+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Edition No. 1. IEEE Press Series on Networks and Service Management

  • Book

  • 400 Pages
  • October 2021
  • John Wiley and Sons Ltd
  • ID: 5837609
COMMUNICATION NETWORKS AND SERVICE MANAGEMENT IN THE ERA OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING

Discover the impact that new technologies are having on communication systems with this up-to-date and one-stop resource

Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning delivers a comprehensive overview of the impact of artificial intelligence (AI) and machine learning (ML) on service and network management. Beginning with a fulsome description of ML and AI, the book moves on to discuss management models, architectures, and frameworks. The authors also explore how AI and ML can be used in service management functions like the generation of workload profiles, service provisioning, and more.

The book includes a handpicked selection of applications and case studies, as well as a treatment of emerging technologies the authors predict could have a significant impact on network and service management in the future. Statistical analysis and data mining are also discussed, particularly with respect to how they allow for an improvement of the management and security of IT systems and networks. Readers will also enjoy topics like: - A thorough introduction to network and service management, machine learning, and artificial intelligence - An exploration of artificial intelligence and machine learning for management models, including autonomic management, policy-based management, intent based ­management, and network virtualization-based management - Discussions of AI and ML for architectures and frameworks, including cloud ­systems, software defined networks, 5G and 6G networks, and Edge/Fog networks - An examination of AI and ML for service management, including the automatic ­generation of workload profiles using unsupervised learning

Perfect for information and communications technology educators, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning will also earn a place in the libraries of engineers and professionals who seek a structured reference on how the emergence of artificial intelligence and machine learning techniques is affecting service and network management.

Table of Contents

List of Contributors xv

Preface xxi

Acknowledgments xxv

Acronyms xxvii

Part I Introduction 1

1 Overview of Network and Service Management 3
Marco Mellia, Nur Zincir-Heywood, and Yixin Diao

1.1 Network and Service Management at Large 3

1.2 Data Collection and Monitoring Protocols 5

1.2.1 SNMP Protocol Family 5

1.2.2 Syslog Protocol 5

1.2.3 IP Flow Information eXport (IPFIX) 6

1.2.4 IP Performance Metrics (IPPM) 7

1.2.5 Routing Protocols and Monitoring Platforms 8

1.3 Network Configuration Protocol 9

1.3.1 Standard Configuration Protocols and Approaches 9

1.3.2 Proprietary Configuration Protocols 10

1.3.3 Integrated Platforms for Network Monitoring 10

1.4 Novel Solutions and Scenarios 12

1.4.1 Software-Defined Networking - SDN 12

1.4.2 Network Functions Virtualization -NFV 14

Bibliography 15

2 Overview of Artificial Intelligence and Machine Learning 19
Nur Zincir-Heywood, Marco Mellia, and Yixin Diao

2.1 Overview 19

2.2 Learning Algorithms 20

2.2.1 Supervised Learning 21

2.2.2 Unsupervised Learning 22

2.2.3 Reinforcement Learning 23

2.3 Learning for Network and Service Management 24

Bibliography 26

Part II Management Models and Frameworks 33

3 Managing Virtualized Networks and Services with Machine Learning 35
Raouf Boutaba, Nashid Shahriar, Mohammad A. Salahuddin, and Noura Limam

3.1 Introduction 35

3.2 Technology Overview 37

3.2.1 Virtualization of Network Functions 38

3.2.1.1 Resource Partitioning 38

3.2.1.2 Virtualized Network Functions 40

3.2.2 Link Virtualization 41

3.2.2.1 Physical Layer Partitioning 41

3.2.2.2 Virtualization at Higher Layers 42

3.2.3 Network Virtualization 42

3.2.4 Network Slicing 43

3.2.5 Management and Orchestration 44

3.3 State-of-the-Art 46

3.3.1 Network Virtualization 46

3.3.2 Network Functions Virtualization 49

3.3.2.1 Placement 49

3.3.2.2 Scaling 52

3.3.3 Network Slicing 55

3.3.3.1 Admission Control 55

3.3.3.2 Resource Allocation 56

3.4 Conclusion and Future Direction 59

3.4.1 Intelligent Monitoring 60

3.4.2 Seamless Operation and Maintenance 60

3.4.3 Dynamic Slice Orchestration 61

3.4.4 Automated Failure Management 61

3.4.5 Adaptation and Consolidation of Resources 61

3.4.6 Sensitivity to Heterogeneous Hardware 62

3.4.7 Securing Machine Learning 62

Bibliography 63

4 Self-Managed 5G Networks 69
Jorge Martín-Pérez, Lina Magoula, Kiril Antevski, Carlos Guimarães, Jorge Baranda, Carla Fabiana Chiasserini, Andrea Sgambelluri, Chrysa Papagianni, Andrés García-Saavedra, Ricardo Martínez, Francesco Paolucci, Sokratis Barmpounakis, Luca Valcarenghi, Claudio EttoreCasetti, Xi Li, Carlos J. Bernardos, Danny De Vleeschauwer, Koen De Schepper, Panagiotis Kontopoulos, Nikolaos Koursioumpas, Corrado Puligheddu, Josep Mangues-Bafalluy, and Engin Zeydan

4.1 Introduction 69

4.2 Technology Overview 73

4.2.1 RAN Virtualization and Management 73

4.2.2 Network Function Virtualization 75

4.2.3 Data Plane Programmability 76

4.2.4 Programmable Optical Switches 77

4.2.5 Network Data Management 78

4.3 5G Management State-of-the-Art 80

4.3.1 RAN resource management 80

4.3.1.1 Context-Based Clustering and Profiling for User and Network Devices 80

4.3.1.2 Q-Learning Based RAN Resource Allocation 81

4.3.1.3 vrAIn: AI-Assisted Resource Orchestration for Virtualized Radio Access Networks 81

4.3.2 Service Orchestration 83

4.3.3 Data Plane Slicing and Programmable Traffic Management 85

4.3.4 Wavelength Allocation 86

4.3.5 Federation 88

4.4 Conclusions and Future Directions 89

Bibliography 92

5 AI in 5G Networks: Challenges and Use Cases 101
Stanislav Lange, Susanna Schwarzmann, Marija Gaji´c, Thomas Zinner, and Frank A. Kraemer

5.1 Introduction 101

5.2 Background 103

5.2.1 ML in the Networking Context 103

5.2.2 ML in Virtualized Networks 104

5.2.3 ML for QoE Assessment and Management 104

5.3 Case Studies 105

5.3.1 QoE Estimation and Management 106

5.3.1.1 Main Challenges 107

5.3.1.2 Methodology 108

5.3.1.3 Results and Guidelines 109

5.3.2 Proactive VNF Deployment 110

5.3.2.1 Problem Statement and Main Challenges 111

5.3.2.2 Methodology 112

5.3.2.3 Evaluation Results and Guidelines 113

5.3.3 Multi-service, Multi-domain Interconnect 115

5.4 Conclusions and Future Directions 117

Bibliography 118

6 Machine Learning for Resource Allocation in Mobile Broadband Networks 123
Sadeq B. Melhem, Arjun Kaushik, Hina Tabassum, and Uyen T. Nguyen

6.1 Introduction 123

6.2 ML in Wireless Networks 124

6.2.1 Supervised ML 124

6.2.1.1 Classification Techniques 125

6.2.1.2 Regression Techniques 125

6.2.2 Unsupervised ML 126

6.2.2.1 Clustering Techniques 126

6.2.2.2 Soft Clustering Techniques 127

6.2.3 Reinforcement Learning 127

6.2.4 Deep Learning 128

6.2.5 Summary 129

6.3 ML-Enabled Resource Allocation 129

6.3.1 Power Control 131

6.3.1.1 Overview 131

6.3.1.2 State-of-the-Art 131

6.3.1.3 Lessons Learnt 132

6.3.2 Scheduling 132

6.3.2.1 Overview 132

6.3.2.2 State-of-the-Art 132

6.3.2.3 Lessons Learnt 134

6.3.3 User Association 134

6.3.3.1 Overview 134

6.3.3.2 State-of-the-Art 136

6.3.3.3 Lessons Learnt 136

6.3.4 Spectrum Allocation 136

6.3.4.1 Overview 136

6.3.4.2 State-of-the-Art 138

6.3.4.3 Lessons Learnt 138

6.4 Conclusion and Future Directions 140

6.4.1 Transfer Learning 140

6.4.2 Imitation Learning 140

6.4.3 Federated-Edge Learning 141

6.4.4 Quantum Machine Learning 142

Bibliography 142

7 Reinforcement Learning for Service Function Chain Allocation in Fog Computing 147
José Santos, Tim Wauters, Bruno Volckaert, and Filip De Turck

7.1 Introduction 147

7.2 Technology Overview 148

7.2.1 Fog Computing (FC) 149

7.2.2 Resource Provisioning 149

7.2.3 Service Function Chaining (SFC) 150

7.2.4 Micro-service Architecture 150

7.2.5 Reinforcement Learning (RL) 151

7.3 State-of-the-Art 152

7.3.1 Resource Allocation for Fog Computing 152

7.3.2 ML Techniques for Resource Allocation 153

7.3.3 RL Methods for Resource Allocation 154

7.4 A RL Approach for SFC Allocation in Fog Computing 155

7.4.1 Problem Formulation 155

7.4.2 Observation Space 156

7.4.3 Action Space 157

7.4.4 Reward Function 158

7.4.5 Agent 161

7.5 Evaluation Setup 162

7.5.1 Fog-Cloud Infrastructure 162

7.5.2 Environment Implementation 162

7.5.3 Environment Configuration 164

7.6 Results 165

7.6.1 Static Scenario 165

7.6.2 Dynamic Scenario 167

7.7 Conclusion and Future Direction 169

Bibliography 170

Part III Management Functions and Applications 175

8 Designing Algorithms for Data-Driven Network Management and Control: State-of-the-Art and Challenges 177
Andreas Blenk, Patrick Kalmbach, Johannes Zerwas, and Stefan Schmid

8.1 Introduction 177

8.1.1 Contributions 179

8.1.2 Exemplary Network Use Case Study 179

8.2 Technology Overview 181

8.2.1 Data-Driven Network Optimization 181

8.2.2 Optimization Problems over Graphs 182

8.2.3 From Graphs to ML/AI Input 184

8.2.4 End-to-End Learning 187

8.3 Data-Driven Algorithm Design: State-of-the Art 188

8.3.1 Data-Driven Optimization in General 188

8.3.2 Data-Driven Network Optimization 190

8.3.3 Non-graph Related Problems 192

8.4 Future Direction 193

8.4.1 Data Production and Collection 193

8.4.2 ML and AI Advanced Algorithms for Network Management with Performance Guarantees 194

8.5 Summary 194

Acknowledgments 195

Bibliography 195

9 AI-Driven Performance Management in Data-Intensive Applications 199
Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale, and Francesco Lo Presti

9.1 Introduction 199

9.2 Data-Processing Frameworks 200

9.2.1 Apache Storm 200

9.2.2 Hadoop MapReduce 201

9.2.3 Apache Spark 202

9.2.4 Apache Flink 202

9.3 State-of-the-Art 203

9.3.1 Optimal Configuration 203

9.3.1.1 Traditional Approaches 203

9.3.1.2 AI Approaches 204

9.3.1.3 Example: AI-Based Optimal Configuration 206

9.3.2 Performance Anomaly Detection 207

9.3.2.1 Traditional Approaches 208

9.3.2.2 AI Approaches 208

9.3.2.3 Example: ANNs-Based Anomaly Detection 210

9.3.3 Load Prediction 211

9.3.3.1 Traditional Approaches 212

9.3.3.2 AI Approaches 212

9.3.4 Scaling Techniques 213

9.3.4.1 Traditional Approaches 213

9.3.4.2 AI Approaches 214

9.3.5 Example: RL-Based Auto-scaling Policies 214

9.4 Conclusion and Future Direction 216

Bibliography 217

10 Datacenter Traffic Optimization with Deep Reinforcement Learning 223
Li Chen, Justinas Lingys, Kai Chen, and Xudong Liao

10.1 Introduction 223

10.2 Technology Overview 225

10.2.1 Deep Reinforcement Learning (DRL) 226

10.2.2 Applying ML to Networks 227

10.2.3 Traffic Optimization Approaches in Datacenter 229

10.2.4 Example: DRL for Flow Scheduling 230

10.2.4.1 Flow Scheduling Problem 230

10.2.4.2 DRL Formulation 230

10.2.4.3 DRL Algorithm 231

10.3 State-of-the-Art: AuTO Design 231

10.3.1 Problem Identified 231

10.3.2 Overview 232

10.3.3 Peripheral System 233

10.3.3.1 Enforcement Module 233

10.3.3.2 Monitoring Module 234

10.3.4 Central System 234

10.3.5 DRL Formulations and Solutions 235

10.3.5.1 Optimizing MLFQ Thresholds 235

10.3.5.2 Optimizing Long Flows 239

10.4 Implementation 239

10.4.1 Peripheral System 239

10.4.1.1 Monitoring Module (MM): 240

10.4.1.2 Enforcement Module (EM): 240

10.4.2 Central System 241

10.4.2.1 sRLA 241

10.4.2.2 lRLA 242

10.5 Experimental Results 242

10.5.1 Setting 243

10.5.2 Comparison Targets 244

10.5.3 Experiments 244

10.5.3.1 Homogeneous Traffic 244

10.5.3.2 Spatially Heterogeneous Traffic 245

10.5.3.3 Temporally and Spatially Heterogeneous Traffic 246

10.5.4 Deep Dive 247

10.5.4.1 Optimizing MLFQ Thresholds using DRL 247

10.5.4.2 Optimizing Long Flows using DRL 248

10.5.4.3 System Overhead 249

10.6 Conclusion and Future Directions 251

Bibliography 253

11 The New Abnormal: Network Anomalies in the AI Era 261
Francesca Soro, Thomas Favale, Danilo Giordano, Luca Vassio, Zied Ben Houidi, and Idilio Drago

11.1 Introduction 261

11.2 Definitions and Classic Approaches 262

11.2.1 Definitions 263

11.2.2 Anomaly Detection: A Taxonomy 263

11.2.3 Problem Characteristics 264

11.2.4 Classic Approaches 266

11.3 AI and Anomaly Detection 267

11.3.1 Methodology 267

11.3.2 Deep Neural Networks 268

11.3.3 Representation Learning 270

11.3.4 Autoencoders 271

11.3.5 Generative Adversarial Networks 272

11.3.6 Reinforcement Learning 274

11.3.7 Summary and Takeaways 275

11.4 Technology Overview 277

11.4.1 Production-Ready Tools 277

11.4.2 Research Alternatives 279

11.4.3 Summary and Takeaways 280

11.5 Conclusions and Future Directions 282

Bibliography 283

12 Automated Orchestration of Security Chains Driven by Process Learning 289
Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi, and Stephan Merz

12.1 Introduction 289

12.2 RelatedWork 290

12.2.1 Chains of Security Functions 291

12.2.2 Formal Verification of Networking Policies 292

12.3 Background 294

12.3.1 Flow-Based Detection of Attacks 294

12.3.2 Programming SDN Controllers 295

12.4 Orchestration of Security Chains 296

12.5 Learning Network Interactions 298

12.6 Synthesizing Security Chains 301

12.7 Verifying Correctness of Chains 306

12.7.1 Packet Routing 306

12.7.2 Shadowing Freedom and Consistency 306

12.8 Optimizing Security Chains 308

12.9 Performance Evaluation 311

12.9.1 Complexity of Security Chains 312

12.9.2 Response Times 313

12.9.3 Accuracy of Security Chains 313

12.9.4 Overhead Incurred by Deploying Security Chains 314

12.10 Conclusions 315

Bibliography 316

13 Architectures for Blockchain-IoT Integration 321
Sina Rafati Niya, Eryk Schiller, and Burkhard Stiller

13.1 Introduction 321

13.1.1 Blockchain Basics 323

13.1.2 Internet-of-Things (IoT) Basics 324

13.2 Blockchain-IoT Integration (BIoT) 325

13.2.1 BIoT Potentials 326

13.2.2 BIoT Use Cases 328

13.2.3 BIoT Challenges 329

13.2.3.1 Scalability 332

13.2.3.2 Security 333

13.2.3.3 Energy Efficiency 334

13.2.3.4 Manageability 335

13.3 BIoT Architectures 335

13.3.1 Cloud, Fog, and Edge-Based Architectures 337

13.3.2 Software-Defined Architectures 337

13.3.3 A Potential Standard BIoT Architecture 338

13.4 Summary and Considerations 341

Bibliography 342

Index 345

Authors

Nur Zincir-Heywood Marco Mellia Yixin Diao