Next Article in Journal
Polymer Optical Fiber-Based Integrated Instrumentation in a Robot-Assisted Rehabilitation Smart Environment: A Proof of Concept
Next Article in Special Issue
Enhancing the Internet of Things with Knowledge-Driven Software-Defined Networking Technology: Future Perspectives
Previous Article in Journal
Probabilistic Updating of Structural Models for Damage Assessment Using Approximate Bayesian Computation
Previous Article in Special Issue
A Smart Microcontroller Architecture for the Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Traffic Engineering in an NFV Enabled IoT System †

by
Thi-Thuy-Lien Nguyen
1,2 and
Tuan-Minh Pham
3,4,*
1
University of Engineering and Technology, Vietnam National University, Hanoi 100000, Vietnam
2
Faculty of Information Technology, Hanoi National University of Education, Hanoi 100000, Vietnam
3
Faculty of Computer Science, Phenikaa University, Hanoi 12116, Vietnam
4
Phenikaa Institute for Advanced Study (PIAS), Phenikaa University, Hanoi 12116, Vietnam
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Nguyen, T.-T.-L.; Pham, T.-M. Optimization Model and Algorithm for Dynamic Service-Aware Traffic Steering in Network Functions Virtualization. In Proceedings of the 2018 IEEE Seventh International Conference on Communications and Electronics, Hue, Vietnam, 18–20 July 2018.
Sensors 2020, 20(11), 3198; https://doi.org/10.3390/s20113198
Submission received: 29 April 2020 / Revised: 27 May 2020 / Accepted: 2 June 2020 / Published: 4 June 2020
(This article belongs to the Special Issue The Impact of Emerging Technologies on Sensor-Based Systems/Solutions)

Abstract

:
The Internet of Things (IoT) is increasingly creating new market possibilities in several industries’ sectors such as smart homes, smart manufacturing, and smart cities, to link the digital and physical worlds. A key challenge in an IoT system is to ensure network performance and cost-efficiency when a plethora of data is generated and proliferated. The adoption of Network Function Virtualization (NFV) technologies within an IoT environment enables a new approach of providing services in a more agile and cost-efficient way. We address the problem of traffic engineering with multiple paths for an NFV enabled IoT system (vIoT), taking into account the fluctuation of traffic volume in various time periods. We first formulate the problem as a mixed linear integer programming model for finding the optimal solution of link-weight configuration and traffic engineering. We then develop heuristic algorithms for a vIoT system with a large number of devices. Our solution enables a controller to adjust a link weight system and update a flow table at an NFV switch for directing IoT traffic through a service function chain in a vIoT system. The evaluation results under both synthetic and real-world datasets of network traffic and topologies show that our approach to traffic engineering with multiple paths remarkably improves several performance metrics for a vIoT system.

1. Introduction

The Internet of Things (IoT) is an enabler of the digital revolution through which a variety of things (e.g., people, actuators, sensors) integrated over the Internet are able to interact worldwide. IoT systems have been commonly implemented in diverse fields such as the climate, education and engineering with many applications. A smart home network, for example, utilizes data gathered by a collection of home sensors and is exchanged by the cities’ information network to enhance the quality of living and energy use. As a number of connected IoT devices are growing at a breathtaking pace, the data produced, processed, or distributed by IoT devices clearly receives undivided attention. Moreover, with a large number of users in IoT networks, the usage of an independent link with each user will contribute to an unreasonable demand with Internet connectivity. Therefore, a network architecture with effective data transfer is highly required for an IoT network.
The adoption of Network Function Virtualization (NFV) technologies within an IoT environment enables a new approach of providing services in a more agile and cost-efficient way. Compared to today’s network infrastructure based on specialized appliances, Network Functions Virtualization (NFV) based on network softwarization and cloudification has emerged as a promising approach to building agile networks and reducing capital and operational expenditures. NFV enables service providers to rapidly launch and release on-demand IoT services in a flexible way. Hence, we believe that Network Functions Virtualization (NFV) is a promising technology that could help to address these challenges and leverage the IoT architecture in the Cloud era. In the system under our consideration, a network function (e.g., deep packet inspection (DPI), firewalls) or an IoT function (e.g., measurement, home automation) can be installed as software on a standardized server and linked to build an IoT service. A flow of IoT traffic is driven through a service function chain (SFC) consisting of several virtual functions (VNF) in an ordered sequence [1]. We refer to such a system as an NFV enabled IoT system (vIoT).
In this paper, we present an efficient solution to traffic engineering for improving the performance of a vIoT system. As a VNF instance is dispersed in an infrastructure, directing a flow of IoT traffic through an SFC and retaining good network performance and cost-efficiency is challenging, especially in the fluctuation of traffic volume. We aim to find a traffic engineering (TE) solution with equal-cost multipath (ECMP) for improving the performance of a vIoT system taking into account the instability of traffic demand in various periods. ECMP is a multipath routing technique that evenly splits the overall traffic passing through a network node into several minimum-cost routes. We first maximize the ratio of total satisfied traffic by considering different types of service demands, named differentiated demands. More specifically, we divide service demands into two types, where the system fully satisfies demands belonging to the first type and serves those associated with the second type with its best efforts. We then minimize the total routing cost when taking into account the dynamics of traffic demands over multiple time periods. Finally, we consider both differentiated demands and multiple time periods for optimizing multiple objectives in a TE solution.
A detailed discussion of the literature on the use of NFV for IoT has been provided in Section 2. As discussed in Section 2, much of the existing work on vIoT is concerned with the architecture design of an NFV enabled IoT system [2,3,4]. Some works have considered the performance of vIoT [5,6,7,8]. However, none of these works have addressed the optimization problem of multipath routing in a vIoT system taking into account the fluctuation of demand volume and the differentiated demands, which is important for improving the performance of a vIoT system.
The major contributions of this paper are as follows:
  • We introduce the TE problem in a vIoT system and provide a mixed linear integer programming model (MILP) for finding the optimal solution of the problem. Our solution takes into consideration the ECMP routing technique, SFC, the different types of requests, and the fluctuation of traffic volume in various periods.
  • In a large scenario, we suggest an effective heuristic algorithm for addressing the TE problem in a vIoT system with a large number of devices. The algorithm offers a link metric vector and a traffic splitting solution to optimize the overall traffic served and reduce the total routing cost concerning the categories of service demands, the dynamics of traffic demands, and the usable system capacity.
  • We use two real network datasets and two synthetic network topologies in evaluation scenarios. We compare a number of our TE solutions, taking into consideration differentiated demands and different time periods in three major performance metrics including the routing cost, the total satisfied traffic, and the number of accepted demands. The evaluation results show that our proposal for traffic engineering of a vIoT system performs better than a scheme that ignores the classification and the fluctuation of demand volume.
The remainder of this paper is organized as follows. Section 2 provides a brief overview of related works. We describe the system and problem in Section 3. The formulation of the TE problem is presented in Section 5. We propose a heuristic algorithm for solving the large scale problem in Section 4. We evaluate our proposed model and algorithm in Section 6. Finally, conclusions are stated in Section 7.

2. Related Work

NFV is an attractive research area by its flexibility and agility in network designing via virtualization technology application. In recent years, researchers have studied many issues raised in NFV, including SFC routing, VNF placement, resource management, and orchestration. For example, in [9], Medhat et al. address the VNF implementation and migration issue when an instance of service functions becomes overwhelmed by seeking an appropriate way to redirect traffic flows. In [10], Eramo et al., present three algorithms that tackle VNF instance and SFC routing in reaction to changes in the workload. Some other platforms are also developed to enhance packet processing on generic servers [11,12]. In [13], Kulkarni et al. propose the NFVnice framework to improve NF performance and schedule resource efficiently, fairly and dynamically. In [14], Sun et al. also investigate to improve NFV performance by applying network function parallelism. In [15], Cotroneo et al. investigate overload control and propose a novel framework (named NFV-Throttle) to protect NFV services from failures due to an excess of traffic in the short term and to preserve the QoS of traffic flows admitted in the network. The work of [16] presents a deployment algorithm for service chains that optimizes performance by minimizing the actual cost of virtual switching. More research results about the NFV performance are presented in [17,18,19,20,21].
The scientific literature has addressed different aspects that highlight how NFV can be an enabler for future IoT platforms. For example, Ojo et al. propose an SDN-IoT architecture with NFV implementation where traditional gateways are replaced with SDN-enabled gateways [22]. Wang et al., propose the use of NFV for creating a network slice in an IoT environment and implement an IoT scenario with multiflow transmissions [23]. Mouradian et al. follow a similar objective [3]. However, they focus on the design of a distributed IoT gateway using NFV and SDN technologies for on-the-fly service provisioning in disaster management. Differently, Fu et al. design an NFV-enabled IoT framework where complex VNFs are divided into smaller VNF components, and a deep reinforcement learning scheme is used for dynamic SFC embedding [24]. In [2], Diaz et al. present some IoT challenges for the effective implementation of IoT services and highlight the use of network cloudification and softwarization that is essential to face the IoT revolution. In [25], Verma et al. investigate the resource utilization problem in a cloud environment for optimizing the allocation of virtual machines (VM) and the consolidation process. The proposed approaches can reduce remarkably the energy consumption, total VM migration, and host shutdown while maintaining the system performance. For a survey paper related to the evolution of IoT and NFV, we refer readers to the work by Farris et al. [4].
The above works focus on the architecture design of vIoT. However, they did not consider efficient algorithms to properly address, among other potential issues, service placement, scaling, and load balancing aspects, which are critical aspects affecting the performance of vIoT. In [5], Kaiwartya et al., study the optimization problem of fault tolerance for wireless sensor networks in IoT. The authors propose an adapted nondominated sorting based genetic algorithm for solving the optimization problem. However, the paper focuses on the access layer with the virtualization of sensors rather than the incorporation of NFV and IoT. Xu et al. consider the optimization problem of VNF placement for IoT applications in the mobile edge clouds. They develop both optimization models and algorithms for a special case of the problem with the bandwidth resource constraint [8]. However, they ignored the traffic fluctuations, the maximum achievable flow, and SFC constraints, which are essential for providing the performance and agility of a vIoT system. There are some research works that aim to obtain the maximum traffic flow in NFV systems. In [6], Jia et al., investigate to minimize the operational cost and maximize network throughput. Specifically, the authors consider the consumption of computing resource for the implementation of a service chain and that of bandwidth resource for data routing. They address the optimization problem of operational cost and network throughput for a sequence of requests. In [7], Sallam et al., study the SFC-constrained shortest path problem in order to find the maximum feasible flow from a source to a destination. Several studies have considered the dynamics of traffic rate in NFV networks. In [26], Ma et al., aim to minimize the overall traffic volume for a given flow when considering the variations of traffic volume after being processed by some network functions. In [27], Fei et al., consider the fluctuations of data traffic in the proactive VNF provisioning problem for NFV providers in order to minimize the cost incurred by inaccurate prediction and VNF deployment. However, the optimization model has not been provided, and multipath routing has not been considered.
To the best of our knowledge, no existing research has focused on traffic steering for improving the performance of a vIoT system taking into account multipath routing, the fluctuation of demand volume, and the differentiated demands. This paper is an extended version of our work presented at the 7th International Conference on Communications and Electronics (ICCE, 2018) [28]. Our work provides new results of optimization models and algorithms for traffic engineering in a vIoT system using multipath routing when taking into consideration the difference of service demand types and the combination of various demand types and time periods for optimizing the total satisfied traffic and reducing the network routing cost.

3. System Description

We study a vIoT system that provides IoT functions and network functions deployed at the application layer and the control layer as a service (Figure 1). In vIoT, a VNF is the software implementation of network functions and IoT functions, managed by NFV Management and Orchestration (MANO) [29]. In an NFV system, an end-to-end service can be composed of several virtual functions deployed in a cloud environment (Figure 3 in [29]). As the virtualization layer of NFV is responsible for enabling the software that implements the VNF (page 18 in [29]), it can be further classified as the control layer providing network functions and the application layer providing IoT functions. A flow of IoT traffic generated by sensors at the infrastructure layer can be processed in a sequence of virtual functions such as deep packet inspection at the control layer and smart metering at the application layer. We assume that the implementation of virtual functions at NFV nodes incurs costs, and data transmission at links interconnecting the nodes also incurs communication costs.
A service demand in vIoT is a request from customers for a service that may include several VNFs implementing IoT and network functions. To serve a service demand, NFV MANO finds a solution of resource allocation for the implementation of a SFC requested by the service demand and routes data traffic through the SFC, as illustrated in Figure 2. We consider ECMP, a widely multipath routing strategy, for improving the performance of a vIoT system.
Our first objective is to maximize the satisfied traffic throughput in vIoT. To achieve this purpose, we consider differentiated demands in the TE problem, called Problem 1—Traffic engineering under differentiated demands (ED). Specifically, we classify a set of service demands into two types. The system fully satisfies service demands belonging to the first type and serves those associated with the second type with its best efforts. Data traffic on a link is adjusted by optimizing the link weight system of the infrastructure. Our second objective is to minimize the network routing cost in vIoT. We consider multiple time periods in the TE problem, named Problem 2—Traffic engineering under multiple time periods (EP). Particularly, we take into account the fluctuation of data traffic demand in different time periods. Finally, we consider multiple optimization objectives in the TE problem in which we take into account both differentiated demands and multiple time periods, called Problem 3—Traffic engineering under differentiated demands and multiple time periods (EDP). In the next section, we state formally the above problems and formulate them as Mixed Integer Linear Program models for finding the optimal solution.

4. Optimization Models

4.1. System Formulation

We model a vIoT system as a directed graph G = ( V , E ) , where V is a set of n nodes and E is a set of k directed links. Let F be all VNFs available in the system. Node v V represents a commodity hardware device where one or more VNFs can be instantiated flexibly to serve demands. Node v has a limited capacity for instantiating VNFs and can support some functions in F. We use C 2 , v to denote the processing capacity of node v. Link e E is a connection between the starting node i e and the terminating node j e . Let C 1 , e denote the bandwidth capacity of link e.
We use D to represent a set of m service demands requested by tenants. Demand d is defined as a customer request that requires SFC F d F from source s d to destination t d with different bandwidth requirements h d . We assume that link e E is assigned a weight and we define w = w e : e E to be the link weight system on the vIoT system. We use a traffic splitting vector x = x e p d : e E , d D , p P d to represent the routing solution where P d is all available paths on the vIoT system of demand d and x e p d is the amount of data on link e of flow p of demand d according to the link metric vector w. Next, we use r v f to present the computing resources required for processing function f with one unit of traffic rate at node v. Others variables are as follows:
  • k v d i = 1 if node v provides the ith VNF in SFC F d of demand d; k v d i = 0 otherwise.
  • l u v corresponds to the smallest length of all paths from node u to node v.
  • u e v = 1 if link e is on a minimum-cost path to node v; u e v = 0 otherwise. The variable is used for guaranteeing the ECMP routing strategy.
  • y e is the total traffic through link e.
We provide a summary of the mathematical notations representing the vIoT system model, and the main parameters and variables of our optimal solutions in Table 1.
Now, we formally state three TE problems as follows:
  • Problem 1 (Traffic engineering under differentiated demands (ED)): Given a vIoT system G = ( V , E ) , a set of service demands D is classified to two types D 1 and D 2 where the system fully satisfies demands belonging to D 1 , and serves those associated with D 2 with its best efforts, find a routing solution x e p d and a link weight system w = w e : e E where e E , p P and d D , satisfying all requirements of the bandwidth capacity constraint on vIoT links and the computing capacity constraint on vIoT nodes in order to maximize the total satisfied traffic.
  • Problem 2 (Traffic engineering under multiple time periods (EP)): Given a vIoT system G = ( V , E ) , a set of service demands D, a set of path P, a set of periods T that presents for the variation in traffic demand volume and cost structure during multiple time periods, find a routing solution x e p d t and a link weight system w = w e : e E where e E , p P , d D and t T , satisfying all requirements of the bandwidth capacity constraint on vIoT links and the computing capacity constraint on vIoT nodes in order to minimize the total network routing cost.
  • Problem 3 (Traffic engineering under differentiated demands and multiple time periods (EDP)): Given a vIoT system G = ( V , E ) , a set of service demands D that is classified to two types D 1 and D 2 where the system fully satisfies demands belonging to D 1 , and serves those associated with D 2 with its best efforts, a set of path P, a set of periods T that presents for the variation in traffic demand volume and cost structure during multiple time periods, find a routing solution x e p d t and a link weight system w = w e : e E where e E , p P , d D and t T , satisfying all requirements of the bandwidth capacity constraint on vIoT links and the computing capacity constraint on vIoT nodes to obtain multiple objectives: (1) to maximize the ratio of accepted demand, (2) to maximize the ratio of total satisfied traffic to total required traffic and (3) to minimize the network routing cost.
Based on NFV characteristics, resource constraints on vIoT nodes, and vIoT links, the system applies the ECMP strategy to determine x ( w ) for achieving the optimal routing solution with link metric vector w. In the following sections, we will present specific constraints and objective functions to obtain the optimal solution including the optimal metric of links and the best routing solution for the three problems.

4.2. Traffic Engineering under Differentiated Demands

In this section, we formulate the ED problem as a Mixed Integer Linear Programming (MILP) model, named ED-O, in order to obtain the optimal solution. Our aim is to find the optimal link weight system w and the best routing solution for obtaining the maximal total satisfied traffic. In this case, we consider multiple types of service demands by classifying the set of demands to two classes, D = D 1 D 2 , where the system fully satisfies demands belonging to D 1 and serves those associated with D 2 with its best efforts.
The objective is to find the optimal solution for obtaining the maximal total data traffic that the network system can support. Hence, the objective function is as follows:
F = d , p x e p d .
We now describe the constraints of our model. First, for constraint (2), (3) make sure that for demand d D 1 the total traffic outgoing from the starting node and the total traffic incoming the terminating node are the same as its traffic volume. In other words, the system supports fully for demand d belonging to D 1 . Similarly, for constraint (4), (5) make sure that for demand d D 2 the total traffic outgoing from the starting node and the total traffic incoming the terminating node are no more than its traffic volume. This implies that service demand d D 2 allows the system to serve a portion of its traffic. The equations are as follows:
p , e : i e = s d x e p d = h d , d D 1
p , e : j e = t d x e p d = h d , d D 1
p , e : i e = s d x e p d h d , d D 2
p , e : j e = t d x e p d h d , d D 2
To make sure that total traffic in-flow and out-flow of each link are equal, we use constraint (6):
p , e : i e = v x e p d p , e : j e = v x e p d = 0 , d , v : v s d , v t d
Next, we formulate constraint (7) to make sure that total traffic passing through a link is not greater than the bandwidth capacity of that link. The equation is given by:
d , p x e p d C 1 , e , e
In addition, to represent the constraint on the computing capacity of nodes, we use constraint (9). This constraint makes sure that the VNFs deployment does not violate the computing capacity of nodes where Equation (8) computes resources required to process function f on node v per one unit of traffic. The equation is given by:
R v ( x , f ) = x · r v f
d , i R v ( k v d i · p , e : j e = v x e p d , F d i ) C 2 , v
It is necessary to ensure that each VNF of SFC requested by demand d has to be implemented at one node and any flow of demand d has to go through its VNFs. We formulate this constraint as follows:
e x e p d · ( k i e d i + k j e d i ) > 0 , d , i , t , h d
e x e p d > 0 , d , p , h d > 0
0 x e p d M z · b e p d , d , p , e
Next, to make certain that the in-flow and out-flow of each node are equal, we formulate the flow constraint by the following conditions where M z is the largest link capacity of all links:
x e p d e : j e = i e x e p d M z ( 1 b e p d ) , d , e , p
x e p d e : j e = i e x e p d , d , e , p
Finally, to ensure that the ECMP routing strategy is used to split traffic demand, we use constraint (15)–(17) as follows:
0 g i e v p , d : t d = v x e p d ( 1 u e v ) d : t d = v h d , v , e
p x e p d u e t d · h d , d , e
1 u e t d l j e t d + w e l i e t d ( 1 u e t d ) · M z , d , e

4.3. Traffic Engineering under Multiple Time Periods

Because the data traffic of demands may vary during different time periods according to service requests, we consider the variations in traffic demand volume and cost structure during multiple time periods in order to achieve the minimal total network routing cost.
We now extend the ED-O formulation to find the optimal solution of the TE problem under consideration of multiple time periods, named EP-O. For more details, we use a set of T = t i i = 1 , 2 , r to present r time periods. Next, we use C e t to denote unit routing cost of link e for transferring a data traffic unit at time period t. Because of the variation in traffic data during multiple time periods, we use a traffic volume h d t to present for the required data traffic of demand d at time period t.
Similarly, we introduce index t to constants and variables related to a time period. Specially, the flow traffic variable is x e p d t . The variables representing VNF placement are b e p d t and k v d i t . The variable related to the minimum cost path routing is g u v t . Hence, when we use equations and constants in this formulation, the new variables and parameters with index t will replace the old variables without index t.
Our objective is to find a solution for obtaining the minimal total routing cost. Hence, we use the following objective function:
F = max t T e y e t · C e t
where y e t = d , p x e p d t .
Note that in the EP problem we do not consider the different types of service demands. Therefore, to ensure that for time period t and for demand d the total traffic outgoing from the starting node equals to the total traffic incoming from the terminating node and both of them equal to traffic volume of demand d, we use the two following constraints:
p , e : i e = s d x e p d t = h d t , d , t
p , e : j e = t d x e p d t = h d t , d , t
Other constraints on flow conservation, bandwidth guarantee, and SFC are derived from the ED-O formulation. The constraints on flow conservation and bandwidth guarantee for demands in EP-O are given by (6), (7), (13), and (14) where x e p d t and b e p d t are used instead of x e p d and b e p d . By replacement k v d i t and x e p d t for k v d i and x e p d respectively in constraints (9)–(12) the model ensures that every traffic flow of demand d is processed by all VNFs required by its SFC, and the VNFs deployment is not over the computing capacity of nodes. The conditions that guarantee the minimum cost path routing and traffic splitting are (15)–(17) where x e p d , h d , and g i e v are replaced by x e p d t , h d t , and g i e v t respectively.

4.4. Traffic Engineering under Differentiated Demands and Multiple Time Periods

In this case, we consider both differentiated demands and multiple time periods to obtain a link weight system and a traffic splitting solution with multiple objectives, which are as follows: maximizing the ratio of accepted demands, maximizing the total satisfied total traffic throughput, and minimizing the total network routing cost.
We extend the EP-O formulation for obtaining the optimal solution of the EDP problem, named EDP-O, by considering differentiated demands as in the ED problem. Therefore, all variables, parameters, constants and conditions are described as the EP-O formulation except conditions (19) and (20) which are replaced by the following constraints:
p , e : i e = s d x e p d t = h d t , d D 1 , t
p , e : j e = t d x e p d t = h d t , d D 1 , t
p , e : i e = s d x e p d t h d t , d D 2 , t
p , e : j e = t d x e p d t h d t , d D 2 , t
In addition, we use Equation (25) to calculate the ratio of accepted demands for time period t where n a t is number of service demands that the system can serve for time period t. Equations (26) and (27) are used to estimate the ratio of total satisfied traffic and the ratio of total network routing cost for time period t, respectively. These equations are as follows:
Ψ 1 t = n a t D ,
Ψ 2 t = e , p , d x e p d t d h d t ,
Ψ 3 t = e , p , d C e t · y e t max t T d h d t · max t T , e E C e t · V 1
We use an auxiliary variable Ψ ¯ 1 that is the minimum ratio of accepted demands over all time periods. The constraint is given by:
Ψ ¯ 1 Ψ 1 t , t .
Similarly, Ψ ¯ 2 and Ψ ¯ 3 are sequentially the minimum of total satisfied traffic and the maximum of total network routing cost over all time periods. We express this constraints as follows:
Ψ ¯ 2 Ψ 2 t , t ,
Ψ ¯ 3 Ψ 3 t , t .
Due to the trade-off between the total traffic throughput and the total network routing cost, we use the objective function (31) to find the optimal solution where α , β , and γ are the model parameters representing the weight of the accepted demands, the total satisfied traffic, and the total network routing cost, respectively. The objective function of the problem is as follows:
F = α · Ψ ¯ 1 + β · Ψ ¯ 2 γ · Ψ ¯ 3
Our MILP formulations of three problems allow us to achieve optimal solutions and can be effectively solved for moderate networks by a MILP solver (e.g., CPLEX). Unfortunately, finding optimal link weight system of the shortest-path routing problem for an arbitrary network is NP hard [30]. Hence, we propose a heuristic algorithm to solve the TE problems for a large-scale vIoT system in the sequel.

5. Heuristic Algorithm

We propose a heuristic algorithm for finding an approximate solution of the three problems in a large-scale vIoT system. The objectives are as follows: (1) maximizing the total satisfied traffic, (2) maximizing the number of accepted service demands, and (3) minimizing the total network routing cost in the vIoT system. The proposed algorithm contains two primary components: (i) optimizing the link weight system while considering the differentiated demands, the dynamics of service demands, and available resources (i.e., Algorithm 1: Optimizing the link weight system); (ii) deciding a routing solution based on the link weight system vector, service demands, and available system resources by the ECMP technique (i.e., Algorithm 2: TrafficDecision, Algorithm 3: VNFAllocation). The algorithm is deployed as a component in the NFV orchestrator block of the NFV reference architecture framework (Figure 4 in [29]).
The main steps of the proposed algorithm are presented as a flow chart in Figure 3. In the sequel, we present the details of Algorithms 1–3.
Algorithm 1 Optimizing the link weight system
Input:G, D, F, T
Output: Routing solution x, link weight system w
1:
Initialize w
2:
O w , A w TRAFFICDECISION( G , D , F , T ,w)
3:
w b e s t w , O b e s t O w , A b e s t A w
4:
Q Q o
5:
while Q > 1 do
6:
     l 0
7:
    while l < L do
8:
         z generate a neighbor vector
9:
         O z , A z TRAFFICDECISION( G , D , F , T ,z)
10:
         Δ O O z - O w , Δ A A z - A w
11:
        if Δ O 0 and Δ A 0 then
12:
             w z , O w O z , A w A z
13:
            if O z < O b e s t then
14:
                 w b e s t z , O b e s t O z , A b e s t A z
15:
            end if
16:
        else
17:
            if e Δ O / Q > random(0,1) then
18:
                 w z , O w O z , A w A z
19:
            end if
20:
        end if
21:
         l l + 1
22:
    end while
23:
    reduce temperature Q
24:
end while

5.1. Optimizing the Link Weight System

In this component, we propose an approximation algorithm based on Simulated Annealing heuristic [31] to find the optimal link weight system (Algorithm 1). First, the algorithm generates an initial link metric vector where all link weights equal to 1. The algorithm then optimizes the metric of links by two loops underlying the neighborhood selection scheme. Specially, for two loops, we use Q and L as two parameters to set up the initial temperature and the times of the inner while-end loop, respectively. For generating a new neighborhood (i.e., line 8), the algorithm increases the weight of links whose routing cost is highest. Next, based on the new neighborhood vector z, the algorithm uses the TrafficDecision function to find a routing solution and to estimate the link metric vector z based on the objective function O z . The detail of TrafficDecision is presented in Algorithm 2 and is described in the following section. The new link weight system z is better than the current link weight vector if and only if the value of the objective function O z is not worse and the achieved minimum accepted demands do not decrease. The optimization process updates the current vector in the next loop by the neighborhood vector z if it is better or with probability e Δ O / Q to overcome a local optimum. Finally, the algorithm achieves the optimal link weight system to update the vIoT system.
Algorithm 2 Deciding a traffic splitting vector
1:
functionTrafficDecision( G , D , F , T ,w)
2:
    for all t T do
3:
         sort D 1 decreasingly by traffic volumes
4:
         sort D 2 decreasingly by traffic volumes
5:
         D = D 1 D 2
6:
        for all d D do
7:
            P d all shortest paths for demand d
8:
           x ← split flow traffic for P d with ECMP strategy
9:
           if d D 1 then
10:
                VNFALLOCATION G , x , d , P d
11:
               if satisfy all link and node constraints then
12:
                   update the utilization of links and nodes
13:
               else
14:
                   reject demand d
15:
               end if
16:
           else
17:
               do
18:
                    VNFALLOCATION G , x , d , P d
19:
                   if do not satisfy all link and node constraints then
20:
                       decrease flow traffic x
21:
                   else
22:
                       increase flow traffic x
23:
                   end if
24:
               while do not satisfy all constraints
25:
               update the utilization of links and nodes
26:
           end if
27:
        end for
28:
         A ¯ t compute number of accepted demands at time period t
29:
    end for
30:
     A w min t T A ¯ t
31:
     O w compute value of the objective function
    return O w , A w
32:
end function

5.2. Deciding the Traffic Splitting Vector

With a metric of links on the vIoT system, we propose the TrafficDecision algorithm to determine the traffic splitting vector based on the ECMP technique, SFC, and resource constraints. The detail of TrafficDecision is presented in Algorithm 2. Specially, the first step in the algorithm is to find all shortest paths from the starting node to the terminating node of demands. Next, TrafficDecision applies the ECMP technique to determine how to split the traffic volumes of demands on these paths. Then, the algorithm finds an allocating VNFs solution for nodes along these paths using VnfAllocation function, presented in Algorithm 3. The VnfAllocation function considers mapping the required network function chaining of each demand for the nodes along each path sequentially. When it cannot find a possible traffic splitting solution for a demand, this demand is rejected if it belongs to class D 1 or its traffic is adjusted if it belongs to class D 2 . All of these steps are looped through all demands for each time period.
As mentioned above, this component is modified when applying to find an approximate solution for ED, EP, and EDP. Specifically, we use Algorithm 2 to find the traffic splitting vector for the EDP problem. For the ED problem, we modify Algorithm 2 by removing some lines, including line 2 and 29. Similarly, we apply Algorithm 2 after removing some lines from line 16 to 26 and line 9 for solving the EP problem.
Algorithm 3 Allocating VNFs of demands
1:
functionVnfAllocation( G , x , d , P d )
2:
    for all p P d do
3:
         V ¯ all nodes belongs to p
4:
         F d ¯ all network functions of F d
5:
        while V ¯ is not empty and F d ¯ is not empty do
6:
            v the first node of V ¯
7:
           remove the first node from V ¯
8:
           while available capacity of v > 0 and F d ¯ is not empty do
9:
                f the first function of SFC F d ¯
10:
               if available capacity of v R v x e p d , f then
11:
                   mapping f for v
12:
                   remove the first function from SFC F d ¯
13:
               else
14:
                   break
15:
               end if
16:
           end while
17:
        end while
18:
    end for
returnG
19:
end function

6. Evaluation

In this section, we present the scenarios and parameters in our experiments using both real-world datasets and synthetic topologies to evaluate the performance of our solution with multiple objectives. First, we evaluate the efficiency of our TE solution when considering differentiated demands. Second, the simulations are focused on comparing the multiple time periods scheme with the nonmultiperiod scheme. Finally, we evaluate the strategy considering both differentiated demands and multiple time periods.

6.1. Scenario Setting

To evaluate performance of our solution, we use four scenarios as given in Table 2, where the Internet2 dataset [32] and the GEANT dataset [33] are real-world datasets and the later ones are random generated by synthetic topologies based on the two-tier model [34] and the Bcube model [35], sequentially.
For more details, the Internet2 dataset includes a topology that consists of 12 nodes, 30 links, and 120 service demands. In this dataset, we consider three time periods where the traffic volumes of demands in the first time period are recorded from the real traffic, and the others are generated from the minimum to the maximum traffic volume of all demands randomly. The Geant dataset contains a topology that consists of 22 nodes, 72 links, 200 service demands, and four time periods. Similarly, for the first time period we use the traffic volumes of demands that tracked from the Geant network, and the traffic demands in other time periods are randomly generated. The third and fourth datasets are randomly generated by FNSS tool [36] based on the Two-tier and Bcube models, respectively. The Two-tier dataset contains a topology of 60 nodes and 282 links and traffic matrices with 40 service demands. The Bcube dataset is a network consisting of 176 nodes and 1464 links with 200 service demands. In all four experiments, we consider four VNFs available on the vIoT system.
The processing capacity of a node, the resource requirements of a VNF, and the SFC of a demand are randomly generated with the Uniform distribution. A demand will be classified to D 1 and D 2 based on the average of its traffic volumes over all time periods. If the average is larger than the average of all traffic volumes of all demands over all time periods, a demand will belong to D 2 . We set α = 3, β =2, γ = 1 since we consider that the number of accepted demand has the highest priority and the total routing cost has the lowest priority.
In the evaluation, we consider three performance metrics: the ratio of accepted demands, the ratio of total satisfied traffic, and the total network routing cost. Specifically, the ratio of accepted demands is the proportion of a number of service demands supported by the system to that requested by customers. Similarly, the ratio of total satisfied traffic is the proportion of total traffic provided by the system to that required by customers. The total network routing cost is the sum of routing cost of all links used in the system where the routing cost of link e is the product of the total traffic through link e and the unit routing cost of link e.

6.2. Performance Evaluation of the Traffic Engineering Solution Considering Differentiated Demands

We evaluate the efficiency of the proposed algorithms for the ED problem, whose objective is to maximize the total satisfied traffic that the system supports all service demands. For simplicity, we refer to this algorithm for schemes considering classified demand types and nonclassified demand types as multitype and one-type sequentially. We perform our solution in the same set of demands and network scenarios for two cases. In the multitype case, we use two demand types where the system fully satisfies demands belonging to the first type, and serves those associated with the second type with its best efforts.
In four scenarios, the experiment results show that the Multi-type scheme outperforms the One-type scheme in both the total satisfied traffic objective and the ratio of accepted demands objective. Particularly, Figure 4 shows that the ratio of satisfied demands achieved by the Multi-type scheme is higher from 5% to 25% than that of the One-type scheme for the Internet2 dataset. The result of the percentage of total satisfied traffic is similar in this case. It can be seen from Figure 4c that the Multi-type scheme achieves a higher total network routing cost than the One-type scheme. The main reason is that the Multi-type scheme supports for much more network throughput therefore its resource utilization is larger. We can observe that the Multi-type scheme overcomes the One-type scheme not only the accepted demands and total traffic but also the total network routing cost in Figure 5 with the Bcube dataset. Moreover, the gap between the effective performance of the Multi-type scheme and the One-type scheme becomes larger with the increase of number of service demands when evaluating the ratio of supported demands and total satisfied traffic in Figure 5a,b. Figure 6 and Figure 7 illustrate the similar results for the Geant and Two-tier datasets. To summarize, the approach considering differentiated demands is effective in maximizing the total satisfied traffic.

6.3. Performance Evaluation of the Traffic Engineering Solution Considering Multiple Time Periods

We evaluate the performance of our approach by comparing results achieved by the case of multiperiod and the none-period case. Note that in the multiperiod case, we divide time to multiple time periods where the traffic demand and routing cost of links may vary during different time periods. Hence, there are different values of the ratio of accepted demand, the ratio of total satisfied traffic, and the total network routing cost for different time periods. Then we use the worst one in all time periods for each aspect in the multiperiod case. In the none-period case, each service demand has only one traffic volume that is the maximal demand volume over all time periods in the multiperiod case. It is similar for the routing cost of network links. We compare three performance metrics, including the minimum ratio of accepted demand, the minimum ratio of total satisfied traffic, and the maximum total network routing cost over all time periods of the multiperiod case to that of the none-period case. The main objective of the EP problem is to minimize the total network routing cost.
The evaluation results show that the multiperiod scheme outperforms the none-period scheme in terms of three metrics. Specially, Figure 8 depicts that the multiperiod strategy can save approximately 25% the total network routing cost and around 7% the minimum ratio of accepted demands with the Internet2 dataset. In addition, the ratio of total satisfied traffic of the multiperiod scheme is 5–13% higher than that of the none-period scheme. For the evaluation using datasets of Bcube, Geant, and two-tier, Figure 9, Figure 10 and Figure 11 depict that the multiperiod scheme saves approximately 50% of the total network routing cost compared with the none-period scheme. Similarly, the multiperiod scheme obtains a higher percentage of accepted demands and total satisfied traffic in comparison with the nonperiod scheme. To sum up, the traffic engineering solution considering multiple time periods is an effective approach to minimizing the total network routing cost.

6.4. Performance Evaluation of the Traffic Engineering Solution Considering the Combination of Differentiated Demands and Multiple Time Periods

We then evaluate the performance of the strategy considering both differentiated demands and multiple time periods (called COM) against the scheme considering multiple time periods only (called MP). For more details, in the first case, we aggregate both the differentiated demands scheme and the multiple time periods scheme to the algorithm. For the second case, we only consider multiple time periods scheme. However, notice that we use the new objective function as Equation (31) for the MP case that leads to the differences of results compared with the mentioned multiple time periods results.
The results illustrate that the COM scheme achieves a higher ratio of accepted demands than the MP scheme while both the total satisfied traffic and the total network routing cost results are equivalent. As shown in Figure 12, the ratio of accepted demands obtained by the COM scheme is better than that of the MP scheme with the Internet2 dataset. In addition, on the percentage of total satisfied traffic and the total network routing cost aspects, the results are very closed. Figure 13 compares the traffic solution considering the COM scheme to the MP scheme with the Bcube dataset. It shows that COM outperforms MP in both the ratio of accepted demands and total satisfied traffic while having the same total network routing cost. For the Geant dataset, Figure 14 shows that the COM scheme achieves at least 20% higher ratio of total satisfied traffic than the MP scheme with a number of service demands from 50 to 200. The total network routing cost of COM is higher than that of MP because of the extreme increment of satisfied traffic. The comparison between COM and MP with the two-tier dataset also shows a similar result, presented in Figure 15. To summarize, the aggregation of the multiple time periods scheme and the differentiated demands scheme provides an effective solution for traffic engineering with multiple objectives.

7. Conclusions

In this paper, we investigated the TE problem considering the ECMP routing technique, SFC, differentiated demands in various periods, and the fluctuation of traffic volume in a vIoT system. We proposed three MILP models for achieving the optimal link weight configuration and routing solution for the TE problem. We then developed efficient algorithms that provide an approximate solution for the large scale problem. We evaluated the performance of the proposed algorithms through simulations using both synthetic and real-world datasets of network traffic and topologies. The evaluation results demonstrate that a traffic engineering strategy aggregating both the fluctuation of demand volume and the different demand types can significantly increase the performance of a vIoT system thanks to the offered features of service composition agilely created in NFV. There are several interesting extensions of our TE approaches, including consideration of failure scenarios, traffic prediction, and cache optimization for further improving the performance of an IoT system based on NFV [17,37,38]. Another important direction might be the performance evaluation of energy consumption in a vIoT system taking into account the mobility of IoT devices.

Author Contributions

Conceptualization and methodology, T.-T.-L.N. and T.-M.P.; formal analysis, investigation, and resources, T.-T.-L.N. and T.-M.P.; writing—original draft preparation, T.-T.-L.N.; writing—review and editing, T.-T.-L.N. and T.-M.P.; supervision, T.-M.P.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Halpern, J.; Pignataro, C. RFC 7665: Service Function Chaining (SFC) Architecture. Available online: https://tools.ietf.org/html/rfc7665 (accessed on 3 June 2020).
  2. Díaz, M.; Martín, C.; Rubio, B. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 2016, 67, 99–117. [Google Scholar] [CrossRef]
  3. Mouradian, C.; Jahromi, N.T.; Glitho, R.H. NFV and SDN-Based Distributed IoT Gateway for Large-Scale Disaster Management. IEEE Internet Things J. 2018, 5, 4119–4131. [Google Scholar] [CrossRef] [Green Version]
  4. Farris, I.; Taleb, T.; Khettab, Y.; Song, J. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems. IEEE Commun. Surv. Tutor. 2019, 21, 812–837. [Google Scholar] [CrossRef]
  5. Kaiwartya, O.; Abdullah, A.H.; Cao, Y.; Lloret, J.; Kumar, S.; Shah, R.R.; Prasad, M.; Prakash, S. Virtualization in Wireless Sensor Networks: Fault Tolerant Embedding for Internet of Things. IEEE Internet Things J. 2018, 5, 571–580. [Google Scholar] [CrossRef] [Green Version]
  6. Jia, M.; Liang, W.; Huang, M.; Xu, Z.; Ma, Y. Routing Cost Minimization and Throughput Maximization of NFV-Enabled Unicasting in Software-Defined Networks. IEEE Trans. Network Serv. Manag. 2018, 15, 732–745. [Google Scholar] [CrossRef]
  7. Sallam, G.; Gupta, G.R.; Li, B.; Ji, B. Shortest Path and Maximum Flow Problems Under Service Function Chaining Constraints. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 2132–2140. [Google Scholar]
  8. Xu, Z.; Gong, W.; Xia, Q.; Liang, W.; Rana, O.; Wu, G. NFV-Enabled IoT Service Provisioning in Mobile Edge Clouds. IEEE Trans. Mob. Comput. (Early Access) 2020, 1–15. [Google Scholar] [CrossRef]
  9. Medhat, A.M.; Carella, G.A.; Pauls, M.; Magedanz, T. Orchestrating scalable service function chains in a NFV environment. In Proceedings of the 3rd IEEE Conference on Network Softwarization, Bologna, Italy, 3–7 July 2017; pp. 1–5. [Google Scholar]
  10. Eramo, V.; Miucci, E.; Ammar, M.; Lavacca, F.G. An Approach for Service Function Chain Routing and Virtual Function Network Instance Migration in Network Function Virtualization Architectures. IEEE/ACM Trans. Netw. 2017, 25, 2008–2025. [Google Scholar] [CrossRef]
  11. Hwang, J.; Ramakrishnan, K.K.; Wood, T. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. IEEE Trans. Netw. Service Manag. 2015, 12, 34–47. [Google Scholar] [CrossRef]
  12. Martins, J.; Ahmed, M.; Raiciu, C.; Olteanu, V.; Honda, M.; Bifulco, R.; Huici, F. ClickOS and the Art of Network Function Virtualization. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, Seattle, WA, USA, 2–4 April 2014; pp. 459–473. [Google Scholar]
  13. Kulkarni, S.G.; Zhang, W.; Hwang, J.; Rajagopalan, S.; Ramakrishnan, K.K.; Wood, T.; Arumaithurai, M.; Fu, X. NFVnice: Dynamic Backpressure and Scheduling for NFV Service Chains. In Proceedings of the ACM Special Interest Group on Data Communication, Los Angeles, CA, USA, 21–25 August 2017; pp. 71–84. [Google Scholar]
  14. Sun, C.; Bi, J.; Zheng, Z.; Yu, H.; Hu, H. NFP: Enabling Network Function Parallelism in NFV. In Proceedings of the ACM Special Interest Group on Data Communication, Los Angeles, CA, USA, 21–25 August 2017; pp. 43–56. [Google Scholar]
  15. Cotroneo, D.; Natella, R.; Rosiello, S. NFV-Throttle: An Overload Control Framework for Network Function Virtualization. IEEE Trans. Network Serv. Manag. 2017, 14, 949–963. [Google Scholar] [CrossRef]
  16. Luizelli, M.C.; Raz, D.; Sa’ar, Y. Optimizing NFV Chain Deployment through Minimizing the Cost of Virtual Switching. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 2150–2158. [Google Scholar]
  17. Pham, T.M.; Fdida, S.; Nguyen, T.T.L.; Chu, H.N. Modeling and analysis of robust service composition for network functions virtualization. Comput. Netw. 2020, 166, 106989. [Google Scholar] [CrossRef]
  18. Elias, J.; Martignon, F.; Paris, S.; Wang, J. Optimization Models for Congestion Mitigation in Virtual Networks. In Proceedings of the IEEE 22nd International Conference on Network Protocols, Raleigh, NC, USA, 21–24 October 2014; pp. 471–476. [Google Scholar]
  19. Pham, T.M.; Nguyen, T.T.L.; Fdida, S.; Binh, H.T.T. Online load balancing for Network Functions Virtualization. In Proceedings of the IEEE International Conference on Communications, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  20. Pham, T.M.; Pham, L.M. Load balancing using multipath routing in Network Functions Virtualization. In Proceedings of the 2016 IEEE International Conference on Research, Innovation and Vision for the Future on Computing and Communication Technologies (IEEE-RIVF’16), Hanoi, Vietnam, 7–9 November 2016; pp. 85–90. [Google Scholar]
  21. Pham, T.M.; Chu, H.N. Multi-Provider and Multi-Domain Resource Orchestration in Network Functions Virtualization. IEEE Access 2019, 7, 86920–86931. [Google Scholar] [CrossRef]
  22. Ojo, M.; Adami, D.; Giordano, S. A SDN-IoT Architecture with NFV Implementation. In Proceedings of the 2016 IEEE Globecom Workshops (GC Wkshps), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  23. Wang, M.; Cheng, B.; Liu, X.; Yue, Y.; Li, B.; Chen, J. A SDN/NFV-Based IoT Network Slicing Creation System. In Proceedings of the ACM MobiCom 2018—the 24th Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29 October–2 November 2018; pp. 666–668. [Google Scholar]
  24. Fu, X.; Yu, F.R.; Wang, J.; Qi, Q.; Liao, J. Service Function Chain Embedding for NFV-Enabled IoT Based on Deep Reinforcement Learning. IEEE Commun. Mag. 2019, 57, 102–108. [Google Scholar] [CrossRef]
  25. Verma, J.K.; Kumar, S.; Kaiwartya, O.; Cao, Y.; Lloret, J.; Katti, C.P.; Kharel, R. Enabling green computing in cloud environments: Network virtualization approach toward 5G support. Trans. Emerg. Telecommun. Technol. 2018, 29, e3434. [Google Scholar] [CrossRef] [Green Version]
  26. Ma, W.; Sandoval, O.; Beltran, J.; Pan, D.; Pissinou, N. Traffic aware placement of interdependent NFV middleboxes. In Proceedings of the IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  27. Fei, X.; Liu, F.; Xu, H.; Jin, H. Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction. In Proceedings of the IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 486–494. [Google Scholar]
  28. Nguyen, T.T.L.; Pham, T.M. Optimization Model and Algorithm for Dynamic Service-Aware Traffic Steering in Network Functions Virtualization. In Proceedings of the 2018 IEEE Seventh International Conference on Communications and Electronics, Hue, Vietnam, 18–20 July 2018; pp. 107–112. [Google Scholar]
  29. ETSI. Network Functions Virtualisation (NFV); Architectural Framework, ETSI GS NFV 002 v1.2.1. Available online: https://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.02.01_60/gs_NFV002v010201p.pdf (accessed on 3 June 2020).
  30. Fortz, B.; Thorup, M. Increasing Internet Capacity Using Local Search. Comput. Optim. Appl. 2004, 29, 13–48. [Google Scholar] [CrossRef]
  31. Hwang, C.-R. Simulated annealing: Theory and applications. Acta Appl. Math. 1988, 12, 108–111. [Google Scholar]
  32. Internet2 Research Network Topology and Traffic Matrix. Available online: http://www.topology-zoo.org/dataset.html (accessed on 3 June 2020).
  33. Uhlig, S.; Quoitin, B.; Lepropre, J.; Balon, S. Providing Public Intradomain Traffic Matrices to the Research Community. SIGCOMM Comput. Commun. Rev. 2006, 36, 83–86. [Google Scholar] [CrossRef]
  34. Al-shawi, M. CCDE Study Guide, 1st ed.; Cisco Press: Indianapolis, IN, USA, 2015. [Google Scholar]
  35. Guo, C.; Lu, G.; Li, D.; Wu, H.; Zhang, X.; Shi, Y.; Tian, C.; Zhang, Y.; Lu, S. BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers. SIGCOMM Comput. Commun. Rev. 2009, 39, 63–74. [Google Scholar] [CrossRef]
  36. Saino, L.; Cocora, C.; Pavlou, G. A Toolchain for Simplifying Network Simulation Setup. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France, 6–8 March 2013; pp. 82–91. [Google Scholar]
  37. Pham, T.M. Analysis of ISP caching in information-centric networks. In Proceedings of the 2015 IEEE RIVF International Conference on Computing Communication Technologies - Research, Innovation, and Vision for Future (RIVF), Can Tho, Vietnam, 25–28 January 2015; pp. 151–156. [Google Scholar]
  38. Pham, T.M.; Minoux, M.; Fdida, S.; Pilarski, M. Optimization of content caching in Content-Centric Networks. In Proceedings of the First International Balkan Conference on Communications and Networking (BalkanCom), Tirana, Albania, 30 May–2 June 2017; pp. 1–5. [Google Scholar]
Figure 1. An NFV enabled IoT framework (vIoT).
Figure 1. An NFV enabled IoT framework (vIoT).
Sensors 20 03198 g001
Figure 2. Service chain provisioning in vIoT.
Figure 2. Service chain provisioning in vIoT.
Sensors 20 03198 g002
Figure 3. Flowchart of the proposed algorithm.
Figure 3. Flowchart of the proposed algorithm.
Sensors 20 03198 g003
Figure 4. Efficient traffic engineering solution considering differentiated demands with the Internet2 dataset.
Figure 4. Efficient traffic engineering solution considering differentiated demands with the Internet2 dataset.
Sensors 20 03198 g004
Figure 5. Efficient traffic engineering solution considering differentiated demands with the Bcube dataset.
Figure 5. Efficient traffic engineering solution considering differentiated demands with the Bcube dataset.
Sensors 20 03198 g005
Figure 6. Efficient traffic engineering solution considering differentiated demands with the GEANT dataset.
Figure 6. Efficient traffic engineering solution considering differentiated demands with the GEANT dataset.
Sensors 20 03198 g006
Figure 7. Efficient traffic engineering solution considering differentiated demands with the Two-tier dataset.
Figure 7. Efficient traffic engineering solution considering differentiated demands with the Two-tier dataset.
Sensors 20 03198 g007
Figure 8. Efficient traffic engineering solution considering multiple time periods with the Internet2 dataset.
Figure 8. Efficient traffic engineering solution considering multiple time periods with the Internet2 dataset.
Sensors 20 03198 g008
Figure 9. Efficient traffic engineering solution considering multiple time periods with the Bcube dataset.
Figure 9. Efficient traffic engineering solution considering multiple time periods with the Bcube dataset.
Sensors 20 03198 g009
Figure 10. Efficient traffic engineering solution considering multiple time periods with the GEANT dataset.
Figure 10. Efficient traffic engineering solution considering multiple time periods with the GEANT dataset.
Sensors 20 03198 g010
Figure 11. Efficient traffic engineering solution considering multiple time periods with the Two-tier dataset.
Figure 11. Efficient traffic engineering solution considering multiple time periods with the Two-tier dataset.
Sensors 20 03198 g011
Figure 12. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Internet2 dataset.
Figure 12. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Internet2 dataset.
Sensors 20 03198 g012
Figure 13. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Bcube dataset.
Figure 13. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Bcube dataset.
Sensors 20 03198 g013
Figure 14. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the GEANT dataset.
Figure 14. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the GEANT dataset.
Sensors 20 03198 g014
Figure 15. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Two-tier dataset.
Figure 15. Efficient traffic engineering solution considering the combination of differentiated demands and multiple time periods with the Two-tier dataset.
Sensors 20 03198 g015
Table 1. Summary of notations.
Table 1. Summary of notations.
Sets
DService demands
D 1 Service demands require that the system fully satisfies their traffic volumes
D 2 Service demands allow a system to serve with its best efforts
ELinks on the vIoT system
VNodes on the vIoT system
FVNFs available on the vIoT system
PPossible paths on the vIoT system
P d Possible paths for demand d
TTime periods
Parameters
h d t The traffic volume of d D at time period t T
s d The starting node of demand d D
t d The terminating node of demand d D
F d The SFC requested by demand d, F d F
k v d i t Node v supports the ith VNF in SFC F d of demand d at time period t if k v d i t = 1 , otherwise k v d i t = 0
C 1 , e Bandwidth capacity of link e E
C e t Network routing cost of link e E at time period t T
C 2 , v Computing capacity of node v V
M z The largest link capacity of all links
α The weight of accepted demands
β The weight of total satisfied traffic
γ The weight of total network routing cost
Binary variables
b e p d t A binary variable represents that link e is on flow p of demand d at time period t if b e p d t = 1 , otherwise b e p d t = 0
u e v A binary variable represents that link e is on a minimum-cost path to node v if u e v = 1 , otherwise u e v = 0
Continuous variables
x e p d t The traffic rate on link e of data flow p of demand d at time period t T
l u v The smallest length of the paths from node u to node v
y e t Total of traffic through link e at time period t T
g u v t Total traffic volume assigned to outgoing links of node v that belongs to the minimum-cost paths from node u to node v at time period t T
Ψ 1 t Percentage of accepted demands at time period t T
Ψ 2 t Percentage of total satisfied traffic at time period t T
Ψ 3 t Percentage of total network routing cost at time period t T
Discrete variables
n a t Number of accepted demands at time period t T
Auxiliary variables
Ψ ¯ 1 The minimum ratio of accepted demands over all time periods
Ψ ¯ 2 The minimum of total satisfied traffic over all time periods
Ψ ¯ 3 The maximum of total network routing cost over all time periods
Metric vector variables
wThe metric of links on the vIoT system, w = w e : e E
xA traffic splitting vector x = x e p d t : e E , p P , d D , t T
Table 2. Scenarios.
Table 2. Scenarios.
ScenariosNumber of Virtual NodesNumber of Virtual LinksNumber of VNFsNumber of Time PeriodsMin Number of DemandMax Number of Demand
Internet212304320120
Geant22724450200
Two-tier60282431040
Bcube17614644350200

Share and Cite

MDPI and ACS Style

Nguyen, T.-T.-L.; Pham, T.-M. Efficient Traffic Engineering in an NFV Enabled IoT System. Sensors 2020, 20, 3198. https://doi.org/10.3390/s20113198

AMA Style

Nguyen T-T-L, Pham T-M. Efficient Traffic Engineering in an NFV Enabled IoT System. Sensors. 2020; 20(11):3198. https://doi.org/10.3390/s20113198

Chicago/Turabian Style

Nguyen, Thi-Thuy-Lien, and Tuan-Minh Pham. 2020. "Efficient Traffic Engineering in an NFV Enabled IoT System" Sensors 20, no. 11: 3198. https://doi.org/10.3390/s20113198

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop