Networking Conference (WCNC), pp. 861–865,
    March 2015.
    [26] P. Cao and S. Irani, “Cost-aware www proxy caching algorithms,” in Usenix symposium
    on internet technologies and systems, vol. 12, pp. 193–206, 1997.
    [27] C. Reiss, J. Wilkes, and J. L. Hellerstein, “Google cluster-usage traces: format +
    schema,” tech. rep., Google Inc., Nov. 2011. Revised 2014-11-17 for version 2.1.
    Posted at https://github.com/google/cluster-data.
    [28] L. Cherkasova, Improving WWW proxies performance with greedy-dual-sizefrequency
    caching policy. Hewlett-Packard Laboratories, 1998.
    [29] M. Abrams, C. R. Standridge, G. Abdulla, E. A. Fox, and S. Williams, “Removal
    policies in network caches for World-Wide Web documents,” in ACM SIGCOMM
    Computer Communication Review, vol. 26, pp. 293–305, 1996.
    [30] Amazon Web Services, “Alexa top sites.”
    [31] C.-K. Huang and S.-H. Shen, “Prototype of s-cache,” 2018.
    [32] Micron, “Crucial mx500 ssd,” 2018.
    [33] NGINX, “Nginx—high performance load balancer, web server, and reverse,” 2018.
    41

    無法下載圖示 全文公開日期 2024/08/22 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE