Open access peer-reviewed chapter

Architecture and Operation Algorithms of Mobile Core Network with Virtualization

By Larysa Globa, Svitlana Sulima, Mariia Skulysh, Stanislav Dovgyi and Oleksandr Stryzhak

Submitted: February 8th 2019Reviewed: September 9th 2019Published: November 26th 2019

DOI: 10.5772/intechopen.89608

Downloaded: 108

Abstract

The analysis of the current situation in the wireless communication market shows an increase in the workload, which leads to an increase in the need in additional resources. However, the uneven loading of the infrastructure nodes leads to their loss of use; so, there is a need in introducing technologies that both do not lead to downtime of equipment and ensure the quality of load service during the day. An overview of the NFV virtualization technology has shown that it is appropriate to build wireless networks, since it provides the necessary flexibility and scalability. The method for determining the location and capacity of reserved computer resources of virtual network functions in the data centers of the mobile communication operator, method for determining the size of computing resources constant configuration time interval, and distributed method of local reconfiguration of the virtual network computing resources in the case of a failure or overload are proposed. Thus, configuration, operation, and reconfiguration processes in mobile core network with virtualized functions are described.

Keywords

  • network function virtualization
  • evolved packet core
  • resource allocation
  • reconfiguration
  • mobile network

1. Introduction

In the mobile cellular network, the rapid development has been observed. Modern telecommunication systems are being constructed as complex networks that involve various types of devices united into a single complex, operating in conditions of large load flows and large number of connections [1]. They can offer higher data transfer rates, with the integration of more services and guarantee of high quality of experience. Nevertheless, this development also means that the amount of data that is transferred in the mobile network is increasing and the volume of signaling traffic is increasing, respectively. According to [2], it is expected that total mobile data traffic will have increased to 77 exabytes per month by 2022, almost seven times more compared to 2017. Mobile data traffic will grow at an average annual growth rate (CAGR) equal to 46% from 2017 to 2022.

According to Shimojo et al. [3], vehicles, houses, personal devices, robots, sensors, etc. will be connected wirelessly. It means that an automatic and intelligent control system will be achieved. An increase in the number of devices will affect the IoT market, which is estimated to be $19 trillion [4], and is expected to reach 50 billion [5]. In addition, rich content services, such as real-time streaming movies that require high resolution and tele-surgery requiring small delay must be provided (Figure 1).

Figure 1.

Services in the era of future generations’ networks.

In addition, the average signaling requirement per subscriber is up to 42% higher in LTE compared to the standard of the past generation communication [6].

Furthermore, market competition requires faster deployment of services and elasticity of changing service criteria as well as the ability to cope with higher service requirements. Therefore, there is a need to manage the signaling traffic in order to provide the necessary quality of service to end users and the proper use of resources of the network operator.

In such circumstances, operators are forced to build up the network infrastructure to ensure the process of service of telecommunication services at a given level of quality. During the day, the load differs, and according to [7], up to 80% of the computing capacity of the base stations and up to half of the capacity of the core network are unused. This leads to a low usage of resources as well as a high level of energy consumption, which reduce the cost-effectiveness of the network for mobile operators.

The emergence of the concept of network functions virtualization opens up new opportunities for the world of telecommunication systems. At the same time, there is a need for new approaches, models, and methods for organizing service handling. The use of virtual servers to solve the tasks of the mobile core network can greatly simplify the process of organizing resources on the service server and ensure its scalability and fault tolerance.

The principle of network function virtualization (NFV) [8] is aimed at transforming network architectures by deploying network functions into software that can run on a standard hardware platform. According to the ETSI [9], the network function is a functional block within a network infrastructure that has defined external interfaces and a defined functional behavior. Network functions are components of the LTE evolved packet core (EPC) network, such as MME, HSS, PGW, and SGW, which for the NFV case will be deployed on the basis of data center system, with the use of leased computing resources (CPU core, memory, disk space, and network interface card), which can be allocated and reallocated in the process of operation depending on actual load requirements.

Thus, the features of NFV can be characterized as follows [10]:

  1. Separation of software from hardware. Since the network element is no longer an aggregate of integrated hardware and software entities, the evolution of both is independent of each other. This allows having separate terms of development and maintenance of software and hardware.

  2. Flexible deployment of network functions. The separation of software from hardware helps to reallocate and share infrastructure resources; thus, together hardware and software can perform various functions at different times. It helps network operators to deploy new network services faster on the same physical platform. Consequently, the components can be created in any NFV-compliant device on the network and their connections can be installed on a flexible basis.

  3. Dynamic scaling. Dividing the functionality of the network function into created software components provides greater flexibility in scaling the actual performance of the virtual network function (VNF) more dynamically and with greater details, for example, according to the actual traffic for which the network operator should provide capacity.

At present, numbers of problems remain unresolved. You need to consider hybridity of the service environment, where flexible, well-scalable, virtual servicing entities located in rented cloud-based databases operate along with specialized hardware with limited features. Therefore, the task to organize the computing resources of service nodes and flows between them in a hybrid environment, which consists of hardware telecommunications and virtual computing entities, is important.

Unlike the existing static architecture of the LTE EPC network, a system (Figure 2) in which service flows are processed by hardware, and in the case of expected overload, the redistribution of flows happens and takes into account the expansion of the service network by adding virtual service facilities located in the leased clouds of the data centers is proposed (Figure 3). After organizing a hybrid service environment, there is a need to adapt the computing resources of the system in the process of operation to ensure a high-quality service, and also it is necessary to consider the features of the reconfiguration process and the costs associated with it. So far, there has not been any comprehensive solution to the task of controlling the computing resources of the hybrid telecommunication environment. The peculiarities of the load distribution of resources of network elements, hardware or virtual ones, have it been considered yet either.

Figure 2.

LTE EPC network architecture with the use of NFV (variable dependent on load volumes).

Figure 3.

Distribution of load in hybrid network.

Thus, the chapter proposes a structured approach to the management of resources of network functions through sequential control of the following stages: monitoring, forecasting, controlling the sufficiency of resources, and controlling the given level of quality of telecommunication services.

Having analyzed the research and development processes of telecommunication networks of the next generation, we may argue that the existence of powerful data centers greatly expands the possibilities of organizing the process of providing services. One of the key aspects of network virtualization is the allocation of physical resources to virtual network functions. This involves mapping virtual networks on physical networks, as well as managing dedicated resources throughout the life cycle of a virtual network. The optimality and flexibility of resource allocation are key factors for successful network virtualization.

Most of the existing methods for solving the tasks of organizing hardware and virtual resources offer a static distribution of resources, in which, when computing and telecommunication environment is organized, the reallocation of resources does not occur throughout its life cycle. As the network traffic is not static, this may result in improper use of shared computing resources. It is important to organize monitoring of virtual nodes and provide the resources on the basis of their real needs.

2. Method for determining the location and required capacity of virtual reserved computing resources in case of an overload of the physical network

The method is based on the shared embedding concept [11] of the individual virtualized services of the core network on the physical network. We suppose that the virtual network functions of the mobile core network have the same functionality and interfaces as the network components of the 3GPP LTE EPC architecture.

The number of service chains must be determined in advance. The extreme case would be consideration of one service chain for the mobile phone/eNodeB. Since realistic scenarios for mobile networks are up to 10,000 eNodeBs, the resulting optimization model will be enormous and quite long computation time is required to solve it. Therefore, we accept reasonably large clusters of eNodeBs and assume that each of these eNodeB clusters refers to a single service chain of the core network.

Consider the situation when the provider of telecommunication services already has an existing topology of base stations. You need to determine a subset of the network nodes where the load aggregation blocks will be placed which will generate the requests to the same virtualized EPC service. After that, for each base station site, we assign a node of aggregation (traffic aggregation point – TAP).

Let xi be a binary variable that is equal to 1 if we need to place TAP at point i and equals 0 in the other case. In addition, we define yji as a binary variable that is equal to 1 if the base station j sends the load to the i TAP and equals 0 in the other case. We need to define the values of xi and yji in order to find the optimal value of the objective function.

Objective function (1) aims to minimize network latency. Objective function (2) represents the total cost of placing aggregation nodes and the cost of establishing channels between base stations and the respective TAPs. The objective function (3) aims to leave more free bandwidth on each physical channel. The residual bandwidth of all channels is maximized, since high-downloaded channels can lead to network overload; so, it is advisable to get a solution where more free channels are left.

These optimization goals can be useful for network operators to plan the best deployment strategy.

minxi,yjiijyji·Lji,E1
minxi,yjiixi·costi+ijyji·costlji,E2
maxxi,yjiijyji·cjiBji,E3

where Lji is the delay of the communication channel between the site j and TAP i;

costi is the cost that consists of two parts: the fixed initial cost fi, which is responsible for fixed investments such as space and installation of equipment, and the additional costs – costNi – per unit of processing power on the computing node, where di is the amount of computational resources of processing: costi=fi+costNi·di;

costlji is the cost of establishing a connection between the site j and TAP i, and it is determined as a linear combination of the initial fixed cost flji and the variable part dependent on the bandwidth Bji, which is necessary for the channel, and the cost of the unit of capacity costLj: costlji=flji+costLi·Bji;

cji – available bandwidth throughput.

It is possible to use the linear combination (4) of Eqs. (1)(3) with weights a, b, and c, which can be applied not only to give importance the component but also in order to scale the values of these equations for the purpose of converting to comparable values and have meaningful summation:

minxi,yjia·ijyji·Lji+b·ixi·costNi+ijyji·costLjic·ijyji·cjiBjiE4

Subject to:

iyji=1j,E5
yjixiji,E6
ixip,E7
jyji·djpii,E8
iyji·cjiBji0j,E9
iyji·LjiTjj.E10

Restriction (5) ensures that each base station will be connected only one TAP. Restriction (6) ensures that a channel is created between the base station site j and the TAP i only if i was placed.

Restriction (7) ensures that the maximum TAP does not exceed budget p, while (8) is a capacity limit that ensures that the general requirements for processing of all base stations assigned to a specific TAP do not exceed the actual physical resources installed. Restriction (9) makes sure the sufficiency of channel resources for the establishment of channels, and (10) ensures admissibility of delay value, i.e., not exceeding the threshold Tj.

Below we describe the method for solving the problem of placement and the capacity of reserved computing resources of virtual network functions.

Physical network is given in the form of graph SN = (N, NE), where N is a set of physical nodes and L is a set of channels. Each channel l = (n1, n2) ∈ NE, n1,n2 ∈ N has a maximum capacity of c(n1, n2) and each node n ∈ N is associated with certain resources cni, i ∈ R, where R is the set of resource types (CPU cores, memory, disk space, and network interface card). The set of all traffic aggregation points (TAPs), i.e., eNodeB clusters, is denoted as K ⊆ N. For each node n ∈ N, suitnk,j is a binary parameter that indicates whether it is administratively possible to deploy a function j ∈ V on the node n, where V is the set of types of network functions, k service, where k ∈ K.

A virtual mobile core network is represented by a set of services (one service per TAP) which are embedded in the physical network.

The requirements to the bandwidth between two functions, j1 and j2, (j1,j2)∈E, referring to the TAP k∈K service are denoted as dk(j1,j2). dkj,i is the amount of computing resource type i allocated to the network function j in the service k. sn,ik,j specifies the processing time for the type resource i of the virtual network function j for the service k with one resource unit on node n. The requirements to the admissible processing time of the network function j related to the service k are designated as Pkj. Tk – the maximum delay for kK, L(n1,n2) is the network latency for the channel (n1,n2)NE.

The goal of optimization is to find the location of the virtualized services of the core network (i.e., the allocation of network functions and the allocation of resources, as well as definition of the ways to transfer traffic between them), so as to minimize the cost of the occupied resources of channels and nodes in the physical network, while satisfying the load requirements λk,j. Let us formulate an objective function (Eq. (11)) in the form of a linear combination of two value expressions: the occupied capacity of computing node resources, where the value of resource unit i on node n is denoted by costN(i,n), and the occupied bandwidth of the channels, where costL(n1,n2) is the cost of the unit of bandwidth of the physical channel (n1,n2)NE.

The following Eqs. (11)(20) represent the formulation of the optimization problem of mixed integer nonlinear programming. The Boolean variables xnk,j indicate whether the network function j associated with the service k is located on the physical node n. For j = TAP, xnk,TAP are not variables but input parameters that indicate where TAP k is, i.e.,

xnk,TAP=1ifk=n,0else.

Similarly, Boolean variables fn1n2k,j1j2indicate whether the physical channel (n1,n2)NE is used for the path between j1 and j2 for service k.

minxnk,j,f(n1,n2)k,(j1,j2),dtj,i(kKjVnNiRxnk,j·dkj,i·costN(i,n)+(n1,n2)LcostL(n1,n2)·kK(j1,j2)Ef(n1,n2)k,(j1,j2)·dk(j1,j2))E11
Subject tonNxnk,j=1kK,jVE12
xnk,jsuitnk,jkK,jV,nNE13
wnNEkKj1j2Efwnk,j1j2·dkj1j2cnbdwnNE14
kKjVxnk,j·dkj,icninN,iR\bdwE15
kKj1j2Efn1n2k,j1j2·dkj1j2cn1n2n1n2NEE16
nwNEfwnk,j1j2fnwk,j1j2=xnk,j1xnk,j2kK,nN,j1j2EE17
xnk,j,fn1n2k,j1j201kK,jV,nN,j1j2E,n1n2NEE18
j1j2En1n2Lfn1n2k,j1j2·Ln1n2TkkKE19
nNxnk,jiR1dkj,isn,ik,jλk,jPkjtT,jVE20

Eq. (12) ensures that for each TAP/service, only one network function of each type is placed. Eq. (13) ensures that the allocation of resources is carried out on physical nodes, which have an administrative opportunity to locate the corresponding network functions. Eqs. (14)(16) represent restriction for the available resources of physical nodes and channels. Eq. (17) represents a restriction for flow conservation of all paths in the physical network. Eq. (18) ensures that the variables in the task of locating network functions and displaying a path are Boolean.

In order to limit the delays on channels, the delay limit shown in Eq. (19) is also added. And to take into account the necessary performance of the virtual network function, the restrictions for the value of the processing time of the request determined in Eq. (20) are necessary.

It is supposed to solve the problem (11)(20) in the offline mode at the initial stage. According to the solution, each network function reserves a certain number of resources of the virtual network function based on the assessment of its greatest resource requirements. The instantaneous needs of different network functions are dynamically satisfied by activating the necessary configuration of virtual machines during execution in such a way as to satisfy the guarantees provided for each network function.

3. Method for determining the size of the time interval of the constant configuration of computing resources

The decision when to provide resources depends on the dynamics of traffic loads. Telecommunication loads undergo long-term changes, such as hourly effects or seasonal effects, as well as short-term fluctuations such as unexpected crowds. While long-term fluctuations can be predicted in advance, observing changes in the past, short-term fluctuations are less predictable, and in some cases, unpredictable. The proposed method uses two different approaches for working in conditions of changes that are observed at different time scales. Proactive resource management is used to assess the load and corresponding management, as well as reactive resource management is used to correct long-term errors or to respond to unforeseen overload.

We propose to apply a mechanism which implies dynamic change in the duration of the constant configuration of the resources of the virtual network function, depending on the difference between the maximum load value at a certain base interval and the minimum one. Eq. (21) describes the principle:

Intt=maxIntbase·1K·maxτϵtIt1tλbasepredτminτϵtIt1tλbasepredτmaxλbasepred;Intminbase,E21

Int is the interval during which the appropriate specified resources will be allocated; Intbase is the base value of the interval calculated according to the load discretization approach described below; K is the coefficient of the duration change of constant configuration determined by the network operator according to the experiment; λbasepred(t) is the average predicted arrival rate in the period t, and Intminbase is the minimum acceptable value of the base interval.

To do this, you need to define the base interval. The goal is to present a daily load pattern, sampling its requests into successive, non-overlapping time intervals with a single representative value in each interval. Load discretization: having a time series X in the interval [v, τ], time series Y on the same interval is the discretization of the load X, if [v, τ] can be divided into m consecutive non-overlapping time intervals, {[v, τ1],[τ1, τ2],…,[τm-1, τ]}, so that X(j) = ri, for all j in i-th interval, [τi-1, τi].

The solution for time series discretization (Eq. 22) is given as follows:

i=1mτ=τi1τiuriXτ+fmmin.E22

Eq. (22) is an objective function which has to be minimized, where X is the time series and f(m) is a function of the value of the number of changes or intervals, m. The purpose of Eq. (22) is to simultaneously minimize the load representation error and number of changes. Basic interval is calculated as Intbase=τmm. In order to determine the optimal value of the interval, we set different values of the number of intervals, calculate the value of the Eq. (22) and choose the best, i.e., the minimum one, having for each interval:

ri=maxτϵτi1τiXτ.E23

At the same time, it is proposed to continuously monitor the values of the request arrival rate and use the predicted values if the load does not exceed the threshold; otherwise, current trends are evaluated and resources are scaled on the basis of the new forecast.

Load forecasting for the next time interval is carried out by taking into account long-term statistics and adjusting it according to the model of exponential smoothing, where errors of more recent past periods have a greater importance factor:

λpredt=λbasepredt+αj=tht11αt1j·λobsjλbasepredj+,E24

α (smoothing constant) is the coefficient that characterizes the weight rate reduction and takes values from 0 to 1; the closer the value of this parameter is to 1, the better is the consideration of the influence of the last levels of the series during the forecast. The model parameters are set by the network administrator according to the experiment. λobs(t) is the request arrival rate on interval t, h is the interval of previous observations, which is considered by the algorithm, and x+ denotes max(0,x).

4. Method of local reconfiguration of network computing resources in case of failure or overload

There might be situations when the resources available on the nodes will be insufficient or if the node fails. Potential failures can be physical nodes failures, failures of servers that have higher failure rates than telecommunication hardware or the infrastructure provider will perform node maintenance tasks and this will require the migration of nodes.

For this case, the methods of reconfiguration are used which seek to find the places for migration of network functions from the affected nodes, minimizing the cost of recovering the node after failure and maintaining a high level of physical performance of the network. The proposed improved recovery methods differ from existing ones by taking into account the cost of resources on the nodes and the final quality of service, as well as the case of node overload. In addition, in previous research, the problem of locating management nodes, which are coordinators of the movement of virtual network functions, remained unsolved.

MN represents a set of control nodes (hereinafter–managers), where managers MN⊆N are responsible for the operation of the proposed recovery mechanism after the failure. Each control node is connected to one or more nodes in the physical network and performs the steps required to recover from the failure. Let us assume that managers can be located in nodes N. For a given number of managers A, there is a finite set of possible NAlocations, so the task of placing managers is the task of multi-criteria combinatorial optimization. The purpose of the task is to determine the location of each manager at a given number of A, so that the general cost function UA({pn:n∈N}) can be minimized, where pn is a Boolean variable equal to 1 if the manager is placed at the point n. The task of optimization will be given as follows:

minpn:nNUAsubject tonpn=A.E25

The main purpose of the optimal placement of managers is to minimize delays between nodes and managers in the network. However, considering only delays is not enough. The placement of managers should also take into account certain restrictions of stability. Figure 4 shows different issues that need to be considered when evaluating the stability of the placement. Below we will briefly explain these issues and what is needed to be sustainable in relation to them. Figure 4 shows normalized delays between nodes and arrival rate at nodes.

Figure 4.

Assignment according to different criteria: (a) minimal delay to the manager; (b) a minimum load imbalance of the managers; and (c) the minimum delay between managers.

Let us presume that the nodes are assigned to their closest manager, using as the metric of delay, i.e., the shortest path dlg1,g2 between the node g1 and the manager g2. The number of nodes per manager may be unbalanced – the more nodes the manager has to control, the greater is the load per this manager. If the number of site requests to the manager in the network increases, additional delays probability due to the queues in the control system increases too. In order to be resilient to manager overload, the assignment of nodes to different managers should be balanced properly.

It is obvious that one manager is not enough to achieve network resilience. On the other hand, when multiple managers are hosted in the network, the logic of network management is distributed across multiple managers, and these managers must be synchronized to maintain a consistent global state. Depending on the frequency of synchronization between managers, the delay between individual managers plays an important role.

Based on the dl matrix, which contains the distance of the shortest paths between all nodes, the maximum transmission latency between the node and the manager for a certain placement of managers can be calculated as follows:

UAlatency(p) = max(ddcn),

ddcn is the maximum transmission delay from the network node to the manager at the point n;

ddcn is calculated as follows:

ddcn=maxgNlatencyg·πg,n,

where latencyg is the delay between manager and node g, latencyg=minn:nNpn=1dlg,n;

πg,n is a Boolean variable equal to 1 if node g is served by a manager located at the point n.

We consider not the average, but the maximum delay value, since the average hides the values of the worst case which are important when resiliency needs to be improved.

Depending on the situation, it may be desirable to have an approximately equal load for all managers, so that no manager is overloaded, while others have little work. Next, we consider the balanced distribution of nodes between managers. As a formal metric, we introduce the balance of placement, or rather, the imbalance, UAimbalance, i.e., the deviation from the fully balanced distribution, as the difference between the load for the most downloaded manager and the least downloaded manager.

UAimbalance is calculated as follows:

UAimbalance(p) = max(ldcn)– min(ldcn), де ldcn > 0,

ldcn – manager load at n;

ldcn is given as follows:

ldcn=gNloadg·πg,n,

where loadg is the load factor for the node g.

As the last aspect of a resilient placement of managers, let us consider how the delay between managers can be taken into account when choosing managers. Formally, the delay between managers UAinterlatency is defined as the greatest delay between any two managers at a given placement:

UAinterlatencyp=maxng:ngNpn=1pg=1dlg,n.

In general, placement with a delay between managers’ considerations tends to place all managers closer to each other. This increases the maximum delay from nodes to managers.

Thus, the target optimization function is given by:

UA=wulatency×UAlatencyp+wuimbalance×UAimbalanсep++wuinterlatency×UAinterlatencyp,

where wu is the set of importance coefficients.

The recovery algorithm is based on prototype described in [12] but considers modified problem formulation and expands the solution on node overload case.

The physical network is given in the form of a graph SN = (N,NE), where N is a set of physical nodes and NE is a set of channels. Each channel (n1,n2)NE, n1,n2N has a maximum throughput of c(n1,n2) and a network delay L(n1,n2), and each node n∈N is associated with certain resources cni, iR, where R is the set of types of resources. The communication network is represented by a set of services (or virtual network requests) K that are embedded into the physical network. The virtual network request k, kK, can be given as a graph Gk = (Vk,Ek), where Vk is the set of virtual nodes containing hk elements and denoted as Vk = (vk,1,vk,2,…,vk,hk), where vk,j indicates the j-th network function in the service chain of k. Ek is the set of virtual channels ek(vk,j,vk,g)Ek. The channel throughput requirements between the two functions, j1 and j2, referring to the kK service are marked as dk(j1,j2), dkj,i is the number of resource type i allocated to the network function j in the k-th service. The Boolean variables xnk,j indicate whether the network function j associated with kK is located on the physical node n, and the variables f(n1,n2)k,(j1,j2) determine whether the physical channel (n1, n2) is used in the path between j1 and j2 for request k. Lk is the maximum delay for request k. costN(i,n) is the cost of the occupied resource unit on the physical node n, and costL(n1,n2) is the cost per unit occupied bandwidth on the physical channel (n1,n2)NE. suitnk,j means that the j function k can be placed on node n.

The process of moving the nodes of the virtual network hosted on the failed node, vk,jfail, starts when the system sends a recovery request to the corresponding host manager. The recovery process for each failed virtual node proceeds as follows: the manager sends the recovery request to all nodes of the physical network, which hosts the virtual nodes adjacent to the affected virtual nodes. Each of these nodes builds the shortest path tree (SPT) to all nodes of the physical network at a distance of not more than l (the threshold is set by the service provider) from the node, where the SPT root is the node. The manager uses these paths to select the node with the optimal distance to all nodes in the physical network, where the nodes of the virtual network are located adjacent to the failed node. This node eventually becomes the best candidate for hosting the affected virtual host. In addition, the capacity of the end nodes of the paths with the SPT should be at least the capacity of the virtual node located on the failed node. We select a node with a minimum cost of the path to all root nodes in the SPT trees and the minimum processing cost. Figure 5 contains a description of the pseudo-code of the recovery algorithm (Figure 6) after failure and is applied for all {vk,j: xnk,j = 1 & n = failed}.

Figure 5.

Algorithm of recovering the node with a failure.

Figure 6.

Recovering the node with a failure.

There is also a probability of the node failure due to overload. To perform a recovery in an overloaded network, the reconfiguration procedure is performed to migrate the virtual nodes hosted on the overloaded physical node.

The recovery process begins with sorting all the virtual nodes located on the overloaded physical node. The criterion (CRT in Figure 7) used to sort these nodes in a virtual network is the capacity of the virtual nodes. Then, the recovery procedure is performed on the first sorted virtual network node, which has a capacity equal to the overloaded, to migrate to the new node of the physical network.

Figure 7.

Recovering the node with overload.

When the load or resources change, some virtual network functions (VNFs) may have to be moved. There is a probability that finding a new node candidate for a node of a virtual network hosted on a failed site will not be possible. In this case, the reconfiguration procedure is performed to migrate one or more virtual nodes. Let us consider the problem of migration as an optimization problem, which is aimed at minimizing the general migration costs with the limits of permissible delay and computational resources.

The goal of optimization is to find the location of virtual network functions (i.e., the location of network functions and resource allocation as well as channels to transfer traffic between them), so as to minimize the cost of the occupied resources of channels and nodes in the physical network, while satisfying the requirements of traffic. Let us give the objective function (26) in the form of a linear combination (with weighted coefficients a, b, c, and e) of the cost expressions.

Let us determine the binary variable xnk,j∈{0,1} to indicate that VNF j is associated with the service chain k placed on the node n after migration. The indicator xnk,j = 0 means that VNF j is not placed on node n after migration; otherwise, j is placed on node n after migration.

Then, we enter the binary variable ynk,j to display the network status before migration. It is similar to variable xnk,j, ynk,j = 0 means that VNF is not located on node n before migration; otherwise, j is located on node n before migration.

Thus, we can use the Ik,j indicator to indicate whether the VNFj by k service was moved in the current migration process.

Ik,j=nNxnk,j·ynk,j

Ik,j = 0 indicates that the VNF has been moved in the current migration process, and Ik,j = 1 indicates that the VNF has not been moved.

xn denotes whether the n physical server works or not after migration.

xn=1servernlaunched0otherwise

yn indicates whether the n physical server works or not before migrating.

yn=1servernlaunched0otherwise

In order to consider the resources that are consumed while migrating, we introduce the following equations:

Bn indicates the required bn costs to launch the n-th server:

Bn=bnxnxnyn;

Lik,jnndenotes the use of resource i for the migration of VNF j from the service chain k from the server n to the server n’:

Lik,jnn=lidk,j+lidk,j,

where li(x) is the function of using resource i for migration from the server and l’i(x) is the use of resource i for migration to the server.

The objective function will be calculated as follows:

MCost=a·nN(Bn+xn·cost(n))+b·nNkKjViRxnk,j·dik,j·costN(i,n)+c·(n1,n2)NEcostL(n1,n2)·kK(j1,j2)Ef(n1,n2)k,(j1,j2)·dk(j1,j2)+e·nNnNLik,j(nn)xn(xnyn)E26

Taking everything into account, we formulate the problem as follows.

Objective function:

Min MCost.

With constraints:

nNxnk,j=1kK,jV,E27
xnk,jsuitnk,jkK,jV,nN,E28
kKjVxnk,j·dik,j+ynk,j·(1Ik,j)·li(dk,j)+xnk,j·(1Ik,j)·li(dk,j)cninN,iR,E29
tKj1j2Efn1n2k,j1j2·dkj1j2cn1n2n1n2NE,E30
nwLfwnk,j1j2fnwk,j1j2=xnk,j1xnk,j2
kK,nN,j1j2E,E31
xnk,j,fn1n2k,j1j201kK,jV,nN,j1j2E,n1n2NE,E32
j1j2En1n2NEfn1n2k,j1j2·Ln1n2LkkK,E33
nNxnk,jiR1dkj,isn,ik,jλk,jPkjkK,jVE34

Hence, the objective function (26) is a linear combination of four equations which aims to minimize: the cost of starting and using a server, using server resources, communication channels, and resources for migration. Eq. (27) ensures the one-time allocation of network functions, and Eq. (28) is the administrative possibility of placement on the node. Eqs. (29) and (30) represent a limit for the resources of physical nodes and channels, i.e., they ensure that the amount of resources involved in a node does not exceed the amount of available resources. Eq. (31) represents a flow conservation limit, i.e., the input stream at the node is equal to the output stream. Eq. (32) ensures that the variables in the problem are Boolean. Eqs. (33) and (34) represent a limit for the time of transmission by telecommunication channels and time of processing by service nodes, respectively, and ensure compliance with the specified time requirements for the service.

5. Operating scheme of the resource management system

Thus, before operation starting, it is necessary to have statistics on the requests arrival rate for the network function and the probability characteristics of the request servicing. According to the allocation method, the binding of each network function of the traditional network to the data center and the amount of resources that should be reserved for the corresponding virtualized network function is determined. Next, it is necessary to divide the lifecycle of the network function into intervals during which its configuration will remain unchanged and a certain amount of resources will be activated in accordance with the method of determining the size of the resources constant configuration time interval, while taking into account the expected load. When a mobile network operates, a physical node may not be able to continue to handle an incoming load due to lack of resources or due to its failure, and in this case, a distributed local reconfiguration of resources that re-distributes virtual nodes is triggered.

The general resource management system is shown in Figure 8.

Figure 8.

Modified resource management system.

The monitoring system tracks traffic and counts the number of requests. The monitoring system sets the threshold for the number of requests and sends a message to the coordinator if detecting an overload. When the coordinator accepts an overload message from the monitoring system, the resource allocation unit calculates the required amount of resources to process the applications properly and dynamically distributes the estimated volume. Then, the coordinator redirects the requests and the overload is eliminated.

The coordinator is launched periodically. To predict the base load, one can take the average value of historic daily load. The coordinator sends an incoming load to a data center, which maintains excessive workload, and also exchanges data with a resource allocation unit to provide information about the predicted input load.

The resource distribution module is responsible for distributing the appropriate amount of resources needed to handle the load with the specified quality indicators. During the direct operation of the system, this module is started when the actual load exceeds the base predicted value of the load in order to provide additional resources for excessive load. Since the resource distribution module and coordinator do not start when the actual load is lower than the predicted one, the resource reconfiguration procedure creates minimal additional costs associated with this process.

The general operating scheme of the resource management system is shown in Figure 9.

Figure 9.

The method of system resource management.

6. Analysis

Quantitative and qualitative analysis (Figure 10) of the proposed methods showed a reduction of the cost associated with reserved resources up to 15%, which contributes to increasing the efficiency of load processing, saving computing resources.

Figure 10.

Consumption of system resources by using the method of allocating virtual network functions and without it.

The examples of representation of time series values, i.e., loads that illustrate the accuracy of representation, depending on the selected interval of the constant configuration, are presented in Figure 11, where the representation error for the case of intervals in 10 minutes is 7%, and for the case of 60 minutes—19%.

Figure 11.

Representation of load values depending on different values of the constant configuration interval.

The results of simulation of the method of determining the size of the resources constant configuration time interval (Figure 12) showed that the difference between representational value and actual one can be 9%. If you do not apply a dynamic adjustment system to the value of the constant configuration interval, then the deviation will be 18%, i.e., 9% more, and the resources will be spent more.

Figure 12.

Results of simulating the system with dynamic change in the value of constant configuration time interval and the system without it.

In order to assess the proposed approach, the average amount of free resources per day was determined as the difference between fixed allocations, i.e., when 100% of resources were always allocated during the day, and dynamically allocated resources by using NFV. According to the results of simulation, the volume of resources allocated dynamically on average is 42% less than in the case of using the traditional distribution approach. Figure 13 depicts the result of the dynamic distribution of resources in the virtualized EPC of the mobile network in a graphical form. A gray line illustrates the fixed allocations for the worst case scenario. The black curve shows the amount of resources distributed dynamically according to the proposed method.

Figure 13.

Results of simulating the system with variable configuration of resources and the system with fixed resources.

According to the simulation results (Figure 14), the proposed local reconfiguration method showed up to 27% lower costs compared to a strategy aimed at minimizing delay, the delay being within the permissible limits but by 20% greater.

Figure 14.

Results of simulating the system with variable configuration of resources and the system with fixed resources.

7. Conclusions

The main result of the study has become the development of the method for reconfiguring resources of the core network by means of virtualization technology. As a result of the research, the following basic scientific results have been obtained.

The analysis of the current situation in the wireless communication market shows an increase in the workload, which leads to an increase in the need in additional resources. However, the uneven loading of the infrastructure nodes leads to their loss of use; so, there is a need in introducing technologies that both do not lead to downtime of equipment and ensure the quality of load service during the day.

An overview of the NFV virtualization technology has shown that it is appropriate to build wireless networks, since it provides the necessary flexibility and scalability.

We have developed the method for determining the location and capacity of reserved computer resources of virtual network functions in the data centers of the mobile communication operator, which guarantees the quality of providing telecommunication services with the minimum necessary resources by determining their sufficient configuration in a heterogeneous environment of available resources. This allows reducing costs by 13% compared to the randomly selected monocloud and by 47% compared with the traditional approach to deploying the network.

In addition, we have developed the method for determining the size of computing resources constant configuration time interval, which involves its changing and the consideration of both the cost of reconfiguration and the use of resources, as well as provides a flexible use of resources in the virtualized environment, which reduces the percentage of free resources by 42% compared to the dedicated equipment and by 9% compared to existing analogs and reducing the workload on the network.

Furthermore, we have improved the distributed method of local reconfiguration of the virtual network computing resources in the case of a failure or overload, which uses decentralized management and considers migration costs, that redistributes virtual network functions in normal and emergency modes while providing rational resource usage and reducing costs on average by 21%.

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Larysa Globa, Svitlana Sulima, Mariia Skulysh, Stanislav Dovgyi and Oleksandr Stryzhak (November 26th 2019). Architecture and Operation Algorithms of Mobile Core Network with Virtualization, Mobile Computing, Jesus Hamilton Ortiz, IntechOpen, DOI: 10.5772/intechopen.89608. Available from:

chapter statistics

108total chapter downloads

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

Related Content

This Book

Next chapter

Mobile Distributed User Interfaces

By Erika Hernández-Rubio, Amilcar Meneses-Viveros and Sonia G. Mendoza-Chapa

Related Book

First chapter

Access Control Solutions for Next Generation Networks

By F. Pereniguez-Garcia, R. Marin-Lopez and A.F. Gomez-Skarmeta

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

More About Us