Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = NFV experimental infrastructure

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1450 KB  
Article
Latency-Aware NFV Slicing Orchestration for Time-Sensitive 6G Applications
by Abdulrahman K. Alnaim and Khalied M. Albarrak
Systems 2025, 13(11), 957; https://doi.org/10.3390/systems13110957 - 27 Oct 2025
Viewed by 1082
Abstract
Ensuring ultra-low latency and high reliability in 6G network slices remains a significant challenge, as current NFV orchestration approaches are largely reactive and not designed to anticipate performance degradation. The advent of 6G networks brings forth stringent requirements for ultra-reliable low-latency communication (URLLC), [...] Read more.
Ensuring ultra-low latency and high reliability in 6G network slices remains a significant challenge, as current NFV orchestration approaches are largely reactive and not designed to anticipate performance degradation. The advent of 6G networks brings forth stringent requirements for ultra-reliable low-latency communication (URLLC), necessitating advanced orchestration mechanisms that go beyond reactive policies in traditional NFV environments. In this paper, we propose a latency-aware, AI-driven NFV slice orchestration framework aligned with ETSI MANO architecture to address the needs of time-sensitive 6G applications. Our framework integrates a predictive AI engine into the NFV Orchestrator (NFVO) to forecast latency violations based on real-time telemetry and historical trends. It enables dynamic scaling, intelligent VNF migration, and infrastructure-level isolation to maintain stringent end-to-end (E2E) latency targets. Experimental results indicate up to 30% reduction in average latency, a 42% improvement in SLA compliance, and 25% lower migration overhead compared to traditional reactive orchestration. The framework provides a scalable and intelligent orchestration solution adaptable to future 6G deployments. Full article
Show Figures

Figure 1

28 pages, 1679 KB  
Article
Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain
by Anwei Dong, Xingwei Wang, Bo Yi, Qiang He and Min Huang
Sensors 2023, 23(23), 9343; https://doi.org/10.3390/s23239343 - 23 Nov 2023
Cited by 1 | Viewed by 1917
Abstract
In the realm of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) are crucial software entities that require execution on virtualized hardware infrastructure. Deploying a Service Function Chain (SFC) requires multiple steps for instantiating VNFs to analyze, request, deploy, and monitor resources. It [...] Read more.
In the realm of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) are crucial software entities that require execution on virtualized hardware infrastructure. Deploying a Service Function Chain (SFC) requires multiple steps for instantiating VNFs to analyze, request, deploy, and monitor resources. It is well recognized that the sharing of infrastructure resources among different VNFs will enhance resource utilization. However, conventional mechanisms for VNF sharing often neglect the interests of both VNF instances and infrastructure providers. In this context, this paper presents a blockchain-based framework that focuses on resource sharing and access control, with a particular emphasis on ensuring profitability during VNF instantiation. Additionally, a resource sharing game model and a novel greedy matching algorithm are introduced to optimize the benefits for both VNF instances and infrastructure resource providers. Furthermore, a blockchain-based access control mechanism is designed to securely store keys and provide fine-grained access control. The experimental results demonstrate that the proposed resource sharing game model and greedy matching algorithm promote healthy competition among resource owners and facilitate effective bargaining between resource owners and infrastructure providers. In comparison to the standard Stackelberg game solution, our proposed method achieves up to an 8.1 times performance improvement while sacrificing fewer optimal social utility values. Furthermore, compared to other CP-ABE methods, the proposed approach enhances security within a blockchain-based framework while maintaining an excellent encryption efficiency and a moderate decryption efficiency. Full article
(This article belongs to the Special Issue Edge Intelligence: Challenges and Opportunities)
Show Figures

Figure 1

23 pages, 1848 KB  
Article
SALMA: A Novel Middlebox Infrastructure System Based on Integrated Subnets
by Amer AlGhadhban and Ahmad Showail
Systems 2022, 10(5), 165; https://doi.org/10.3390/systems10050165 - 24 Sep 2022
Cited by 1 | Viewed by 2922
Abstract
Middleboxes are critical components in today’s networks. Due to the variety of network/security policies and the limitations of routing protocols, middleboxes are installed in multiple physical locations to face high traffic with few considerations for efficiency. Reducing the number of deployed middleboxes would [...] Read more.
Middleboxes are critical components in today’s networks. Due to the variety of network/security policies and the limitations of routing protocols, middleboxes are installed in multiple physical locations to face high traffic with few considerations for efficiency. Reducing the number of deployed middleboxes would reduce capital and operation costs. Moreover, some flows prefer to bypass one or more in-path middlebox where they provide useless services, such as payload compression for multimedia streams. These challenges can be partially tackled by network function virtualization (NFV) schemes with the costs of performance reduction and replacement expenses. Given the rapid growth and the wide adoption of software-defined networking solutions and the recent advances in managing middleboxes’ configuration, the consolidation of middleboxes is becoming easier than before. We designed and evaluated SALMA, a new pre-NFV practical solution that systematically recreates the infrastructure of middleboxes by proposing the Integrated Middleboxes Subnets scheme. In this work, we attempted to reduce the number of installed middleboxes by implementing horizontal integration of middleboxes’ functions, such as every pair of middleboxes being integrated into a dedicated hardware box. We support the motivation for creating SALMA with a practical survey of in-production middleboxes from 30 enterprises. Our solution addresses key challenges of middleboxes, including cost, utilization, flexibility, and load balancing. SALMA’s performance has been evaluated experimentally as well. Full article
Show Figures

Figure 1

24 pages, 9613 KB  
Article
A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services
by Ivan Vidal, Borja Nogales, Diego Lopez, Juan Rodríguez, Francisco Valera and Arturo Azcorra
Electronics 2021, 10(15), 1868; https://doi.org/10.3390/electronics10151868 - 3 Aug 2021
Cited by 6 | Viewed by 3744
Abstract
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services [...] Read more.
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users). Still, this flexibility creates new challenges in terms of VNF connectivity. To address these challenges, we introduce a novel secure link-layer connectivity platform, L2S. Our solution can automatically be deployed and configured as a regular multi-site NFV service, providing the abstraction of a layer-2 switch that offers link-layer connectivity to VNFs deployed on remote NFV sites. Inter-site communications are effectively protected using existing security solutions and protocols, such as IP security (IPsec). We have developed a functional prototype of L2S using open-source software technologies. Our evaluation results indicate that this prototype can perform IP tunneling and cryptographic operations at Gb/s data rates. Finally, we have validated L2S using a multi-site NFV ecosystem at the Telefonica Open Network Innovation Centre (5TONIC), using our solution to support a multicast-based IP television service. Full article
(This article belongs to the Special Issue Novel Cloud-Based Service/Application Platforms and Ecosystems)
Show Figures

Figure 1

21 pages, 3007 KB  
Article
A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
by Håkon Gunleifsen, Thomas Kemmerich and Vasileios Gkioulos
Future Internet 2019, 11(9), 183; https://doi.org/10.3390/fi11090183 - 24 Aug 2019
Cited by 4 | Viewed by 4322
Abstract
Contemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefore, suitable adaptations of automation and encryption concepts for the development of [...] Read more.
Contemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefore, suitable adaptations of automation and encryption concepts for the development of interconnected data centre infrastructures are essential. Nevertheless, packet isolation constraints related to the current NFV infrastructure and SFC protocols, render current NFV standards insecure. Accordingly, the goal of our work was an experimental demonstration of a new SFC packet forwarding standard that enables contemporary data centres to overcome these constraints. This article presents a comprehensive view of the developed architecture, focusing on the elements that constitute a new forwarding standard of encrypted SFC packets. Through a Proof-of-Concept demonstration, we present our closing experimental results of how the architecture fulfils the requirements defined in our use case. Full article
(This article belongs to the Section Network Virtualization and Edge/Fog Computing)
Show Figures

Figure 1

20 pages, 3458 KB  
Article
Deploying CPU-Intensive Applications on MEC in NFV Systems: The Immersive Video Use Case
by Giorgio Cattaneo, Fabio Giust, Claudio Meani, Daniele Munaretto and Pietro Paglierani
Computers 2018, 7(4), 55; https://doi.org/10.3390/computers7040055 - 26 Oct 2018
Cited by 19 | Viewed by 14205
Abstract
Multi-access Edge Computing (MEC) will be a technology pillar of forthcoming 5G networks. Nonetheless, there is a great interest in also deploying MEC solutions in current 4G infrastructures. MEC enables data processing in proximity to end users. Thus, latency can be minimized, high [...] Read more.
Multi-access Edge Computing (MEC) will be a technology pillar of forthcoming 5G networks. Nonetheless, there is a great interest in also deploying MEC solutions in current 4G infrastructures. MEC enables data processing in proximity to end users. Thus, latency can be minimized, high data rates locally achieved, and real-time information about radio link status or consumer geographical position exploited to develop high-value services. To consolidate network elements and edge applications on the same virtualization infrastructure, network operators aim to combine MEC with Network Function Virtualization (NFV). However, MEC in NFV integration is not fully established yet: in fact, various architectural issues are currently open, even at standardization level. This paper describes a novel MEC in an NFV system which successfully combines, at management level, MEC functional blocks with an NFV Orchestrator, and can neutrally support any “over the top” Mobile Edge application with minimal integration effort. A specific ME app combined with an end-user app for the provision of immersive video services is presented. To provide low latency, CPU-intensive services to end users, the proposed architecture exploits High-Performance Computing resources embedded in the edge infrastructure. Experimental results showing the effectiveness of the proposed architecture are reported and discussed. Full article
(This article belongs to the Special Issue Mobile Edge Computing)
Show Figures

Figure 1

18 pages, 1940 KB  
Article
An Online Algorithm for Dynamic NFV Placement in Cloud-Based Autonomous Response Networks
by Leonardo Ochoa-Aday, Cristina Cervelló-Pastor, Adriana Fernández-Fernández and Paola Grosso
Symmetry 2018, 10(5), 163; https://doi.org/10.3390/sym10050163 - 15 May 2018
Cited by 16 | Viewed by 5507
Abstract
Autonomous response networks are becoming a reality thanks to recent advances in cloud computing, Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies. These enhanced networks fully enable autonomous real-time management of virtualized infrastructures. In this context, one of the major challenges is [...] Read more.
Autonomous response networks are becoming a reality thanks to recent advances in cloud computing, Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies. These enhanced networks fully enable autonomous real-time management of virtualized infrastructures. In this context, one of the major challenges is how virtualized network resources can be effectively placed. Although this issue has been addressed before in cloud-based environments, it is not yet completely resolved for the online placement of virtual machines. For such a purpose, this paper proposes an online heuristic algorithm called Topology-Aware Placement of Virtual Network Functions (TAP-VNF) as a low-complexity solution for such dynamic infrastructures. As a complement, we provide a general formulation of the network function placement using the service function chaining concept. Furthermore, two metrics called consolidation and aggregation validate the efficiency of the proposal in the experimental simulations. We have compared our approach with optimal solutions, in terms of consolidation and aggregation ratios, showing a more suitable performance for dynamic cloud-based environments. The obtained results show that TAP-VNF also outperforms existing approaches based on traditional bin packing schemes. Full article
(This article belongs to the Special Issue Advanced in Artificial Intelligence and Cloud Computing)
Show Figures

Figure 1

Back to TopTop