2017
DOI: 10.1007/978-3-319-65172-9_59
|View full text |Cite
|
Sign up to set email alerts
|

Putting Intelligence in the Network Edge Through NFV and Cloud Computing: The SESAME Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1
1

Relationship

6
2

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…1 where the working architecture is illustrated, with emphasis on the functional elements and interfaces. The proposed architecture [45][46][47][48] allows multiple network operators (tenants) to provide services to their users through a set of CESCs deployed, owned and managed by a third party (i.e., the CESC provider). In this way, operators can extend the capacity of their own 5G RAN in areas where the deployment of their own infrastructure could be expensive and/or inefficient, as it would be the case of, for example, highly dense areas where massive numbers of SCs would be needed to provide the expected services.…”
Section: The Proposed 5g Essence Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…1 where the working architecture is illustrated, with emphasis on the functional elements and interfaces. The proposed architecture [45][46][47][48] allows multiple network operators (tenants) to provide services to their users through a set of CESCs deployed, owned and managed by a third party (i.e., the CESC provider). In this way, operators can extend the capacity of their own 5G RAN in areas where the deployment of their own infrastructure could be expensive and/or inefficient, as it would be the case of, for example, highly dense areas where massive numbers of SCs would be needed to provide the expected services.…”
Section: The Proposed 5g Essence Approachmentioning
confidence: 99%
“…In the context of the deployed 5G ESSENCE architectural framework [47,48] the corresponding NFVI (Network Function Virtualisation Infrastructure) is realised across two dedicated tiers (i.e. : the Main DC and the Light DC), thus dealing with wider distribution and heterogeneity-related features.…”
Section: The Proposed 5g Essence Approachmentioning
confidence: 99%
“…To achieve these ambitious goals, the 5G ESSENCE project leverages the paradigms of RAN scheduling and, additionally, it provides an enhanced, edge-based, virtualised execution environment attached to the small cell, taking advantage and reinforcing the concepts of MEC and network slicing [23]. The architecture provided so far by the SESAME project ( [7], [8]) acts as a "solid reference point" for 5G ESSENCE. It combines the current 3GPP framework for network management in RAN sharing scenarios and the ETSI NFV framework for managing virtualised network functions [19].…”
Section: The Fundamental 5g Essence Architectural Contextmentioning
confidence: 99%
“…During 5G-PPP Phase-1, the ongoing SESAME project [6] evolved the small cell (SC) concept by integrating processing power (i.e., a low-cost micro-server) and by enabling the execution of applications and network services, in accordance to the Mobile Edge Computing (MEC) paradigm [7]. It also provides network intelligence and applications by leveraging the Network Function Virtualisation (NFV) concept [8]. The SESAME platform consists of one or more clusters of "Cloud -Enabled" Small Cells (CESCs), which are devices that include both the processing power platform and the small cell unit.…”
Section: Introduction: the 5g Essence Context In The 5g Eramentioning
confidence: 99%
“…This led to the recent paradigm of Network Function Virtualization (NFV) [1], where general-purpose private cloud infrastructures allows for quickly provisioning virtualized resources (i.e., network slices) in which to instantiate flexible virtualized network functions (VNFs), seconding the instantaneous workload conditions and their requirements. This way, a more intelligent use of physical resources can be pursued [2].…”
Section: Introductionmentioning
confidence: 99%