“…Research Papers [132], [133], [134], [135], [136], [137], [138], [139], [140] Managements and orchestration frameworks and architectures ETSI Performance & Portability Best Practices [151] Defines the "best practices" that need to followed to obtain acceptable performance in NFV. Also gives performance test results on on NFV use cases such as DPI, C-RAN, BRAS, etc Practical Measurements [148] experiences in deploying a C-RAN on a 2G and 3G network Hardware Acceleration [26], [28], [29], [154] Various proposals for applying hardware acceleration to enhance the performance of some VNFs such as DPI, dedup and NAT Practical Measurements [148], [149] Measurements on the effect of transferring network and user functions to the cloud Simulation [143] Vendor tool that simulates possible energy saving resulting from NFV Placement [157], [158], [159], [160], [161] Deciding the optimal placement of functions in the operator's network or the cloud, following specific functions requirements and resource constraints Migration [166], [167] Allow for one or a group of VNFs to be migrated to disparate physical servers Scheduling [171], [172], [173] Allow multiple VNFs to be hosted in a single VM and schedule their efficient utilization of resources ETSI Security Problem Statement [184] Defines the security, trust and privacy threats in NFV ETSI Security Guidance [30] Provides guidance on how security, privacy and trust may be achieved in NFV.…”