scholarly journals Enabling IoT Network Slicing with Network Function Virtualization

2020 ◽  
Vol 10 (03) ◽  
pp. 17-35
Author(s):  
Ting-An Tsai ◽  
Fuchun Joseph Lin
Informatics ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 13
Author(s):  
Konstantinos Papadakis-Vlachopapadopoulos ◽  
Ioannis Dimolitsas ◽  
Dimitrios Dechouniotis ◽  
Eirini Eleni Tsiropoulou ◽  
Ioanna Roussaki ◽  
...  

With the advent of 5G verticals and the Internet of Things paradigm, Edge Computing has emerged as the most dominant service delivery architecture, placing augmented computing resources in the proximity of end users. The resource orchestration of edge clouds relies on the concept of network slicing, which provides logically isolated computing and network resources. However, though there is significant progress on the automation of the resource orchestration within a single cloud or edge cloud datacenter, the orchestration of multi-domain infrastructure or multi-administrative domain is still an open challenge. Towards exploiting the network service marketplace at its full capacity, while being aligned with ETSI Network Function Virtualization architecture, this article proposes a novel Blockchain-based service orchestrator that leverages the automation capabilities of smart contracts to establish cross-service communication between network slices of different tenants. In particular, we introduce a multi-tier architecture of a Blockchain-based network marketplace, and design the lifecycle of the cross-service orchestration. For the evaluation of the proposed approach, we set up cross-service communication in an edge cloud and we demonstrate that the orchestration overhead is less than other cross-service solutions.


The traditional network is configured based on the prescribed network requirements. Sometimes the resources of the network are underutilized and at sometimes there may resource starvation because of the static configuration of the network. As against traditional network, which is operated either as dedicated network or as an overlay network, network services can be operated over a shared network infrastructure. Thus maximum resource utilization under minimal infrastructure cost can be achieved. The on-demand network requirement can be configured dynamically using network slice. The backbone of the rapidly evolving 5G technology is network slice and service networks can be benefited from it. Different network function for multiple tenants can be enabled customized using network slice with each slice operating independently. Network slice can be offered as a service to meet various requirements from the network slice tenant with different granularities. The Software Defined Networking and Network Function Virtualization are the enabling technologies for network slice. This paper discusses various network slicing use case requirements. And also OpenFlow based software defined network environment is simulated to validate the discussions. Experimental results show that the efficiency of the service network is maximized with improved reliability of service


2019 ◽  
Author(s):  
Gabriel Antonio F. Rebello ◽  
Gustavo Camilo ◽  
Leonardo Silva ◽  
Lucas Guimarães ◽  
Lucas Airam C. de Souza ◽  
...  

As tecnologias de fatiamento da rede (Network Slicing), virtualização de funções de rede (Network Function Virtualization - NFV) e redes definidas por software (Software-Defined Networking - SDN) proveem serviços fim-a-fim ágeis e sob demanda. A identificação de uma função virtual defeituosa torna-se obrigatória, pois serviços alocam recursos em um ambiente distribuído e sem confiança entre os pares composto por múltiplos inquilinos e provedores de serviço concorrentes. Este artigo propõe e desenvolve uma arquitetura baseada em correntes de blocos para prover auditabilidade às operações de orquestração de fatias de rede. Um protótipo de um caso de uso foi desenvolvido e implementado utilizando a plataforma Hyperledger Fabric na qual cada fatia de rede opera sobre um canal isolado. Os resultados mostram que é possível prover segurança à criação de fatias de rede, mas que a obtenção de consenso e o número de transações requeridas pelas fatias de rede são um grande desafio.


2018 ◽  
Vol 246 ◽  
pp. 03028
Author(s):  
Qi He ◽  
Yunxia Ju ◽  
Jianguo Wang ◽  
Gang Zhao ◽  
Haiyong Qin ◽  
...  

In the upcoming fifth-generation (5G) ecosystem, the delivery of a variety of personalized services is envisioned. With the development of software-defined networks and network function virtualization technologies, networks display increasingly flexible features, such as programmability. Network slicing is a state-of-the-art technology that provides services tailored to the specific demands of users, such as smart grids and e-health applications. In this article, we introduce the network slicing concept and its application and discuss related work. In addition, we propose an architecture for network slicing by combining software-defined networks and network function virtualization technologies. Finally, we note important challenges and open issues in the development and application of these technologies.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1342
Author(s):  
Borja Nogales ◽  
Miguel Silva ◽  
Ivan Vidal ◽  
Miguel Luís ◽  
Francisco Valera ◽  
...  

5G communications have become an enabler for the creation of new and more complex networking scenarios, bringing together different vertical ecosystems. Such behavior has been fostered by the network function virtualization (NFV) concept, where the orchestration and virtualization capabilities allow the possibility of dynamically supplying network resources according to its needs. Nevertheless, the integration and performance of heterogeneous network environments, each one supported by a different provider, and with specific characteristics and requirements, in a single NFV framework is not straightforward. In this work we propose an NFV-based framework capable of supporting the flexible, cost-effective deployment of vertical services, through the integration of two distinguished mobile environments and their networks: small sized unmanned aerial vehicles (SUAVs), supporting a flying ad hoc network (FANET) and vehicles, promoting a vehicular ad hoc network (VANET). In this context, a use case involving the public safety vertical will be used as an illustrative example to showcase the potential of this framework. This work also includes the technical implementation details of the framework proposed, allowing to analyse and discuss the delays on the network services deployment process. The results show that the deployment times can be significantly reduced through a distributed VNF configuration function based on the publish–subscribe model.


2021 ◽  
Vol 13 (1) ◽  
pp. 12
Author(s):  
Juan Wang ◽  
Yang Yu ◽  
Yi Li ◽  
Chengyang Fan ◽  
Shirong Hao

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network policies and leaking sensitive processing states, due to running in a shared open environment and lacking the protection of proprietary hardware. Currently, Intel® Software Guard Extensions (SGX) provides a promising way to build a secure and trusted VNF (virtual network function) by isolating VNF or sensitive data into an enclave. However, directly placing multiple VNFs in a single enclave will lose the scalability advantage of NFV. This paper combines SGX and click technology to design the virtual security function architecture based on multiple enclaves. In our design, the sensitive modules of a VNF are put into different enclaves and communicate by local attestation. The system can freely combine these modules according to user requirements, and increase the scalability of the system while protecting its running state security. In addition, we design a new hot-swapping scheme to enable the system to dynamically modify the configuration function at runtime, so that the original VNFs do not need to stop when the function of VNFs is modified. We implement an IDS (intrusion detection system) based on our architecture to verify the feasibility of our system and evaluate its performance. The results show that the overhead introduced by the system architecture is within an acceptable range.


Sign in / Sign up

Export Citation Format

Share Document