Digital Twin-Driven Virtual Network Architecture for Enhanced Extended Reality Capabilities
Abstract
:1. Introduction
2. Background and Related Work
2.1. Digital Twins
2.2. Extended Reality
2.3. Network Virtualization
- Software Defined Network (SDN): A paradigm introduced to decouple the control and data planes in network devices, thus enabling a centralized resource control and provisioning leveraging of an SDN controller. In addition, a SDN introduces dynamic management by enabling applications to directly interact with the hardware resources, while OpenFlow is the protocol to establish communication between the infrastructure elements and SDN controllers [28],
- Network Function Virtualization (NFV): It addresses a different approach in which network functions are supported. Rather than relying on dedicated hardware, NFV leverages standard servers or cloud-based devices to provide these functions. NFV enables the deployment of efficient and flexible network infrastructures. Moreover, it allows the provision of network operators’ dynamic on-demand services, thus enhancing the scalability of the network and optimizing resource utilization [28],
- Network Slicing: This paradigm deals with the partitioning of a physical network into slices oriented for specific purposes (tailored services). The dynamic allocation of physical resources is achieved by means of cloud computing. The concept of network modularity (divide network functions into modular network functions) can be achieved by offering tailored services leveraged by vertical industries [29].
2.4. In-Space Communications and Tolerant Networks
3. Architecture’s Proposed Approach
3.1. DTN Topological Architecture
- Synchronization from ON to DTN is mandatory: this ensures that any ON modification is reflected in the DTN.
- Synchronization from DTN to ON is not required: since the DTN is designed to be enhanced with respect to the ON, any modification deployed in the DTN (topology, configuration, services, external connections, etc.) does not affect the ON.
- The DTN can request resources to the ON via the DTM: for instance, when DTCDs request resources located in the ON, the DTM can request access to such resources and download them in the DTN.
- Synchronization must be assured even in disadvantaged scenarios: QoS may be compromised in terms of latency, percentage of packet loss, throughput, reliability, etc. However, synchronization is an essential process and must be ensured even in disadvantaged conditions.
3.2. System-Supporting Architecture
3.2.1. Original Network Manager (ONM)
- Edge Router: This is designed to serve as a communication interface, enabling the transmission of ON information to the DTM and the reception of DTN status information from the DTM. It is fundamental that the Edge Router is designed with the intelligent ability to determine the optimal transport channel to guarantee a successful packet delivery to the DTM.
- Network Twinning: This is responsible for receiving a request generated in the DTM for the collection of complete network information (network entities, topologies and configurations) from the ON. The collected data are forwarded to the Edge Router for the space transmission process.
- Event Controller: This is in charge of the continuous ON network status monitoring. In the event of network modifications, the Event Controller transmits the “event” data (information regarding the ON modification) to the Edge Router for the DTN synchronization process.
- DTN Synchronization Status: This is responsible for receiving the current DTN status in order to keep the ONM aware of the DTN synchronization state. In addition to synchronization status, this module is capable of receiving information from the DTN related to extended functions with the aim to provide the extended service to the ON.
- Content Delivery Agent: This has the function of forwarding incoming DTN data packets to the ON device and vice versa.
3.2.2. Digital Twin Manager (DTM)
- Edge Router: This is designed to serve as a communication interface, enabling the transmission of DTN status information to the ONM and the reception of ON information from the ONM. It is fundamental that the Edge Router is designed with the intelligent ability to determine the optimal transport protocol according to channel conditions such as disruption time and available bandwidth, among others, to guarantee a successful packet delivery to the ONM.
- Traffic Classifier: This is responsible for classifying the incoming data packets from the DTM Edge Router into control packets, which are utilized for DTN creation or synchronization, and data packets which are destined for DTCDs. The data packets are directly forwarded towards the Content Delivery Agent, while the control packets are forwarded either directly to the Modeler (to create a new DTN) or to the Network Synchronizer (to update the DTN model).
- Network Synchronizer: This has the function of receiving ON “Event” data and forwarding it to the DTM Modeler. This Synchronizer has to be designed with the intelligence to manage and process the “event” information. With the objective to offload the Modeler processing capabilities, the Synchronizer must be supplied with a set of algorithms aimed at: Data Filtering to optimize the data processing and ensure that the relevant data are posteriorly sent to the Modeler (these algorithms can be based on Kalman Filter algorithms); Updating-Priorities Establishment with the aim to carry out an orchestrated synchronization based on the event’s relevance (Neural Networks can be implemented to analyze the priority based on previous synchronization events); Updating-Dependencies establishment to guarantee the network statuses’ consistency (dependency graphs can be envisioned as a solution); Synchronization Algorithms, which can be based on network model difference detection algorithms such as delta or Rsync. The aforementioned algorithms can be analyzed in future work. Since the proposed scenario involves space communication between the ONM and DTM, synchronization can be compromised due to the constraints perceived in space scenarios; mitigation by means of buffer/queues mechanisms or different transport protocols, as outlined in Section 3.1, is crucial to alleviate synchronization issues.
- Modeler: The Modeler is in charge of selecting from several network models (adjacency matrix, knowledge graph, among others) that are capable of managing the appropriate network model, ensuring the compatibility with the network model employed by the ONM and considering the modeling technique according to the algorithms employed or the accessibility to the stored model. Once the Modeler has processed the DTM model, the model has to be stored in the Storage Module. In addition, the Modeler has the capability to update the DTN model, stored in the storage module, with the “event” information received by the Network Synchronizer. Moreover, when the Modeler receives an “Extended Network Model” along with a service request from the XRM Service Controller, the Modeler has the task of determining whether the current DTN model has to be replaced by the “Extended Network Model” (writing services) or the “Extended Network Model” has to be stored and tagged with an XR Service ID (reading services) for a later XR Service request.
- Model Storage: This is responsible for storing the processed network model by the Modeler. Additionally, this module must enable access to stored models for the Modeler; thus, queuing techniques are needed.
- Network Builder: This is responsible for the DTN deployment by the consequence of receiving the modeled network information. Furthermore, it is required to continuously transmit “Network Status” beacons to the Status Control to achieve an autonomous DTN management process. When it receives a “Network Warning” from the Status Control, the Builder needs to request to the Modeler to model the most recent stored network model with the aim of re-generating the DTN. This paper introduces to the Builder the capability to receive super users’ requests intended to modify the current DTN model; subsequently, the request is forwarded to the modeler for the model updating process.
- Status Control: This is in charge of receiving the “Network Status” beacons from the Builder with the objective of identifying any anomalies and failures in the DTN based on the stored network model. In the case that any anomaly or failure is detected, the Status Control transmits a “warning” signal to the Builder requesting that the DTN must be re-modeled.
- Content Delivery Agent: This has the function to receive data packets from the ON and determine whether the packets have to be forwarded to a DTCD or an external proxy server with the objective of storing ON content in a Content Delivery Network fashion. Additionally, it receives data packets from DTCDs to be delivered to the ON.
3.2.3. Extended Reality Manager (XRM)
- Service Controller: The controller is responsible for the XR service deployment (including the extended data integration and service building). This module can be approached with several techniques. Network Function Virtualization (NFV) is a suitable technology for deploying the different XR services; then, technologies such as OpenMANO, OpenNFV, OpenStack or even proprietary solutions can be adopted. This results in it being necessary to additionally design this module with AT techniques in order to determine, according to the user’s request, if the requested service is one of a reading or writing nature. A reading service just consults the network model information; for instance, visualization services correspond to those of a reading nature. On the other hand, services that modify the network model, such as resource re-allocation, smart routing tables, etc., correspond to writing services. The objective of classifying the services aims to forward the appropriate request to the DTM Modeler along with the “extended Network Model”. This block needs to interact directly with the DTM Modeler in two iterations: in the first iteration, the XRM Service Controller requests from the DTM Modeler the network model information (stored in the DTM Model Storage), and once the network model information is retrieved, the XRM Service Controller has the responsibility of processing the network data and integrating them with extended data; on the other hand, for the second iteration, the XRM Service Controller forwards the “Extended Network Model” along with the request nature (reading or writing) to the DTM Modeler. Moreover, this module has to manage the XR service with the objective of guaranteeing an efficient service interaction. In order to manage the XR service, different criteria can be followed; for instance, service nature (reading or writing), user role priority (super users or network administrators have more priority than clients), latency and response time (XR services that require low latency and response time should have a higher priority), resource availability (XR services must be deployed according to the current resources utilization), etc.
- Service Interface: This has the function of serving as an input/output user interface. The Service Interface can be realized as a set of interfaces including: Human–Machine Interfaces (HMIs), glazes, touch sensors and voice commands, among others. Subsequently, this block has to process the input/output information. The service interface receives the network information for the corresponding user visualization from the DTM Network Builder. Moreover, this interface has to be designed with a standardized platform to receive XR service creation requests, and must be flexible in handling any type of information exchanged, as an information-agnostic interface.
3.3. DTM Traffic Flows
- 1.
- Control Plane:The control plane traffic flows are presented next. Such flows describe the DTN control operation including: creation, synchronization, monitoring, re-configuration and status sharing.
- (a)
- DTN creation: The process for creating a new DTN once the space station has been established and the DTM and XRM entities have been deployed is initiated by the DTM Modeler, which lacks network models at this initial phase. The modeler generates a “Request” message, which is relayed to the Traffic Classifier and then to the Edge Router. Upon receipt of the request by the ONM Edge Router, a custody ACK is sent to the DTM Edge Router. The request is forwarded to the Network Twinning, which processes it and determines that the ON network model has to be transmitted to the DTM (the processing time is referred to as Twinning Time). The network model travels back to the DTM Edge Router. The network model flows through the Traffic Classifier and is received by the Modeler. The Modeler processes the ON network model and subsequently transmits a “DTN request” to the Builder, which is responsible for the DTN building for the first time. Figure 9 illustrates the aforementioned traffic flow.
- (b)
- DTN synchronization: The synchronization process is initiated by the ONM Event Control, which has the task of periodically monitoring the ON in order to detect any change in the ON; upon identifying a network change, the module generates an “Event” message, which contains the specific ON modification. The “Event” is sent back to the DTM Edge Router (the double ACK mechanism is established between the Edge Routers) and is relayed to the Traffic Classifier, and then to the Network Synchronizer, which processes the ON modification and forwards the “event” to the Modeler. The modeler is responsible for retrieving the stored network model and subsequently updating it according to the “event” information (this process time is referred to as Re-modeling Time). Finally, the Modeler generates a “Net Regeneration” request that is sent to the Builder. This traffic flow is shown in Figure 10. Note that this paper differs from other Digital Twin Network oriented papers: the synchronization is not requested by the Digital Twin but by the Original Network.
- (c)
- DTN monitoring: The monitoring process is essential to ensure autonomous management and DTN self-healing. The DTM Builder has to periodically report its own statistics (packet error rate, throughput, etc.) to the Status Control module. The Status Control module has the capability to access the stored models enabling the detection of any anomaly or failure; in the event of anomaly or failure detection, the Status Control raises a “Net Warning” alert, which is sent back to the Builder. When the Builder receives a warning, it needs to request to the Modeler a re-modeling process as described previously. Figure 11 demonstrates the aforementioned flow.
- (d)
- DTN re-configuration request: This process is performed with the objective to modify the DTN configuration as explained in Section 3.1. The process requires that the DTM Builder operates as a DTCD super users’ interface. The Builder receives the request and then the previously described re-modeling and re-generation operations are initiated (Figure 12).
- (e)
- DTN synchronization Status Sharing: This process is designed to ensure that the ONM is aware of the DTN network model status. The DTM Modeler generates a “Sync.Status”, which contains the DTM network model information, and is sent through the Classifier and Edge Routers (with the double ACK mechanism), finally reaching the ONM DTN Synchronization Status. Figure 13 illustrates the traffic flow.
- 2.
- Data Plane:The data plane traffic flows describe the data flow transmitted within the DTN among the DTCDs along with the data shared between DTCDs and ON devices. Three scenarios are introduced next:
- (a)
- Scenario 1: Two clients within the DTN exchange information: This is the simplest scenario. The DTN communication delay will be the typical delay from any terrestrial network. Then, the communication transport protocol can be approached with TCP or different streaming protocols.
- (b)
- Scenario 2: A client within the DTN requests content to the ON: In this scenario, the DT client is requesting contents that are originally located in the ON. This scenario introduces the high latency issue described in previous sections. Since a continuous content downloading involves the high latency problem, this paper proposes leveraging proxy servers placed in the space station; these proxy servers can monitor the channel utilization and request to the DTM to download ON content. Then, two sub-scenarios emerge:
- i
- The content is already stored in the proxy server: the DTM requests the content directly to the proxy server; data flow for this request can be approached with the TCP protocol.
- ii
- The content must be downloaded to the proxy server: the DTM must request to the ONM to transmit the content and then store it in the proxy server. Inevitably, the content transmission will suffer from the space communication delay.
In both previous cases, the DTM Content Delivery Agent is responsible for determining whether or not to request content download to the ONM. Furthermore, the DTM Status Control may have the ability to asses the DTN’s utilization and requests for content downloading in instances where the DTN operates at low utilization. The decision-making process can be leveraged with AI techniques. - (c)
- Scenario 3: A client within the DTN is communicating with a client within the ON: In this third scenario, the communication between the two nodes will suffer high latency from space communication conditions. The DTM Edge Router must determine that the TCP protocol is unsuitable to support the communication; consequently, the data flow from DTM to ON must be approached with a different transmission protocol; Delay-and Disrupting-Tolerant Networking can be considered as a potential solution. The traffic flows for this scenario are illustrated next in Figure 14.
3.4. Extended Reality Functions’ Deployment Approach and DTN Operation—Integration
- Network model access: The manner in which the XRM Service Controller accesses the DTN network models has to be defined. APIs can be employed to facilitate the retrieval of the DTN network models (stored in the DTM Model Storage block).
- Identify the requested XR network service: in this step, the requested network service has to be analyzed and decomposed into smaller portions of the network function.
- VNF’s deployment: once the network functions that comprise the XR requested service have been identified, the VNFs can be constructed. The approach to employ smaller VNFs has the advantage of function modularity. The deployment of the VNFs has to consider the DTN network model information.
- Construct the XR service: the XRM service controller has the task of constructing the XR service based on the NFV architecture.
- Extended Network Model definition: once the XR service has been constructed, it has to be modeled by the DTM Modeler and stored in the DTM Model Storage identified with a unique tag ID for future XR service access.
- Real-time data access: The DTN real-time data are realized as network models processed and updated by the DTM Modeler and stored in the DTM storage block. Consequently, the XRM Service Controller needs first to classify the service as a reading or writing service, and then access the stored network models through the DTM Modeler.
- Data Processing: Data processing for XR integration is supported by two blocks: the XRM Service controller and the DTM Modeler. The former has the responsibility of processing the retrieved network model and integrating it with extended data, while the latter has to re-model the “Extended Network Model”.
- XR Interfaces: The XR interfaces are approached with the XRM Service Interface. As stated in Section 3.2, this block has to process the input and output information according to the input/output format (voice, images, touches, etc.); consequently, it has to process the DTM Network Builder information in order to allow the users to know and realize the service’s response.
- Feedback: The integration of XR monitoring services can be realized as immersive feedback mechanisms to enable users to visualize real-time network data and achieve a real-time comprehension of configuration changes in the DTN.
- Data Encryption: the encryption algorithms can ensure that the data transmitted between the DTM and XRM, as well as the data transmitted between the ONM and DTM, and the data that are shared within the DTN are protected.
- Authentication APIs: as was illustrated in Section 3.2, APIs can be adopted as an approach to address the user’s authentication to XR services, as well as DTN resources.
- Bio-metric Authentication: the XRM module can be utilized to build an authentication service based on bio-metric signals and then ensuring the user’s authenticity.
- Secure Protocols: secure protocols such as TLS/SSL can be adopted to guarantee the user’s data integrity.
- Reading XR Service: The reading services retrieve the “Extended Network Model” for the visualization of DTN information. The XRM Service Interface receives the request to utilize the previously created “XR Service A”. This request is forwarded to the XRM Service Controller which processes the request and sends it to the DTM Modeler. The Modeler retrieves the stored “Extended Network Model A” and forwards it to the DTM Network Builder to retrieve the requested XR service information. Finally, the information is transmitted to the XRM Service Interface, which has the responsibility of processing the out-coming information. Figure 16 depicts the aforementioned process.
- Writing XR Service: The writing services modify the current DTN model by the “Extended Network Model”. The initial operation is similar to the reading services’ scenario. Once the DTM Modeler has retrieved the “Extended Network Model A”, this model replaces the current operating DTN model and a “Network Re-generation” request is transmitted from the DTM Modeler to the DTM Network Builder. Finally, the XRM Service Interface processes the output information. Figure 17 illustrates the writing XR service process.
4. Architecture Modeling Approach
4.1. System Metrics
- DTN resilience and Failure Protection: This refers to the metrics employed to measure the Failure Protection capability. This measurement will be approached with commonly used metrics including Mean Time to Recovery (MTTR), which is the average time taken by networks to recover from failures, and the Mean Time Between Failures (MTBF), which is the average time between successive network failures; both metrics are measured in seconds. Furthermore, it must be noted that in the ON-DTN communication disruption, the DTN remains operational. With regard to failure protection, the monitoring process is essential to heal the DTN’s operation.
- Response Time: This refers to the response time between Edge Routers after receipt of a request and it is measured in seconds. The response time is dependent on the channel conditions (bandwidth, disruption time, etc.), and the Edge Routers’ channel selection capability. Response time is defined by Equation (3) where is the processing time at the Edge Routers, is the propagation time and is the transmission time. Note that and may vary according to the type of request and the traffic involved, while is dependent on the Edge Routers’ distance.
- DTN Synchronization Time: This refers to the necessary time to achieve model synchronization between the ON and the DTN and it is measured in seconds. Synchronization Time is dependent on the response time metric and the complexity of the network models employed. The synchronization time is defined by Equation (4), where is the response time and is the time to process the network model according to the model’s complexity.
- Zero Touch Capability: This defines the level of zero touch capability; in [51], several metrics are employed including automation percentage, operational cost, Quality of Service (QoS) and so forth. The advantage of leveraging the DTM’s capabilities is that it introduces a high autonomy tier in the DTN; to guarantee the autonomous DTN operation, each DTM sub-module must be provided with enough intelligence. In the case of network re-configurations in the DTN, a DT super user is necessary to introduce those modifications; however, the re-configuration and re-building process will be autonomous. In a similar fashion, the XR Service management is autonomous by means of the XRM entity,
- DTN scalability: This qualitative metric allows us to realize how the DTN can be scaled up or down and enhanced. The XRM entity enables the DTN’s enhancement with novel and immersive functionalities; those DTN-enhanced capabilities are initially not present in the ON. The DTN can be easily scaled up or down topologically by means of the re-configuration process to modify the DTN network model. Similarly, with the re-configuration DTN process, external gateways can be added to the DTN network model with the purpose to provide the deployed DTN connection to external networks
- System Complexity: This refers to the number of operations that are necessary to execute in the supporting entities to achieve an optimal system operation. In addition, with regard to the entities visualized in Figure 6, Figure 7 and Figure 8, it can be appreciated that the supporting elements are relatively simple: such entities do not require a large amount of modules, while the modules’ behavior and objective are clearly established as well as modules’ interactions.
- DTN portability and Deployment Efficiency: This is a qualitative metric to realize the ease of the DTN’s deployment; the DTM’s behavior provides a high level of ease of deployment. In addition, the DTN can be deployed in any terrestrial or extra-terrestrial station; then, the DTN can be envisioned as a portable network.
4.2. Communication Protocol Requirements
- 1.
- ONM Edge Router—DTN Edge Router: The communication between both Edge Routers concerns the in-space data transmission scenarios. In order to establish the in-space communication channel between both Edge Routers, several considerations have to be taken into account; among the main issues to be considered are:
- Bandwidth: since the available bandwidth is a limited resource, the amount of data to be sent has to be optimized; then, compression algorithms can be utilized.
- Latency and Disruptions: In the space communication scenario that has been proposed, the latency will be in the range of tens of seconds to hundreds of seconds; also, the communication links will suffer from disruptions due to different conditions such as planetary orbits. Then, it results as being fundamental to mitigate the communication degrade in high delay and disrupting conditions with the aim to achieve the proposed system deployment. Alternatives such as the Delay/Disrupting Tolerant Networking with the Bundle Protocol (BP) can be envisioned as potential solutions.
- Security: Since the information shared between both Edge Routers can exhibit critical network information, the data integrity must be guaranteed and avoid unauthorized data access. Then, coding and encryption techniques can be adopted.
- Interoperability: it must be assured that both Edge Routers employ compatible standards, technologies, algorithms and protocols.
In this scenario, since the communication between the ONM and DTM will suffer from high latency, the utilization of security and authentication mechanisms can incur an increase in jitter and delay in the aforementioned communication; however, such fluctuations are expected to be insignificant compared with the space communication latency, which ranges from tens of seconds to hundreds of seconds. - 2.
- Data Center—DTCD: Since both the clients and the Data center are hosted in the space station, the issues to be considered are different from the previous scenario. Among the main considerations are:
- Environmental conditions: in the space station, space radiation could degrade the communication between clients and the data center.
- Bandwidth: since the clients can request XR services, the bandwidth must be guaranteed to support those requests.
- Accessibility and Security: In order to guarantee authorized accesses, API interfaces can be adopted. On the other hand, encryption techniques can be utilized to guarantee data integrity, as well as the TLS protocol.
- Communication Protocols: The space station communication established between DTCD’s and the data center will not suffer the high delay and disruption conditions; however, the utilization of XR services and DTN navigation require small latencies. Then, UDP or streaming protocols can be implemented.
4.3. System Requirements Approach
- Cloud Infrastructure such as OpenStack (Minimal Requirements: 24 CPUs, 24 GB RAM and 500 GB disk) [54].
- Orchestration platforms such as “Open Source MANO (OSM)” (Minimal requirements: 4 CPUs, 16 GB RAM and 80 GB disk) [55].
- Virtualization engines, such as “VMware” (Minimal requirements: 8 CPUs, 16 GB RAM and 500 GB disk) [56].
- Monitoring, management and fault detection software.
- Data base structures such as “Oracle” (Minimal requirements: 64 GB RAM and 500 GB disk) [57].
- Firewall and cyber-security systems.
5. Conclusions and Future Work
- To define the technology to support the DTN’s deployment. Virtualization techniques are envisioned as a suitable solution.
- To analyze the appropriate transport communication protocol to communicate the ON and the DTN.
- To analyze the hardware and software requirements for constructing the supporting entity modules.
- To analyze the security approaches to ensure a secure DTN environment.
- It is necessary to analyze the system’s consistency validation processes based on simulations in order to provide a proposal for the real system’s deployment.
- To conduct a study to determine and estimate the dimensions for hardware and software resources.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Grieves, M. Digital Twin: Manufacturing Excellence Through Virtual Factory Replication. Available online: https://www.researchgate.net/publication/275211047 (accessed on 12 August 2024).
- Minerva, R.; Lee, G.M.; Crespi, N. Digital Twin in the IoT Context: A Survey on Technical Features, Scenarios, and Architectural Models. Proc. IEEE 2020, 108, 1785–1824. [Google Scholar] [CrossRef]
- Wenzheng, L. Construction Methods, Data-Driven, and Operational Modes of Digital Twin Basin. In Proceedings of the 2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 14–16 July 2023; pp. 158–161. [Google Scholar] [CrossRef]
- WG Standardisation Focus Group; BDVA Task Force Data Space; BDVA Task Force Standards and Benchmarking. Guidance for the Integration of Digital Twins in Data Spaces; Alliance for IoT and Edge Computing Innovation: Brussels, Belgium, 2024. [Google Scholar]
- Laaki, H.; Miche, Y.; Tammi, K. Prototyping a Digital Twin for Real Time Remote Control Over Mobile Networks: Application of Remote Surgery. IEEE Access 2019, 7, 20325–20336. [Google Scholar] [CrossRef]
- El Saddik, A. Digital Twins: The Convergence of Multimedia Technologies. IEEE MultiMedia 2018, 25, 87–92. [Google Scholar] [CrossRef]
- Wang, K.; Du, H.; Su, L. Digital Twin Network based Network Slice Security Provision. In Proceedings of the 2022 IEEE 2nd International Conference on Digital Twins and Parallel Intelligence (DTPI), Boston, MA, USA, 24–28 October 2022. [Google Scholar] [CrossRef]
- Zhao, J.; Xiong, X.; Chen, Y. Design and Application of a Network Planning System Based on Digital Twin Network. IEEE J. Radio Freq. Identif. 2022, 6, 900–904. [Google Scholar] [CrossRef]
- Wei, Z.; Wang, S.; Li, D.; Gui, F.; Hong, S. Data-Driven Routing: A Typical Application of Digital Twin Network. In Proceedings of the 2021 IEEE 1st International Conference on Digital Twins and Parallel Intelligence (DTPI), Beijing, China, 15 July 2021–15 August 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Chen, D.; Yang, H.; Zhou, C.; Lu, L.; Lü, P.; Sun, T. Classification, Building and Orchestration Management of Digital Twin Network Models. In Proceedings of the 2022 IEEE 22nd International Conference on Communication Technology (ICCT), Nanjing, China, 11–14 November 2022; pp. 1843–1846. [Google Scholar] [CrossRef]
- Polverini, M.; Lavacca, F.G.; Galán-Jiménez, J.; Aureli, D.; Cianfrani, A.; Listanti, M. Digital Twin Manager: A Novel Framework to Handle Conflicting Network Applications. In Proceedings of the 2022 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Phoenix, AZ, USA, 14–16 November 2022; pp. 85–88. [Google Scholar] [CrossRef]
- Jian, M.; Long, B.; Liu, H. A Survey of Extended Reality in 3GPP Release 18 and Beyond. Highlights Sci. Eng. Technol. 2023, 56, 542–549. [Google Scholar] [CrossRef]
- Caudell, T.; Mizell, D. Augmented reality: An application of heads-up display technology to manual manufacturing processes. In Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, Kauai, HI, USA, 7–10 January 1992; Volume 2, pp. 659–669. [Google Scholar] [CrossRef]
- Brooks, F. What’s real about virtual reality? IEEE Comput. Graph. Appl. 1999, 19, 16–27. [Google Scholar] [CrossRef]
- Guan, J.; Irizawa, J.; Morris, A. Extended Reality and Internet of Things for Hyper-Connected Metaverse Environments. In Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Christchurch, New Zealand, 12–16 March 2022; pp. 163–168. [Google Scholar] [CrossRef]
- Pereira, V.; Matos, T.; Rodrigues, R.; Nóbrega, R.; Jacob, J. Extended Reality Framework for Remote Collaborative Interactions in Virtual Environments. In Proceedings of the 2019 International Conference on Graphics and Interaction (ICGI), Faro, Portugal, 21–22 November 2019; pp. 17–24. [Google Scholar] [CrossRef]
- Xu, Z.; Wu, S.; Zhang, L. A New Architecture of Augmented Reality Engine. In Proceedings of the 2023 2nd International Conference on Mechatronics and Electrical Engineering (MEEE), Abu Dhabi, United Arab Emirates, 10–12 February 2023; pp. 64–68. [Google Scholar] [CrossRef]
- Zhang, Z.; Weng, D.; Jiang, H.; Liu, Y.; Wang, Y. Inverse Augmented Reality: A Virtual Agent’s Perspective. In Proceedings of the 2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct), Munich, Germany, 16–20 October 2018; pp. 154–157. [Google Scholar] [CrossRef]
- Shin, J.H.; Park, S.J.; Kim, M.A.; Lee, M.J.; Lim, S.C.; Cho, K.W. Development of a Digital Twin Pipeline for Interactive Scientific Simulation and Mixed Reality Visualization. IEEE Access 2023, 11, 100907–100918. [Google Scholar] [CrossRef]
- Kamdjou, H.M.; Baudry, D.; Havard, V.; Ouchani, S. Resource-Constrained EXtended Reality Operated With Digital Twin in Industrial Internet of Things. IEEE Open J. Commun. Soc. 2024, 5, 928–950. [Google Scholar] [CrossRef]
- Zhong, Y.; Marteau, B.; Hornback, A.; Zhu, Y.; Shi, W.; Giuste, F.; Krzak, J.J.; Graf, A.; Chafetz, R.; Wang, M.D. IDTVR: A Novel Cloud Framework for an Interactive Digital Twin in Virtual Reality. In Proceedings of the 2022 IEEE 2nd International Conference on Intelligent Reality (ICIR), Piscataway, NJ, USA, 14–16 December 2022; pp. 21–26. [Google Scholar] [CrossRef]
- Künz, A.; Rosmann, S.; Loria, E.; Pirker, J. The Potential of Augmented Reality for Digital Twins: A Literature Review. In Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), Christchurch, New Zealand, 12–16 March 2022; pp. 389–398. [Google Scholar] [CrossRef]
- Böhm, F.; Dietz, M.; Preindl, T.; Pernul, G. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. J. Cybersecur. Priv. 2021, 1, 519–538. [Google Scholar] [CrossRef]
- Chen, H.; Xu, X.; Simsarian, J.; Szczerban, M.; Harby, R.; Ryf, R.; Mazur, M.; Dallachiesa, L.; Fontaine, N.; Cloonan, J.; et al. Digital Twin of a Network and Operating Environment Using Augmented Reality. In Proceedings of the 49th European Conference on Optical Communications (ECOC 2023), Glasgow, UK, 1–5 October 2023. [Google Scholar]
- Hübel, N.; Kaigom, E.G. Codeless, Inclusive, and End-to-End Robotized Manipulations by Leveraging Extended Reality and Digital Twin Technologies. In Proceedings of the 2024 16th International Conference on Human System Interaction (HSI), Paris, France, 8–11 July 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Li, S.; Lin, X.; Wu, J.; Zhang, W.; Li, J. Digital Twin and Artificial Intelligence-Empowered Panoramic Video Streaming: Reducing Transmission Latency in the Extended Reality-Assisted Vehicular Metaverse. IEEE Veh. Technol. Mag. 2023, 18, 56–65. [Google Scholar] [CrossRef]
- Carapinha, J.; Jiménez, J. Network Virtualization—A View from the Bottom. In Proceedings of the 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures, Barcelona, Spain, 17 August 2009; pp. 73–80. [Google Scholar] [CrossRef]
- Yousaf, F.Z.; Bredel, M.; Schaller, S.; Schneider, F. NFV and SDN—Key Technology Enablers for 5G Networks. IEEE J. Sel. Areas Commun. 2017, 35, 2468–2478. [Google Scholar] [CrossRef]
- Zhang, S. An Overview of Network Slicing for 5G. IEEE Wirel. Commun. 2019, 26, 111–117. [Google Scholar] [CrossRef]
- Mosharaf Kabir Chowdhury, N.M.; Boutaba, R. Network virtualization: State of the art and research challenges. IEEE Commun. Mag. 2009, 47, 20–26. [Google Scholar] [CrossRef]
- Fischer, A.; Botero, J.F.; Beck, M.T.; de Meer, H.; Hesselbach, X. Virtual Network Embedding: A Survey. IEEE Commun. Surv. Tutor. 2013, 15, 1888–1906. [Google Scholar] [CrossRef]
- Zhou, X.; Li, R.; Chen, T.; Zhang, H. Network slicing as a service: Enabling enterprises’ own software-defined cellular networks. IEEE Commun. Mag. 2016, 54, 146–153. [Google Scholar] [CrossRef]
- Shin, S.; Wang, H.; Gu, G. A First Step Toward Network Security Virtualization: From Concept To Prototype. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2236–2249. [Google Scholar] [CrossRef]
- Shen, X.; Gao, J.; Wu, W.; Li, M.; Zhou, C.; Zhuang, W. Holistic Network Virtualization and Pervasive Network Intelligence for 6G. IEEE Commun. Surv. Tutor. 2022, 24, 1–30. [Google Scholar] [CrossRef]
- Li, T.; Zhou, H.; Luo, H.; Xu, Q.; Ye, Y. Using SDN and NFV to Implement Satellite Communication Networks. In Proceedings of the 2016 International Conference on Networking and Network Applications (NaNA), Hakodate, Japan, 23–25 July 2016; pp. 131–134. [Google Scholar] [CrossRef]
- Chaudhry, A.U.; Yanikomeroglu, H. Temporary Laser Inter-Satellite Links in Free-Space Optical Satellite Networks. IEEE Open J. Commun. Soc. 2022, 3, 1413–1427. [Google Scholar] [CrossRef]
- Liang, J.; Chaudhry, A.U.; Erdogan, E.; Yanikomeroglu, H.; Kurt, G.K.; Hu, P.; Ahmed, K.; Martel, S. Free-Space Optical (FSO) Satellite Networks Performance Analysis: Transmission Power, Latency, and Outage Probability. IEEE Open J. Veh. Technol. 2024, 5, 244–261. [Google Scholar] [CrossRef]
- Hu, H.; Li, H.; Liu, Y. Bandwidth and Round-Trip Time Detection based Congestion Control for Multipath TCP over Highly Lossy Satellite Networks. In Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, CA, USA, 26–29 November 2018; pp. 1072–1075. [Google Scholar] [CrossRef]
- Farrell, S.; Cahill, V.; Geraghty, D.; Humphreys, I.; McDonald, P. When TCP Breaks: Delay- and Disruption-Tolerant Networking. IEEE Internet Comput. 2006, 10, 72–78. [Google Scholar] [CrossRef]
- Yu, X.; Yu, F.; Hou, W.; Wang, X. State-of-the-Art of Transmission Protocols for Deep Space Communication Networks. In Proceedings of the 2010 First International Conference on Networking and Distributed Computing, Hangzhou, China, 21–24 October 2010; pp. 123–127. [Google Scholar] [CrossRef]
- Caini, C.; Cruickshank, H.; Farrell, S.; Marchese, M. Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications. Proc. IEEE 2011, 99, 1980–1997. [Google Scholar] [CrossRef]
- Kim, H.S.; Kim, H.; Paek, J.; Bahk, S. Load Balancing Under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks. IEEE Trans. Mob. Comput. 2017, 16, 964–979. [Google Scholar] [CrossRef]
- Zhu, Y.; Lin, L.; Ware, S.; Su, R. Supervisor Synthesis for Networked Discrete Event Systems With Communication Delays and Lossy Channels. In Proceedings of the 2019 IEEE 58th Conference on Decision and Control (CDC), Nice, France, 11–13 December 2019; pp. 6730–6735. [Google Scholar] [CrossRef]
- Xie, Y.; Jiang, X.; Jin, G.; Chen, H. BBR-FIT: An Intelligent BBR based on the Reinforcement Learning to Boost the Network Efficiency over Time-Varying Networks. In Proceedings of the 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Hainan, China, 18–20 December 2022; pp. 1633–1640. [Google Scholar] [CrossRef]
- Zhang, J.; Ren, S.; Dong, E.; Meng, Z.; Yang, Y.; Xu, M.; Yang, S.; Zhang, M.; Yue, Y. Reducing Mobile Web Latency Through Adaptively Selecting Transport Protocol. IEEE/ACM Trans. Netw. 2023, 31, 2162–2177. [Google Scholar] [CrossRef]
- Cao, B.; Wang, R.; Sabbagh, A.; Peng, S.; Zhao, K.; Fraire, J.A.; Yang, G.; Wang, Y. Expected File-Delivery Time of DTN Protocol over Asymmetric Space Internetwork Channels. In Proceedings of the 2018 6th IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Huntsville, AL, USA, 11–13 December 2018; pp. 147–151. [Google Scholar] [CrossRef]
- Rehman, A.U.; Aguiar, R.L.; Barraca, J.P. Network Functions Virtualization: The Long Road to Commercial Deployments. IEEE Access 2019, 7, 60439–60464. [Google Scholar] [CrossRef]
- Kultgen, D.; Grandy, C.; Andujar, D.; Grannan, A.; Kent, T.; Weathered, M.; Rein, J. Deploying Extended Reality (XR) for Digital Operations and Maintenance (O&M) at the Mechanisms Engineering Test Loop (METL) Nuclear Science and Engineering Division; Argonne National Laboratory (ANL): Argonne, IL, USA, 2023. [Google Scholar]
- Coloma, S.; Frantz, A.; Meer, D.V.D.; Skrzypczyk, E.; Orsula, A.; Olivares-Mendez, M. Immersive Rover Control and Obstacle Detection based on Extended Reality and Artificial Intelligence. In Proceedings of the Proceedings—2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Orlando, FL, USA, 16–21 March 2024; pp. 743–744. [Google Scholar] [CrossRef]
- Huang, Y.; Li, Y.J.; Cai, Z. Security and Privacy in Metaverse: A Comprehensive Survey. Big Data Min. Anal. 2023, 6, 234–247. [Google Scholar] [CrossRef]
- Benzaid, C.; Taleb, T. AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions. IEEE Netw. 2020, 34, 186–194. [Google Scholar] [CrossRef]
- Ginosar, R.; Shor, Y.; Aviely, P.; Livni, J.; Alony, N.; Caspi, G. Data Center in Space (DCiS) Architecture. In Proceedings of the 2023 European Data Handling & Data Processing Conference (EDHPC), Juan Les Pins, France, 2–6 October 2023; pp. 1–4. [Google Scholar] [CrossRef]
- Wijata, A.M.; Musiał, A.; Lazaj, D.; Gumiela, M.; Przeliorz, M.; Weiss, J.; Sagmeister, P.; Morf, T.; Schmatz, M.; Longépé, N.; et al. Designing (Not Only) Lunar Space Data Centers. In Proceedings of the IGARSS 2024—2024 IEEE International Geoscience and Remote Sensing Symposium, Athens, Greece, 7–12 July 2024; pp. 6104–6108. [Google Scholar] [CrossRef]
- OpenStack. 2024. Available online: https://docs.openstack.org/murano/rocky/admin/deploy_murano/prerequisites.html (accessed on 7 November 2024).
- ETSI Open Source MANO. 2024. Available online: https://www.etsi.org/technologies/open-source-mano (accessed on 7 November 2024).
- VMware. 2024. Available online: https://docs.vmware.com/en/VMware-Cloud-Provider-Stack/1.1/com.vmware.vcps.gsg.doc/GUID-83365584-C63E-4DC1-8DE8-8B3EE7543A3D.html (accessed on 7 November 2024).
- Oracle. 2024. Available online: https://www.oracle.com/es/database/ (accessed on 7 November 2024).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Calle-Heredia, X.; Hesselbach, X. Digital Twin-Driven Virtual Network Architecture for Enhanced Extended Reality Capabilities. Appl. Sci. 2024, 14, 10352. https://doi.org/10.3390/app142210352
Calle-Heredia X, Hesselbach X. Digital Twin-Driven Virtual Network Architecture for Enhanced Extended Reality Capabilities. Applied Sciences. 2024; 14(22):10352. https://doi.org/10.3390/app142210352
Chicago/Turabian StyleCalle-Heredia, Xavier, and Xavier Hesselbach. 2024. "Digital Twin-Driven Virtual Network Architecture for Enhanced Extended Reality Capabilities" Applied Sciences 14, no. 22: 10352. https://doi.org/10.3390/app142210352
APA StyleCalle-Heredia, X., & Hesselbach, X. (2024). Digital Twin-Driven Virtual Network Architecture for Enhanced Extended Reality Capabilities. Applied Sciences, 14(22), 10352. https://doi.org/10.3390/app142210352