2014 IEEE 3rd International Conference on Cloud Networking (CloudNet) 2014
DOI: 10.1109/cloudnet.2014.6968996
|View full text |Cite
|
Sign up to set email alerts
|

A PCE-based architecture for the management of virtualized infrastructures

Abstract: The emerging Network Function Virtualization paradigm (NFV) is a disruptive change that creates new business opportunities for vendors and carriers. By exploiting virtualization technologies, it allows the dynamic creation of logically isolated infrastructures over abstracted physical networks. To be able to offer Virtualized Services efficiently, service providers need a new class of Management systems able to manage and orchestrate both network and IT virtualized resources. In this paper, we propose an enhan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…NetFATE [132] proposes an orchestration approach for virtualized functions, taking into account the service chains needed by traffic flows and the desired QoE. In addition, other MANO frameworks and architectures have been proposed in [133], [134], [135], [136], [137], [138]. However, there are still some open issues.…”
Section: A Management and Orchestrationmentioning
confidence: 99%
See 1 more Smart Citation
“…NetFATE [132] proposes an orchestration approach for virtualized functions, taking into account the service chains needed by traffic flows and the desired QoE. In addition, other MANO frameworks and architectures have been proposed in [133], [134], [135], [136], [137], [138]. However, there are still some open issues.…”
Section: A Management and Orchestrationmentioning
confidence: 99%
“…Research Papers [132], [133], [134], [135], [136], [137], [138], [139], [140] Managements and orchestration frameworks and architectures ETSI Performance & Portability Best Practices [151] Defines the "best practices" that need to followed to obtain acceptable performance in NFV. Also gives performance test results on on NFV use cases such as DPI, C-RAN, BRAS, etc Practical Measurements [148] experiences in deploying a C-RAN on a 2G and 3G network Hardware Acceleration [26], [28], [29], [154] Various proposals for applying hardware acceleration to enhance the performance of some VNFs such as DPI, dedup and NAT Practical Measurements [148], [149] Measurements on the effect of transferring network and user functions to the cloud Simulation [143] Vendor tool that simulates possible energy saving resulting from NFV Placement [157], [158], [159], [160], [161] Deciding the optimal placement of functions in the operator's network or the cloud, following specific functions requirements and resource constraints Migration [166], [167] Allow for one or a group of VNFs to be migrated to disparate physical servers Scheduling [171], [172], [173] Allow multiple VNFs to be hosted in a single VM and schedule their efficient utilization of resources ETSI Security Problem Statement [184] Defines the security, trust and privacy threats in NFV ETSI Security Guidance [30] Provides guidance on how security, privacy and trust may be achieved in NFV.…”
Section: G Research Directions In Selected Nfv Use Casesmentioning
confidence: 99%
“…In fact, the first proposals for architecture with a virtual network controller are based on a centralized scheme, Optical Fiber and Wireless Communications as the one proposed in Ref. [74]. Centralized systems are suitable when the time between successive requests is long enough for the central controller to execute the resource allocation algorithm.…”
Section: Information Managementmentioning
confidence: 99%
“…NetFATE [133] proposes an orchestration approach for virtualized functions, taking into account the service chains needed by traffic flows and the desired QoE. In addition, other MANO frameworks and architectures have been proposed in [134], [135], [136], [137], [138], [139], [140]. However, there are still some open issues.…”
Section: A Management and Orchestrationmentioning
confidence: 99%
“…Research Papers [132], [133], [134], [135], [136], [137], [138], [139], [140] Managements and orchestration frameworks and architectures ETSI Performance & Portability Best Practices [151] Defines the "best practices" that need to followed to obtain acceptable performance in NFV. Also gives performance test results on on NFV use cases such as DPI, C-RAN, BRAS, etc Practical Measurements [148] experiences in deploying a C-RAN on a 2G and 3G network Hardware Acceleration [26], [28], [29], [154] Various proposals for applying hardware acceleration to enhance the performance of some VNFs such as DPI, dedup and NAT Practical Measurements [148], [149] Measurements on the effect of transferring network and user functions to the cloud Simulation [143] Vendor tool that simulates possible energy saving resulting from NFV Placement [157], [158], [159], [160], [161] Deciding the optimal placement of functions in the operator's network or the cloud, following specific functions requirements and resource constraints Migration [166], [167] Allow for one or a group of VNFs to be migrated to disparate physical servers Scheduling [171], [172], [173] Allow multiple VNFs to be hosted in a single VM and schedule their efficient utilization of resources ETSI Security Problem Statement [184] Defines the security, trust and privacy threats in NFV ETSI Security Guidance [30] Provides guidance on how security, privacy and trust may be achieved in NFV.…”
Section: G Research Directions In Selected Nfv Use Casesmentioning
confidence: 99%