Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)
Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)

Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

COMMUNICATION NETWORKS AND SERVICE MANAGEMENT IN THE ERA OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING Discover the impact that new technologies are having on communication systems with this up-to-date and one-stop resource Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning delivers a comprehensive overview of the impact of artificial intelligence (AI) and machine learning (ML) on service and network management. Beginning with a fulsome description of ML and AI, the book moves on to discuss management models, architectures, and frameworks. The authors also explore how AI and ML can be used in service management functions like the generation of workload profiles, service provisioning, and more. The book includes a handpicked selection of applications and case studies, as well as a treatment of emerging technologies the authors predict could have a significant impact on network and service management in the future. Statistical analysis and data mining are also discussed, particularly with respect to how they allow for an improvement of the management and security of IT systems and networks. Readers will also enjoy topics like: A thorough introduction to network and service management, machine learning, and artificial intelligence An exploration of artificial intelligence and machine learning for management models, including autonomic management, policy-based management, intent based ­management, and network virtualization-based management Discussions of AI and ML for architectures and frameworks, including cloud ­systems, software defined networks, 5G and 6G networks, and Edge/Fog networks An examination of AI and ML for service management, including the automatic ­generation of workload profiles using unsupervised learning Perfect for information and communications technology educators, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning will also earn a place in the libraries of engineers and professionals who seek a structured reference on how the emergence of artificial intelligence and machine learning techniques is affecting service and network management.

Table of Contents:
List of Contributors xv Preface xxi Acknowledgments xxv Acronyms xxvii Part I Introduction 1 1 Overview of Network and Service Management 3 Marco Mellia, Nur Zincir-Heywood, and Yixin Diao 1.1 Network and Service Management at Large 3 1.2 Data Collection and Monitoring Protocols 5 1.2.1 SNMP Protocol Family 5 1.2.2 Syslog Protocol 5 1.2.3 IP Flow Information eXport (IPFIX) 6 1.2.4 IP Performance Metrics (IPPM) 7 1.2.5 Routing Protocols and Monitoring Platforms 8 1.3 Network Configuration Protocol 9 1.3.1 Standard Configuration Protocols and Approaches 9 1.3.2 Proprietary Configuration Protocols 10 1.3.3 Integrated Platforms for Network Monitoring 10 1.4 Novel Solutions and Scenarios 12 1.4.1 Software-Defined Networking – SDN 12 1.4.2 Network Functions Virtualization –NFV 14 Bibliography 15 2 Overview of Artificial Intelligence and Machine Learning 19 Nur Zincir-Heywood, Marco Mellia, and Yixin Diao 2.1 Overview 19 2.2 Learning Algorithms 20 2.2.1 Supervised Learning 21 2.2.2 Unsupervised Learning 22 2.2.3 Reinforcement Learning 23 2.3 Learning for Network and Service Management 24 Bibliography 26 Part II Management Models and Frameworks 33 3 Managing Virtualized Networks and Services with Machine Learning 35 Raouf Boutaba, Nashid Shahriar, Mohammad A. Salahuddin, and Noura Limam 3.1 Introduction 35 3.2 Technology Overview 37 3.2.1 Virtualization of Network Functions 38 3.2.1.1 Resource Partitioning 38 3.2.1.2 Virtualized Network Functions 40 3.2.2 Link Virtualization 41 3.2.2.1 Physical Layer Partitioning 41 3.2.2.2 Virtualization at Higher Layers 42 3.2.3 Network Virtualization 42 3.2.4 Network Slicing 43 3.2.5 Management and Orchestration 44 3.3 State-of-the-Art 46 3.3.1 Network Virtualization 46 3.3.2 Network Functions Virtualization 49 3.3.2.1 Placement 49 3.3.2.2 Scaling 52 3.3.3 Network Slicing 55 3.3.3.1 Admission Control 55 3.3.3.2 Resource Allocation 56 3.4 Conclusion and Future Direction 59 3.4.1 Intelligent Monitoring 60 3.4.2 Seamless Operation and Maintenance 60 3.4.3 Dynamic Slice Orchestration 61 3.4.4 Automated Failure Management 61 3.4.5 Adaptation and Consolidation of Resources 61 3.4.6 Sensitivity to Heterogeneous Hardware 62 3.4.7 Securing Machine Learning 62 Bibliography 63 4 Self-Managed 5G Networks 69 Jorge Martín-Pérez, Lina Magoula, Kiril Antevski, Carlos Guimarães, Jorge Baranda, Carla Fabiana Chiasserini, Andrea Sgambelluri, Chrysa Papagianni, Andrés García-Saavedra, Ricardo Martínez, Francesco Paolucci, Sokratis Barmpounakis, Luca Valcarenghi, Claudio EttoreCasetti, Xi Li, Carlos J. Bernardos, Danny De Vleeschauwer, Koen De Schepper, Panagiotis Kontopoulos, Nikolaos Koursioumpas, Corrado Puligheddu, Josep Mangues-Bafalluy, and Engin Zeydan 4.1 Introduction 69 4.2 Technology Overview 73 4.2.1 RAN Virtualization and Management 73 4.2.2 Network Function Virtualization 75 4.2.3 Data Plane Programmability 76 4.2.4 Programmable Optical Switches 77 4.2.5 Network Data Management 78 4.3 5G Management State-of-the-Art 80 4.3.1 RAN resource management 80 4.3.1.1 Context-Based Clustering and Profiling for User and Network Devices 80 4.3.1.2 Q-Learning Based RAN Resource Allocation 81 4.3.1.3 vrAIn: AI-Assisted Resource Orchestration for Virtualized Radio Access Networks 81 4.3.2 Service Orchestration 83 4.3.3 Data Plane Slicing and Programmable Traffic Management 85 4.3.4 Wavelength Allocation 86 4.3.5 Federation 88 4.4 Conclusions and Future Directions 89 Bibliography 92 5 AI in 5G Networks: Challenges and Use Cases 101 Stanislav Lange, Susanna Schwarzmann, Marija Gaji´c, Thomas Zinner, and Frank A. Kraemer 5.1 Introduction 101 5.2 Background 103 5.2.1 ML in the Networking Context 103 5.2.2 ML in Virtualized Networks 104 5.2.3 ML for QoE Assessment and Management 104 5.3 Case Studies 105 5.3.1 QoE Estimation and Management 106 5.3.1.1 Main Challenges 107 5.3.1.2 Methodology 108 5.3.1.3 Results and Guidelines 109 5.3.2 Proactive VNF Deployment 110 5.3.2.1 Problem Statement and Main Challenges 111 5.3.2.2 Methodology 112 5.3.2.3 Evaluation Results and Guidelines 113 5.3.3 Multi-service, Multi-domain Interconnect 115 5.4 Conclusions and Future Directions 117 Bibliography 118 6 Machine Learning for Resource Allocation in Mobile Broadband Networks 123 Sadeq B. Melhem, Arjun Kaushik, Hina Tabassum, and Uyen T. Nguyen 6.1 Introduction 123 6.2 ML in Wireless Networks 124 6.2.1 Supervised ML 124 6.2.1.1 Classification Techniques 125 6.2.1.2 Regression Techniques 125 6.2.2 Unsupervised ML 126 6.2.2.1 Clustering Techniques 126 6.2.2.2 Soft Clustering Techniques 127 6.2.3 Reinforcement Learning 127 6.2.4 Deep Learning 128 6.2.5 Summary 129 6.3 ML-Enabled Resource Allocation 129 6.3.1 Power Control 131 6.3.1.1 Overview 131 6.3.1.2 State-of-the-Art 131 6.3.1.3 Lessons Learnt 132 6.3.2 Scheduling 132 6.3.2.1 Overview 132 6.3.2.2 State-of-the-Art 132 6.3.2.3 Lessons Learnt 134 6.3.3 User Association 134 6.3.3.1 Overview 134 6.3.3.2 State-of-the-Art 136 6.3.3.3 Lessons Learnt 136 6.3.4 Spectrum Allocation 136 6.3.4.1 Overview 136 6.3.4.2 State-of-the-Art 138 6.3.4.3 Lessons Learnt 138 6.4 Conclusion and Future Directions 140 6.4.1 Transfer Learning 140 6.4.2 Imitation Learning 140 6.4.3 Federated-Edge Learning 141 6.4.4 Quantum Machine Learning 142 Bibliography 142 7 Reinforcement Learning for Service Function Chain Allocation in Fog Computing 147 José Santos, Tim Wauters, Bruno Volckaert, and Filip De Turck 7.1 Introduction 147 7.2 Technology Overview 148 7.2.1 Fog Computing (FC) 149 7.2.2 Resource Provisioning 149 7.2.3 Service Function Chaining (SFC) 150 7.2.4 Micro-service Architecture 150 7.2.5 Reinforcement Learning (RL) 151 7.3 State-of-the-Art 152 7.3.1 Resource Allocation for Fog Computing 152 7.3.2 ML Techniques for Resource Allocation 153 7.3.3 RL Methods for Resource Allocation 154 7.4 A RL Approach for SFC Allocation in Fog Computing 155 7.4.1 Problem Formulation 155 7.4.2 Observation Space 156 7.4.3 Action Space 157 7.4.4 Reward Function 158 7.4.5 Agent 161 7.5 Evaluation Setup 162 7.5.1 Fog–Cloud Infrastructure 162 7.5.2 Environment Implementation 162 7.5.3 Environment Configuration 164 7.6 Results 165 7.6.1 Static Scenario 165 7.6.2 Dynamic Scenario 167 7.7 Conclusion and Future Direction 169 Bibliography 170 Part III Management Functions and Applications 175 8 Designing Algorithms for Data-Driven Network Management and Control: State-of-the-Art and Challenges 177 Andreas Blenk, Patrick Kalmbach, Johannes Zerwas, and Stefan Schmid 8.1 Introduction 177 8.1.1 Contributions 179 8.1.2 Exemplary Network Use Case Study 179 8.2 Technology Overview 181 8.2.1 Data-Driven Network Optimization 181 8.2.2 Optimization Problems over Graphs 182 8.2.3 From Graphs to ML/AI Input 184 8.2.4 End-to-End Learning 187 8.3 Data-Driven Algorithm Design: State-of-the Art 188 8.3.1 Data-Driven Optimization in General 188 8.3.2 Data-Driven Network Optimization 190 8.3.3 Non-graph Related Problems 192 8.4 Future Direction 193 8.4.1 Data Production and Collection 193 8.4.2 ML and AI Advanced Algorithms for Network Management with Performance Guarantees 194 8.5 Summary 194 Acknowledgments 195 Bibliography 195 9 AI-Driven Performance Management in Data-Intensive Applications 199 Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale, and Francesco Lo Presti 9.1 Introduction 199 9.2 Data-Processing Frameworks 200 9.2.1 Apache Storm 200 9.2.2 Hadoop MapReduce 201 9.2.3 Apache Spark 202 9.2.4 Apache Flink 202 9.3 State-of-the-Art 203 9.3.1 Optimal Configuration 203 9.3.1.1 Traditional Approaches 203 9.3.1.2 AI Approaches 204 9.3.1.3 Example: AI-Based Optimal Configuration 206 9.3.2 Performance Anomaly Detection 207 9.3.2.1 Traditional Approaches 208 9.3.2.2 AI Approaches 208 9.3.2.3 Example: ANNs-Based Anomaly Detection 210 9.3.3 Load Prediction 211 9.3.3.1 Traditional Approaches 212 9.3.3.2 AI Approaches 212 9.3.4 Scaling Techniques 213 9.3.4.1 Traditional Approaches 213 9.3.4.2 AI Approaches 214 9.3.5 Example: RL-Based Auto-scaling Policies 214 9.4 Conclusion and Future Direction 216 Bibliography 217 10 Datacenter Traffic Optimization with Deep Reinforcement Learning 223 Li Chen, Justinas Lingys, Kai Chen, and Xudong Liao 10.1 Introduction 223 10.2 Technology Overview 225 10.2.1 Deep Reinforcement Learning (DRL) 226 10.2.2 Applying ML to Networks 227 10.2.3 Traffic Optimization Approaches in Datacenter 229 10.2.4 Example: DRL for Flow Scheduling 230 10.2.4.1 Flow Scheduling Problem 230 10.2.4.2 DRL Formulation 230 10.2.4.3 DRL Algorithm 231 10.3 State-of-the-Art: AuTO Design 231 10.3.1 Problem Identified 231 10.3.2 Overview 232 10.3.3 Peripheral System 233 10.3.3.1 Enforcement Module 233 10.3.3.2 Monitoring Module 234 10.3.4 Central System 234 10.3.5 DRL Formulations and Solutions 235 10.3.5.1 Optimizing MLFQ Thresholds 235 10.3.5.2 Optimizing Long Flows 239 10.4 Implementation 239 10.4.1 Peripheral System 239 10.4.1.1 Monitoring Module (MM): 240 10.4.1.2 Enforcement Module (EM): 240 10.4.2 Central System 241 10.4.2.1 sRLA 241 10.4.2.2 lRLA 242 10.5 Experimental Results 242 10.5.1 Setting 243 10.5.2 Comparison Targets 244 10.5.3 Experiments 244 10.5.3.1 Homogeneous Traffic 244 10.5.3.2 Spatially Heterogeneous Traffic 245 10.5.3.3 Temporally and Spatially Heterogeneous Traffic 246 10.5.4 Deep Dive 247 10.5.4.1 Optimizing MLFQ Thresholds using DRL 247 10.5.4.2 Optimizing Long Flows using DRL 248 10.5.4.3 System Overhead 249 10.6 Conclusion and Future Directions 251 Bibliography 253 11 The New Abnormal: Network Anomalies in the AI Era 261 Francesca Soro, Thomas Favale, Danilo Giordano, Luca Vassio, Zied Ben Houidi, and Idilio Drago 11.1 Introduction 261 11.2 Definitions and Classic Approaches 262 11.2.1 Definitions 263 11.2.2 Anomaly Detection: A Taxonomy 263 11.2.3 Problem Characteristics 264 11.2.4 Classic Approaches 266 11.3 AI and Anomaly Detection 267 11.3.1 Methodology 267 11.3.2 Deep Neural Networks 268 11.3.3 Representation Learning 270 11.3.4 Autoencoders 271 11.3.5 Generative Adversarial Networks 272 11.3.6 Reinforcement Learning 274 11.3.7 Summary and Takeaways 275 11.4 Technology Overview 277 11.4.1 Production-Ready Tools 277 11.4.2 Research Alternatives 279 11.4.3 Summary and Takeaways 280 11.5 Conclusions and Future Directions 282 Bibliography 283 12 Automated Orchestration of Security Chains Driven by Process Learning 289 Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi, and Stephan Merz 12.1 Introduction 289 12.2 RelatedWork 290 12.2.1 Chains of Security Functions 291 12.2.2 Formal Verification of Networking Policies 292 12.3 Background 294 12.3.1 Flow-Based Detection of Attacks 294 12.3.2 Programming SDN Controllers 295 12.4 Orchestration of Security Chains 296 12.5 Learning Network Interactions 298 12.6 Synthesizing Security Chains 301 12.7 Verifying Correctness of Chains 306 12.7.1 Packet Routing 306 12.7.2 Shadowing Freedom and Consistency 306 12.8 Optimizing Security Chains 308 12.9 Performance Evaluation 311 12.9.1 Complexity of Security Chains 312 12.9.2 Response Times 313 12.9.3 Accuracy of Security Chains 313 12.9.4 Overhead Incurred by Deploying Security Chains 314 12.10 Conclusions 315 Bibliography 316 13 Architectures for Blockchain-IoT Integration 321 Sina Rafati Niya, Eryk Schiller, and Burkhard Stiller 13.1 Introduction 321 13.1.1 Blockchain Basics 323 13.1.2 Internet-of-Things (IoT) Basics 324 13.2 Blockchain-IoT Integration (BIoT) 325 13.2.1 BIoT Potentials 326 13.2.2 BIoT Use Cases 328 13.2.3 BIoT Challenges 329 13.2.3.1 Scalability 332 13.2.3.2 Security 333 13.2.3.3 Energy Efficiency 334 13.2.3.4 Manageability 335 13.3 BIoT Architectures 335 13.3.1 Cloud, Fog, and Edge-Based Architectures 337 13.3.2 Software-Defined Architectures 337 13.3.3 A Potential Standard BIoT Architecture 338 13.4 Summary and Considerations 341 Bibliography 342 Index 345

About the Author :
Nur Zincir-Heywood, PhD, is Full Professor of Computer Science with Dalhousie University in Nova Scotia, Canada. She is an Associate Editor of the IEEE Transactions on Network and Service Management and Wiley International Journal of Network Management. Marco Mellia, PhD, is Full Professor with Politecnico di Torino, Italy. He is an Associate Editor of the IEEE Transactions on Network and Service Management, Elsevier Computer Networks and ACM Computer Communication Reviews. Yixin Diao, PhD, is Director of Data Science and Analytics at PebblePost in New York, NY, USA. He is an Associate Editor of the IEEE Transactions on Network and Service Management and the Journal of Network and Systems Management.


Best Sellers


Product Details
  • ISBN-13: 9781119675440
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • Series Title: IEEE Press Series on Networks and Service Management
  • ISBN-10: 1119675448
  • Publisher Date: 26 Aug 2021
  • Binding: Digital (delivered electronically)
  • No of Pages: 400


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)
John Wiley & Sons Inc -
Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning: (IEEE Press Series on Networks and Service Management)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!