Post-Action Verification in Self-Organizing Networks Manuel Höfler Technische Universität München Fakultät für Informatik Lehrstuhl für Netzarchitekturen und Netzdienste Garching, 28. Juli 2017
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Global Mobile Data Traffic, 2016 to 2021 CAGR=compound annual growth rate Source: Cisco VNI Mobile, 2017 Manuel Höfler (TUM) | Post-Action Verification in SONs 2
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Overview Self-Organizing Networks ● Post-Action Verification ● Configuration Management Verification – Topology Verification – Related: Pre-Action Coordination ● Manuel Höfler (TUM) | Post-Action Verification in SONs 3
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Self-Organizing Networks (SONs) Main properties: ● Self-Configuration Self-Optimization Self-Healing Goals: ● Stable, full-coverage network – Automation – Autonomy – Manuel Höfler (TUM) | Post-Action Verification in SONs 4
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Self-Organizing Networks (SONs) PM = Performance Management CM = Configuration Management FM = Fault Management Manuel Höfler (TUM) | Post-Action Verification in SONs 5
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Post-Action Verification Verification The evaluation of whether or not a product, service, or system complies with a regulation, requirement, specification, or imposed condition. Source: IEEE – The PMBOK guide Manuel Höfler (TUM) | Post-Action Verification in SONs 6
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Post-Action Verification Verify CM & Topology changes ● Create undo requests for harmful changes ● Save money & time ● Self-healing ● Enable automation ● Manuel Höfler (TUM) | Post-Action Verification in SONs 7
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Constraint Optimization Approach Three-step process ● Verification area creation Anomaly Detection Generation of CM undo requests Manuel Höfler (TUM) | Post-Action Verification in SONs 8
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature Each NE receives a virtual temperature (NEVT) ● NEVT rises when CM changes are done ● NEVT decreases with time ● NEVT is propagated to neighbors ● Manuel Höfler (TUM) | Post-Action Verification in SONs 9
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (2) Manuel Höfler (TUM) | Post-Action Verification in SONs 10
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (3) a) No activity Manuel Höfler (TUM) | Post-Action Verification in SONs 11
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (4) b) Major reconfiguration Manuel Höfler (TUM) | Post-Action Verification in SONs 12
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (5) c) First step of heat distribution Manuel Höfler (TUM) | Post-Action Verification in SONs 13
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (6) d) Second step of heat distribution Manuel Höfler (TUM) | Post-Action Verification in SONs 14
Chair of Network Architectures and Services Department of Informatics Technical University of Munich CM Verification: Network Element Virtual Temperature (7) e) Final stable state Manuel Höfler (TUM) | Post-Action Verification in SONs 15
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification Previous approaches fail for topology changes ● Today‘s mobile networks contain on-demand cells ● Steiner trees can solve this problem ● Manuel Höfler (TUM) | Post-Action Verification in SONs 16
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Steiner Trees Invented by swiss mathematician Jakob Steiner ● Generalization of the Minimum Spanning Tree ● Set V of vertexes is divided into ● Source: Wikipedia Steiner terminals V T – (must be included) Steiner points V S – (can be included) Manuel Höfler (TUM) | Post-Action Verification in SONs 17
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees Manuel Höfler (TUM) | Post-Action Verification in SONs 18
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (2) (a) Static cells (1,2,6,7), enabled on-demand cells (5,4), and disabled on- demand cells (3,8) Manuel Höfler (TUM) | Post-Action Verification in SONs 19
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (3) (b) Input graph G Manuel Höfler (TUM) | Post-Action Verification in SONs 20
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (4) (c) Complete terminal graph D G (V T ) Manuel Höfler (TUM) | Post-Action Verification in SONs 21
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (5) (d) MST T DG of D G (V T ) Manuel Höfler (TUM) | Post-Action Verification in SONs 22
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (6) (e) Steiner tree T S Manuel Höfler (TUM) | Post-Action Verification in SONs 23
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Topology Verification: Steiner Trees (7) (f) Allowed topology changes: disabling on-demand cells (5,4) and enabling (3) Manuel Höfler (TUM) | Post-Action Verification in SONs 24
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Related: Pre-Action Coordination Coordinate execution of SON functions ● Evaluates if running a SON function is ● safe at the current state Acts based on knowledge and ● predictions Manuel Höfler (TUM) | Post-Action Verification in SONs 25
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Summary Self-Organizing Networks consist of a set of Network Elements and a set of SON ● Functions Post-Action Verification verifies the desired operation of Network Elements ● Post-Action Verification is a key enabler for modern high-speed mobile networks ● Configuration management changes can be verified in several ways ● Steiner trees allow the verification of topology changes ● Pre-Action Coordination is a conjoined concept to control SON function execution ● Manuel Höfler (TUM) | Post-Action Verification in SONs 26
Chair of Network Architectures and Services Department of Informatics Technical University of Munich Thank you Manuel Höfler (TUM) | Post-Action Verification in SONs 27
Recommend
More recommend