• Aucun résultat trouvé

Application-aware Performance Optimization

This case aims to improve the network efficiency and QoE, e.g., video stalling

485

time, voice quality, etc., for each higher-layer application (e.g., YouTube, Skype) individually. For instance, operators employ deep packet inspection (DPI) to clas-sify each traffic flow and form the switch flow table rules (e.g., queue prioritization) in order to increase QoE in any IP-based operator network. So, the Application type and Application control protocol arguments are necessary to be identified.

490

Further, two arguments are further identified: Requested RAN information

argu-Application-aware Performance Optimization

① Application type (VoIP, Video conference)

② Application protocol (SIP, HTTP, SMTP, ...)

Target bearer

Target KPI (E-RAB

KPI Evaluation and Traffic profiling

⑥ Target user

Network element Network element ID Configuration eNB list Cell ID, TAI, ECGI Geo-region, eNB capability, Connected MME/GW

UE list C-RNTI, GUTI, S-TMSI Connected eNB, UE category, UE capability

① Target bearer

② Applied policy & config.

(QCI, ARP, MBR, GBR)

③ Network element

④ Target user Network status and

configuration

Parameter

QCI Bearer Packet Delay Packet Loss

1 GBR 100ms 10^-2

2 GBR 150ms 10^-3

3 GBR 50ms 10^-3

4 GBR 300ms 10^-6

5 Non-GBR 100ms 10^-6

6 Non-GBR 300ms 10^-6

7 Non-GBR 100ms 10^-3

8 Non-GBR 300ms 10^-6

9 Non-GBBR 300ms 10^-6

Priority ARP Pre-emption

Capability Pre-emption Vulunability

High 1~H Yes No

Medium H+1~M No Yes

Low M+1~15 No Yes

QCI mapping table

ARP mapping table QoS parameter database

Application type of target UE Application protocol of target UE Bearer ID

VoIP SIP 7

Application database

③ Application quality (GBR,

MBR, Loss Rate, Priority) ⑧ Target user

⑥ Operate period

⑦ Geo-region

④ Requested RAN info (TNL, Throughput, ...)

Figure 9: Application-aware Performance Optimization application ment and Application quality argument. The former argument is used to request RAN information by the MEC application and the latter one is for allocating new QoS policy on the application. The arguments of this case are given as:

Arguments:Application type, Application control protocol, Application

qual-495

ity, Requested RAN information (Throughput, Delay jitter, etc.), Update frequency, Operate period, Concerned geo-region, Target user

In Fig. 9, three MEC services (Analytics, KPI Evaluation and Traffic profiling, Network status and configuration) and two common services (RNIS, EPS) are in-volved. The RNIS and EPS take the input from the support services and output the

500

parameters to the MEC services after loop-up in their internal DB. Afterwards, the Analytics service and the KPI Evaluation and Traffic profiling service provide the control-plane and the data-plane value-added RAN information that is sent back to the MEC application. Finally, the Network status and configuration service enact the configuration and policy on the target bearer.

505

7 Conclusion

This paper presents a modular MEC server architecture for LTE/LTE-A that provides a rich network application development environment. It is composed of three main components, (1) MEC RAN abstraction interface in charge of establish-ing communication channels with the underlyestablish-ing networks, (2) MEC application

510

development framework provides services and high-level APIs for application de-velopment, and (3) MEC application offering value-added network service. Then, the proposed architecture is used to analyze the ETSI MEC use-cases, and de-rive the required network information and the mapping of the MEC services. The analysis reveals the interplay between MEC, RAN and cloud to enable a

slica-515

ble network for the future 5G system. Going forward, we plan to build a MEC proof-of-concept for RAN-aware video optimization and low-latency service for IoT leveraging OpenAirInterface software implementation of LTE/LTE-A system.

Acknowledgment

Research and development leading to these results has received funding from

520

the European Framework Program under H2020 grant agreement 671639 for the COHERENT project.

References

[1] M. Patel, J. Joubert, J. R. Ramos, N. Sprecher, S. Abeta, and A. Neal,

“Mobile-edge computing,”ETSI, 2014.

525

[2] Intel and Nokia-Siemens, “Increasing mobile operators’ value proposition with edge computing,” Intel and Nokia-Siemens, Tech. Rep., 2013.

[3] R. E. Hattachi, J. Erfanian, and B. Daly,NGMN 5G Initiative White Paper.

NGMN, 2015.

[4] ETSI MEC ISG, “Mec001: Mobile edge computing (mec) terminology,”

530

ETSI, Tech. Rep., 2015.

[5] ——, “Mec002: Mobile edge computing (mec) technical requirements,”

ETSI, Tech. Rep., 2015.

[6] ——, “Mec003: Mobile edge computing (mec) framework and reference ar-chitecture,” ETSI, Tech. Rep., 2015.

535

[7] ——, “Mec004: Mobile edge computing (mec) service scenarios,” ETSI, Tech. Rep., 2015.

[8] ——, “Mec005: Mobile edge computing (mec) poc framework,” ETSI, Tech.

Rep., 2015.

[9] D. Kreutz, F. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S.

Azodol-540

molky, and S. Uhlig, “Software-defined networking: A comprehensive sur-vey,”Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, 2015.

[10] ETSI, “Network Functions Virtualisation (NFV), White paper,” Tech. Rep., 2014.

[11] R. Schooler, “Transforming networks with nfv & sdn,” Intel Architecture

545

Group, 2013.

[12] N. Nikaein, E. Schiller, R. Favraud, K. Katsalis, D. Stavropoulos, I. Alyafawi, Z. Zhao, T. Braun, and T. Korakis, “Network store: Exploring slicing in future 5g networks,” inProceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, ser. MobiArch ’15, 2015.

550

[13] M. T. Beck, M. Werner, S. Feld, and S. Schimper, “Mobile edge computing:

A taxonomy,” inProc. of the Sixth International Conference on Advances in Future Internet. Citeseer, 2014.

[14] H. Chang, A. Hari, S. Mukherjee, and T. Lakshman, “Bringing the cloud to the edge,” inComputer Communications Workshops (INFOCOM WKSHPS),

555

2014 IEEE Conference on. IEEE, 2014, pp. 346–351.

[15] S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, “Replisom: Dis-ciplined tiny memory replication for massive iot devices in lte edge cloud,”

2015.

[16] M. T. Beck, S. Feld, A. Fichtner, C. Linnhoff-Popien, and T. Schimper,

“Me-560

volte: Network functions for energy-efficient video transcoding at the mobile edge,” inIntelligence in Next Generation Networks (ICIN), 2015 18th Inter-national Conference on. IEEE, 2015, pp. 38–44.

[17] L. Ramaswamy, L. Liu, and A. Iyengar, “Cache clouds: Cooperative caching of dynamic documents in edge networks,” inDistributed Computing Systems,

565

2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on.

IEEE, 2005, pp. 229–238.

[18] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” inProceedings of the first edition of the MCC work-shop on Mobile cloud computing. ACM, 2012, pp. 13–16.

570

[19] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for vm-based cloudlets in mobile computing,” Pervasive Computing, IEEE, vol. 8, no. 4, pp. 14–23, 2009.

[20] F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: A platform for internet of things and analytics,” in Big Data and Internet of Things: A

575

Roadmap for Smart Environments. Springer, 2014, pp. 169–186.

[21] K. Ha and M. Satyanarayanan, “Openstack++ for cloudlet deployment,”

School of Computer Science Carnegie Mellon University Pittsburgh, 2015.

Documents relatifs