Conference paper Open Access

An Exposed Closed-Loop Model forCustomer-Driven Service Assurance Automation

Xie, Min; Michelinakis, Foivos; Dreibholz, Thomas; S. Pujol-Roig, Juan; Malacarne, Sara; Majumdar, Sayantini; Yi Poe, Wint; M. Elmokashfi, Ahmed


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.4707588</identifier>
  <creators>
    <creator>
      <creatorName>Xie, Min</creatorName>
      <givenName>Min</givenName>
      <familyName>Xie</familyName>
      <nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org/">0000-0001-7794-7479</nameIdentifier>
      <affiliation>Telenor Research</affiliation>
    </creator>
    <creator>
      <creatorName>Michelinakis, Foivos</creatorName>
      <givenName>Foivos</givenName>
      <familyName>Michelinakis</familyName>
      <affiliation>Simula Metropolitan Centre for Digital Engineering</affiliation>
    </creator>
    <creator>
      <creatorName>Dreibholz, Thomas</creatorName>
      <givenName>Thomas</givenName>
      <familyName>Dreibholz</familyName>
      <affiliation>Simula Metropolitan Centre for Digital Engineering</affiliation>
    </creator>
    <creator>
      <creatorName>S. Pujol-Roig, Juan</creatorName>
      <givenName>Juan</givenName>
      <familyName>S. Pujol-Roig</familyName>
      <affiliation>Samsung Electronics R&amp;D Institute</affiliation>
    </creator>
    <creator>
      <creatorName>Malacarne, Sara</creatorName>
      <givenName>Sara</givenName>
      <familyName>Malacarne</familyName>
      <affiliation>Telenor Research</affiliation>
    </creator>
    <creator>
      <creatorName>Majumdar, Sayantini</creatorName>
      <givenName>Sayantini</givenName>
      <familyName>Majumdar</familyName>
      <affiliation>Munich Research Center, Huawei Technologies</affiliation>
    </creator>
    <creator>
      <creatorName>Yi Poe, Wint</creatorName>
      <givenName>Wint</givenName>
      <familyName>Yi Poe</familyName>
      <affiliation>Munich Research Center, Huawei Technologies</affiliation>
    </creator>
    <creator>
      <creatorName>M. Elmokashfi, Ahmed</creatorName>
      <givenName>Ahmed</givenName>
      <familyName>M. Elmokashfi</familyName>
      <affiliation>Simula Metropolitan Centre for Digital Engineering</affiliation>
    </creator>
  </creators>
  <titles>
    <title>An Exposed Closed-Loop Model forCustomer-Driven Service Assurance Automation</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2021</publicationYear>
  <subjects>
    <subject>autonomous management</subject>
    <subject>closed loop</subject>
    <subject>machine learning</subject>
    <subject>service exposure</subject>
    <subject>monitoring</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2021-04-21</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/4707588</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.4707587</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/5g-vinni</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;This repository accompanies the conference paper with the same title: &amp;quot;An Exposed Closed-Loop Model forCustomer-Driven Service Assurance Automation&amp;quot;, published in EuCNC 2021. In the paper we propose&amp;nbsp;an exposed CL model based on service exposure which is&amp;nbsp;meant&amp;nbsp;to automate service assurance tasks like auto-scaling in a network function virtualization (NFV) system orchestrated by ETSI Open Source MANO (OSM).&amp;nbsp;Here we provide&amp;nbsp;the testbed-generated experimental results we used to validate our proof-of-concept.&lt;/p&gt;

&lt;p&gt;Please refer to the conference paper for details about the topology and the scenario of each experiment.&lt;/p&gt;

&lt;p&gt;The csv files can be grouped in 3 categories, which correspond to the three vantage points (levels) of monitoring. Each experiment repetition is represented by a hash. The hash is either in the file name or as a column inside the csv files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. prometheus.csv&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some of the columns are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;timestamp: timestamp in Oslo timezone&lt;/li&gt;
	&lt;li&gt;experimentHash: the unique identifier of the experiment&lt;/li&gt;
	&lt;li&gt;vdu_name: Where the data comes from&lt;/li&gt;
	&lt;li&gt;metric_name: what is being measured&lt;/li&gt;
	&lt;li&gt;value: the actual value.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It was hard to make this csv&amp;nbsp;flat&amp;nbsp;(ie. use as a unique index the timestamp), because the column names would be very long. The way to use it is to filter per,&amp;nbsp;&lt;em&gt;&lt;strong&gt;&amp;lt;experimentHash, vdu_name, metric_name&amp;gt;&lt;/strong&gt;&lt;/em&gt;&amp;nbsp;and then use&amp;nbsp;&lt;em&gt;&lt;strong&gt;&amp;lt;timestamp, value&amp;gt;&lt;/strong&gt;&lt;/em&gt;&amp;nbsp;to plot the timeseries of the value for this metric (experimentHash) of this component (vdu_name) for this experiment (experimentHash).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.&amp;nbsp;sysstat&amp;nbsp;csv&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are 3 csv with the systat values . They contain&amp;nbsp;exactly the same information&amp;nbsp;just in different representations. So, pick the one that is most convenient for you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. packet capture csv (csv that starts with a hash)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;These are csvs from the packet capture (pcap) files. You can tell by the name which component created them. The files that end with a number are captured at the client (UE). Refer to the topology figure of the conference publication.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/815279/">815279</awardNumber>
      <awardTitle>5G Verticals INNovation Infrastructure</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
86
14
views
downloads
All versions This version
Views 8686
Downloads 1414
Data volume 1.9 GB1.9 GB
Unique views 7575
Unique downloads 44

Share

Cite as