To see the other types of publications on this topic, follow the link: Network Function Virtualization (NFV).

Journal articles on the topic 'Network Function Virtualization (NFV)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network Function Virtualization (NFV).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kumar, M. Sandeep, and Prabhu J. "Analysis of Network Function Virtualization and Software Defined Virtualization." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 122. http://dx.doi.org/10.30630/joiv.1.4.40.

Full text
Abstract:
Network function virtualization (NFV) has played important role in both industry and academic change in telecommunication services. NFV has the ability to handle reduction on OPEX and CAPEX; it provides new service and also increases quickly in getting a time value. NFV has an opportunity in doing research in developing new innovation in architecture, framework, and measures some of the technology used in deploying in NVF. In this paper, the author describes the relation between NFV, SDV and cloud computing. The architecture of NVF its advantage in using network function virtualization and some activity used in NFV and adoption of NVF and future direction of NFV, issues, and difference in NFV and SDV.
APA, Harvard, Vancouver, ISO, and other styles
2

DJOMI, MANZILA IZNIARDI, RENDY MUNADI, and RIDHA MULDINA NEGARA. "Analisis Performansi Layanan FTP danVideo Streaming berbasis Network Function Virtualization menggunakan Docker Containers." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (July 9, 2018): 180. http://dx.doi.org/10.26760/elkomika.v6i2.180.

Full text
Abstract:
ABSTRAKInfrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai aplikasi perangkat lunak yang dapat dijalankan di lingkungan virtual atau Virtualized Network Functions (VNFs). Selain menggunakan hypervisor (hardware-level virtualization), teknologi virtualisasi memiliki alternatif pengimplementasian dengan menggunakan teknologi containers (Operating system -level virtualization), salah satunya menggunakan Docker. Penelitian ini mengimplementasikan layanan FTP dan video streaming pada jaringan NFV di Docker Containers. Tanpa backgound traffic, layanan menunjukkan performansi QoS yang memenuhi standarisasi ITU-T G.1010 dengan delay FTP 0,12 ms dan delay video streaming 6,21 ms serta nilai packet loss kedua layanan sebesar 0%. Penggunaan CPU pada Docker ketika layanan dijalankan dibawah 1 %. Kata kunci: Virtualisasi, Containers, Docker, Network Function Virtualization, QoSABSTRACTNetwork infrastructure such as routers, traditionally using proprietary hardware. Virtualization technology on network function or NFV (Network Function Virtualization) makes this service can be implemented as a software application that can run in virtual environment or Virtualized Network Functions (VNFs). In addition to using hypervisor (hardware-level virtualization), virtualization technology has an alternative implementation using containers technology (Operating system-level virtualization), one of them using Docker. This research implements FTP and video streaming services on NFV networks in Docker Containers. Without background traffic, the service demonstrates QoS performance that meets the ITU-T G.1010 standardization with 0.12 ms FTP delay and 6.21 ms video streaming delay and with packet loss value of both services at 0%. CPU usage on Docker when service runs below 1%.Keywords: Virtualization, Containers, Docker, Network Function Virtualization, QoS
APA, Harvard, Vancouver, ISO, and other styles
3

Jawdhari, Hayder A., and Alharith A. Abdullah. "The Application of Network Functions Virtualization on Different Networks, and its New Applications in Blockchain: A Survey." Webology 18, Special Issue 04 (September 30, 2021): 1007–44. http://dx.doi.org/10.14704/web/v18si04/web18179.

Full text
Abstract:
Operators of networks are striving to provide functional network-based services, while keeping the cost of deploying the service to a minimum. Network Function Virtualization (NFV) is considered to be a promising model to modify such employment by separating network functions from the basic hardware properties, after which they are converted into the style of software. These are eventually referred to as Virtual Network Functions (VNFs). This separation offers numerous benefits, including the decrease of Capital Expenditure (CAPEX) and Operation Expense (OPEX), in addition to the enhanced elasticity of service preparation. Network Functions Virtualization (NFV) is found to cause a remarkable development or even a technological revolution in terms of network-based services, leading to a decrease in deployment costs for network operators. NFV reduces hardware tool costs and energy exhaustion, and it improves its operational performance whereby the network configuration is part of this optimization. Even so, there are a number of possible security problems which are the main focus in NFV. The present study surveys the applications and opportunities of NFV in terms of IoT, SDN, cloud computing and blockchain. A description of the NFV architecture is presented, and several possibilities of NFV security issues and challenges are discussed. Finally, a systematic idea is provided on the design of a Blockchain Network Virtualization System.
APA, Harvard, Vancouver, ISO, and other styles
4

Zehra, Sehar, Ummay Faseeha, Hassan Jamil Syed, Fahad Samad, Ashraf Osman Ibrahim, Anas W. Abulfaraj, and Wamda Nagmeldin. "Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey." Sensors 23, no. 11 (June 5, 2023): 5340. http://dx.doi.org/10.3390/s23115340.

Full text
Abstract:
Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learning-based algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Duytam Ly, Le, Mahsa Sadeghi Ghahroudi, and Victor Ponce. "A Systematic Literature Review of Reliable Provisioning for Virtual Network Function Chaining." Applied Sciences 13, no. 9 (April 28, 2023): 5504. http://dx.doi.org/10.3390/app13095504.

Full text
Abstract:
The abstraction of the network node functions using virtualization methods introduced an innovative architecture called Network Function Virtualization (NFV). In NFV, every virtualization software hosts a network service recognized as a Virtual Network Function (VNF). In general, the network provider creates a Service Function Chain (SFC) for every sequence of multiple requested VNFs by the customers. Although NFV allows for a more flexible and economical approach, it is more prone to error and failure. Therefore, providing reliable provisioning for VNF chaining is one of the key issues in NFV. In this paper, we present a systematic literature review to study the pioneer research efforts that provide reliable provisioning for VNF chaining by guaranteeing the availability of the service and resource optimization. Our review is the result of the analysis of 21 screened papers. This paper presents the result of our analysis, including different aspects of a reliable provisioning algorithm, various adopted techniques for reliable provisioning, and the superiority and drawbacks of each algorithm based on the proposed criteria for the evaluation of the provisioning algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Callegati, Franco, Walter Cerroni, and Chiara Contoli. "Virtual Networking Performance in OpenStack Platform for Network Function Virtualization." Journal of Electrical and Computer Engineering 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5249421.

Full text
Abstract:
The emerging Network Function Virtualization (NFV) paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.
APA, Harvard, Vancouver, ISO, and other styles
7

Papavassiliou, Symeon. "Software Defined Networking (SDN) and Network Function Virtualization (NFV)." Future Internet 12, no. 1 (January 2, 2020): 7. http://dx.doi.org/10.3390/fi12010007.

Full text
Abstract:
The role of Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been instrumental in realizing the transition and vision “from black boxes to a white box towards facilitating 5G network architectures”. Though significant research results and several deployments have occurred and realized over the last few years focusing on the NFV and SDN technologies, several issues—both of theoretical and practical importance—remain still open. Accordingly, the papers of this special issue are significant contributions samples within the general ecosystem highlighted above, ranging from SDN and NFV architectures and implementations, to SDN-NFV integration and orchestration approaches, while considering issues associated with optimization, network management and security aspects. In particular, a total of nine excellent articles (one review and eight original research articles) have been accepted, following a rigorous review process, and addressing many of the aforementioned challenges and beyond.
APA, Harvard, Vancouver, ISO, and other styles
8

Elagin, Vasily S., Alexander V. Bogachev, and Ilya A. Belozertsev. "Modeling the estimation of end-to-end packet latency for a chain of NFV nodes in 5G networks." T-Comm 16, no. 3 (2022): 23–30. http://dx.doi.org/10.36724/2072-8735-2022-16-3-23-30.

Full text
Abstract:
It is expected that future communication networks will provide configurable delay-sensitive types of services (for example, streaming video, machine interaction). To support a variety of applications and use cases of servers providing various functions, you can use network function virtualization (NFV), which will be able to provide flexible implementation and placement of configuration of the necessary network functions. This article analyzes the end-to-end packet latency (E2E) for multiple traffic flows passing through the chain of embedded virtual network functions (VNF) in fifth-generation communication networks (5G). The Dominant of Generalized Resource Processing (DR-GPS) is used to distribute computing resources and transfer data between threads in each node of Network Function Virtualization (NFV) to achieve equitable distribution and utilization of available resources. The tandem queuing model is designed for incoming packets combined in several streams passing through the NFV node and its outgoing transmission channel. To analyze manageability, we separate packet processing (and transmission) of various streams in the simulation and determine the average packet processing and transmission rates of each stream as approximate service speeds.
APA, Harvard, Vancouver, ISO, and other styles
9

Raddwan, Basheer, Khalil AL-Wagih, Ibrahim A. Al-Baltah, Mohamed A. Alrshah, and Mohammed A. Al-Maqri. "Path Mapping Approach for Network Function Virtualization Resource Allocation with Network Function Decomposition Support." Symmetry 11, no. 9 (September 16, 2019): 1173. http://dx.doi.org/10.3390/sym11091173.

Full text
Abstract:
Recently, Network Function Virtualization (NFV) and Software Defined Networking (SDN) have attracted many mobile operators. For the flexible deployment of Network Functions (NFs) in an NFV environment, NF decompositions and control/user plane separation have been introduced in the literature. That is to map traditional functions into their corresponding Virtual Network Functions (VNFs). This mapping requires the NFV Resource Allocation (NFV-RA) for multi-path service graphs with a high number of virtual nodes and links, which is a complex NP-hard problem that inherited its complexity from the Virtual Network Embedding (VNE). This paper proposes a new path mapping approach to solving the NFV-RA problem for decomposed Network Service Chains (NSCs). The proposed solution has symmetrically considered optimizing an average embedding cost with an enhancement on average execution time. The proposed approach has been compared to two other existing schemes using 6 and 16 scenarios of short and long simulation runs, respectively. The impact of the number of nodes, links and paths of the service requests on the proposed scheme has been studied by solving more than 122,000 service requests. The proposed Integer Linear Programming (ILP) and heuristic schemes have reduced the execution time up to 39.58% and 6.42% compared to existing ILP and heuristic schemes, respectively. Moreover, the proposed schemes have also reduced the average embedding cost and increased the profit for the service providers.
APA, Harvard, Vancouver, ISO, and other styles
10

Venâncio, Giovanni, Rogério C. Turchetti, and Elias Procópio Duarte Jr. "NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies." Journal of Internet Services and Applications 12, no. 1 (November 18, 2022): 46–53. http://dx.doi.org/10.5753/jisa.2022.2342.

Full text
Abstract:
Network Functions Virtualization (NFV) allows the implementation in software of middleboxes traditionally available as specialized hardware. Network services can be implemented as SFCs (Service Function Chains) based onvirtualization technologies that run on commodity hardware. Although most virtualized functions have classic middlebox functionalities (e.g. firewalls or intrusion detectors) NFV technology can be used to leverage the networkto provide novel types of services to end-users. Actually, NFV can be very convenient to deploy traditional enduser services in the network, in the paradigm that has been called Computing In the Network (COIN). This articlediscusses the requirements to deploy COIN services using NFV technologies, which we call NFV-COIN. We alsopresent case studies and an NFV-COIN architecture that is compliant with the NFV-MANO reference model.
APA, Harvard, Vancouver, ISO, and other styles
11

Chang, Hung-Cheng, Bo-Jun Qiu, Jyh-Cheng Chen, Tze-Jie Tan, Ping-Fan Ho, Chen-Hao Chiu, and Bao-Shuh Paul Lin. "Empirical Experience and Experimental Evaluation of Open5GCore over Hypervisor and Container." Wireless Communications and Mobile Computing 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/6263153.

Full text
Abstract:
One of the most important technologies for future 5G networks is to utilize Network Function Virtualization (NFV) to virtualize the network components. NFV provides flexibility, short time to market, and low cost solution to build network services, which are important features of 5G networks. Although the idea of virtualization is just being applied to cellular networks, it has been used in the community of cloud computing. There are two main virtualization techniques, hypervisor and container. In this paper, we present our practical experience of virtualizing Open5GCore, a commercial product of SDN-enabled Evolved Packet Core (EPC), over hypervisor and container. In addition to describing how to virtualize Open5GCore, we also present the experimental performance evaluation of the systems. Finally, some important lessons learned are provided.
APA, Harvard, Vancouver, ISO, and other styles
12

Femminella, Mauro, and Gianluca Reali. "Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies." Future Internet 16, no. 3 (March 8, 2024): 91. http://dx.doi.org/10.3390/fi16030091.

Full text
Abstract:
The need for adaptivity and scalability in telecommunication systems has led to the introduction of a software-based approach to networking, in which network functions are virtualized and implemented in software modules, based on network function virtualization (NFV) technologies. The growing demand for low latency, efficiency, flexibility and security has placed some limitations on the adoption of these technologies, due to some problems of traditional virtualization solutions. However, the introduction of lightweight virtualization approaches is paving the way for new and better infrastructures for implementing network functions. This article discusses these new virtualization solutions and shows a proposal, based on serverless computing, that uses them to implement container-based virtualized network functions for the delivery of advanced Internet of Things (IoT) services. It includes open source software components to implement both the virtualization layer, implemented through Firecracker, and the runtime environment, based on Kata containers. A set of experiments shows that the proposed approach is fast, in order to boost new network functions, and more efficient than some baseline solutions, with minimal resource footprint. Therefore, it is an excellent candidate to implement NFV functions in the edge deployment of serverless services for the IoT.
APA, Harvard, Vancouver, ISO, and other styles
13

Dang-Quang, Nhat-Minh, and Myungsik Yoo. "Optimized placement of symmetrical service function chain in network function virtualization." Computer Science and Information Systems, no. 00 (2022): 6. http://dx.doi.org/10.2298/csis210920006d.

Full text
Abstract:
Network function virtualization (NFV) is one of the key technology enablers for actualizing 5G networks. With NFV, virtual network functions (VNFs) are linked together as a service function chain (SFC), which provides network functionality for the customer on demand. However, how to efficiently find a suitable placement for VNFs regarding the given objectives is an extremely difficult issue. The existing approaches assume that the SFC has a simple and asymmetrical pattern that is unsuitable to modeling a real system. We address this limitation by studying a VNF placement optimization problem with symmetrical SFCs that can support both symmetric and asymmetric traffic flows. This NP-hard problem is formulated as a mixed-integer linear programming (MILP) model. An iterative greedy-based heuristic is proposed to overcome the complexity of the MILP model. Extensive simulation results show that the proposed heuristic can obtain a near-optimal solution compared to MILP for a small-scale network, and at the same time, is superior to a traditional heuristic for a large-scale network.
APA, Harvard, Vancouver, ISO, and other styles
14

Kovalenko, V., A. A. Alzaghir, and A. Muthanna. "Building a UAV network with support for SDN / NFV technologies." Telecom IT 8, no. 3 (September 30, 2020): 71–85. http://dx.doi.org/10.31854/2307-1303-2020-8-3-71-85.

Full text
Abstract:
Research Subject - integration of software-defined networks (SDN) and network functions virtualization (NFV) technologies in the unmanned aerial vehicle networks. Method – analysis of standards and recommendations in the field of SDN, NFV technologies and construction of UAV networks. Core results – presents the main advantages of introducing SDN and NFV technologies into the UAV networks, two ways of organizing the UAV network architecture with SDN technology support: when the Base Station performs the functions of an SDN controller, and when air baluns are used as SDN controllers. This paper also compared the technologies of software-defined networking and virtualization of network functions. Practical relevance – this paper provides a detailed description of the structure and application possibilities of UAV networks, functional diagrams of SDN and NFV. The network architectures presented in this paper using SDN controllers in the flying (air balloon) and ground (Base stations) segment are examples of the implementation of SDN technology in a UAV network.of SDN and NFV technologies, and also considers the application of these technologies in UAV networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Full text
Abstract:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
16

Sharma, Sachin, and Avishek Nag. "Cognitive Software Defined Networking and Network Function Virtualization and Applications." Future Internet 15, no. 2 (February 17, 2023): 78. http://dx.doi.org/10.3390/fi15020078.

Full text
Abstract:
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using AI and ML techniques, such as AI- and software-based networking, autonomic networking, and policy-based network management. Contributions to this Special Issue come from the above areas of research. Following a rigorous review process, four excellent articles were accepted that address and go beyond many of the challenges mentioned above.
APA, Harvard, Vancouver, ISO, and other styles
17

Parmanand, Prabha, and Umar Syed. "Network Functions Virtualization: Challenges and Opportunities for Innovations." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (March 30, 2021): 64–69. http://dx.doi.org/10.35940/ijitee.d8483.0310521.

Full text
Abstract:
Network Functions Virtualization (NFV) was at the latest introduced to reform the suppleness of mechanism handling provisional and extenuate stress the time to bazaar of new handling. By leveraged virtualization processing and mercantile off-the recess schedule hardware, such as obscure motivation handling, store and button, NFV the software execution of mechanism festival and features from the basic hardware. As an supervene processing, NFV fetch diverse defiance to mechanism manipulator, such as the warranty of mechanism execution for factual appliance, their movable appliance and dwelling abroad, and their verseed placing. In this document, we bestow a concise inspection supervision of NFV, decode its Importance analysis and architectonic structure, current handling use location and debate the defiance and pending quarter for use in this investigation domain.
APA, Harvard, Vancouver, ISO, and other styles
18

Thembelihle, Dlamini, Michele Rossi, and Daniele Munaretto. "Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey." Wireless Communications and Mobile Computing 2017 (2017): 1–21. http://dx.doi.org/10.1155/2017/8618364.

Full text
Abstract:
Future mobile networks (MNs) are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN) and network function virtualization (NFV) technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC), a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC) and MEC architectures.
APA, Harvard, Vancouver, ISO, and other styles
19

Adoga, Haruna Umar, and Dimitrios P. Pezaros. "Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges." Future Internet 14, no. 2 (February 15, 2022): 59. http://dx.doi.org/10.3390/fi14020059.

Full text
Abstract:
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastructure, thereby reducing both capital and operational costs. With network function virtualisation (NFV), network functions (NFs) such as firewalls, traffic load balancers, content filters, and intrusion detection systems (IDS) are either instantiated on virtual machines (VMs) or lightweight containers, often chained together to create a service function chain (SFC). In this work, we review the state-of-the-art NFV and SFC implementation frameworks and present a taxonomy of the current proposals. Our taxonomy comprises three major categories based on the primary objectives of each of the surveyed frameworks: (1) resource allocation and service orchestration, (2) performance tuning, and (3) resilience and fault recovery. We also identify some key open research challenges that require further exploration by the research community to achieve scalable, resilient, and high-performance NFV/SFC deployments in next-generation networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Pinheiro, Billy, Eduardo Cerqueira, and Antonio Abelem. "NVP: A Network Virtualization Proxy for Software Defined Networking." International Journal of Computers Communications & Control 11, no. 5 (September 1, 2016): 697. http://dx.doi.org/10.15837/ijccc.2016.5.2681.

Full text
Abstract:
The combination of Network Function Virtualization (NFV) and Software Defined Networking (SDN) can improve the control and utilization of network resources. However, this issue still requires proper solutions to virtualize large-scale networks, which would allow the use of SDN and Virtualization in real environments.Thus, this paper proposes a virtualization architecture for SDN that relies on a proxy-based approach. The NVP (Network Virtualization Proxy) is a virtualization proxy that intercepts messages exchanged between controllers and switches SDN enabling network virtualization. An implementation of the proposal was developed as a proof of concept and load testing was performed showing that the solution can provide network virtualization in a scalable manner, using less than 2.5 MB of memory to manage 100 switches performing simultaneous requests, whereas FlowVisor requires more than 200 MB.
APA, Harvard, Vancouver, ISO, and other styles
21

Sridharan, Srinivasan. "A Literature Review of Network Function Virtualization (NFV) in 5G Networks." International Journal of Computer Trends & Technology 68, no. 10 (October 25, 2020): 49–55. http://dx.doi.org/10.14445/22312803/ijctt-v68i10p109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Alnaim, Abdulrahman K. "Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization." Future Internet 14, no. 7 (June 30, 2022): 201. http://dx.doi.org/10.3390/fi14070201.

Full text
Abstract:
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more security threats. A key part of this virtualization environment is the hypervisor, which emulates the hardware resources to provide a runtime environment for virtual machines (VMs). The hypervisor is considered a major attack vector and must be secured to ensure network service continuity. The virtualization environment contains critical non-control data where compromise could lead to several misuses, including information leakage and privilege and resource modification. In this paper, we present a misuse pattern for an attack that exploits the security vulnerabilities of the hypervisor to compromise the integrity of non-control data in the NFV environment. Misuse patterns are used to describe how attacks are carried out from the attackers’ perspective. The threat of modification of non-control data can lead to several misuses, and in this paper, we discuss three of them. The defenses to this attack can be incorporated into the Security Reference Architecture (SRA) of the NFV system to prevent these misuses.
APA, Harvard, Vancouver, ISO, and other styles
23

Xu, Ran. "Proactive VNF Scaling with Heterogeneous Cloud Resources: Fusing Long Short-Term Memory Prediction and Cooperative Allocation." Mathematical Problems in Engineering 2020 (January 28, 2020): 1–10. http://dx.doi.org/10.1155/2020/4371056.

Full text
Abstract:
Network function virtualization (NFV) is designed to implement network functions by software that replaces proprietary hardware devices in traditional networks. In response to the growing demand of resource-intensive services, for NFV cloud service providers, software-oriented network functions face a number of challenges, such as dynamic deployment of virtual network functions and efficient allocation of multiple resources. This study aims at the dynamic allocation and adjustment of network multiresources and multitype flows for NFV. First, to seek a proactive approach to provision new instances for overloaded VNFs ahead of time, a model called long short-term memory recurrent neural network (LSTM RNN) is proposed to estimate flows in this paper. Then, based on the estimated flow, a cooperative and complementary resource allocation algorithm is designed to reduce resource fragmentation and improve the utilization. The final results demonstrate the advantage of the LSTM model on predicting the network function flow requirements, and our algorithm achieves good results and performance improvement in dynamically expanding network functions and improving resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
24

Huang, Yong-Xuan, and Jerry Chou. "A Survey of NFV Network Acceleration from ETSI Perspective." Electronics 11, no. 9 (May 2, 2022): 1457. http://dx.doi.org/10.3390/electronics11091457.

Full text
Abstract:
Network function virtualization (NFV) enables network operators to save costs and flexibility by replacing dedicated hardware with software network functions running on commodity servers. There is a high need for network acceleration to achieve performance comparable to hardware, which is vital for the implementation of NFV. The necessity of NFV acceleration stems from the lengthy packet delivery path following virtualization and the unavailability of generic operating system designs to serve network-specific scenarios. Therefore, the software approach alters the operating system’s processing architecture through Kernel Bypass or offload packet processing to hardware. A typical classification scheme divides it into two main categories based on technology with software and hardware. Only these two categories can be utilized to rapidly and easily establish a classification system. However, it is difficult to suggest the specifics and peculiarities of any acceleration approach during real-world operation. For a more comprehensive classification of NFV acceleration, we refer to the ETSI NFV architectural framework in this research. As the framework clearly illustrates, the technical infrastructure layer of NFV and the corresponding management roles provides a comprehensive and intuitive view of the differences between these acceleration technologies, solutions, and initiatives. Additionally, we conducted an analysis to identify opportunities for improvement in existing solutions and propose new research programs. We expect that NFV will increasingly rely on cloud services in the future. Since cloud services do not offer a choice of hardware, our acceleration method will be primarily software-based.
APA, Harvard, Vancouver, ISO, and other styles
25

Shamsan, Ali Haider, and Arman Rasool Faridi. "A conceptual architecture for integrating software defined network and network virtualization with internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (December 1, 2022): 6777. http://dx.doi.org/10.11591/ijece.v12i6.pp6777-6784.

Full text
Abstract:
<span lang="EN-US">Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a software-based environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating software defined network (SDN) and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.</span>
APA, Harvard, Vancouver, ISO, and other styles
26

Chung, Wu-Chun, and Yun-He Wang. "The Effects of High-Performance Cloud System for Network Function Virtualization." Applied Sciences 12, no. 20 (October 13, 2022): 10315. http://dx.doi.org/10.3390/app122010315.

Full text
Abstract:
Since ETSI introduced the architectural framework of network function virtualization (NFV), telecom operators have paid more attention to the synergy of NFV and cloud computing. With the integration of the NFV cloud platform, telecom operators decouple network functions from the dedicated hardware and run virtualized network functions (VNFs) on the cloud. However, virtualization degrades the performance of VNF, resulting in violating the performance requirements of the telecom industry. Most of the existing works were not conducted in a cloud computing environment, and fewer studies focused on the usage of enhanced platform awareness (EPA) features. Furthermore, few works analyze the performance of the service function chain on a practical cloud. This paper facilitates the OpenStack cloud with different EPA features to investigate the performance effects of VNFs on the cloud. A comprehensive test framework is proposed to evaluate the verification of functionality, performance, and application testing. Empirical results show that the cloud system under test fulfills the requirements of service level agreement in Rally Sanity testcases. The throughput of OVS-DPDK is up to 8.2 times as high as that of OVS in the performance test. Meanwhile, the hardware-assisted solution, SR-IOV, achieves the throughput at near the line rate in the end-to-end scenario. For the application test, the successful call rate for the vIMS service is improved by up to 14% while applying the EPA features on the cloud.
APA, Harvard, Vancouver, ISO, and other styles
27

Nogales, Borja, Miguel Silva, Ivan Vidal, Miguel Luís, Francisco Valera, Susana Sargento, and Arturo Azcorra. "Using Aerial and Vehicular NFV Infrastructures to Agilely Create Vertical Services." Sensors 21, no. 4 (February 13, 2021): 1342. http://dx.doi.org/10.3390/s21041342.

Full text
Abstract:
5G communications have become an enabler for the creation of new and more complex networking scenarios, bringing together different vertical ecosystems. Such behavior has been fostered by the network function virtualization (NFV) concept, where the orchestration and virtualization capabilities allow the possibility of dynamically supplying network resources according to its needs. Nevertheless, the integration and performance of heterogeneous network environments, each one supported by a different provider, and with specific characteristics and requirements, in a single NFV framework is not straightforward. In this work we propose an NFV-based framework capable of supporting the flexible, cost-effective deployment of vertical services, through the integration of two distinguished mobile environments and their networks: small sized unmanned aerial vehicles (SUAVs), supporting a flying ad hoc network (FANET) and vehicles, promoting a vehicular ad hoc network (VANET). In this context, a use case involving the public safety vertical will be used as an illustrative example to showcase the potential of this framework. This work also includes the technical implementation details of the framework proposed, allowing to analyse and discuss the delays on the network services deployment process. The results show that the deployment times can be significantly reduced through a distributed VNF configuration function based on the publish–subscribe model.
APA, Harvard, Vancouver, ISO, and other styles
28

Azzam, Ahmad Thoriq, Rendy Munadi, and Ratna Mayasari. "Performance Analysis Of Firewall As Virtualized Network Function On VMware ESXi Hypervisor." JURNAL INFOTEL 11, no. 1 (March 25, 2019): 29. http://dx.doi.org/10.20895/infotel.v11i1.425.

Full text
Abstract:
Virtualization technology is slowly being used to build network infrastructure called Network Function Virtualization (NFV). It takes network functions such as firewall, load balancer, IPS out of its hardware then use its software to be run on high specification server. It helps reduce vendor lock-in and help create a multiplatform network function environment. It has a lot of benefits compared to a traditional network. One of them is it can reduce the number of hardware that is used in the telecom industry. This technology runs on the hypervisor that is used for the management of hardware. One of the important components from NFV is Virtualized Network Function (VNF). In NFV, network devices are run on a server so that a firewall is needed because if an attack occurs on the network it will interfere with existing network components. This paper focuses on analyzing the performance of two firewall system, pfSense, and FortiGate. Both firewalls will run on the VMware ESXi hypervisor. It aims to determine the firewall performance comparison in normal conditions without attacks and under SYN DoS attacks. We also evaluate firewall failover capabilities. Based on the results of testing obtained that overall FortiGate has better performance. It has better ability in handling DoS SYN attack because it has lower throughput performance degradation and better FTP performance compare to pfSense. We conclude that FortiGate has best performance compare with pfSense
APA, Harvard, Vancouver, ISO, and other styles
29

Hassan, Heba, Amr Al-Awamry, and Mohammed Abdelhalim. "Dragonfly addressing model for software defined networks based on datacenters." International Journal of Engineering & Technology 7, no. 2 (April 30, 2018): 657. http://dx.doi.org/10.14419/ijet.v7i2.9769.

Full text
Abstract:
With the advancement of technology, virtualization has become very important for Information Technology (IT) experts. Network Functions Virtualization (NFV) means to address issues resulting from complex hardware-based appliances by developing standard IT virtualization technologies. Software Defined Networking (SDN) solidifies the advantages of datacenter virtualization, increases resource flexibility and utilization, and reduces infrastructure costs and overhead. Datacenter networks should have the ability to guarantee high throughput and resiliency. For such reasons, typical datacenter networks (e.g. Fat Tree) have been evolved to high-radix networks (e.g. Dragonfly). This work aims to investigate how SDN and NFV can improve the advantages of datacenter virtualization by utilizing datacenter topologies such as Dragonfly (DF) topology and Fat Tree (FT) topology in SDN, thus expanding resource flexibility and utilization and diminishing infrastructure costs and overhead. By using Dragonfly topology, the cost is reduced and better scalability is introduced compared to the folded clos networks such as Fat Tree. Here in, a novel addressing scheme is proposed for Dragonfly topology with simulation results included utilizing Mininet, which incorporates MiniEdit that is used to create and run network simulations.
APA, Harvard, Vancouver, ISO, and other styles
30

Cotroneo, Domenico, Luigi De Simone, and Roberto Natella. "NFV-Bench: A Dependability Benchmark for Network Function Virtualization Systems." IEEE Transactions on Network and Service Management 14, no. 4 (December 2017): 934–48. http://dx.doi.org/10.1109/tnsm.2017.2733042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cotroneo, Domenico, Roberto Natella, and Stefano Rosiello. "NFV-Throttle: An Overload Control Framework for Network Function Virtualization." IEEE Transactions on Network and Service Management 14, no. 4 (December 2017): 949–63. http://dx.doi.org/10.1109/tnsm.2017.2752173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kim, Hyuncheol, Seunghyun Yoon, Hongseok Jeon, Wonhyuk Lee, and Seungae Kang. "Service platform and monitoring architecture for network function virtualization (NFV)." Cluster Computing 19, no. 4 (September 21, 2016): 1835–41. http://dx.doi.org/10.1007/s10586-016-0640-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Jaadouni, Hatim, Chaimae Saadi, and Habiba Chaoui. "SDN/NFV architectures for edge-cloud oriented IoT." ITM Web of Conferences 46 (2022): 02004. http://dx.doi.org/10.1051/itmconf/20224602004.

Full text
Abstract:
Thanks to Software Defined Networking (SDN) and Network Functions Virtualization (NFV), the use and behaviour of interconnect network backhauls to provide virtualization services has changed completely. Several benefits have been discovered in various application areas that combine SDN and NFV. As a result, we explored the SDN / NFV paradigm to determine if network services could be efficiently deployed, managed, and distributed to end users. The Internet of Things (IoT) is inseparable from improving SDN / b NFV to improve this task. However, until now, problems related to Edge cloud communications and network services have not been effectively mitigated. The rest of this article is organized as follows. We first present the background of this work. Then we present the new technologies around these topics and the extended architecture, and e. Finally, we conclude this work.
APA, Harvard, Vancouver, ISO, and other styles
34

Antonenko, Vitaly A., Ruslan L. Smeliansky, Artem V. Plakunov, and Pavel A. Mikheev. "Shared Virtual Function Orchestration Technique." Modeling and Analysis of Information Systems 26, no. 1 (March 15, 2019): 7–22. http://dx.doi.org/10.18255/1818-1015-2019-1-7-22.

Full text
Abstract:
Network function virtualization (NFV) is a promising technique of high quality, flexible and scalable service for telecommunication companies clients and for enterprise data center clients. One of the important capabilities of this technique is providing a virtual service as a combination of multiple virtual functions. There are two types of virtual functions: those intended for a single customer (su-VF) and those that can serve multiple users (mu-VF). In case when output of mu-VF is chained with inputs of several different su-VFs, there is a need for a mechanism of identification and separation of users network flows passing through mu-VF to allocate them correctly between inputs of su-VFs in the NFV infrastructure. In the cloud environment, it is not always possible to use VLAN tags, IP and MAC addresses for that. In this paper, we consider the problem of identification of network traffic coming from a certain user inside an NFV platform and present a solution implemented in C2 MANO-platform.
APA, Harvard, Vancouver, ISO, and other styles
35

Qi Xu, Deyun Gao, Huachun Zhou, Bohao Feng, and Taixin Li. "OpenNSP: Open Network Service Provision for Mobile Networks." Research Briefs on Information and Communication Technology Evolution 3 (May 15, 2017): 42–52. http://dx.doi.org/10.56801/rebicte.v3i.43.

Full text
Abstract:
In recent years, many innovative techniques are emerged for satisfying various user requirements,such as Software Definition Network (SDN) and Network Function Virtualization (NFV). However,the current solutions for network service provision still lack enough flexibility and openness thatresult in high expenditures and complexity. Thus, we propose an Open Network Service Provision(OpenNSP) solution in this paper, aiming to address the multi-domain problems of service functionchain outsourcing for mobile networks. Particularly, OpenNSP is based on IETF hierarchical servicefunction chaining (hSFC) architecture to implement service chains hierarchically in multi-domainnetworks comprising operator network and cloud datacenters. It outsources service chains, which isusually located in SGi-LAN, to the public clouds, enabling fast, flexible and cost-effective networkservice provision. Besides, OpenNSP achieves the programmable service function placement andchaining by the integration of SDN and NFV. Much work has been done, and the experiment resultsconfirm its feasibility and flexibility.
APA, Harvard, Vancouver, ISO, and other styles
36

Molina Zarca, Alejandro, Dan Garcia-Carrillo, Jorge Bernal Bernabe, Jordi Ortiz, Rafael Marin-Perez, and Antonio Skarmeta. "Enabling Virtual AAA Management in SDN-Based IoT Networks †." Sensors 19, no. 2 (January 12, 2019): 295. http://dx.doi.org/10.3390/s19020295.

Full text
Abstract:
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things (IoT) networks to deal with cyber-threats. In this sense, this paper presents and evaluates a novel policy-based and cyber-situational awareness security framework for continuous and dynamic management of Authentication, Authorization, Accounting (AAA) as well as Channel Protection virtual security functions in IoT networks enabled with SDN/NFV. The virtual AAA, including network authenticators, are deployed as VNF (Virtual Network Function) dynamically at the edge, in order to enable scalable device’s bootstrapping and managing the access control of IoT devices to the network. In addition, our solution allows distributing dynamically the necessary crypto-keys for IoT Machine to Machine (M2M) communications and deploy virtual Channel-protection proxys as VNFs, with the aim of establishing secure tunnels among IoT devices and services, according to the contextual decisions inferred by the cognitive framework. The solution has been implemented and evaluated, demonstrating its feasibility to manage dynamically AAA and channel protection in SDN/NFV-enabled IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
37

Kovacs, Rudolf, Sorin Buzura, Bogdan Iancu, Vasile Dadarlat, Adrian Peculea, and Emil Cebuc. "Practical Implementation of a Blockchain-Enabled SDN for Large-Scale Infrastructure Networks." Applied Sciences 14, no. 5 (February 26, 2024): 1914. http://dx.doi.org/10.3390/app14051914.

Full text
Abstract:
The network function virtualization (NFV) feature lies at the core of modern networking, and it allows on-demand real-time integration of new network functions, which is a great benefit for large-scale infrastructure networks. In contrast to the functional benefits, NFV introduces software complexity and computational overhead through additional abstraction layers. The current article addresses the function validation problem in large-scale infrastructure networks of Internet Service Providers (ISPs) and proposes the utilization of blockchain as a validation technology, as opposed to implementing a custom validation solution. The current work showcases a practical architecture implementation to address the service validation in service provider large-scale networks. The POX-based solution to control software-defined networks (SDN) for NFV is extended to offer additional blockchain capabilities. Thus, a blockchain node is integrated and executed in the POX SDN controller. Transaction experiments are performed between two endpoints located in remote locations on the Internet, and the detailed results are presented to validate the utilization of the blockchain technology used on SDNs’ control plane.
APA, Harvard, Vancouver, ISO, and other styles
38

Cattaneo, Giorgio, Fabio Giust, Claudio Meani, Daniele Munaretto, and Pietro Paglierani. "Deploying CPU-Intensive Applications on MEC in NFV Systems: The Immersive Video Use Case." Computers 7, no. 4 (October 26, 2018): 55. http://dx.doi.org/10.3390/computers7040055.

Full text
Abstract:
Multi-access Edge Computing (MEC) will be a technology pillar of forthcoming 5G networks. Nonetheless, there is a great interest in also deploying MEC solutions in current 4G infrastructures. MEC enables data processing in proximity to end users. Thus, latency can be minimized, high data rates locally achieved, and real-time information about radio link status or consumer geographical position exploited to develop high-value services. To consolidate network elements and edge applications on the same virtualization infrastructure, network operators aim to combine MEC with Network Function Virtualization (NFV). However, MEC in NFV integration is not fully established yet: in fact, various architectural issues are currently open, even at standardization level. This paper describes a novel MEC in an NFV system which successfully combines, at management level, MEC functional blocks with an NFV Orchestrator, and can neutrally support any “over the top” Mobile Edge application with minimal integration effort. A specific ME app combined with an end-user app for the provision of immersive video services is presented. To provide low latency, CPU-intensive services to end users, the proposed architecture exploits High-Performance Computing resources embedded in the edge infrastructure. Experimental results showing the effectiveness of the proposed architecture are reported and discussed.
APA, Harvard, Vancouver, ISO, and other styles
39

Umrao, Brajesh Kumar, and Dharmendar Kumar Yadav. "APVNFC: Adaptive Placement of Virtual Network Function Chains." Cybernetics and Information Technologies 23, no. 1 (March 1, 2023): 59–74. http://dx.doi.org/10.2478/cait-2023-0003.

Full text
Abstract:
Abstract Designing efficient and flexible approaches for placement of Virtual Network Function (VNF) chains is the main success of Network Function Virtualization (NFV). However, most current work considers the constant bandwidth and flow processing requirements while deploying the VNFs in the network. The constant (immutable) flow processing and bandwidth requirements become critical limitations in an NFV-enabled network with highly dynamic traffic flow. Therefore, bandwidth requirements and available resources of the Point-of-Presence (PoP) in the network change constantly. We present an adaptive model for placing VNF chains to overcome this limitation. At the same time, the proposed model minimizes the number of changes (i.e., re-allocation of VNFs) in the network. The experimental evaluation shows that the adaptive model can deliver stable network services. Moreover, it reduces the significant number of changes in the network and ensures flow performance.
APA, Harvard, Vancouver, ISO, and other styles
40

Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam A. Khan, Muhammad Waseem Akhtar, Asad Waqar Malik, Arslan Munir, Jawad Ahmad, and Balawal Shabir. "Evolution towards Smart and Software-Defined Internet of Things." AI 3, no. 1 (February 21, 2022): 100–123. http://dx.doi.org/10.3390/ai3010007.

Full text
Abstract:
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened up new and vast domains for connecting not only people, but also all kinds of simple objects and phenomena all around us. With billions of heterogeneous devices connected to the Internet, the network architecture must evolve to accommodate the expected increase in data generation while also improving the security and efficiency of connectivity. Traditional IoT architectures are primitive and incapable of extending functionality and productivity to the IoT infrastructure’s desired levels. Software-Defined Networking (SDN) and virtualization are two promising technologies for cost-effectively handling the scale and versatility required for IoT. In this paper, we discussed traditional IoT networks and the need for SDN and Network Function Virtualization (NFV), followed by an analysis of SDN and NFV solutions for implementing IoT in various ways.
APA, Harvard, Vancouver, ISO, and other styles
41

Erbati, Mohammad Mohammadi, Mohammad Mahdi Tajiki, and Gregor Schiele. "Service Function Chaining to Support Ultra-Low Latency Communication in NFV." Electronics 12, no. 18 (September 11, 2023): 3843. http://dx.doi.org/10.3390/electronics12183843.

Full text
Abstract:
Network function virtualization (NFV) has the potential to fundamentally transform conventional network architecture through the decoupling of software from dedicated hardware. The convergence of virtualization and cloud computing technologies has revolutionized the networking landscape, offering a wide range of advantages, including improved flexibility, manageability, and scalability. The importance of network capability in enabling ultra-low latency applications has been greatly amplified in the current era due to the increased demand for emerging services such as autonomous driving, teleoperated driving, virtual reality, and remote surgery. This paper presents a novel and efficient methodology for service function chaining (SFC) in an NFV-enabled network that aims to minimize latency and optimize the utilization of physical network resources, with a specific focus on ultra-low latency applications. In our proposed methodology, we offer flow prioritization and an adjustable priority coefficient factor (µ) to reserve a portion of physical network resources exclusively for ultra-low latency applications in order to optimize the deployment paths of these applications further. We formulate the SFC deployment problem as an integer linear programming (ILP) optimization model. Furthermore, we propose a set of heuristic algorithms that yield near-optimal solutions with minimal optimality gaps and execution times, making them practical for large-scale network topologies. Performance evaluations demonstrate the effectiveness of our proposed methodology in enabling ultra-low latency applications in an NFV-enabled network. Compared to existing algorithms, our proposed methodology achieves notable enhancements in terms of the end-to-end delay (up to 22 percent), bandwidth utilization (up to 28 percent), and SFC acceptance rate (up to 13 percent).
APA, Harvard, Vancouver, ISO, and other styles
42

Rasool, Samer Mohammed, Yassine Boujelben, and Faouzi Zarai. "Optimizing high availability multi-controller placement in SDN/NFV 5G networks: a survey." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 3 (June 1, 2024): 1800. http://dx.doi.org/10.11591/ijeecs.v34.i3.pp1800-1813.

Full text
Abstract:
<p>In meeting the diverse and occasionally conflicting quality of service (QoS) requirements associated with modern communication networks, 5G technology has emerged as a pivotal player. In its architecture, 5G has adopted network function virtualization (NFV) and cloud-based approaches, aiming to simplify network and service deployment, operational processes, and management. The convergence of software defined networking (SDN) and NFV offers an effective solution, enabling scalable and high-performance 5G networks. However, this integration poses critical challenges, with the placement of SDN controllers being a central concern due to its significant impact on network performance, covering aspects such as latency, costs, and energy efficiency. This challenge is known as the controller placement problem (CPP). The central theme of this paper revolves around the intricate relationship between 5G core networks, virtualization technology, and the pressing concern of SDN controller placement, underscoring its significance in the modern networking landscape. We provide a survey of recent methodologies aimed at solving the CPP within the realm of SDN, with a particular focus on resiliency and high availability.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Abdullah, Aswan, Adelina Ibrahim, and Erwin Gunawan. "Analisis Performansi Network Function Virtualization Pada Teknologi Containers." Jurnal Teknik Informatika (J-Tifa) 3, no. 2 (September 3, 2020): 23–31. http://dx.doi.org/10.52046/j-tifa.v3i2.1053.

Full text
Abstract:
Sebagai teknologi virtualisasi yang baru, banyak hal yang perlu digali tentang teknologi container. Penelitian ini bertujuan untuk mengukur kehandalan dari Network Function Virtualization (NFV) yang akan dibangun dan dijalankan diatas Docker menggunakan virtual router dan dapat terhubung dengan jaringan yang real. Penelitian ini bertujuan untuk mengetahui performansi Docker Containers dan Native ketika menjalankan virtual router yang dilewatkan oleh layanan FTP menggunakan parameter Quality of Service (QoS). Pada penelitian ini dilakukan analisa perbandingan perfomansi fungsi jaringan antara Docker Containers dan Native di Laboratorium Infrastruktur Teknologi Informasi Universitas Muhammadiyah Maluku Utara menggunakan layanan FTP (File Transfer Protocol). Parameter QoS yang diamati adalah berupa Delay, Packet Loss, Troughput dan apakah ada perbedaan pada saat Upload dan Download file berupa video dengan kapasitas 1Gb dan 500Mb antara Docker Containers dan Native, pengujian dilakukan dengan pengambilan data selama duakali percobaan, kesimpulan dari penelitian ini bagaimana melakukan perbandingan QoS dari Docker Containers dan Native
APA, Harvard, Vancouver, ISO, and other styles
44

Vladislavić, Đani, Darko Huljenić, and Julije Ožegović. "Virtual Network Resource Optimization Model for Network Function Virtualization." Wireless Communications and Mobile Computing 2021 (August 17, 2021): 1–21. http://dx.doi.org/10.1155/2021/9928210.

Full text
Abstract:
Network function virtualization (NFV) is a concept aimed at achieving telecom grade cloud ecosystem for new-generation networks focusing on capital and operational expenditure (CAPEX and OPEX) savings. This study introduces empirical throughput prediction model for the virtual network function (VNF) and network function virtualization infrastructure (NFVI) architectures based on Linux kernel. The model arises from the methodology for performance evaluation and modeling based on execution area (EA) distribution by CPU core pinning. EA is defined as a software execution unit that can run isolated on a compute resource (CPU core). EAs are derived from the elements and packet processing principles in NFVIs and VNFs based on Linux kernel. Performing measurements and observing linearity of the measured results open the possibility to apply model calibration technique to achieve general VNF and NFVI architecture model with performance prediction and environment setup optimization. The modeling parameters are derived from the cumulative packet processing cost obtained by measurements for collocated EAs on the CPU core hosting the bottleneck EA. The VNF and NFVI architecture model with performance prediction is successfully validated against the measurement results obtained in emulated environment and used to predict optimal system configurations and maximal throughput results for different CPUs.
APA, Harvard, Vancouver, ISO, and other styles
45

Karimzadeh-Farshbafan, Mohammad, Vahid Shah-Mansouri, and Dusit Niyato. "A Dynamic Reliability-Aware Service Placement for Network Function Virtualization (NFV)." IEEE Journal on Selected Areas in Communications 38, no. 2 (February 2020): 318–33. http://dx.doi.org/10.1109/jsac.2019.2959196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mauricio, Leopoldo, and Marcelo Rubinstein. "A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware." Journal of Internet Services and Applications 14, no. 1 (February 16, 2023): 10–20. http://dx.doi.org/10.5753/jisa.2023.2847.

Full text
Abstract:
This paper proposes and implements a Network Function Virtualization (NFV) security architecture to provide automatic and efficient detection and mitigation against Web application malware. The mitigation is given by dynamically chaining a Virtual Security Function (VSF) to the data stream to block malicious exploitation traffic without affecting the benign traffic. We implement an NFV Security Controller (NFV-SC) that interacts with an Intrusion Detection System and a Web Application Firewall (WAF), both implemented as VSFs. We also implement a vulnerability scanner and a mechanism to automatically create rules in advance in the WAF-VSF when a security vulnerability is found in an application, even if no malicious traffic has attempted to exploit the flaw. In addition, it dynamically identifies and removes no longer used security rules to improve performance. We implement and evaluate our security proposal in the Open Platform for NFV (OPNFV). The evaluation results in our experimental scenarios show that the NFV security architecture automatically blocks 99.12% of the HTTP malicious traffic without affecting 93.6% of the benign HTTP requests. Finally, we show that the number of rules in the WAF-VSF severely affects the latency to load HTTP response headers and that the number of redirection OpenFlow rules within Open vSwitches is not enough to significantly impact the end-user experience in modern web browser applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Hu, Haiyan, Qiaoyan Kang, Shuo Zhao, Jianfeng Wang, and Youbin Fu. "Service Function Chain Deployment Method Based on Traffic Prediction and Adaptive Virtual Network Function Scaling." Electronics 11, no. 16 (August 22, 2022): 2625. http://dx.doi.org/10.3390/electronics11162625.

Full text
Abstract:
With the development of network function virtualization (NFV), the resource management of service function chains (SFC) in the virtualized environment has gradually become a research hotspot. Usually, users hope that they can get the network services they want anytime and anywhere. The network service requests are dynamic and real-time, which requires that the SFC in the NFV environment can also meet the dynamically changing network service requests. In this regard, this paper proposes an SFC deployment method based on traffic prediction and adaptive virtual network function (VNF) scaling. Firstly, an improved network traffic prediction method is proposed to improve its prediction accuracy for dynamically changing network traffic. Secondly, the predicted traffic data is processed for the subsequent scaling of the VNF. Finally, an adaptive VNF scaling method is designed for the purpose of dynamic management of network virtual resources. The experimental results show that the method proposed in this paper can manage the network resources in dynamic scenarios. It can effectively improve the availability of network services, reduce the operating overhead and achieve a good optimization effect.
APA, Harvard, Vancouver, ISO, and other styles
48

Sun, Jian, Guanhua Huang, Gang Sun, Hongfang Yu, Arun Kumar Sangaiah, and Victor Chang. "A Q-Learning-Based Approach for Deploying Dynamic Service Function Chains." Symmetry 10, no. 11 (November 16, 2018): 646. http://dx.doi.org/10.3390/sym10110646.

Full text
Abstract:
As the size and service requirements of today’s networks gradually increase, large numbers of proprietary devices are deployed, which leads to network complexity, information security crises and makes network service and service provider management increasingly difficult. Network function virtualization (NFV) technology is one solution to this problem. NFV separates network functions from hardware and deploys them as software on a common server. NFV can be used to improve service flexibility and isolate the services provided for each user, thus guaranteeing the security of user data. Therefore, the use of NFV technology includes many problems worth studying. For example, when there is a free choice of network path, one problem is how to choose a service function chain (SFC) that both meets the requirements and offers the service provider maximum profit. Most existing solutions are heuristic algorithms with high time efficiency, or integer linear programming (ILP) algorithms with high accuracy. It’s necessary to design an algorithm that symmetrically considers both time efficiency and accuracy. In this paper, we propose the Q-learning Framework Hybrid Module algorithm (QLFHM), which includes reinforcement learning to solve this SFC deployment problem in dynamic networks. The reinforcement learning module in QLFHM is responsible for the output of alternative paths, while the load balancing module in QLFHM is responsible for picking the optimal solution from them. The results of a comparison simulation experiment on a dynamic network topology show that the proposed algorithm can output the approximate optimal solution in a relatively short time while also considering the network load balance. Thus, it achieves the goal of maximizing the benefit to the service provider.
APA, Harvard, Vancouver, ISO, and other styles
49

Leivadeas, Aris, George Kesidis, Mohamed Ibnkahla, and Ioannis Lambadaris. "VNF Placement Optimization at the Edge and Cloud †." Future Internet 11, no. 3 (March 9, 2019): 69. http://dx.doi.org/10.3390/fi11030069.

Full text
Abstract:
Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.
APA, Harvard, Vancouver, ISO, and other styles
50

Xue, Peilei, and Zhongyuan Jiang. "SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology." IEEE Transactions on Circuits and Systems II: Express Briefs 69, no. 3 (March 2022): 1727–31. http://dx.doi.org/10.1109/tcsii.2021.3119938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography