To see the other types of publications on this topic, follow the link: Network Functions Virtualization (NFV).

Journal articles on the topic 'Network Functions Virtualization (NFV)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network Functions Virtualization (NFV).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vilalta, Ricard, Raül Muñoz, Arturo Mayoral, et al. "Transport Network Function Virtualization." Journal of Lightwave Technology 33, no. 5 (2015): 1–8. https://doi.org/10.5281/zenodo.47262.

Full text
Abstract:
In this paper, we present a network function virtualization (NFV) architecture to deploy different virtualized network functions (VNF) on an optical transport network. NFV concepts do not only apply to data plane functions (i.e., packet processing or forwarding), but also to control plane functions, such as path computation. First, we focus on the IT and network resources that are virtualized to provide the required VNFs. Second, we provide an example of VNF on top of the virtualized infrastructure, by proposing a path computation element (PCE) architecture to deploy a PCE by means of NFV. The instances of the virtualized PCE are deployed on demand, but they are perceived as a single-network element. We present the benefits of such approach by providing experimental validation.
APA, Harvard, Vancouver, ISO, and other styles
2

Jawdhari, Hayder A., and Alharith A. Abdullah. "The Application of Network Functions Virtualization on Different Networks, and its New Applications in Blockchain: A Survey." Webology 18, Special Issue 04 (2021): 1007–44. http://dx.doi.org/10.14704/web/v18si04/web18179.

Full text
Abstract:
Operators of networks are striving to provide functional network-based services, while keeping the cost of deploying the service to a minimum. Network Function Virtualization (NFV) is considered to be a promising model to modify such employment by separating network functions from the basic hardware properties, after which they are converted into the style of software. These are eventually referred to as Virtual Network Functions (VNFs). This separation offers numerous benefits, including the decrease of Capital Expenditure (CAPEX) and Operation Expense (OPEX), in addition to the enhanced elasticity of service preparation. Network Functions Virtualization (NFV) is found to cause a remarkable development or even a technological revolution in terms of network-based services, leading to a decrease in deployment costs for network operators. NFV reduces hardware tool costs and energy exhaustion, and it improves its operational performance whereby the network configuration is part of this optimization. Even so, there are a number of possible security problems which are the main focus in NFV. The present study surveys the applications and opportunities of NFV in terms of IoT, SDN, cloud computing and blockchain. A description of the NFV architecture is presented, and several possibilities of NFV security issues and challenges are discussed. Finally, a systematic idea is provided on the design of a Blockchain Network Virtualization System.
APA, Harvard, Vancouver, ISO, and other styles
3

DJOMI, MANZILA IZNIARDI, RENDY MUNADI, and RIDHA MULDINA NEGARA. "Analisis Performansi Layanan FTP danVideo Streaming berbasis Network Function Virtualization menggunakan Docker Containers." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (2018): 180. http://dx.doi.org/10.26760/elkomika.v6i2.180.

Full text
Abstract:
ABSTRAKInfrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai aplikasi perangkat lunak yang dapat dijalankan di lingkungan virtual atau Virtualized Network Functions (VNFs). Selain menggunakan hypervisor (hardware-level virtualization), teknologi virtualisasi memiliki alternatif pengimplementasian dengan menggunakan teknologi containers (Operating system -level virtualization), salah satunya menggunakan Docker. Penelitian ini mengimplementasikan layanan FTP dan video streaming pada jaringan NFV di Docker Containers. Tanpa backgound traffic, layanan menunjukkan performansi QoS yang memenuhi standarisasi ITU-T G.1010 dengan delay FTP 0,12 ms dan delay video streaming 6,21 ms serta nilai packet loss kedua layanan sebesar 0%. Penggunaan CPU pada Docker ketika layanan dijalankan dibawah 1 %. Kata kunci: Virtualisasi, Containers, Docker, Network Function Virtualization, QoSABSTRACTNetwork infrastructure such as routers, traditionally using proprietary hardware. Virtualization technology on network function or NFV (Network Function Virtualization) makes this service can be implemented as a software application that can run in virtual environment or Virtualized Network Functions (VNFs). In addition to using hypervisor (hardware-level virtualization), virtualization technology has an alternative implementation using containers technology (Operating system-level virtualization), one of them using Docker. This research implements FTP and video streaming services on NFV networks in Docker Containers. Without background traffic, the service demonstrates QoS performance that meets the ITU-T G.1010 standardization with 0.12 ms FTP delay and 6.21 ms video streaming delay and with packet loss value of both services at 0%. CPU usage on Docker when service runs below 1%.Keywords: Virtualization, Containers, Docker, Network Function Virtualization, QoS
APA, Harvard, Vancouver, ISO, and other styles
4

Parmanand, Prabha, and Umar Syed. "Network Functions Virtualization: Challenges and Opportunities for Innovations." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (2021): 64–69. http://dx.doi.org/10.35940/ijitee.d8483.0310521.

Full text
Abstract:
Network Functions Virtualization (NFV) was at the latest introduced to reform the suppleness of mechanism handling provisional and extenuate stress the time to bazaar of new handling. By leveraged virtualization processing and mercantile off-the recess schedule hardware, such as obscure motivation handling, store and button, NFV the software execution of mechanism festival and features from the basic hardware. As an supervene processing, NFV fetch diverse defiance to mechanism manipulator, such as the warranty of mechanism execution for factual appliance, their movable appliance and dwelling abroad, and their verseed placing. In this document, we bestow a concise inspection supervision of NFV, decode its Importance analysis and architectonic structure, current handling use location and debate the defiance and pending quarter for use in this investigation domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Parmanand, Prabhat, and Syed Umar. Dr. "Network Functions Virtualization: Challenges and Opportunities for Innovations." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 5 (2021): 64–69. https://doi.org/10.35940/ijitee.D8483.0310521.

Full text
Abstract:
Network Functions Virtualization (NFV) was at the latest introduced to reform the suppleness of mechanism handling provisional and extenuate stress the time to bazaar of new handling. By leveraged virtualization processing and mercantile off-the recess schedule hardware, such as obscure motivation handling, store and button, NFV the software execution of mechanism festival and features from the basic hardware. As an supervene processing, NFV fetch diverse defiance to mechanism manipulator, such as the warranty of mechanism execution for factual appliance, their movable appliance and dwelling abroad, and their verseed placing. In this document, we bestow a concise inspection supervision of NFV, decode its Importance analysis and architectonic structure, current handling use location and debate the defiance and pending quarter for use in this investigation domain.
APA, Harvard, Vancouver, ISO, and other styles
6

Kovalenko, V., A. A. Alzaghir, and A. Muthanna. "Building a UAV network with support for SDN / NFV technologies." Telecom IT 8, no. 3 (2020): 71–85. http://dx.doi.org/10.31854/2307-1303-2020-8-3-71-85.

Full text
Abstract:
Research Subject - integration of software-defined networks (SDN) and network functions virtualization (NFV) technologies in the unmanned aerial vehicle networks. Method – analysis of standards and recommendations in the field of SDN, NFV technologies and construction of UAV networks. Core results – presents the main advantages of introducing SDN and NFV technologies into the UAV networks, two ways of organizing the UAV network architecture with SDN technology support: when the Base Station performs the functions of an SDN controller, and when air baluns are used as SDN controllers. This paper also compared the technologies of software-defined networking and virtualization of network functions. Practical relevance – this paper provides a detailed description of the structure and application possibilities of UAV networks, functional diagrams of SDN and NFV. The network architectures presented in this paper using SDN controllers in the flying (air balloon) and ground (Base stations) segment are examples of the implementation of SDN technology in a UAV network.of SDN and NFV technologies, and also considers the application of these technologies in UAV networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Venâncio, Giovanni, Rogério C. Turchetti, and Elias Procópio Duarte Jr. "NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies." Journal of Internet Services and Applications 12, no. 1 (2022): 46–53. http://dx.doi.org/10.5753/jisa.2022.2342.

Full text
Abstract:
Network Functions Virtualization (NFV) allows the implementation in software of middleboxes traditionally available as specialized hardware. Network services can be implemented as SFCs (Service Function Chains) based onvirtualization technologies that run on commodity hardware. Although most virtualized functions have classic middlebox functionalities (e.g. firewalls or intrusion detectors) NFV technology can be used to leverage the networkto provide novel types of services to end-users. Actually, NFV can be very convenient to deploy traditional enduser services in the network, in the paradigm that has been called Computing In the Network (COIN). This articlediscusses the requirements to deploy COIN services using NFV technologies, which we call NFV-COIN. We alsopresent case studies and an NFV-COIN architecture that is compliant with the NFV-MANO reference model.
APA, Harvard, Vancouver, ISO, and other styles
8

Muñoz, Raül, Ricard Vilalta, Ramon Casellas, et al. "Integrated SDN/NFV management and orchestration architecture for dynamic deployment of virtual SDN control instances for virtual tenant networks." Journal of Optical Communications and Networking 7, no. 11 (2015): B62—B70. https://doi.org/10.5281/zenodo.46115.

Full text
Abstract:
Software-defined networking (SDN) and network function virtualization (NFV) have emerged as the most promising candidates for improving network function and protocol programmability and dynamic adjustment of network resources. On the one hand, SDN is responsible for providing an abstraction of network resources through well-defined application programming interfaces. This abstraction enables SDN to perform network virtualization, that is, to slice the physical infrastructure and create multiple coexisting application-specific virtual tenant networks (VTNs) with specific quality-of-service and service-level-agreement requirements, independent of the underlying optical transport technology and network protocols. On the other hand, the notion of NFV relates to deploying network functions that are typically deployed in specialized and dedicated hardware, as software instances [called virtual network functions (VNFs)] running on commodity servers (e.g., in data centers) through software virtualization techniques. Despite all the attention that has been given to virtualizing IP functions (e.g., firewall; authentication, authorization, and accounting) or Long-Term Evolution control functions (e.g., mobility management entity, serving gateway, and packet data network gateway), some transport control functions can also be virtualized and moved to the cloud as a VNF. In this work we propose virtualizing the tenant SDN control functions of a VTN and moving them into the cloud. The control of a VTN is a key requirement associated with network virtualization, since it allows the dynamic programming (i.e., direct control and configuration) of the virtual resources allocated to the VTN. We experimentally assess and evaluate the first SDN/NFV orchestration architecture in a multipartner testbed to dynamically deploy independent SDN controller instances for each instantiated VTN and to provide the required connectivity within minutes.
APA, Harvard, Vancouver, ISO, and other styles
9

Elagin, Vasily S., Alexander V. Bogachev, and Ilya A. Belozertsev. "Modeling the estimation of end-to-end packet latency for a chain of NFV nodes in 5G networks." T-Comm 16, no. 3 (2022): 23–30. http://dx.doi.org/10.36724/2072-8735-2022-16-3-23-30.

Full text
Abstract:
It is expected that future communication networks will provide configurable delay-sensitive types of services (for example, streaming video, machine interaction). To support a variety of applications and use cases of servers providing various functions, you can use network function virtualization (NFV), which will be able to provide flexible implementation and placement of configuration of the necessary network functions. This article analyzes the end-to-end packet latency (E2E) for multiple traffic flows passing through the chain of embedded virtual network functions (VNF) in fifth-generation communication networks (5G). The Dominant of Generalized Resource Processing (DR-GPS) is used to distribute computing resources and transfer data between threads in each node of Network Function Virtualization (NFV) to achieve equitable distribution and utilization of available resources. The tandem queuing model is designed for incoming packets combined in several streams passing through the NFV node and its outgoing transmission channel. To analyze manageability, we separate packet processing (and transmission) of various streams in the simulation and determine the average packet processing and transmission rates of each stream as approximate service speeds.
APA, Harvard, Vancouver, ISO, and other styles
10

Femminella, Mauro, and Gianluca Reali. "Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies." Future Internet 16, no. 3 (2024): 91. http://dx.doi.org/10.3390/fi16030091.

Full text
Abstract:
The need for adaptivity and scalability in telecommunication systems has led to the introduction of a software-based approach to networking, in which network functions are virtualized and implemented in software modules, based on network function virtualization (NFV) technologies. The growing demand for low latency, efficiency, flexibility and security has placed some limitations on the adoption of these technologies, due to some problems of traditional virtualization solutions. However, the introduction of lightweight virtualization approaches is paving the way for new and better infrastructures for implementing network functions. This article discusses these new virtualization solutions and shows a proposal, based on serverless computing, that uses them to implement container-based virtualized network functions for the delivery of advanced Internet of Things (IoT) services. It includes open source software components to implement both the virtualization layer, implemented through Firecracker, and the runtime environment, based on Kata containers. A set of experiments shows that the proposed approach is fast, in order to boost new network functions, and more efficient than some baseline solutions, with minimal resource footprint. Therefore, it is an excellent candidate to implement NFV functions in the edge deployment of serverless services for the IoT.
APA, Harvard, Vancouver, ISO, and other styles
11

Thembelihle, Dlamini, Michele Rossi, and Daniele Munaretto. "Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey." Wireless Communications and Mobile Computing 2017 (2017): 1–21. http://dx.doi.org/10.1155/2017/8618364.

Full text
Abstract:
Future mobile networks (MNs) are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN) and network function virtualization (NFV) technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC), a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC) and MEC architectures.
APA, Harvard, Vancouver, ISO, and other styles
12

Jaadouni, Hatim, Chaimae Saadi, and Habiba Chaoui. "SDN/NFV architectures for edge-cloud oriented IoT." ITM Web of Conferences 46 (2022): 02004. http://dx.doi.org/10.1051/itmconf/20224602004.

Full text
Abstract:
Thanks to Software Defined Networking (SDN) and Network Functions Virtualization (NFV), the use and behaviour of interconnect network backhauls to provide virtualization services has changed completely. Several benefits have been discovered in various application areas that combine SDN and NFV. As a result, we explored the SDN / NFV paradigm to determine if network services could be efficiently deployed, managed, and distributed to end users. The Internet of Things (IoT) is inseparable from improving SDN / b NFV to improve this task. However, until now, problems related to Edge cloud communications and network services have not been effectively mitigated. The rest of this article is organized as follows. We first present the background of this work. Then we present the new technologies around these topics and the extended architecture, and e. Finally, we conclude this work.
APA, Harvard, Vancouver, ISO, and other styles
13

Hassan, Heba, Amr Al-Awamry, and Mohammed Abdelhalim. "Dragonfly addressing model for software defined networks based on datacenters." International Journal of Engineering & Technology 7, no. 2 (2018): 657. http://dx.doi.org/10.14419/ijet.v7i2.9769.

Full text
Abstract:
With the advancement of technology, virtualization has become very important for Information Technology (IT) experts. Network Functions Virtualization (NFV) means to address issues resulting from complex hardware-based appliances by developing standard IT virtualization technologies. Software Defined Networking (SDN) solidifies the advantages of datacenter virtualization, increases resource flexibility and utilization, and reduces infrastructure costs and overhead. Datacenter networks should have the ability to guarantee high throughput and resiliency. For such reasons, typical datacenter networks (e.g. Fat Tree) have been evolved to high-radix networks (e.g. Dragonfly). This work aims to investigate how SDN and NFV can improve the advantages of datacenter virtualization by utilizing datacenter topologies such as Dragonfly (DF) topology and Fat Tree (FT) topology in SDN, thus expanding resource flexibility and utilization and diminishing infrastructure costs and overhead. By using Dragonfly topology, the cost is reduced and better scalability is introduced compared to the folded clos networks such as Fat Tree. Here in, a novel addressing scheme is proposed for Dragonfly topology with simulation results included utilizing Mininet, which incorporates MiniEdit that is used to create and run network simulations.
APA, Harvard, Vancouver, ISO, and other styles
14

Duytam Ly, Le, Mahsa Sadeghi Ghahroudi, and Victor Ponce. "A Systematic Literature Review of Reliable Provisioning for Virtual Network Function Chaining." Applied Sciences 13, no. 9 (2023): 5504. http://dx.doi.org/10.3390/app13095504.

Full text
Abstract:
The abstraction of the network node functions using virtualization methods introduced an innovative architecture called Network Function Virtualization (NFV). In NFV, every virtualization software hosts a network service recognized as a Virtual Network Function (VNF). In general, the network provider creates a Service Function Chain (SFC) for every sequence of multiple requested VNFs by the customers. Although NFV allows for a more flexible and economical approach, it is more prone to error and failure. Therefore, providing reliable provisioning for VNF chaining is one of the key issues in NFV. In this paper, we present a systematic literature review to study the pioneer research efforts that provide reliable provisioning for VNF chaining by guaranteeing the availability of the service and resource optimization. Our review is the result of the analysis of 21 screened papers. This paper presents the result of our analysis, including different aspects of a reliable provisioning algorithm, various adopted techniques for reliable provisioning, and the superiority and drawbacks of each algorithm based on the proposed criteria for the evaluation of the provisioning algorithms.
APA, Harvard, Vancouver, ISO, and other styles
15

Raddwan, Basheer, Khalil AL-Wagih, Ibrahim A. Al-Baltah, Mohamed A. Alrshah, and Mohammed A. Al-Maqri. "Path Mapping Approach for Network Function Virtualization Resource Allocation with Network Function Decomposition Support." Symmetry 11, no. 9 (2019): 1173. http://dx.doi.org/10.3390/sym11091173.

Full text
Abstract:
Recently, Network Function Virtualization (NFV) and Software Defined Networking (SDN) have attracted many mobile operators. For the flexible deployment of Network Functions (NFs) in an NFV environment, NF decompositions and control/user plane separation have been introduced in the literature. That is to map traditional functions into their corresponding Virtual Network Functions (VNFs). This mapping requires the NFV Resource Allocation (NFV-RA) for multi-path service graphs with a high number of virtual nodes and links, which is a complex NP-hard problem that inherited its complexity from the Virtual Network Embedding (VNE). This paper proposes a new path mapping approach to solving the NFV-RA problem for decomposed Network Service Chains (NSCs). The proposed solution has symmetrically considered optimizing an average embedding cost with an enhancement on average execution time. The proposed approach has been compared to two other existing schemes using 6 and 16 scenarios of short and long simulation runs, respectively. The impact of the number of nodes, links and paths of the service requests on the proposed scheme has been studied by solving more than 122,000 service requests. The proposed Integer Linear Programming (ILP) and heuristic schemes have reduced the execution time up to 39.58% and 6.42% compared to existing ILP and heuristic schemes, respectively. Moreover, the proposed schemes have also reduced the average embedding cost and increased the profit for the service providers.
APA, Harvard, Vancouver, ISO, and other styles
16

Xue, Peilei, and Zhongyuan Jiang. "SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology." IEEE Transactions on Circuits and Systems II: Express Briefs 69, no. 3 (2022): 1727–31. http://dx.doi.org/10.1109/tcsii.2021.3119938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Xue, Peilei, and Zhongyuan Jiang. "SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology." IEEE Transactions on Circuits and Systems II: Express Briefs 69, no. 3 (2022): 1727–31. http://dx.doi.org/10.1109/tcsii.2021.3119938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kumbum, Praveen Kumar, Vijay Kumar Adari, Vinay Chunduru, Srinivas Gonepally, and Kishor Kumar Amuda. "Optimizing Network Function Virtualization: A Comprehensive Performance Analysis of Hardware- Accelerated Solutions." SOJ Materials Science & Engineering 10, no. 1 (2024): 1–10. http://dx.doi.org/10.15226/sojmse.2024.00172.

Full text
Abstract:
Network Function Virtualization (NFV) heralds a transformative shift in the realm of network infrastructure, moving away from the rigid confines of specialised hardware appliances towards nimble, software-driven solutions that operate on off-the-shelf hardware. This transition holds the tantalising promise of substantial reductions in both capital and operational expenditures. However, the deployment and orchestration of virtual network functions pose formidable challenges, particularly concerning the optimisation of performance and judicious allocation of resources. The significance of this research lies in its targeted approach to the pressing necessity for a thorough performance evaluation of diverse NFV implementations. By furnishing organisations with vital insights for strategic infrastructure planning, this study embarks on a comparative journey through various NFV architectures, juxtaposed with traditional hardware-centric solutions. It delves into the intricacies of practical deployment considerations while rigorously examining critical performance metrics, aiming to illuminate the path forward in this rapidly evolving landscape. The research methodology utilises the EDAS (Evaluation based on Distance from Average Solution) approach, a nuanced and multifaceted decisionmaking framework adept at assessing alternatives through their proximity to average solutions. This investigation delves into four pivotal evaluation parameters: scalability, resource utilisation, latency, and energy consumption. In total, five alternative implementations are scrutinised: traditional hardware, NFV with software acceleration, NFV leveraging GPU acceleration, NFV employing FPGA acceleration, and cloud-based NFV.The findings reveal that NFV with GPU acceleration emerges as the frontrunner, attaining an impressive appraisal score of 0.9626, indicative of its exceptional performance across all evaluated metrics. Hot on its heels, NFV with FPGA acceleration secures a noteworthy score of 0.9474, particularly excelling in the domain of resource utilisation. In contrast, NFV with software acceleration (0.7614) and cloud-based NFV (0.4675) exhibit moderate efficacy, while traditional hardware languishes at the bottom of the hierarchy, registering a dismal score of 0.0000.The findings illuminate that hardwareaccelerated Network Functions Virtualization (NFV) solutions, especially those harnessing the power of Graphics Processing Unit (GPU) technology, deliver an optimal and nuanced performance tailored to the demands of contemporary networking landscapes. This research significantly enriches the discourse on NFV implementation, shedding light on the intricate trade-offs involved, while offering empirical guidance for organisations making the pivotal shift from traditional hardware infrastructures to virtualised network functions. The results underscore that, although hardware acceleration markedly boosts NFV performance, the selection of implementation strategies must be meticulously aligned with the unique needs and operational constraints of each organisation. Keywords: Network Function Virtualization (NFV), Hardware Acceleration, Performance Benchmarking, EDAS Methodology, Resource Optimization and Virtualized Network Infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
19

Cunha, José, Pedro Ferreira, Eva M. Castro, et al. "Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies." Future Internet 16, no. 7 (2024): 226. http://dx.doi.org/10.3390/fi16070226.

Full text
Abstract:
The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple virtual networks on the same physical infrastructure, each optimized for specific service requirements. Despite its numerous benefits, network slicing introduces significant security vulnerabilities that must be addressed to prevent exploitation by increasingly sophisticated cyber threats. This review explores the application of cutting-edge technologies—Artificial Intelligence (AI), specifically Machine Learning (ML), Software-Defined Networking (SDN), and Network Functions Virtualization (NFV)—in crafting advanced security solutions tailored for network slicing. AI’s predictive threat detection and automated response capabilities are analysed, highlighting its role in maintaining service integrity and resilience. Meanwhile, SDN and NFV are scrutinized for their ability to enforce flexible security policies and manage network functionalities dynamically, thereby enhancing the adaptability of security measures to meet evolving network demands. Thoroughly examining the current literature and industry practices, this paper identifies critical research gaps in security frameworks and proposes innovative solutions. We advocate for a holistic security strategy integrating ML, SDN, and NFV to enhance data confidentiality, integrity, and availability across network slices. The paper concludes with future research directions to develop robust, scalable, and efficient security frameworks capable of supporting the safe deployment of network slicing in next-generation networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Full text
Abstract:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Xu, Ran. "Proactive VNF Scaling with Heterogeneous Cloud Resources: Fusing Long Short-Term Memory Prediction and Cooperative Allocation." Mathematical Problems in Engineering 2020 (January 28, 2020): 1–10. http://dx.doi.org/10.1155/2020/4371056.

Full text
Abstract:
Network function virtualization (NFV) is designed to implement network functions by software that replaces proprietary hardware devices in traditional networks. In response to the growing demand of resource-intensive services, for NFV cloud service providers, software-oriented network functions face a number of challenges, such as dynamic deployment of virtual network functions and efficient allocation of multiple resources. This study aims at the dynamic allocation and adjustment of network multiresources and multitype flows for NFV. First, to seek a proactive approach to provision new instances for overloaded VNFs ahead of time, a model called long short-term memory recurrent neural network (LSTM RNN) is proposed to estimate flows in this paper. Then, based on the estimated flow, a cooperative and complementary resource allocation algorithm is designed to reduce resource fragmentation and improve the utilization. The final results demonstrate the advantage of the LSTM model on predicting the network function flow requirements, and our algorithm achieves good results and performance improvement in dynamically expanding network functions and improving resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
22

Peuster, Manuel, Stefan Schneider, Mengxuan Zhao, et al. "Introducing Automated Verification and Validation for Virtualized Network Functions and Services." IEEE Communications Magazine 57, no. 5 (2019): 96–102. https://doi.org/10.1109/MCOM.2019.1800873.

Full text
Abstract:
Network function virtualisation (NFV) and software defined networks (SDN) will transform network management and operation into agile development tasks. They involve software artefacts, which are managed and deployed as composite services using DevOps principles. Those softwarized networks rely on complex technology stacks, starting with low-level virtualization technologies and ranging up to machine-learning-based orchestration solutions. One of the main challenges in those environments is to verify that the deployed functions and services operate correctly and meet the quality goals set by the stakeholders before they are put into production. We tackle this challenge by introducing the novel concept of a verification and validation (V&V) platform for NFV, which enables automatic testing and qualification of single network functions and complex services. By adding such a platform to the NFV ecosystem, new business models emerge, as we discuss in this article. We evaluate our proposed concepts by presenting a case study that uses our open source V&V platform to verify and validate the behavior and performance of a real-world network service.
APA, Harvard, Vancouver, ISO, and other styles
23

Baban, Nabil. "Refine Energy Efficiency in LTE Networks: A Proposal for Reducing Energy Consumption through NFV and SDN Optimization." Journal of Engineering Research and Reviews 2, no. 1 (2025): 22. https://doi.org/10.5455/jerr.20241120121616.

Full text
Abstract:
With the rapid proliferation of mobile data traffic and the expansion of Long-Term Evolution (LTE) networks, energy consumption has become a significant concern for telecom operators and service providers. Current LTE infrastructure, designed for optimal performance, often disregards the energy efficiency of network operations, leading to increased operational costs and environmental impact. This paper deals with the issue of energy wastage that is abundant in LTE networks through the alliance of Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies. NFV and SDN have been concentrated on enlarging network flexibility and lessening delay; however, there has not been much consideration given to their power to boost energy efficiency. The fundamental problem that will be covered in this paper is high power consumption, which is tied to regular LTE networks that are inflexible and demand many resources. One of the principal contributions of this paper is the development of an innovative optimization model that effectively addresses 4G technologies by integrating Network Functions Virtualization (NFV) and Software-Defined Networking (SDN). This model is designed to provision network resources, scale network functions, and facilitate intelligent traffic routing. It possesses the capability to dynamically modify network configurations in real-time based on current traffic conditions, thereby minimizing energy consumption while maintaining an acceptable level of Quality of Service (QoS). The proposed design employs multi-objective optimization techniques aimed at reducing energy usage and achieving a balance among various parameters related to network performance. The framework is validated using simulation scenarios that compare energy consumption and network performance between traditional and proposed models. The results prove that the proposed NFV-SDN integrated model is highly energy efficient, with network performance equal to or better than before. This paper proposes an innovative technique for the reduction of energy consumption in LTE networks towards environmentally sustainable and cost-effective management of the next-generation mobile network.
APA, Harvard, Vancouver, ISO, and other styles
24

Martínez, Ricardo, Arturo Mayoral, Ricardo Vilalta, et al. "Integrated SDN/NFV Orchestration for the Dynamic Deployment of Mobile Virtual Backhaul Networks over a Multi-layer (Packet/Optical) Aggregation Infrastructure [Invited]." Optical Communications and Networks 9, no. 2 (2017): A135 — A142. https://doi.org/10.1364/JOCN.9.00A135.

Full text
Abstract:
Future 5G networks will bring important challenges to network operators, such as the traffic load increase mainly due to the proliferation of mobile broadband communications. This will force mobile network operators (MNOs) redesigning and investing in their infrastructures [e.g., new equipment for radio access network (RAN), backhaul] to cope with such data growth. Aiming at lowering both capital expenditures and operational expenditures, current networking trends on network virtualization, software-defined networking (SDN), and network function virtualization (NFV) provide an appealing scenario to flexibly deal with the increase in traffic for MNOs without overdimensioning the deployed network resources. To this end, we rely on an implemented SDN/NFV orchestrator that automatically serves MNO capacity requests by computing and allocating virtual backhaul tenants. Such backhaul tenants are built over a common physical aggregation network, formed by heterogeneous technologies (e.g., packet and optical) that may be owned by different infrastructure providers. MNO RAN traffic is transported toward a mobile core network [i.e., evolved packet core (EPC)], where required backhaul resources are tailored to the capacity needs. The EPC functions are virtualized within the cloud (vEPC), leveraging the NFV advantages. This increases MNO flexibility where cloud resources are instantiated according to EPC needs. The goal of the SDN/NFV orchestrator is to jointly allocate both network and cloud resources, deploying virtual backhaul tenants and vEPC instances for a number of MNOs with different service and capacity requirements. Each MNO’s backhaul is isolated and controlled independently via a virtualized SDN (vSDN) controller deployed in the cloud. The SDN/NFV orchestrator architecture is detailed and experimentally validated in a setup provided by the Centre Tecnològic de Telecomunicacions de Catalunya and ADVA Optical Networking. Specifically, upon an MNO request, the orchestrator instantiates the vEPC and vSDN functions in the cloud and then composes the MNO’s backhaul tenant over a multilayer (packet and optical) aggregation network.
APA, Harvard, Vancouver, ISO, and other styles
25

Saniya biju, Adithya prasad, Gowri V Nair, Karthikamol P S, Diya Deepak, and Saritha N pillai. "Future-Proof Networks: NFV’S Role In 5g and Beyond." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 12 (2024): 3693–99. https://doi.org/10.47392/irjaem.2024.0548.

Full text
Abstract:
Riding the wave of the multifaceted rapid change in communication technologies and universal deployment of 5G, Network Functions Virtualization, or NFV, has emerged as a disruptive framework for adaptable, scalable, and cost-efficient networks. This can be because NFV decouples network functions from specialized hardware, affording the flexibility that addresses growing demands in ultra-reliable low-latency communications, enhanced mobile broadband, and massive machine-type communications. These capabilities are essential for meeting 5G’s requirements and preparing for the more complex challenges anticipated with 6G. As 6G transition begins, the role of NFV has to be reassessed in order to meet the increased challenges for ultra-low latency, massive connectivity, and unprecedented network reliability. This paper considers the ability of NFV to evolve with new networking standards by unpacking its potentials, limitations, and opportunities for improvement. This research determines factors critical to the scalability, flexibility, and efficiency of NFV in various network scenarios through simulations, case studies, and performance metric analyses. In doing this, it raises the need for advancing NFV architecture to stay relevant. Rather than only looking at current applications, this work addresses new future needs and maybe even answers issues for future stringent network standards that do not compromise on profitability. Such insights will be useful for developing future-proof infrastructures, positioning NFV as a cornerstone in nextgeneration networks such as 6G and beyond.
APA, Harvard, Vancouver, ISO, and other styles
26

Ali, Haider Shamsan, and Rasool Faridi Arman. "A conceptual architecture for integrating software defined network and network virtualization with internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6777–84. https://doi.org/10.11591/ijece.v12i6.pp6777-6784.

Full text
Abstract:
Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a softwarebased environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating SDN and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.
APA, Harvard, Vancouver, ISO, and other styles
27

Sharma, Sachin, and Avishek Nag. "Cognitive Software Defined Networking and Network Function Virtualization and Applications." Future Internet 15, no. 2 (2023): 78. http://dx.doi.org/10.3390/fi15020078.

Full text
Abstract:
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using AI and ML techniques, such as AI- and software-based networking, autonomic networking, and policy-based network management. Contributions to this Special Issue come from the above areas of research. Following a rigorous review process, four excellent articles were accepted that address and go beyond many of the challenges mentioned above.
APA, Harvard, Vancouver, ISO, and other styles
28

Mario, Baldi, and Sapio Amedeo. "Network Function Modeling and Performance Estimation." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3021–37. https://doi.org/10.11591/ijece.v8i5.pp3021-3037.

Full text
Abstract:
This work introduces a methodology for the modelization of network functions focused on the identification of recurring execution patterns as basic building blocks and aimed at providing a platform independent representation. By mapping each modeling building block on specific hardware, the performance of the network function can be estimated in terms of maximum throughput that the network function can achieve on the specific execution platform. The approach is such that once the basic modeling building blocks have been mapped, the estimate can be computed automatically for any modeled network function. Experimental results on several sample network functions show that although our approach cannot be very accurate without taking in consideration traffic characteristics, it is very valuable for those application where even loose estimates are key. One such example is orchestration in network functions virtualization (NFV) platforms, as well as in general virtualization platforms where virtual machine placement is based also on the performance of network services offered to them. Being able to automatically estimate the performance of a virtualized network function (VNF) on different execution hardware, enables optimal placement of VNFs themselves as well as the virtual hosts they serve, while efficiently utilizing available resources.
APA, Harvard, Vancouver, ISO, and other styles
29

Buzhin, I. G., V. M. Antonova, E. A. Gaifutdinov, and Yu B. Mironov. "METHODOLOGY FOR A COMPREHENSIVE ASSESSMENT OF THE TELECOMMUNICATION SERVICES QUALITY OF TRANSPORT NETWORKS USING SDN/NFV TECHNOLOGIES." T-Comm 16, no. 12 (2022): 40–45. http://dx.doi.org/10.36724/2072-8735-2022-16-12-40-45.

Full text
Abstract:
Methodology for a comprehensive assessment of the quality of telecommunication services of transport networks using SDN/NFV technology has been developed. The current state and development trends of communication networks have shown that the potential for growth in productivity and bandwidth of networks based on traditional technologies is practically exhausted. These problems can be solved by the technology of software-defined networks and virtualization of network functions (here-inafter SDN/NFV). This methodology can be the basis for selecting the structure and number of SDN controllers and their optimal location in the communication network based on SDN/NFV, calculating reliability indicators, obtaining loss probabilities of streams and control messages as well as time delays for processing streams in SDN telecommunication equipment. Proposals on balancing the traffic load on SDN controllers of the communication network were also given.
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Yong-Xuan, and Jerry Chou. "A Survey of NFV Network Acceleration from ETSI Perspective." Electronics 11, no. 9 (2022): 1457. http://dx.doi.org/10.3390/electronics11091457.

Full text
Abstract:
Network function virtualization (NFV) enables network operators to save costs and flexibility by replacing dedicated hardware with software network functions running on commodity servers. There is a high need for network acceleration to achieve performance comparable to hardware, which is vital for the implementation of NFV. The necessity of NFV acceleration stems from the lengthy packet delivery path following virtualization and the unavailability of generic operating system designs to serve network-specific scenarios. Therefore, the software approach alters the operating system’s processing architecture through Kernel Bypass or offload packet processing to hardware. A typical classification scheme divides it into two main categories based on technology with software and hardware. Only these two categories can be utilized to rapidly and easily establish a classification system. However, it is difficult to suggest the specifics and peculiarities of any acceleration approach during real-world operation. For a more comprehensive classification of NFV acceleration, we refer to the ETSI NFV architectural framework in this research. As the framework clearly illustrates, the technical infrastructure layer of NFV and the corresponding management roles provides a comprehensive and intuitive view of the differences between these acceleration technologies, solutions, and initiatives. Additionally, we conducted an analysis to identify opportunities for improvement in existing solutions and propose new research programs. We expect that NFV will increasingly rely on cloud services in the future. Since cloud services do not offer a choice of hardware, our acceleration method will be primarily software-based.
APA, Harvard, Vancouver, ISO, and other styles
31

Vidal, Ivan, Borja Nogales, Diego Lopez, Juan Rodríguez, Francisco Valera, and Arturo Azcorra. "A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services." Electronics 10, no. 15 (2021): 1868. http://dx.doi.org/10.3390/electronics10151868.

Full text
Abstract:
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users). Still, this flexibility creates new challenges in terms of VNF connectivity. To address these challenges, we introduce a novel secure link-layer connectivity platform, L2S. Our solution can automatically be deployed and configured as a regular multi-site NFV service, providing the abstraction of a layer-2 switch that offers link-layer connectivity to VNFs deployed on remote NFV sites. Inter-site communications are effectively protected using existing security solutions and protocols, such as IP security (IPsec). We have developed a functional prototype of L2S using open-source software technologies. Our evaluation results indicate that this prototype can perform IP tunneling and cryptographic operations at Gb/s data rates. Finally, we have validated L2S using a multi-site NFV ecosystem at the Telefonica Open Network Innovation Centre (5TONIC), using our solution to support a multicast-based IP television service.
APA, Harvard, Vancouver, ISO, and other styles
32

Shamsan, Ali Haider, and Arman Rasool Faridi. "A conceptual architecture for integrating software defined network and network virtualization with internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6777. http://dx.doi.org/10.11591/ijece.v12i6.pp6777-6784.

Full text
Abstract:
<span lang="EN-US">Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a software-based environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating software defined network (SDN) and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.</span>
APA, Harvard, Vancouver, ISO, and other styles
33

Gonzalez, Luis F., Ivan Vidal, Francisco Valera, Borja Nogales, Victor Sanchez-Aguero, and Diego R. Lopez. "Transport-Layer Limitations for NFV Orchestration in Resource-Constrained Aerial Networks." Sensors 19, no. 23 (2019): 5220. http://dx.doi.org/10.3390/s19235220.

Full text
Abstract:
In this paper, we identify the main challenges and problems related with the management and orchestration of Virtualized Network Functions (VNFs) over aerial networks built with Small Unmanned Aerial Vehicles (SUAVs). Our analysis starts from a reference scenario, where several SUAVs are deployed over a delimited geographic area, and provide a mobile cloud environment that supports the deployment of functions and services using Network Functions Virtualization (NFV) technologies. After analyzing the main challenges to NFV orchestration in this reference scenario from a theoretical perspective, we undertake the study of one specific but relevant aspect following a practical perspective, i.e., the limitations of existing transport-layer solutions to support the dissemination of NFV management and orchestration information in the considered scenario. While in traditional cloud computing environments this traffic is delivered using TCP, our simulation results suggest that using this protocol over an aerial network of SUAVs presents certain limitations. Finally, based on the lessons learned from our practical analysis, the paper outlines different alternatives that could be followed to address these challenges.
APA, Harvard, Vancouver, ISO, and other styles
34

Leivadeas, Aris, George Kesidis, Mohamed Ibnkahla, and Ioannis Lambadaris. "VNF Placement Optimization at the Edge and Cloud †." Future Internet 11, no. 3 (2019): 69. http://dx.doi.org/10.3390/fi11030069.

Full text
Abstract:
Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.
APA, Harvard, Vancouver, ISO, and other styles
35

Boukessessa, Meriem, Abdelkader Ghazli, and Adda Ali-Pacha. "Blockchain-Based Security Framework for VNF Package Protection in 5G Network Slicing Services." Transport and Telecommunication Journal 25, no. 3 (2024): 289–99. http://dx.doi.org/10.2478/ttj-2024-0021.

Full text
Abstract:
Abstract The demand for scalable, open and granular networks has enabled mobile networks such as 5G to adopt new concepts including NFV (Network Function Virtualization). NFV separates the dependency of network functions from the hardware component, allowing them to be deployed flexibly and dynamically across network slices. In this way, operators can deliver personalized services and optimize the use of network resources, contributing to greater operational efficiency and an enhanced end-user experience. However, there are several issues to be addressed, such as the security of VNFs and the way in which service provider customers instantiate NSSIs (Network Slice Subnet Instance). In this article, we present a new approach based on blockchain 2.0, which guarantees the immutability of VNFs and templates, as well as highly secure instantiation with access management and support for replay attacks.
APA, Harvard, Vancouver, ISO, and other styles
36

Shin-ichi, Kuribayashi. "VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE CONTENT DELIVERY SERVICES." International Journal of Computer Networks & Communications (IJCNC) 12, no. 2 (2020): 69–84. https://doi.org/10.5281/zenodo.3816858.

Full text
Abstract:
The algorithm to determine the place where network functions are located and how much capacities of network function flexibly are required is essential for economical NFV (Network Functions Virtualization)- based network design. The authors proposed a placement algorithm of virtual routing function and virtual firewall function in the NFV-based network for minimizing the total network cost and developed the effective allocation guidelines for these virtual functions. This paper proposes an NFV-based virtual cache placement algorithm for cost-effective content delivery service such as video streaming, which judges the optimal placement of the cache per content, not on a virtual machine (VM) like the conventional CDN (virtual CDN). Moreover, the content is dynamically cached at the time of first content delivery like ICN (Information-Centric Networking) without placing the cache in advance like CDN .Our evaluation results revealed that the proposed algorithm could reduce total network costs by about 15% compared with CDN .Even if the content cache is deployed economically, performance will degrade if the latency between the content cache and user terminals is long. In order to prevent such a case, this paper also propose a cost-effective placement method of NFV-based WAN accelerator function.
APA, Harvard, Vancouver, ISO, and other styles
37

Dang-Quang, Nhat-Minh, and Myungsik Yoo. "Optimized placement of symmetrical service function chain in network function virtualization." Computer Science and Information Systems, no. 00 (2022): 6. http://dx.doi.org/10.2298/csis210920006d.

Full text
Abstract:
Network function virtualization (NFV) is one of the key technology enablers for actualizing 5G networks. With NFV, virtual network functions (VNFs) are linked together as a service function chain (SFC), which provides network functionality for the customer on demand. However, how to efficiently find a suitable placement for VNFs regarding the given objectives is an extremely difficult issue. The existing approaches assume that the SFC has a simple and asymmetrical pattern that is unsuitable to modeling a real system. We address this limitation by studying a VNF placement optimization problem with symmetrical SFCs that can support both symmetric and asymmetric traffic flows. This NP-hard problem is formulated as a mixed-integer linear programming (MILP) model. An iterative greedy-based heuristic is proposed to overcome the complexity of the MILP model. Extensive simulation results show that the proposed heuristic can obtain a near-optimal solution compared to MILP for a small-scale network, and at the same time, is superior to a traditional heuristic for a large-scale network.
APA, Harvard, Vancouver, ISO, and other styles
38

Garrich, Miquel, José Luis Romero-Gázquez, Francisco Javier Moreno-Muro, et al. "IT and Multi-layer Online Resource Allocation and Offline Planning in Metropolitan Networks." IEEE Journal of Lightwave Technology 99 (May 1, 2020): 1. https://doi.org/10.5281/zenodo.3981187.

Full text
Abstract:
Metropolitan networks are undergoing a major technological breakthrough leveraging the capabilities of software-defined networking (SDN) and network function virtualization (NFV). NFV permits the deployment of virtualized network functions (VNFs) on commodity hardware appliances which can be combined with SDN flexibility and programmability of the network infrastructure. SDN/NFV-enabled networks require decision-making in two time scales: short-term online resource allocation and mid-to-long term offline planning. In this paper, we first tackle the dimensioning of SDN/NFV-enabled metropolitan networks paying special attention to the role that latency plays in the capacity planning. We focus on a specific use-case: the metropolitan network that covers the Murcia - Alicante Spanish regions. Then, we propose a latency-aware multilayer service-chain allocation (LA-ML-SCA) algorithm to explore a range of maximum latency requirements and their impact on the resources for dimensioning the metropolitan network. We observe that design costs increase for low latency requirements as more data center facilities need to be spread to get closer to the network edge, reducing the economies of scale on the IT infrastructure. Subsequently, we review our recent joint computation of multi-site VNF placement and multilayer resource allocation in the deployment of a network service in a metro network. Specifically, a set of subroutines contained in LA-ML-SCA are experimentally validated in a network optimization-as-a-service architecture that assists an Open-Source MANO instance, virtual infrastructure managers and WAN controllers in a metro network test-bed.
APA, Harvard, Vancouver, ISO, and other styles
39

Adoga, Haruna Umar, and Dimitrios P. Pezaros. "Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges." Future Internet 14, no. 2 (2022): 59. http://dx.doi.org/10.3390/fi14020059.

Full text
Abstract:
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastructure, thereby reducing both capital and operational costs. With network function virtualisation (NFV), network functions (NFs) such as firewalls, traffic load balancers, content filters, and intrusion detection systems (IDS) are either instantiated on virtual machines (VMs) or lightweight containers, often chained together to create a service function chain (SFC). In this work, we review the state-of-the-art NFV and SFC implementation frameworks and present a taxonomy of the current proposals. Our taxonomy comprises three major categories based on the primary objectives of each of the surveyed frameworks: (1) resource allocation and service orchestration, (2) performance tuning, and (3) resilience and fault recovery. We also identify some key open research challenges that require further exploration by the research community to achieve scalable, resilient, and high-performance NFV/SFC deployments in next-generation networks.
APA, Harvard, Vancouver, ISO, and other styles
40

Domínguez-Dorado, Manuel, Jesús Calle-Cancho, Jesús Galeano-Brajones, Francisco-Javier Rodríguez-Pérez, and David Cortés-Polo. "Detection and Mitigation of Security Threats Using Virtualized Network Functions in Software-Defined Networks." Applied Sciences 14, no. 1 (2023): 374. http://dx.doi.org/10.3390/app14010374.

Full text
Abstract:
The evolution of interconnected systems and the evolving demands in service requirements have led to data centers integrating multiple heterogeneous technologies that must coexist. Consequently, the resource management and the security of the infrastructure are becoming more complex than in traditional scenarios. In this context, technologies such as Software-Defined Networking (SDN) or Network Function Virtualization (NFV) are being embraced as mechanisms that facilitate communication management. The integration of both technologies into a single framework, termed Software-Defined NFV (SDNFV) introduces a multitude of tools for managing the security of the data center’s resources. This work delineates the primary characteristics of the evolution of these communication networks and their application to information security and communications within a data center. It presents an illustrative use case demonstrating the application of these next-generation technologies to detect and mitigate a security issue through virtualized network functions deployed in containers.
APA, Harvard, Vancouver, ISO, and other styles
41

Kuribayashi, Shin-ichi. "Dynamic Shaping Method using SDN And NFV Paradigms." International journal of Computer Networks & Communications 13, no. 2 (2021): 1–14. http://dx.doi.org/10.5121/ijcnc.2021.13201.

Full text
Abstract:
Traffic shaping controls communication traffic flow to prevent a specified communication rate from being exceeded. In conventional networks, the traffic shaping device is implemented at a predetermined location and only a communication flow passing through the device is targeted. If the traffic can be shaped dynamically on any selected communication flows at the optimal point only when necessary, it could use network bandwidths and packet relay processing capacity more efficiently and flexibly. This paper proposes a dynamic shaping method using Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) paradigms, which selects the optimal communication flows to be shaped, and the optimal shaping points dynamically. This paper also presented system configuration and functions for the proposed dynamic shaping, and the method to simplify the process of collecting the traffic data of each communication flow by SDN controller.
APA, Harvard, Vancouver, ISO, and other styles
42

Chung, Wu-Chun, and Yun-He Wang. "The Effects of High-Performance Cloud System for Network Function Virtualization." Applied Sciences 12, no. 20 (2022): 10315. http://dx.doi.org/10.3390/app122010315.

Full text
Abstract:
Since ETSI introduced the architectural framework of network function virtualization (NFV), telecom operators have paid more attention to the synergy of NFV and cloud computing. With the integration of the NFV cloud platform, telecom operators decouple network functions from the dedicated hardware and run virtualized network functions (VNFs) on the cloud. However, virtualization degrades the performance of VNF, resulting in violating the performance requirements of the telecom industry. Most of the existing works were not conducted in a cloud computing environment, and fewer studies focused on the usage of enhanced platform awareness (EPA) features. Furthermore, few works analyze the performance of the service function chain on a practical cloud. This paper facilitates the OpenStack cloud with different EPA features to investigate the performance effects of VNFs on the cloud. A comprehensive test framework is proposed to evaluate the verification of functionality, performance, and application testing. Empirical results show that the cloud system under test fulfills the requirements of service level agreement in Rally Sanity testcases. The throughput of OVS-DPDK is up to 8.2 times as high as that of OVS in the performance test. Meanwhile, the hardware-assisted solution, SR-IOV, achieves the throughput at near the line rate in the end-to-end scenario. For the application test, the successful call rate for the vIMS service is improved by up to 14% while applying the EPA features on the cloud.
APA, Harvard, Vancouver, ISO, and other styles
43

Kravchenko, Yu V., K. V. Herasymenko, O. V. Starkova, and A. Y. Bulgakova. "Routing technology based on virtualization software-defined networking concept." PROBLEMS IN PROGRAMMING, no. 2-3 (September 2024): 343–50. https://doi.org/10.15407/pp2024.02-03.343.

Full text
Abstract:
One of the main characteristics of the digital revolution is the acceleration of change. The technologies that have fueled the digital revolution over the past decades are experiencing increasingly rapid innovation cycles. For today, a substantial growth of amount of users, devices, applications and traffic has presented new challenges to service providers. The SDN paradigm emerged to address some of these emerging challenges. SDN simplifies network management and allows automated network configuration on demand with optimal use of network resources. The work is devoted to the present networks research and the identification of opportunities for the implementation of virtualization of network functions in the context of SDN and NFV concepts. Because these are two new technological trends that are transforming network management. Together, they simplify the provisioning of network resources and provide greater network flexibility.
APA, Harvard, Vancouver, ISO, and other styles
44

Nogales, Borja, Victor Sánchez-Aguero, Ivan Vidal, and Francisco Valera. "Adaptable and Automated Small UAV Deployments via Virtualization." Sensors 18, no. 12 (2018): 1–16. https://doi.org/10.3390/s18124116.

Full text
Abstract:
In this paper, we present a practical solution to support the adaptable and automated deployment of applications of Small Unmanned Aerial Vehicles (SUAVs). Our solution is based on virtualization technologies, and considers SUAVs as programmable network platforms capable of executing virtual functions and services, which may be dynamically selected according to the requirements specified by the operator of the aerial vehicles. This way, SUAVs can be flexibly and rapidly adapted to different missions with heterogeneous objectives. The design of our solution is based on Network Function Virtualization (NFV) technologies, developed under the umbrella of the fifth generation of mobile networks (5G), as well as on existing Internet protocol standards, including flying ad hoc network routing protocols. We implemented a functional prototype of our solution using well-known open source technologies, and we demonstrated its practical feasibility with the execution of an IP telephony service. This service was implemented as a set of virtualized network functions, which were automatically deployed and interconnected over an infrastructure of SUAVs, being the telephony service tested with real voice-over-IP terminals.
APA, Harvard, Vancouver, ISO, and other styles
45

Falahatraftar, Farnoush, Samuel Pierre, and Steven Chamberland. "A Conditional Generative Adversarial Network Based Approach for Network Slicing in Heterogeneous Vehicular Networks." Telecom 2, no. 1 (2021): 141–54. http://dx.doi.org/10.3390/telecom2010009.

Full text
Abstract:
Heterogeneous Vehicular Network (HetVNET) is a highly dynamic type of network that changes very quickly. Regarding this feature of HetVNETs and the emerging notion of network slicing in 5G technology, we propose a hybrid intelligent Software-Defined Network (SDN) and Network Functions Virtualization (NFV) based architecture. In this paper, we apply Conditional Generative Adversarial Network (CGAN) to augment the information of successful network scenarios that are related to network congestion and dynamicity. The results show that the proposed CGAN can be trained in order to generate valuable data. The generated data are similar to the real data and they can be used in blueprints of HetVNET slices.
APA, Harvard, Vancouver, ISO, and other styles
46

Coêlho, Roger William, Ronan Assumpção Silva, Luciana Andréia Fondazzi Martimiano, and Elvio João Leonardo. "IoT and 5G Networks: A Discussion of SDN, NFV and Information Security." Journal of the Brazilian Computer Society 30, no. 1 (2024): 212–27. http://dx.doi.org/10.5753/jbcs.2024.3021.

Full text
Abstract:
Having an infrastructure capable of exchanging data at high speed is an efficient way to drive the evolution and development of new applications and existing services. The 5G technology has emerged as a trusted source to meet the increased demand of Internet of Things (IoT) devices connected to the network, in addition to enabling Internet connectivity at high broadband speeds. Another important feature of 5G is to allow the use of Software Defined Network (SDN) and Network Function Virtualization (NFV), mechanisms responsible for performing network configurations through software, as well as the control and management of devices using the configuration network functions or device virtualization. The concern with information security in the 5G network is increasing, as cybercriminals try to access important data that is transported over the network, since the demand for connected IoT devices will be greater, allowing for several possibilities of attacks. The understanding of possible threats and attacks is necessary, so that new measures are taken against cybercrimes presented in the 5G and IoT networks. This paper aims to elucidate some conceptions of what 5G technology is and the use of IoT in this network, contextualizing the SDN and NFV paradigms to allow the configuration of the functionality and management of the network by software. In addition, concerns are reported about possible information security attacks that can occur in 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
47

Nogales, Borja, Victor Sanchez-Aguero, Ivan Vidal, and Francisco Valera. "Adaptable and Automated Small UAV Deployments via Virtualization." Sensors 18, no. 12 (2018): 4116. http://dx.doi.org/10.3390/s18124116.

Full text
Abstract:
In this paper, we present a practical solution to support the adaptable and automated deployment of applications of Small Unmanned Aerial Vehicles (SUAVs). Our solution is based on virtualization technologies, and considers SUAVs as programmable network platforms capable of executing virtual functions and services, which may be dynamically selected according to the requirements specified by the operator of the aerial vehicles. This way, SUAVs can be flexibly and rapidly adapted to different missions with heterogeneous objectives. The design of our solution is based on Network Function Virtualization (NFV) technologies, developed under the umbrella of the fifth generation of mobile networks (5G), as well as on existing Internet protocol standards, including flying ad hoc network routing protocols. We implemented a functional prototype of our solution using well-known open source technologies, and we demonstrated its practical feasibility with the execution of an IP telephony service. This service was implemented as a set of virtualized network functions, which were automatically deployed and interconnected over an infrastructure of SUAVs, being the telephony service tested with real voice-over-IP terminals.
APA, Harvard, Vancouver, ISO, and other styles
48

Antonenko, Vitaly A., Ruslan L. Smeliansky, Artem V. Plakunov, and Pavel A. Mikheev. "Shared Virtual Function Orchestration Technique." Modeling and Analysis of Information Systems 26, no. 1 (2019): 7–22. http://dx.doi.org/10.18255/1818-1015-2019-1-7-22.

Full text
Abstract:
Network function virtualization (NFV) is a promising technique of high quality, flexible and scalable service for telecommunication companies clients and for enterprise data center clients. One of the important capabilities of this technique is providing a virtual service as a combination of multiple virtual functions. There are two types of virtual functions: those intended for a single customer (su-VF) and those that can serve multiple users (mu-VF). In case when output of mu-VF is chained with inputs of several different su-VFs, there is a need for a mechanism of identification and separation of users network flows passing through mu-VF to allocate them correctly between inputs of su-VFs in the NFV infrastructure. In the cloud environment, it is not always possible to use VLAN tags, IP and MAC addresses for that. In this paper, we consider the problem of identification of network traffic coming from a certain user inside an NFV platform and present a solution implemented in C2 MANO-platform.
APA, Harvard, Vancouver, ISO, and other styles
49

Coêlho, Roger William, Elvio João Leonardo, Luciana Andréia Fondazzi Martimiano, and Ronan Assumpção Silva. "A survey of the characteristics of SDN, NFV and information security in IoT and 5G networks." Revista Brasileira de Computação Aplicada 15, no. 3 (2023): 96–105. http://dx.doi.org/10.5335/rbca.v15i3.14645.

Full text
Abstract:
Background, The 5G technology has emerged as a trusted source to meet the increased demand of Internet of Things (IoT) devices, in addition to enabling Internet connectivity at high broadband speeds. Another important feature of 5G is the use of techniques such as Software Defined Networking (SDN) and Network Functions Virtualization (NVF), mechanisms responsible for performing network configurations through software, in addition to massive control and management of devices using the network configuration functions or device virtualization. Results, The concern with information security in the 5G network is increasing, as cybercriminals try to access important data that is transported over the network, since the demand for connected IoT devices will be greater, thus allowing for several possibilities of attacks. The understanding of possible threats and attacks is necessary, so that new measures are taken against cybercrimes presented in the 5G and IoT networks. Conclusions, This paper aims to elucidate some conceptions of what 5G technology is and the use of IoT in this network, contextualizing the SDN and NFV techniques to allow the configuration of the functionality and management of the network by software. In addition, concerns will be reported about possible information security attacks that may occur in 5G.
APA, Harvard, Vancouver, ISO, and other styles
50

Molina Zarca, Alejandro, Dan Garcia-Carrillo, Jorge Bernal Bernabe, Jordi Ortiz, Rafael Marin-Perez, and Antonio Skarmeta. "Enabling Virtual AAA Management in SDN-Based IoT Networks †." Sensors 19, no. 2 (2019): 295. http://dx.doi.org/10.3390/s19020295.

Full text
Abstract:
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things (IoT) networks to deal with cyber-threats. In this sense, this paper presents and evaluates a novel policy-based and cyber-situational awareness security framework for continuous and dynamic management of Authentication, Authorization, Accounting (AAA) as well as Channel Protection virtual security functions in IoT networks enabled with SDN/NFV. The virtual AAA, including network authenticators, are deployed as VNF (Virtual Network Function) dynamically at the edge, in order to enable scalable device’s bootstrapping and managing the access control of IoT devices to the network. In addition, our solution allows distributing dynamically the necessary crypto-keys for IoT Machine to Machine (M2M) communications and deploy virtual Channel-protection proxys as VNFs, with the aim of establishing secure tunnels among IoT devices and services, according to the contextual decisions inferred by the cognitive framework. The solution has been implemented and evaluated, demonstrating its feasibility to manage dynamically AAA and channel protection in SDN/NFV-enabled IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!