The Application of Network Functions Virtualizatio
The Application of Network Functions Virtualizatio
The Application of Network Functions Virtualizatio
net/publication/355866688
CITATIONS READS
8 833
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Alharith A. Abdullah on 09 November 2021.
Alharith A. Abdullah
University of Babylon, Iraq.
Abstract
Keywords
Network Functions Virtualization (NFV), IoT, SDN, Blockchain, Security, Cloud Computing.
1007 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Introduction
The term Network Functions Virtualization (NFV) refers to a technology created with the
important purpose of accelerating the distribution of modern network servicing in the
telecommunication field. NFV's major goal is to expand its future evolution aims. A
closer examination of the communication environments these days shows that it is rather
crowded with many different proprietary hardware devices. The launching of a novel
network service demands the insertion of different hardware entities on account of the
available space, causing much more hardness as its complication increases.
The increased number of devices that are connected to the Internet has led to uncertainty
and worries considering the actual capacity of the existing networks. There are a lot of
challenges that network operators face, among which are the very short life cycle of the
device, the delay in the standardization of protocols, and the delay in inserting new
networking features. Network operators are forced to increase the investment necessary to
build hardware, as well as the cost and maintenance of operations. Because of all of the
aspects that have been mentioned above, the network operators noticed that on account of
network abilities, its maintenance may become a hard mission in the long run.
Considering these difficulties and the functional demands of space and ability, the
technology of NFV is found to be a sufficient option. NFV covers these issues through
running network functions in a virtualized behavior, for instance, through animating
network functions inside a cloud technology, in addition to many established criteria
servers.
The major aim of NFV is to convert the functions of the network into a virtualized manner
such as proxies, load balancers, firewalls, routers, or any other network functions that are
implemented into stable hardware and converted in virtual machines (VMs). Such virtual
network functions may be implemented in servers and hardware resources like
computation, storage, and networking hardware, which are seen as a joint resource
collection. They may migrate, or be instantiated in several positions within the networks
depending on the job imposed on the network. It covers the running of functions in
1008 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
software which may present its service on industry-standard servers with no need for the
inauguration of modern entities. Figure (1) refers to the NFV model. Blockchain is
regarded as an adaptable choice for building a secure platform due to its characteristics,
such as the data traceability and resistance of tamper. It has been broadly supposed that
besides its utilization in economic services (e.g. Bitcoin), Blockchain may also be
executed in application-oriented situations.
It is important to mention the link that exists between NFV and SDN (Software-Defined
Networking). NFV is the virtual machine simulation for specific devices, where the
device control plane operates on the server, so the devices are open and compatible.
However, the SDN is a completely new network architecture. The notion of SDN can be
summed up by the cancellation of the device control plane, followed by consolidating the
calculation through the control unit, and issue flow tables. NFV and SDN have been
largely integrated, yet they are not interconnected. Network functionality is based on the
important concept of virtualization and deployment with no SDN.
The aim of Network Function Virtualization in this relationship is to remove the SDN
mechanism and to only use existing data center technologies. The method is based on
separate control levels and data forwarding that the SDN suggests, which can increase the
performance efficiency, and ease the compatibility with the present equipment and basic
process and servicing operations.
NFV has the ability to back SDN via supplying it through its infrastructure to run the
SDN program. In addition, NFV and SDN are very close in that they use backbone
servers and switches to achieve their goals.
The core of SDN is to soften the network and improve the network's programmability and
ease of modification. The SDN does not change the network function but rather
restructures the network architecture. NFV makes no changes to the device function, but it
changes the appearance of the device. The essence of NFV is to convert a custom device
into a generic software device and share the hardware infrastructure.
The increased number of devices that are linked to the Internet has imparted uncertainty
regarding the actual ability of the existing networks. Figure (2) shows that the number of
linked devices might override twenty billion through these years. Therefore, the industry
and the research groups are offering new technologies so as to ensure the efficient running
of networks. Therefore, NFV and SDN are referred to as essential enabling technologies.
1009 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
The Internet of Things (IoT) can lay hold of the utility of the integration of these
technologies so as to give a context-aware medium. The major IoT difficulties that
currently exist are associated with technology assemblage, handling of massive data, the
programmability of the network, fixed ability, and lack of energy and security. The basic
idea beyond NFV is to deploy the network architecture among various physical
architectures/dealers for the employment of a conventional network mission as a virtual
case. In the IoT case, the cooperation amidst SDN and NFV attempts to promote
controlling and deploying IoT devices in a well-organized manner and at lowest cost.
For decades, blockchain network gained a great reputation through ledgers that non-
changeable in a distribution format along with platforms for independent data-driven
planned. Introduced through the popular venture cryptocurrency project ‘‘Bitcoin’’, the
blockchain network was basically utilized as the essential spine of a public, distributed
ledger system to prepare asset transactions based framework of digital symbols within
Peer-to-Peer (P2P) servants. Blockchain networks, particularly the ones utilizing
open-access systems or policies, are characterized by their essential features of
disintermediation, public approachability of network functionalities, and
tamper-resilience.
Cloud computing is one of the technologies that involve the transfer of all processing, in
addition to the storage space of computers to the cloud for a server device accessible
through the Internet. IT programs are transferred from products into services. Therefore,
this technology help to remove the issues related to the development and maintenance of
IT issues faced on behalf of the company that makes use of it. Thus, the aspects that are
given most attention are the use of such exclusive services, and the cloud computing
infrastructure that relies on advanced data centers to make big storage area available for
users.
1010 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
In general, “cloud computing” or “cloud services” can be described as the services that
include devices and programs linked to a network of servers. It transfers its data in a
virtual cloud which give the guarantee of continuous connection with no interruption
using several devices, including computers, tablets, and smart phones. A special code is
set for unlocking the network, which enables its access from anywhere and anytime. As
the available technology develops through the Internet, many organizations and
companies are worthy on making the application available through the Internet by means
of cloud computing. Therefore, this technology has widely contributed to the saving of
costs.
NFV is an idea in network structure that separates hardware and network missions
utilizing virtualization mechanisms. Through virtualizing whole classes of network
1011 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
physical device functions toward modular systems, NFV reaches more inclusive
scalability in the collection of physical devices that are interconnected via links. These are
utilized to switch information among the devices in addition to computing services which
are that considered a cross-discipline that includes both the science and technology.
A. Architecture of NFV
NFV provides an open architecture with a lot of resilient options for deploying NFVI
solutions. The ideal infrastructure or architecture of NFV is made up of three particular
layers: NFV infrastructure (NFVi) – with regard to equipment and services of cloud to
perform network applications, Virtual Network Functions (VNFs) – application program
which is responsible for providing a particular network job (such as routing, authorization
of access to data, and mobile core), and Management Automation and Network
Orchestration (MANO) which possess the capacity to turn network parts or components in
the issue of hours instead of months and permits to move in dexterity. However, it may
also cause some forms of disorder within the virtualization and NFV process, thereby
1012 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
indicating the necessity for proper management at an early stage as highlighted in Figure
(3).
1013 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
e. VNF Managers (VNFM): The VNF manager is responsible for the administration
of VNFs. They react with both EMS and VNF to obtain an appropriate
provisioning and initial layout administration. The life process of VNF-instances
are managed from VNFM via initializing, scaling, modernizing, and finishing the
VNF instances. Each VNF-instance must be solely related to one VNF Manager.
1014 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
As has been mentioned above, the Network Function Virtualization dissociates network
missions from dedicated hardware accessories and executes missions of the network in the
virtual approach via software programming. In addition, it provides flexibility in terms of
scaling the Service Function Chain (SFC) (Medhat, A. M., et al., 2016) orchestration.
Despite the fact that the dynamics and elasticity of VNF improve the defense against
attacks like DoS, the software virtualization context of VNF additionally leads to a list of
security problems, vulnerabilities, and another malware types like backdoors, causing
VNFs to become more weaker to attackers. Corresponding to electromechanical hardware
devices like VMs, protection missions like firewalls and load balancers are placed in the
central location so as to ensure the security of a set of devices. Therefore, counter attacks
toward VNFs is a significant issue in the use of NFV. Reliability remains an important
case in the study regarding NFV SFC, with the focus on flexible service scheduling in the
event of a dynamic server malfunction.
The service availability demands for NFV are required to be at least identical to those for
traditional systems. These requirements can be achieved whenever the components of
NFV provide equal or more acceptable performance in one or more of the following
aspects: average of failure, time of discovery, time of repair, success average of the
discovery and repair, and effect for every failure. In order to meet the service availability
demands, it is necessary that a number of factors are taken into consideration in the VNF
design, such as commodity-grade hardware and presence of various layers of software
(i.e. hypervisor).
1015 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
framework. These expenses may include everything, ranging from repairing the
infrastructure to purchasing a piece of equipment or building a new data center. As for
OPEX, it involves short-term expenses that must cover the running costs of a business in
progress and thus are essentially identical to current expenses. Other benefits include cost
lowering, decrease in power exhaustion, and the depletion in time-to-market for the
deployment of in this time network services.
A. Advantages of NFV
• NFV improves the services that are introduced via the network, provided through
developable and flexible services automation.
• NFV reduce the present-day period of deployment within the network services.
• Regarding the servers and platform costs, the NFV decreases the expense and power
exhaustion to a minimum.
• NFV assists in a notable decrease in the sequence work of maturation.
• The speed of deployment may be increased by reducing the network providers cycle of
innovation.
• NFV embraces a number of flexibility and extensibility solutions.
• It decreases the expansion expenses of using this technology in addition to the ability of
merging it and examining this process of combination.
• Services of the network may be in constant change based on the demands in NFV.
• NFV provides an increased running capacity because of its network architecture
symmetry.
• It provides the ability to supply more than one user simultaneously while using the same
hardware structure.
• The energy exhaustion is significantly decreased through the use of power controlling
characteristics in criterion storage servers.
B. NFV Tasks
In general, the tasks NFV usages could be classified into two types, namely service-
oriented use cases and architectural use cases.
1016 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
• NFVIs as services.
• VNFs as services (VNFaaS).
• VNPs as services (VNPaaS).
• VNFs as forwarding graphs [74].
NFV Implementations
The Internet Service Provider (ISP) is the service provider that provides communication
between companies and their branches. With the provision of connectivity, services such
as firewalls, VPN encryption, DNS or Routing and others might be required either for the
network itself or for its connection. Previously, real Firewall devices and other devices
had to be provided by the ISP or service provider so as to achieve such services. At
present, the NFV technology allows the ISP to provide the services mentioned above and
more without purchasing real devices from different companies, as it only needs to
provide servers, storage and a network.
Through these elements, the service provider can provide services quickly and with high
flexibility. For example, a company needs 5 firewalls in its branches. The ISP will create
five Virtual Machines and add firewall copies to them and distribute them on the network.
That is, all services have become virtual and the ISP does not need to buy specific
devices, but rather buy copies or applications that implement these services which are
installed on virtual servers. This will provide high flexibility as services will be on
demand and the cost of services will be low. This means that no devices need to be
1017 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
updated, purchased or maintained, as all this will turn into programs. The section below
explains and reviews some solutions and implementations of NFV in some technologies.
The Internet of Things (IoT) gives an idea of capability of being connective to everything
from everywhere at any time. Thus, this reaction of objects that are physically linked to
the network may be carried out freely, as shown in Figure (4). IoT is closely linked to the
mechanization of sensors, as most instance sensors and actuators are considered to be a
part of a greater IoT network. It has been stated that the utilization of IoT equipment like
computer, portable, mobiles, household appliance, manufacturing systems, electronic
healthcare services devices, monitoring tool, and other extensions linked to the Internet
would override 45.5 billion in 2020. Those IoT sensors in addition to the actuators might
present different sizes of facts and statistics. Thus, the necessity to set up modern network
access and essence devices ought to be raised. To administer the network accessories
sufficiently, the network hardware resources need to be virtualized.
NFV is the technology which has the main goal of changing network functions before
being operating by means of hardware into software, and executing it onto an
unspecialized server. The way of refinement in the execution or performance of general-
purpose servers and the work steps of server virtualization as seen with the virtual
machine monitor (VMM) have made it possible to ensure a secure, scalable, and reliable
performance that is serviceable even to carrier networks. By constructing a virtualized
IoT-dedicated network using NFV technology and by optimally diffusing resources based
on to service demands, it is possible to carry out network infrastructures which are pliable,
economical, and effective to be used within the IoT.
1018 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
The present sub-section contains the survey of architectural solutions that have been
suggested in literature regarding function virtualization in environments of IoT. The
majority of the aforementioned solutions are basically a blend of SDN/NFV that present
ideal solutions, as both technologies benefit from each other's abilities. (J. Li, et al., 2015)
suggest an approach with a subsequent architecture for a upper-lower method. That is split
into many interactive layers, being the application layer (for example, services such as
Operation Support System), control layer (for example, SDN controller in addition to the
distributed operating system), and the last layer is the infrastructure layer (for example,
switches as well as gateways that regard to the Internet of Things). The main goal of using
SDN along with NFV is to face the challenges of IoT, such as heterogeneity, the capacity
to be changed in size or scale, safety, and interoperability. The suggested architecture for
NFV merged with SDN-IoT has the ability to supply a centralized control and to
virtualize diverse services of IoT in many fields that are entered directly into user service
such as medical care, transportation, and teaching.
1019 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
(Ojo et al., 2016) offer a different structure for IoT based on virtualized components in the
system support to the SDN. Their work depends on VNFs for several reasons, which
justify the deployment of SDN/NFV gateway nodes. Using these edge communication
devices, the framework has the ability to present services like location information, low
latency, maximum data transfer warranties, and it can ensure the deployment of IoT
equipment in a fast manner. The MANO extension orchestrates the dominance of the
network infrastructure and other different functions of the network through specific
administrators. It also interrelates with the administration extension applications to obtain
a set of rules that dominate the behaviors of network devices and information of
configuration, in addition to the SDN controllers for transmission and services of the
network. The whole architecture is completely identical to the one described in above
Figure (4). According to the rules of logic, the elements of SDN are separated from the
layers of the network function virtualization, and there are several SDN functions are
executed in the NFVI. NFV may additionally be utilized to transfer some of the IoT
gateway tasks for virtual gateways, which ought to permit better scalability, more
comfortable mobility administration, and quicker deployment.
(Du et al., 2016) introduced a prototype for a context-aware IoT architecture which can
transmit and prepare IoT passage within data plane. It is based on contextual data that is
presented through joining the towering application-layer with depressed sensor-layer so as
to plug a hole through IoT. The IP network takes advantage of the SDN merge with NFV
out of software-defined data plane. These problems are associated with scalability,
discoverability, confidence, and reliability, often because of the counting and battery
strength constraints. The term of software-defined data plane is characteristic of
describing novel services for Mobile Virtual Network Operators (MVNOs) which gives
clients many network services at a lower cost, whereby network services are obtained
through Mobile Network Operators (MNOs) so as to reach an infrastructure for wireless
networks. The suggested architecture combines a programmable MVNO switch on
processors that are multi-core in addition to the IoT gateways with an Edison board. The
important thing that is emphasized in this section is based on the architecture of IOT, as
the security in the highest degree, the privacy mechanism, and the optimization of the
performance are essentially required services within the IoT-MVNO area. All data that the
MVNO switch uses may be gathered from the sensors via IoT edge nodes and is
forwarded to the corresponding data service controller to perform a series of operations. A
number of separate MVNO networks are joined with diverse applications to operate
concurrently. The above structure utilizes a protocol from an OpenFlow class to interface
amidst the MVNO switch with the application of IoT. The MVNO switch is constructed
1020 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
on a FLARE testbed that has multiple processor cores. The gateway of IoT software based
on FLARE guarantees the trailer slicing approach, service tasks such as IoT appliance
finding and interconnection, data gathering and encapsulation, and finally the
context-aware packet transmitting series of operations.
This sub-section lists a number of different solutions regarding the field that utilizes NFV
to ensure the secure performance of IoT. (Massonet, P., et al., 2017) propose expanded
federation cloud architecture for advanced networking to guarantee the security of
connected IoT devices. The security solution uses virtual functions in a lightweight
manner in addition to Service Function Chaining (SFC). A universal security policy could
be obtained through the IoT gateways in edge computing, which can be done through
building a chain of VFs for various aims, like firewall and discovery the intrusion. They
observe the IoT network for weaknesses and attacks and separate the involved devices
whenever discovered. Furthermore, SFC is mainly accountable for the management of the
flow inside the IoT system, as needed for cloud and IoT structures to possess the suitable
infrastructure for support. All this can be obtained or accessed through deploying a
federation agent at the IoT controller. The transmissions themselves are achieved utilizing
REST application software. The IoT network controller receives the configuring
information via the federated network that has the ability to manage the network
controller transmissions, as these are later on sent to the IoT gateways to be run. Lastly,
the network controller has the ability to switch the information with the IoT proxy, which
assists in the managing process of the data plane based on a programmable network
protocol. A module is performed within the IoT network controller so as to secure the
IoT-Cloud network slices.
There are studies made a few alterations to the security direction by suggesting an
approach that includes a unique (IPv4) called address resolution protocol (ARP). This
protocol provisions security NFV services so as to guard upon attacks of ARP spoofing as
well as the process of gathering information from every devices or endpoint. The work
further offers some information about an SDN-based architecture to enforce the control of
both fixed and constantly changing network access to the IoT for smart homes. Each of
the ARP demands passes over a virtualized confided structure called ARP server, which is
characterized by the full capacity to protect the entire operations of ARP, dropping the
messages of ARP broadcast, and simply allowing ARP spoofing during ARP proxy
through designing or adapting the server of ARP. In addition, this work presented some
advice for resolving important issues in packet processing delay by following a
1021 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
technology called high-speed packet processing. These technologies involve Deep Packet
Inspection (DPI), with Carrier-grade Linux, multi-core processors, and virtualizations
facilitating the distribution of cores among applications. Only the NFV-IoT associated
donation focuses on this aspect. The building architecture contains domestic ingredients
such as a data plane in addition to NFV dispatcher, with local security services.
The security agent, which is considered one of the main elements, always picks
information based on the control plane user, IoT policy manager, security services, and
the Ryu controller to ensure that the opposite network reaches the rules of control, often in
a forced manner. The NFV sender receives all copied packages that are sent from the
corresponding port. Next, these packages are sent to the identical security service
depending on the sender index. A security agent obtains associated input to straighten the
security services towards all influx. Depending on a test, a number of security
declarations or alarms will be created. The server validation of IPv4 ARP may defend
against the ARP spoofing, whereby the identical data plane development kit (DPDK)
execution works in a great manner for the smart home IoT network. NFV or SDN fields
possess diverse components, applications, and orchestration managers. A harmful
component in each of them might own dangerous influences on the entire framework. For
instance, a malicious VNF via a normalization software trader, a host OS kernel, or
MANO ingredient, may harm the whole network area. The extent to which those
components are more secured in terms of integrity, confidentiality, and other regards
associated with the principle of security will determine whether it will be referred to as
well-protected. Therefore, we introduce the trend analysis of Internet of Things based on
NFV with other techniques, as presented in Figure (5).
The figure below shows that the trends of IoT with NFV initially start by providing the
scalability and dynamic mobility for the IoT gateways. Then, the work develops and deals
with the 5G network. However, in the middle of the period, there is a trend towards
dealing with big data that comes from the IoT devices based on virtual networks. The
work focused on the quality of services and the security of the IoT-based data, but finally
the trend moves towards the work with Edge Cloud that offers the infrastructure to
securely link billions of IoT devices.
1022 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
SDN is considered to be a part of NFV. In particular, it means that the SDN represents a
related enabler of NFV; however one is different from the other. It is predicted that
communications networks will be formed based on virtualized infrastructures of the next
generation, whereby the network functions are diffused in the virtual environment instead
of common proprietary tools. A principal trend observed in modern and planned
communication is the infrastructure of computing. The infrastructure tends to shift from
being dependent on a set of black boxes provided with specific hardware and preinstalled
with specific programs, to a modern infrastructure having a “white box” operating a
number of specific network programs or software. This is necessary with regards to the
5G network approach, with the requisition for a newly discovered network construction
that directs flexible and dynamically adaptive network components. These can in turn
provide particular services based upon traffic requests with more mobility in terms of time
and space, while maintaining its heterogeneity and variety.
For the sake of obtaining a technological model shift, the SDN and NFV were proven to
form a promising technology to be used in managing networks in the future. Besides their
massive advantages, as well as decreasing costs of operation, using resources in a better
manner, and less restricted management demands, the choice of such a combined
technology is earning important momentum. Expanding network resource exploitations
and diminishing operation prices are some of the common yet important goals in the
epoch of network managing and control. The NFV provides additional flexibility by
transferring network functions from hardware devices to virtual machines in order to
1023 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
operate onto commodity hardware. SDN is the main factor for discovery and difference in
networks, which is involved in the increase of cloud applications and services over
enterprise and cloud contractors. As well, it mainly focuses on infrastructures such as
computing, storages, networks, and software-defined data centers.
This sub-section highlights several problems that emerge and correlated with the two
technologies of NFV and SDN, particularly in terms of its practical significance and
applicability based on combining of the new generation networking epoch in advanced
behavior.
(Gkioulos, V., et al., 2018) present a methodical review of literary works that involve the
utilized SDN technologies, in addition to related services and instruments. Their
observation involved a wider domain of networks including physical and military ones, as
well as WANETs, MANETs, and mission-critical physical structures.
(Gunleifsen, H., et al., 2018) investigate the matter of building separate and dynamically
guarded overlaying networks and reduce the constraints of modern NFV applications
which are created to be deployed inside trusted areas. The overlaying network with
non-dynamic granted links are used for increasing the security within networks. This can
be realized via offering a new architecture for the computerized tunnel identification that
is be encrypted in NFV within a multiple-domain configuration.
(Abbasi, A. A., & Jin, H. 2018) offers a resource combination design that performs
theories that regard to the management network resources over SDN control measures,
enabling the achievement of application-aware theories. Their goal in their work is to set
up a vital wall for tool-based choice support procedures to help the determination of cloud
services within a multiple-domain configuration.
(Medhat, A. M., et al., 2016) offer a different Autonomic Network Management (ANM)
and optimization framework which describes the efficient merging of SDN and
software-defined radios (SDRs) for obtaining a flexible reconfiguration enhanced
performance, and an effective utilization of accessible resources in SDR-based Cognitive
Radio Networks (CRNs).
(Leivadeas, A., et al., 2019) concentrate on the practical and effective VNF placement
inside edge and cloud infra-structures that provide improved networking services to IoT
applications. Especially, they suggest a different procedure to increase the facilitation of
the placement progress as well as the rapid deployment of high-speed of service-chained
1024 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
VNFs in a basic physical structure of network cloud, which may be expanded by utilizing
the Mobile Edge Computing (MEC) physical structure for hosting mission-critical and
delay-sensitive traffic.
(Eramo, V., et al., 2019) presents a scalable NFV orchestration architecture which
supports flexible cloud and bandwidth allocations of resources. As an additional feature,
they made use of Segment Routing (SR) to perform the data plane of the suggested
architecture, obtaining a total solution to overcome complications considering the
orchestrations that would traditionally correspond with it.
(Yao, J., et al., 2019) presented security architecture whereby the 5G network
functionality involves the utilization of the SDN technology so as to perform transactions
with no issues regarding the heterogeneity or other inherent security problems attributable
to the intelligence centralization commonly found in such networks.
Finally, some studies examined the complications and difficulties which are commonly
faced when deploying services and platforms within cloud-based configurations. Such a
study is essential to ensure that the 5G technology is applied successfully. A solution was
proposed for solving such issues offering a new sequence of industrial and administrative
setup for deploying and managing such structures and services in multiple-cloud
configuration They took into consideration any implicit technology, protocol, or
Application Program Interface (API) that may be involved.
NFV has the potential ability to migrate enterprise data centers into the cloud. Cloud
computing enables several organizations to obtain the administration of their IT hardware
infrastructure from an outside supplier to, as it is necessary for cloud services suppliers.
However, as indicated in, the process of migration applications from particular data
centers to cloud centers is found to be a rather complex procedure, as some applications
tend to be network-based when providing their services like firewalls, and load balancers.
Considering the tasks that are executed during the resource exploitation within cloud
services, the main focus has been on the placement of VM placement within bare-metal
servers, with little attention paid to the physical network hardware. Despite, a number of
complicated services have been pointed out and eliminated from the services presented by
data centers, such as 3G/4G IP Multimedia Services.
1025 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
In this section, there are a number of challenges identified which need to be fixed so as to
create actual Network Function Centers (NFCs), as well as to increase the network
resource exploitation and to promote a simple network management. As is customary and
in a traditional way previously, network services were implemented as hardware based
network appliance. (Sekar, V., et al., 2012) suggest an architecture that performs these
network appliances as a software-based system with virtualized entities. There are had
been studies offer platforms to run middle-boxes for software-based. The suggested NFC
follows the NFV idea and performs services of network as software-based system entities.
Given the expansion of NFV, and other considers the probability of getting help from an
outsourcing enterprise to perform a series of operations on the middle-box to the cloud. It
offers these outsourcing works to solve numerous difficulties that administrators of
networks face and outsource more than 90% of middle-box hardware in networking
infrastructure.
The placement of the NFVs in the physical boxes (such as personal computer) and usage
of network bandwidth are important for the performance of cloud computing technology.
(Jiang, J. W., et al., 2012) focuses on the online type of the VM placement, whereby a
demand is received each time the VM location is determined, based on a Markov
approximation technique.
There are a number of advanced techniques proposed throughout the past two years which
ultimately target the shift of computing and networking from the current manual order to
fully automated process. Several solutions have been introduced which harmonize with
the remnant infrastructure. Among these technologies are cloud computing and NFV.
Generally, the mentioned solutions are prepared to ensure that computing and networking
processes are extra automated and flexible to assist cloud and virtualized structures.
1026 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
whereby the entities between whom the data or money is transmitted, remain anonymous.
To exemplify, if Bob sends some data to Alice, no one will be able to know Bob nor
Alice, because the people in the Blockchain system are simply represented by codes, as
shown in Figure (6).
Blockchain is a technology that gives the authority to a person (or company) to transfer
assets of value to another person safely and without the interference of any intermediary.
Blockchain is a straightforward and innovative method to push through data between two
persons or entities in a completely automated and secure way. One of the parties
generating the transaction via generating a block which is confirmed via thousands,
possibly millions, of computers, and distributed throughout the network. Then, the
verified block is added to a stored chain within the network, which creates a unique record
1027 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
linked to other records. For a single record to be falsified, the entire series has to be
falsified on millions of computers. This is practically impossible.
From a technical perspective, a blockchain is just a chain of data blocks, hence the term
"blockchains". The terms "block" and "chain" in this context refer to digital information
(a block) stored in a public database (a chain).
The blocks that make up a blockchain consist of a set of digital data. It can be viewed as a
ledger that contains a collection of information related to specific financial transactions.
Once a block is completed, a new block is started to be opened, connected to the former
block, then attached to the chain. A block is permanent; once formed, it can in no way be
altered or changed. Block can generally be divided into two parts:
Block header: The header is made up of several components, such as the software
version number, the previous block hash code, the block registration date, transaction
amounts and other information, as shown in Figure (7).
Block body: The block body contains all the transactions installed in the block, in
addition to information about the people involved in the transactions. Instead of using real
names, transactions and purchases are recorded using a digital signature, which is more
like a user name, and requires no personal information.
Each block contains its own hash code that distinguishes it from the rest of the blocks; this
code is composed of a long string of letters and numbers for example
(0000000ddjyd6d6d87q2bnc024bs023g29ls73). Single block storage capacity can be up
to 1MB of data. This means that a single block can hold many thousands of transactions.
A blockchain may also consist of millions of blocks.
1028 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Another feature is the scale of security and privacy provided by this technology, which is
relatively good. Despite the fact that traditional financing systems owned by banks and
governmental entities do have a certain level of privacy and security, however, their
systems are vulnerable to breakthroughs as they have the risk of being penetrated.
Penetrating blockchain systems is somewhat impossible, as this would require the
alteration of the information and data of millions of devices that are distributed all over
the world.
As for the last feature, since blockchain users are dealing with digital currencies, this
technology guarantees a high level of secrecy and privacy. The users are only referred to
as encrypted codes within the system, and no one has the ability to uncover any piece of
1029 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
private information concerning other users. This can also be traced back to the fact that
this technology is managed through a decentralized system.
In fact, even the world's most powerful economists cannot predict the future of the
Blockchain technology’s eldest son, the digital currency. Yet, no one can deny that
Blockchain technology in general is a technology that deserves attention as it imposes
itself, in one way or another, onto the global stage, and cannot be ignored under any
circumstances.
Concerning the future predictions for this technology, the scene is not completely blurry.
In fact, there are several signs regarding the blockchain technology that can be used to
clarify the scene, as follows:
1030 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
In Blockchain, each block possesses a hash of the preceding block, whereby the latter is
described as the parent block to the existing block. In other words, the present block is
owned by the parent block and carries a hash from it. In case the data in the existing block
is altered, this will cause the hash of the block to be altered, and eventually influence the
former block. This explains why the present block should carry the address of the former
block.
In light of what has been mentioned and pointed out, the conclusion can be drawn that the
blockchain technology is not as complicated as it seems. They are actually similar to
databases but differ in two aspects: structurally and functionally. Databases tend to use
‘table’ data structures to save data, whereas blockchains save data in blocks. The figure
below illustrates the financial transaction utilizing a blockchain system.
a. Virtual Hashing
1031 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
continuously until a consensus arrives that permits the process of transaction to finish. At
any rate, which has not been reached, the transaction truly defeats.
b. Virtual Database
The same process or technology will also be applied to the ledger. In order to create a
virtual database and dispose of the equipment, a storage process is required as shown in
Figure 8 (part 2). The suggested framework in this survey can be summed up in three
phases, as shown in Figure (9).
1. The first phase includes building the private blockchain network based on a specific
environment that starts from (Identify a Suitable Use-case) to (Final Decision).
2. The second phase represents the stage of linking the blockchain with the cloud to apply
the services of NFV.
3. The last phase includes our novel work by virtualizing the hashing blocks and leger
(database of blockchain) through NFV.
1032 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Standardization Movements
So as to quicken NFV deployment, several official NFV movements have been executed
through Standard Development Organizations (SDOs), which are represented through
many terms like ETSI and OPNFV. Almost all executions achieved over certain SDOs are
open source, so in peer operators can acquire skills for further deployment. This will
eventually contribute to the development of NFV. Hence, we present the vitalities of
fundamental Standards Developing Organizations (SDOs) which are applied to NFV
sequentially.
It was primarily found by a study team on NFV during October 2012, which is referred to
as NFV ISG. During the same period, the initial report about the NFV, an in-depth report,
had been published via NFV ISG. With many members connecting in this team, the NFV
in-depth report had been modernized twice in October 2013 and 2014, respectively. One
magnificent success of ETSI NFV ISG was the achievement of the stage-one mission
which included 11 specifications published in the beginning of 2015. Moreover, the
stage-two mission of NFV dealt with many goals such as interoperability, whereas the
stage-three mission of NFV is yet under construction.
1033 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
In spite of the fact that the Open Networking Foundation (ONF) aims to quicken network
discovery by SDN, its inability ignores the notable concern which NFV might have on
futurity networking. Therefore, depending on the significant utility that NFV gives to the
economic or technology activity, ONF begins to monitor NFV via distributing a slight
solution whereby SDN can be utilized to enable the use of NFV. Next, ONF publishes a
technical paper that shows the full connection with SDN and NFV in brief based on the
view of infrastructure of networking.
The NFV Research Group (NFVRG) has been built through the Internet Research Task
Force (IRTF) to execute studies about NFV. The major purpose of NFVRG is to present a
general platform that enables researchers all across the globe to have the ability to
distribute and investigate their information regarding this novel study field. Additionally,
NFVRG further holds seminars or lessons at famous conferences.
As is known, the Function Chain Working Group (SFC WG) services are set up via the
(IETF) and concentrate on creating SFC structure in phases of SFC protocol specification,
and Service Function Path (SFP) estimation. Commonly, the knowledge of SFP is inserted
inside packet headers. Through utilizing that knowledge, SFC passage traffic could
comfortably be driven over essential functions of the network based on a regular approach
prior to arriving at the address. Additionally, administration with the safety of information
are further indoors the fields of SFC WG meanwhile the SFC structure is created.
e. OPNFV
OPNFV decreases the time to merge and distribute NFV physical components and
onboard VNF/CNFs to the ones that provide elements and run the platforms. The OPNFV
1034 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
groups do that through executing, testing, and deploying equipment for matching and
rendering the NFV environment in accordance with the industry reference design.
BBF is applied to improve the terms of the broadband network. Via offering NFV within
broadband networks, BBF has the ability to investigate extra solutions for service
chaining, in addition to a variety of service applications in broadband networks.
OVF (D.M.T.F., 2015) often described as Distributed Management Task Force (DMTF),
does not simply address issues related to virtual machine movement also allows managing
VNFs in a further electronic and defended mode.
3GPP Service and System Aspects Working Group 5 (3GPP SA5) aims to search possible
study phases about NFV. Additionally, 3GPP still runs with ETSI on increasing the
normalization of NFV reference subject terms. The unity party of the reference object is a
3GPP-defined object and the opposite party is a functional block described via ETSI.
1035 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Table 1 The network function virtualization calibration movements about various SDOs
Standards Developing Depiction Fields Goal in NFV
Organizations (SDOs)
Industry Specification Industry specification NFV NFV specification, structure,
Group (ISG) within the group based on NFV basic physical and use cases,
European Telecommunications MANO and virtual network
Standards Institute (ETSI) and function, secret and
NFV (ETSI, 2014) confidence, flexibility, and
service
effective quality.
Open networking foundation User-led organization SDN and OpenFlow. OpenFlow capable network
(ONF, 2012) SDN structure to promote the
solution of NFV, alliance type
in SDN and NFV
Internet Research Task Force, NFV research group NFV, SDN, T2T Policy depends on device
NFV, Research Group (IRTF, administration, VNF
2015) execution pattern, service
confirmation, confidence and
flexibility
Internet Engineering Task Service function chain NFV, SDN, Internet Policy structure is basic
Force, Service Function working group Protocol version 6 physical of NFV, device
Chaining Working Group management of service chain,
(IETF, 2015) confirmation of NFVI services
Open Platform NFV (L. Open development NFV First construction of NFVI
Foundation, 2014) process design that and VIM ingredient, evolving
aims to promote the VNF employment and use
evolution of NFV case depending measurement
Alliance for A forum for enterprise Network function Describing correlated use
Telecommunications Industry NFV advents virtualization, fifth case, structure and demands
Solution Network function generation such highlight the advantages
virtualization Forum (ATIS, technology, Internet of NFV in multi-
2015) of Things administrative area conditions
Forum of Broadband Industry organization Wide bandwidth of Cooperating with the ETSI to
(Mijumbi, R., et al., 2015) that concentrates on networks, Network channel completely
wide bandwidth of Function interoperable NFV solutions
networks Virtualization and NFV demonstration of
ideas
Distributed Management Task Packaging format for NFV with cloud NFV the basic physical
Force Open Virtualization programs and other administration, alliance among
Format (D.M.T.F, 2015) operating information ETSI and NFV
to operate in virtual
mediums
Third generation partnership Telecom administration Radio access network In collaboration with ETSI on
project in addition to the working group about the administration of virtual
System Aspects Working 3rd generation partnership
3rd generation
Group 5 (3GPP, 2015) project network functions
partnership project
1036 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
This section starts off by analyzing the current studies and determining the necessity and
motivation for this survey. Subsequently, the fundamental classification or distribution
and collection of literature works is reviewed.
NVF, Blockchain, have exclusively attracted observation from the research population.
But, there has been a quite poor attempt to study the novel which joins them. Table 1
prepares studies that have before been prepared, also are relevant to the work in this
survey. It is significant to see that most considerable of them only study or search for a
particular technology.
(Vineel Anvith, P., et al., 2019) examined the NFV technology and pointed out its
features and technology-enabled advantages, and dealt with multiple cases and
difficulties. The SDN technology and its combination with the NFV architecture are also
presented in this survey paper. However, (Yi, B., et al., 2018) presented a comprehensive
study on the applications and issues in NFV. They clarify the principal theories of NFV in
terms of terminology, calibration, and historical events, and the manner of NFV deviates
from the common middle-box based on the network. Then, the official NFV structure is
presented utilizing a bottom-up strategy, depending on which the identical utilized
problems and answers are also demonstrated. Lastly, to quicken the NFV deployment and
dodge traps so far as potential, they view the difficulties met by NFV and the stream for
future trends.
(Zhang, T., 2020) offers a wide survey on NFV platform configuration. His search
targeted current NFV platform applications. He started from the architectural design of the
regular source NFV environment and offered his taxonomy of current NFV environments
based on the primary object of design. Next, he completely examines the design space and
develops the implementation options every structure opts for.
The contribution of (Linguaglossa, L., et al., 2019) goes in two directions. First, they
present a general survey of the hierarchical communications system managed through a
primary computer Network Function Virtualization (NFV) ecosystem, including a wide
domain of technologies, beginning of low-level hardware speedup and bump-in-the-wire
ways towards high-level software speedup clarifications, which include the virtualization
mechanism itself. Second, they draw conclusions upon the principles concerning the
1037 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
design, improvement, and process of NFV-based deployments which reach the elasticity
and capacity to be changed in scale demands of the current connection of networks.
(Yang, W., & Fung, C., 2016) paid attention to the security aspect through their work, and
presented a view on the difficulties and events in NFV security. Also, they specify the
architecture of NFV design and many possible NFV security problems and challenges.
They additionally offer existing NFV security clarifications and results, and further
studied the NFV security usage problems and investigate promising analysis trends in this
field.
Some researchers give one of the applications of NFV as another modern choice learning
tool for computer network sessions. Beyond the conducted tests, the proposed
implementation is capable to meet the effective demands of the computer network
courses. Furthermore, the test outcomes indicate that the execution parameters are
growing forward with the increase of the number of users in a reasonable way.
(Li, J., et al.,2019) suggest that one environment is subsequent a highest-lowermost the
way. Also, they split the work into three interactive layers: the first one is the application
layer (such as services of Operation Support System), the second is called control layer
(such as the SDN controller with the DOS), and the last one is the infrastructure layer
(i.e. tools of Internet of Things).
(Balon, M., & Liau, B., 2012) suggested a pattern for strong security and network
execution administration. They exhibit a use-case to develop a special MVNO (Mobile
Virtual Network Operator) virtualized, that can facilely be extended and scaled for large
capacity passage traffic and a number of users. Additionally, they consider the diverse
elements and enabling factors of MVNO networks, and provide a benefit-cost analysis of
utilizing MVNO.
(Kuribayashi, S. I., 2019) suggested a deployment algorithm of the virtual firewall with
virtual routing functions for reducing the cost of the network. Finally, some works
proposed virtualization strategy to treat the difficulties in the current DLT systems.
However, they are reviewed with regards to Wireless sensor network virtualization.
1038 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
1039 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
The modernity of this topic in addition to the combination of NFV and blockchain in one
work provides numerous benefits, which additionally produce various problems that
require to be fixed to achieve the complete advantages of these technologies. This part
presents a review of future researches and works on the use of NFV with blockchain
technology. In addition, Table (2) presents a review of the related studies and contribution
regarding this work.
NFV separates the network into parts that can work on ready systems. Ensuring the
security of those parts requires embedded protection. As the network parts are virtualized,
NFV networks include a standard idea that does not resemble common networks. There is
some complication about the virtual machine monitor (VMM), associated controls, and
procedures for transmitting data, in addition to the boundaries between the virtual and
hardware parts in networks. Although using NFV as a tool with some environments may
enhance the NFV security through using encoding information (encryption), immutability,
Tamper-evident of these environments like (blockchain), yet the security in NFV remains
one of the main difficulties and challenges in executing such an effective and powerful
technology. With the growing number of choices for NFV tools in many applications,
there is an increasing direction towards solving some challenges in terms of security. It is
rather challenging for a number of reasons, including hypervisor dependencies, flexible
network boundaries, and the scalability of available resources. Other significant
challenges include unauthorized access and leakage of data, for which it is recommended
that virtual machines are used for controls of authentication as a solution.
So far, blockchain has received much attention in many fields, but, it additionally is
remarkable difficulties and challenges need to be overcome, such as the majority attack.
This takes place whenever the available resources are attacked to achieve a specific
purpose with the correlative evaluation of the capabilities. Such majority attack could be
best faced by obtaining the highest rating or feasibility whenever most transactions
exceeded the block reward. In addition, the network hash rate was lower with marked
variation and prone to reorganization with a new approach of mining. Other issues involve
fork problems (related to decentralized node version troubles), and scale of blockchain.
When the blockchain increases in growth, the data grows larger, and the operations
(loading of store and computing) additionally become harder. Therefore, lots of time is
1040 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
required for data synchronization, which forms a huge problem to the user when running
the system.
The difficulty of deploying VNFs for many users is the fact that it needs a high-efficiency
distribution of any package flow that comes behind the distribution of the flow to the
required VNFs applicable to the service.
The common data based on blockchain (e.g. Bitcoin) has a fixed size. This small size of
data has become a source of anxiety for delays obtained via transactions. To build things
more critical, the universality of options of third-party validations has been directed to the
more rapid extension of the blockchain.
The problems of blockchain scalability may be classified into three divisions: storage
space, cost-of scalability, and reaching distinct output-with-scalability. Now, the fixed
block volume of the blockchain blocks turns out the greatest impasse. Blockchains are
obverse to an increase in pausing time demanded by transactions because of the small
block volume. Furthermore, for blocks with a short block creation time, several forks are
noticed to be built through the waiting time duration of the former block. This indicates
that the block creation time duration should never be decreased arbitrarily. Consequently,
the blockchain output seems not to increase properly. Blockchain users have to spend
money on the transaction cost that occurs. It becomes onerous to micropayments and
eventually affects the blockchain. Lastly, besides the development in size application and
the extension of blocks, the chain expands and needs storage, therefore, the memory
becomes a problem.
Virtualization has performed a primary part in labeling different difficulties in the fields
of IT. Typically, virtualization indicates mechanizations created to present an abstraction
of essential resources (for example, storage). Through producing a logical design of
resources, instead of a hardware design, virtualization remarkably develops the
1041 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Recently, the great growth of crypto-currencies DLTs such as blockchain has raised
significant attention. A virtualized Distributed Ledger Technology is an operative block
inside the network base which includes clear external interfaces and a clear functional
role. Consequently, a virtualize DLT as a function implies the execution of NFVs which
are used in virtual devices (VM). Significant network issues are faced considering the
shift from the actual infrastructure to NFV-based solutions. The departure of functionality
from the location additionally generates the issue of efficiently putting the virtual
appliances, so as to dynamically create an instance on request. Another aspect to point out
is the time needed to discover and overcome failures in the database of blockchain. As
part of the future works, it is suggested that the process will involve the execution of
multiple DLTs in the main ledger and in the cloud.
Conclusion
This survey offered a comprehensive study of NFV which covers its basic parts, the
fundamental ideas of NFV (including motivations, technologies, applications, and
structures), its difficulties, and future trends. In particular, the NFV architecture is
proposed in a simple approach so as highlight its main benefits. Moreover, the
1042 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
combination of NFV, IoT, and SDN have clarified a direction to network softwarization.
This process ensure the flexible performance of services so as to quicken the time to get to
the market in providing clients new NFV services. Finally, a novel architecture is
proposed for a blockchain virtualization system that includes building a virtual hash in
addition to virtual leger.
References
Medhat, A.M., Taleb, T., Elmangoush, A., Carella, G.A., Covaci, S., & Magedanz, T. (2016).
Service function chaining in next generation networks: State of the art and research
challenges. IEEE Communications Magazine, 55(2), 216-223.
Li, J., Altman, E., & Touati, C. (2015). A general SDN-based IoT framework with NVF
implementation. ZTE communications, 13(3), 42-45.
Ojo, M., Adami, D., & Giordano, S. (2016). A SDN-IoT architecture with NFV
implementation. In IEEE Globecom Workshops (GC Wkshps), 1-6.
Du, P., Putra, P., Yamamoto, S., & Nakao, A. (2016). A context-aware IoT architecture
through software-defined data plane. In IEEE Region 10 Symposium (TENSYMP),
315-320.
Rebello, G.A.F., Alvarenga, I.D., Sanz, I.J., & Duarte, O.C.M. (2019). BSec-NFVO: A
blockchain-based security for network function virtualization orchestration. In ICC
2019-2019 IEEE International Conference on Communications (ICC), 1-6.
Massonet, P., Deru, L., Achour, A., Dupont, S., Croisez, L.M., Levin, A., & Villari, M. (2017).
Security in lightweight network function virtualisation for federated cloud and IoT.
In IEEE 5th International Conference on Future Internet of Things and Cloud
(FiCloud), 148-154.
Gkioulos, V., Gunleifsen, H., & Weldehawaryat, G.K. (2018). A systematic literature review
on military software defined networks. Future Internet, 10(9), 88.
Gunleifsen, H., Gkioulos, V., & Kemmerich, T. (2018). A tiered control plane model for
service function chaining isolation. Future Internet, 10(6), 46.
Abbasi, A.A., & Jin, H. (2018). v-Mapper: an application-aware resource consolidation scheme
for cloud data centers. Future Internet, 10(9), 90.
Leivadeas, A., Kesidis, G., Ibnkahla, M., & Lambadaris, I. (2019). Vnf placement optimization
at the edge and cloud. Future Internet, 11(3), 69.
Eramo, V., Lavacca, F.G., Catena, T., Polverini, M., & Cianfrani, A. (2019). Effectiveness of
Segment Routing Technology in Reducing the Bandwidth and Cloud Resources
Provisioning Times in Network Function Virtualization Architectures. Future
Internet, 11(3), 71.
Yao, J., Han, Z., Sohail, M., & Wang, L. (2019). A robust security architecture for SDN-based
5G networks. Future Internet, 11(4), 85.
Jiang, J.W., Lan, T., Ha, S., Chen, M., & Chiang, M. (2012). Joint VM placement and routing
for data center traffic engineering. In Proceedings IEEE INFOCOM, 2876-2880.
1043 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021
Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K., & Shi, G. (2012). Design and implementation
of a consolidated middlebox architecture. In 9th {USENIX} Symposium on Networked
Systems Design and Implementation ({NSDI} 12), 323-336.
L. Foundation, (2014), Open platform for NFV. https://www.opnfv.org.
IRTF, (2015) Network function virtualization research group (NFVRG). https://irtf.org
IETF, (2015) Service function chaining working group.
https://datatracker.ietf.org/wg/sfc/charter/
ATIS. (2015). Network functions virtualization forum. http://www.atis.org
Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., & Boutaba, R. (2015).
Network function virtualization: State-of-the-art and research challenges. IEEE
Communications surveys & tutorials, 18(1), 236-262.
D.M.T.F. (DMTF). (2015). Open virtualization format (OVF).
http://www.dmtf.org/standards/ovf
The 3rd generation partnership project (3GPP), 2015.
http://www.3gpp.org/about-3gpp/about-3gpp
ETSI, (2014), Network function virtualisation-white paper3, SDN and open flow world
congress, Dusseldorf, Germany, http://portal.etsi.org/NFV/NFV_White_Paper3.pdf.
ONF, (2012), Software-defined networking: The new norm for networks.
https://www.opennetworking.org/
Vineel Anvith, P., Gunavathi, N., Malarkodi, B., & Rebekka, B. (2019). A Survey on Network
Functions Virtualization for Telecom Paradigm. In TEQIP III Sponsored International
Conference on Microwave Integrated Circuits, Photonics and Wireless Networks
(IMICPW), 302-306.
Yi, B., Wang, X., Li, K., & Huang, M. (2018). A comprehensive survey of network function
virtualization. Computer Networks, 133, 212-262.
Zhang, T. (2020). Nfv platform design: A survey. arXiv e-prints, arXiv-2002.
Linguaglossa, L., Lange, S., Pontarelli, S., Rétvári, G., Rossi, D., Zinner, T., & Bianchi, G.
(2019). Survey of performance acceleration techniques for network function
virtualization. Proceedings of the IEEE, 107(4), 746-764.
Yang, W., & Fung, C. (2016). A survey on security in network functions virtualization.
In IEEE NetSoft Conference and Workshops (NetSoft), 15-19.
Alwakeel, A.M., Alnaim, A.K., & Fernandez, E.B. (2018). A survey of network function
virtualization security. In SoutheastCon, 1-8.
Kuribayashi, S.I. (2019). Allocation of Virtual Firewall Functions in NFV-Based Networks
with Minimum Network Cost. International Journal of Computer Networks &
Communications (IJCNC), 11(2).
Li, J., Altman, E., & Touati, C. (2015). A general SDN-based IoT framework with NVF
implementation. ZTE communications, 13(3), 42-45.
Balon, M., & Liau, B. (2012). Mobile virtual network operator. In 15th International
Telecommunications Network Strategy and Planning Symposium (NETWORKS), 1-6.
Seyyed Hosseini, S., Asemi, A., Shabani, A., & Cheshmeh Sohrabi, M. (2017). Scientific
publication behavior versus information seeking behavior: An infodemiological study on
stomach cancer. Webology, 14(1), 21-31.
1044 http://www.webology.org
View publication stats