2016
DOI: 10.1016/j.jnca.2016.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A survey on service function chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
147
0
14

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 266 publications
(176 citation statements)
references
References 67 publications
1
147
0
14
Order By: Relevance
“…Fifth‐generation network infrastructures will become increasingly multitenant, hosting heterogeneous types of tenants with different requirements, with the need of adopting a service model where each tenant is provided with its own virtual infrastructure. In this context, network virtualization becomes crucial and, when combined with IT virtualization, allows service providers to create multiple coexisting isolated end‐to‐end virtual infrastructures for their tenants. SFC defines a specifically ordered list of network services/functions (eg, load balancers, firewalls, etc) based on use scenario requirements and manages traffic redirection functionalities to ensure that the traffic in the infrastructures is flowing through certain services. Security Group Control manages firewall‐filtering functionalities in order to provide control of traffic being produced or consumed in the infrastructure. It includes filtering of traffic based on MAC and IP addresses, port number, packet type, etc.…”
Section: Network Management On 5g Selfnet Infrastructurementioning
confidence: 99%
“…Fifth‐generation network infrastructures will become increasingly multitenant, hosting heterogeneous types of tenants with different requirements, with the need of adopting a service model where each tenant is provided with its own virtual infrastructure. In this context, network virtualization becomes crucial and, when combined with IT virtualization, allows service providers to create multiple coexisting isolated end‐to‐end virtual infrastructures for their tenants. SFC defines a specifically ordered list of network services/functions (eg, load balancers, firewalls, etc) based on use scenario requirements and manages traffic redirection functionalities to ensure that the traffic in the infrastructures is flowing through certain services. Security Group Control manages firewall‐filtering functionalities in order to provide control of traffic being produced or consumed in the infrastructure. It includes filtering of traffic based on MAC and IP addresses, port number, packet type, etc.…”
Section: Network Management On 5g Selfnet Infrastructurementioning
confidence: 99%
“…( ) is given by (13) and can self-adaptively be adjusted by the antibody-antibody affinity ( ) and the antibodyantigen affinity ( ). Their detailed definitions are as follows: (ii) Antibody-antigen affinity ( ).…”
Section: Initializing Operationmentioning
confidence: 99%
“…Specifically, as far as a single service node is concerned, if the occupancy ratio of certain resource reaches the threshold, the node cannot run new instances any more. Third, flows should be routed in such a way to follow the sequence specified by SSC while optimizing the latency of security service, since latency is an important factor in measuring network performance [13][14][15]. Hence, an optimal solution of SSC-DP is needed to satisfy service demand of security request while minimizing resource consumption of service nodes and reducing resource fragmentation as well as forwarding flow through the best available path with the minimal security service latency.…”
Section: Introductionmentioning
confidence: 99%
“…1 In addition, it is also very difficult to deploy new services in legacy networks because of the inflexible and ossified network architecture. In order to provide various services for network users, a large number of middleboxes (eg, firewall, intrusion detection, network address translation (NAT), and load balancer) have been developed.…”
Section: Introductionmentioning
confidence: 99%