scispace - formally typeset
Search or ask a question

Showing papers on "Virtual network published in 2014"


Proceedings ArticleDOI
01 Dec 2014
TL;DR: In this paper, the authors define a model for formalizing the chaining of network functions using a context-free language, and describe the mapping as a Mixed Integer Quadratically Constrained Program (MIQCP) for finding the placement of the network functions and chaining them together considering the limited network resources and requirements of the functions.
Abstract: Network appliances perform different functions on network flows and constitute an important part of an operator’s network. Normally, a set of chained network functions process network flows. Following the trend of virtualization of networks, virtualization of the network functions has also become a topic of interest. We define a model for formalizing the chaining of network functions using a context-free language. We process deployment requests and construct virtual network function graphs that can be mapped to the network. We describe the mapping as a Mixed Integer Quadratically Constrained Program (MIQCP) for finding the placement of the network functions and chaining them together considering the limited network resources and requirements of the functions. We have performed a Pareto set analysis to investigate the possible trade-offs between different optimization objectives.

471 citations


Proceedings ArticleDOI
01 Nov 2014
TL;DR: This paper presents and evaluates a formal model for resource allocation of virtualized network functions within NFV environments, a problem it refers to as Virtual Network Function Placement (VNF-P), and evaluates its execution speed.
Abstract: Network Functions Virtualization (NFV) is an upcoming paradigm where network functionality is virtualized and split up into multiple building blocks that can be chained together to provide the required functionality. This approach increases network flexibility and scalability as these building blocks can be allocated and reallocated at runtime depending on demand. The success of this approach depends on the existence and performance of algorithms that determine where, and how these building blocks are instantiated. In this paper, we present and evaluate a formal model for resource allocation of virtualized network functions within NFV environments, a problem we refer to as Virtual Network Function Placement (VNF-P). We focus on a hybrid scenario where part of the services may be provided by dedicated physical hardware, and where part of the services are provided using virtualized service instances. We evaluate the VNF-P model using a small service provider scenario and two types of service chains, and evaluate its execution speed. We find that the algorithms finish in 16 seconds or less for a small service provider scenario, making it feasible to react quickly to changing demand.

461 citations


Proceedings ArticleDOI
04 Jun 2014
TL;DR: This paper focuses on study and evaluation of SDN emulation tool called Mininet, and suggests that the capacity of rapid and simplified prototyping, the ensuring applicability, the possibility of sharing results and tools at zero cost are positive factors that help scientists boost their researches.
Abstract: Software-Defined Networks (SDNs) represents an innovative approach in the area of computer networks, since they propose a new model to control forwarding and routing data packets that navigate the World Wide Web. Since research on this topic is still in progress, there are not many devices such as routers and switches that implement SDN functionalities; moreover, the existing ones are very expensive. Thus, in order to make researchers able to do experiments and to test novel features of this new paradigm in practice at a low financial cost, one solution is to use virtual network emulators. As a result, this paper focuses on study and evaluation of SDN emulation tool called Mininet. Initial tests suggested that the capacity of rapid and simplified prototyping, the ensuring applicability, the possibility of sharing results and tools at zero cost are positive factors that help scientists boost their researches despite the limitations of the tool in relation to the performance fidelity between the simulated and the real environment. After presenting some concepts of this paradigm, the purpose of its appearance, its elements and how it works, some net prototypes are created to better understand the Mininet tool and an evaluation is done to demonstrate its advantages and disadvantages.

313 citations


Proceedings ArticleDOI
05 May 2014
TL;DR: An architecture based on an orchestrater that ensures the automatic placement of the virtual nodes and the allocation of network services on them is described, supported by a monitoring system that collects and reports on the behaviour of the resources.
Abstract: This paper addresses the problem of managing highly dynamic network and service environments, where virtual nodes and virtual links are created and destroyed depending on traffic volumes, service requests, or high-level goals such as reduction in energy consumption. This problem will be one of the main technical challenges to be faced in the evolution towards Future Networks (FN). Emerging paradigms such as Software Defined Networks (SDN) and Network Function Virtualization (NfV) are concrete steps towards infrastructures where network functions and services will be executed as applications in ensembles of virtual machines (VMs) hosted in pervasive standard hardware resources located across a network. The paper argues that in order to manage these virtual infrastructures there is a need to introduce high-level systems orchestration. The paper describes an architecture based on an orchestrater that ensures the automatic placement of the virtual nodes and the allocation of network services on them, supported by a monitoring system that collects and reports on the behaviour of the resources. The orchestrater manages the creation and removal of the virtual nodes, as well as configuring, monitoring, running and stopping software on them. As a proof of these concepts, a distributed orchestrater prototype has been designed, implemented and tested with the results of different placement algorithms presented.

218 citations


Patent
31 Oct 2014
TL;DR: In this article, an apparatus and method for steering and load balancing mobile network traffic with user session awareness from multiple control and user plane protocols while understanding the load on the corresponding physical or virtual servers in cloud and virtual deployments is disclosed.
Abstract: An apparatus and method for steering and load-balancing mobile network traffic with user session awareness from multiple control and user plane protocols while understanding the load on the corresponding physical or virtual servers in cloud and virtual deployments is disclosed. This traffic could be monitored traffic, such as from optical taps, or network probes of mobile network interfaces, or port mirrors from network devices, or inline traffic when the load-balancer is logically placed inline in the network before the Virtual Network Functions, such as Virtual SGW (vSGW), Virtual SGSN (vSGSN), Virtual PGW (vPGW), Virtual MME (vMME), or Virtual Performance Enhancing proxy(vPEP). The apparatus and methods identified herein allow additional capabilities, such as ensuring that both directions of a protocol flow target the same physical or virtual server, or both control plane and user plane protocols of a flow are forwarded to the same server.

179 citations


Proceedings ArticleDOI
17 Aug 2014
TL;DR: This work presents CloudMirror, a solution that provides bandwidth guarantees to cloud applications based on a new network abstraction and workload placement algorithm that efficiently meets bandwidth requirements specified by TAGs while factoring in high availability considerations.
Abstract: Providing bandwidth guarantees to specific applications is becoming increasingly important as applications compete for shared cloud network resources. We present CloudMirror, a solution that provides bandwidth guarantees to cloud applications based on a new network abstraction and workload placement algorithm. An effective network abstraction should enable applications to easily and accurately specify their requirements, while simultaneously enabling the infrastructure to provision resources efficiently for deployed applications. Prior research has approached the bandwidth guarantee specification by using abstractions that resemble physical network topologies. We present a contrasting approach of deriving a network abstraction based on application communication structure, called Tenant Application Graph or TAG. CloudMirror also incorporates a new workload placement algorithm that efficiently meets bandwidth requirements specified by TAGs while factoring in high availability considerations. Extensive simulations using real application traces and datacenter topologies show that CloudMirror can handle 40% more bandwidth demand than the state of the art (e.g., the Oktopus system), while improving high availability from 20% to 70%.

145 citations


Patent
29 Dec 2014
TL;DR: In this paper, the packets are encapsulated by a virtual network overlay header and forwarded through the service function instances in an SFC, which will prompt the network nodes to re-route the packets in the traffic flow using destination based forwarding or path based forwarding method in the packet network as well as an SDN controller and/or in-band control plane, and can carry the metadata with the packets.
Abstract: Service function chaining is a sequence of service function instances that traffic flows need to traverse through in order. Those service function instances are not required to reside on the direct path and traffic flow, but steered through network nodes. Service function instances and network nodes process the packets that carry a service function chain (SFC) header. The packets are encapsulated by a virtual network overlay header and forwarded through the service function instances in an SFC. The SFC header in specific format will prompt the network nodes to re-route the packets in the traffic flow using destination based forwarding or path based forwarding method in the packet network as well as an SDN controller and/or in-band control plane, and able to carry the metadata with the packets.

132 citations


Patent
21 Feb 2014
TL;DR: A secure virtual network platform connects two or more different or separate network domains as discussed by the authors, and when a data packet is received at an end point in one network domain, a determination is made as to whether the data packet should be forwarded outside the VN platform, or transmitted via the virtual network to a destination in another network domain connected by the VM.
Abstract: A secure virtual network platform connects two or more different or separate network domains. When a data packet is received at an end point in one network domain, a determination is made as to whether the data packet should be forwarded outside the virtual network platform, or transmitted via the virtual network to a destination in another network domain connected by the virtual network platform.

125 citations


Patent
10 Apr 2014
TL;DR: In this paper, a software defined topology (SDT) component is configured to determine a data plane logical topology indicating a plurality of selected nodes and a logical architecture connecting the selected nodes.
Abstract: Embodiments are provided for implementing control plane functionality to configure a data plane at a plurality of network nodes. A software defined topology (SDT) component is configured to determine a data plane logical topology indicating a plurality of selected nodes and a logical architecture connecting the selected nodes. The data plane logical topology enables traffic delivery for a service or virtual network for an end-customer or operator. A software defined networking (SDN) component is configured to interact with the SDT component and map the data plane logical topology to a physical network. The mapping includes allocating network nodes including the selected nodes and network resources which enable communications for the service or virtual network and meet QoS requirement. A software defined protocol (SDP) component is configured to interact with the SDN and define data plane protocol and process functionality for the network nodes.

124 citations


Journal ArticleDOI
TL;DR: An energy cost model is proposed and two efficient energy-aware virtual network embedding algorithms are proposed: a heuristic-based algorithm and a particle-swarm-optimization-technique- based algorithm.
Abstract: Virtual network embedding, which means mapping virtual networks requested by users to a shared substrate network maintained by an Internet service provider, is a key function that network virtualization needs to provide. Prior work on virtual network embedding has primarily focused on maximizing the revenue of the Internet service provider and did not consider the energy cost in accommodating such requests. As energy cost is more than half of the operating cost of the substrate networks, while trying to accommodate more virtual network requests, minimizing energy cost is critical for infrastructure providers. In this paper, we make the first effort toward energy-aware virtual network embedding. We first propose an energy cost model and formulate the energy-aware virtual network embedding problem as an integer linear programming problem. We then propose two efficient energy-aware virtual network embedding algorithms: a heuristic-based algorithm and a particle-swarm-optimization-technique-based algorithm. We implemented our algorithms in C++ and performed side-by-side comparison with prior algorithms. The simulation results show that our algorithms significantly reduce the energy cost by up to 50% over the existing algorithm for accommodating the same sequence of virtual network requests.

118 citations


Patent
24 Feb 2014
TL;DR: In this paper, the authors present a method of managing virtual network functions for a network, the method including providing a virtual network function (VNF) including a number of virtual-network function components (VNFCs) of a many different types, each VNFC comprising a virtual machine (VM) executing application software.
Abstract: A method of managing virtual network functions for a network, the method including providing a virtual network function (VNF) including a number of virtual network function components (VNFCs) of a number of different types, each VNFC comprising a virtual machine (VM) executing application software. The method further includes creating for up to all VNFC types a number of deactivated VMs having application software, monitoring at least one performance level of the VNF, and scaling-out the VNF by activating a number of deactivated VMs of a number of VNFC types when the at least one performance level reaches a scale-out threshold.

Patent
01 Oct 2014
TL;DR: In this paper, the authors present a system and methods for the migration of complex computer applications and the workloads comprising them between physical, virtual, and cloud servers that span a hybrid cloud environment comprising private local and remote customer data centers and public cloud data centers, without modification to the applications, their operational environments, or user access procedures.
Abstract: A system and methods for the migration of complex computer applications and the workloads comprising them between physical, virtual, and cloud servers that span a hybrid cloud environment comprising private local and remote customer data centers and public cloud data centers, without modification to the applications, their operational environments, or user access procedures. A virtual network manager securely extends the subnets and VLANS within the customer's various data center across the distributed, hybrid environment using overlay networks implemented with virtual network appliances at nodes of the overlay network. A server migrater migrates individual workloads of servers used by the complex application from one pool of server resources to another. A migration manager application provides a control interface, and also maps and manages the resources of the complex application, the hybrid environment, and the virtual network spanning the hybrid cloud environment.

Journal ArticleDOI
TL;DR: An opportunistic resource sharing-based mapping framework, ORS, where substrate resources are opportunistically shared among multiple virtual networks, and it is proved that ORS provides a more efficient utilization of substrate resources than two state-of-the-art fixed-resource embedding schemes.
Abstract: Network virtualization has emerged as a promising approach to overcome the ossification of the Internet. A major challenge in network virtualization is the so-called virtual network embedding problem, which deals with the efficient embedding of virtual networks with resource constraints into a shared substrate network. A number of heuristics have been proposed to cope with the NP-hardness of this problem; however, all of the existing proposals reserve fixed resources throughout the entire lifetime of a virtual network. In this paper, we re-examine this problem with the position that time-varying resource requirements of virtual networks should be taken into consideration, and we present an opportunistic resource sharing-based mapping framework, ORS, where substrate resources are opportunistically shared among multiple virtual networks. We formulate the time slot assignment as an optimization problem; then, we prove the decision version of the problem to be NP-hard in the strong sense. Observing the resemblance between our problem and the bin packing problem, we adopt the core idea of first-fit and propose two practical solutions: first-fit by collision probability (CFF) and first-fit by expectation of indicators' sum (EFF). Simulation results show that ORS provides a more efficient utilization of substrate resources than two state-of-the-art fixed-resource embedding schemes.

Patent
10 Feb 2014
TL;DR: In this article, the authors present a virtual network abstraction for multi-tenant datacenters, where a request for resources received at a datacenter from a tenant comprises a number of virtual machines and a performance requirement, such as a bandwidth requirement, specified by the tenant.
Abstract: Methods of offering network performance guarantees in multi-tenant datacenters are described. In an embodiment, a request for resources received at a datacenter from a tenant comprises a number of virtual machines and a performance requirement, such as a bandwidth requirement, specified by the tenant. A network manager within the datacenter maps the request onto the datacenter topology and allocates virtual machines within the datacenter based on the available slots for virtual machines within the topology and such that the performance requirement is satisfied. Following allocation, stored residual capacity values for elements within the topology are updated according to the new allocation and this updated stored data is used in mapping subsequent requests onto the datacenter. The allocated virtual machines form part of a virtual network within the datacenter which is allocated in response to the request and two virtual network abstractions are described: virtual clusters and virtual oversubscribed clusters.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: CoordVNF is proposed, a heuristic method to coordinate the composition of VNF chains and their embedding into the substrate network that aims to minimize bandwidth utilization while computing results within reasonable runtime.
Abstract: Network Functions Virtualization (NFV) is an emerging initiative to overcome increasing operational and capital costs faced by network operators due to the need to physically locate network functions in specific hardware appliances. In NFV, standard IT virtualization evolves to consolidate network functions onto high volume servers, switches and storage that can be located anywhere in the network. Services are built by chaining a set of Virtual Network Functions (VNFs) deployed on commodity hardware. The implementation of NFV leads to the challenge: How several network services (VNF chains) are optimally orchestrated and allocated on the substrate network infrastructure? In this paper, we address this problem and propose CoordVNF, a heuristic method to coordinate the composition of VNF chains and their embedding into the substrate network. CoordVNF aims to minimize bandwidth utilization while computing results within reasonable runtime.

Patent
23 Jul 2014
TL;DR: A secure virtual network platform connects two or more subnets in different or separate network domains as discussed by the authors, which can use the under layer physical networks in various domains as an IP forwarding fabric without changing any existing firewalls, security settings, or network topology.
Abstract: A secure virtual network platform connects two or more subnets in different or separate network domains. The secure virtual network can use the under layer physical networks in various domains as an IP forwarding fabric without changing any existing firewalls, security settings, or network topology. A first type of connection across the virtual network involves connecting server groups. A second type of connection across the virtual network involves connecting a server group to a physical network. A third type of connection across the virtual network involves connecting a physical network to another physical network.

Patent
29 Aug 2014
TL;DR: In this article, the authors present an information technology (IT) services management system comprising instructions that cause the at least one processor to execute a controller, which is further programmed to instantiate a virtual service container at a service hub.
Abstract: An information technology (IT) services management system comprising instructions that cause the at least one processor to execute a controller. The controller may be programmed to communicate with at least one virtual service container, wherein the controller is further programmed to instantiate a virtual service container at a service hub. Instantiating the virtual service container may comprise sending to a service hub an instruction to instantiate a virtual service container; receiving an indication of a secure connection between the controller and the virtual service container; receiving from the virtual service container a request for a virtual service container configuration; verifying an identity of the virtual service container; and providing the virtual service container with a virtual service container configuration, wherein the virtual service container configuration indicates at least one Virtual network service to be provided to a managed component by the virtual service container.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: This work presents quantitative and qualitative performance results of Open vSwitch in scenarios involving physical and virtual network interfaces and provides insights into the performance properties by systematically conducting measurements in virtual switching setups.
Abstract: Virtual switches, like Open vSwitch, have emerged as an important part of cloud networking architectures. They connect interfaces of virtual machines and establish the connection to the outer network via physical network interface cards. Today, all important cloud frameworks support Open vSwitch as the default virtual switch. However, general understanding about the performance implications of Open vSwitch in different usage scenarios is missing. In this work we provide insights into the performance properties by systematically conducting measurements in virtual switching setups. We present quantitative and qualitative performance results of Open vSwitch in scenarios involving physical and virtual network interfaces.

Proceedings ArticleDOI
23 Jun 2014
TL;DR: An integrated architecture is outlined, designed and developed within the context of the EU FP7 T-NOVA project, which allows network operators not only to deploy virtualized Network Functions (NFs) for their own needs, but also to offer them to their customers, as value-added services (Network Functions as-a-Service, NFaaS).
Abstract: Network Functions Virtualization (NFV) is a concept, which has attracted significant attention as a promising approach towards the virtualization/“softwarisation” of network infrastructures. With the aim of promoting NFV, this paper outlines an integrated architecture, designed and developed within the context of the EU FP7 T-NOVA project, which allows network operators not only to deploy virtualized Network Functions (NFs) for their own needs, but also to offer them to their customers, as value-added services (Network Functions as-a-Service, NFaaS). Virtual network appliances (gateways, proxies, firewalls, transcoders, analyzers etc.) can be provided on-demand as-a-Service, eliminating the need to acquire, install and maintain specialized hardware at customers' premises. A “NFV Marketplace” is also introduced, where network services and functions created by a variety of developers can be published, acquired and instantiated on-demand.

Patent
29 Apr 2014
TL;DR: In this article, techniques for managing communications between multiple computing nodes, such as computing nodes that are part of a virtual computer network, are described for managing ongoing communications for those computing nodes so as to accommodate the modifications.
Abstract: Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are part of a virtual computer network. In some situations, various types of modifications may be made to one or more computing nodes of an existing virtual computer network, and the described techniques include managing ongoing communications for those computing nodes so as to accommodate the modifications. Such modifications may include, for example, migrating or otherwise moving a particular computing node that is part of a virtual network to a new physical network location, or modifying other aspects of how the computing node participates in the virtual network (e.g., changing one or more virtual network addresses used by the computing node). In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.

Proceedings ArticleDOI
18 Jun 2014
TL;DR: An overview of the application and state-of-the-art of SDN and NFV technologies over optical networks and the first formalisation model for the VNF complex scheduling problem is provided, using the complex job formalisation.
Abstract: Software-Defined Networking and Network Functions Virtualization have initiated a new landscape within the telecom market landscape. Initial proof-of-concept prototypes for NFV-enabled solutions are being developed at the same time SDN models are identified as the futures solutions within the telecom realm. In this article, we provide a brief overview of the application and state-of-the-art of SDN and NFV technologies over optical networks. At the same time, we provide the first formalisation model for the VNF complex scheduling problem, using the complex job formalisation. The article aims at being used as starting point in order to optimally solve the scheduling problem of virtual network functions that compose network services to be provisioned within the SDN paradigm. Finally, we also provide an example of the virtualization of the routing function over an SDN-enabled domain.

Proceedings ArticleDOI
05 May 2014
TL;DR: Simulations show that the dynamic approach significantly improves the virtual network acceptance ratio and the maximum number of accepted virtual network requests at any time while ensuring that virtual network quality of service requirements such as packet drop rate and virtual link delay are not affected.
Abstract: Network virtualisation is considerably gaining attention as a solution to ossification of the Internet. However, the success of network virtualisation will depend in part on how efficiently the virtual networks utilise substrate network resources. In this paper, we propose a machine learning-based approach to virtual network resource management. We propose to model the substrate network as a decentralised system and introduce a learning algorithm in each substrate node and substrate link, providing self-organization capabilities. We propose a multiagent learning algorithm that carries out the substrate network resource management in a coordinated and decentralised way. The task of these agents is to use evaluative feedback to learn an optimal policy so as to dynamically allocate network resources to virtual nodes and links. The agents ensure that while the virtual networks have the resources they need at any given time, only the required resources are reserved for this purpose. Simulations show that our dynamic approach significantly improves the virtual network acceptance ratio and the maximum number of accepted virtual network requests at any time while ensuring that virtual network quality of service requirements such as packet drop rate and virtual link delay are not affected.

Journal ArticleDOI
TL;DR: The proposed FD-EVN approach has shown to be resource efficient and in particular, outperform other approaches in terms of request acceptance ratio and embedding cost, although as a tradeoff, requiring more service migration after failures.
Abstract: As virtualization is becoming a promising way to support various emerging application, provisioning survivability to requested virtual networks (VN) in a resource efficient way is important. In this paper, we investigate the survivable VN embedding (SVNE) problem from a new perspective. First, we consider the failure dependent protection (FDP) in which each primary facility node would have a different backup facility node, as opposed to the Failure Independent Protection (FIP) which has been studied before, in order to provide the same degree of protection against a single node failure with less substrate resources. Secondly, we enhance the VN with additional computing and communication resources and design the Enhanced VN (or EVN) before embedding it to the substrate in order to further reduce the amount of substrate resources needed to survive a single facility node failure. The work is the first that combines the FDP with EVN design (FD-EVN) to explore a resource efficient solution to the SVNE problem. After presenting a binary quadratic programming (BQP) formulation of the FD-EVN design problem and a Mixed Integer Linear Programming (MILP) formulation of the EVN embedding (EVNE) problem, we propose two heuristic algorithms for FD-EVN design, as well as an EVNE algorithm that explores primary and backup substrate resources sharing. Simulations are conducted to evaluate the performance of the solutions to the BQP/MILP formulation when possible, and the heuristics. The proposed FD-EVN approach has shown to be resource efficient and in particular, outperform other approaches in terms of request acceptance ratio and embedding cost, although as a tradeoff, requiring more service migration after failures.

01 Oct 2014
TL;DR: This document describes issues associated with providing multi-tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach.
Abstract: This document describes issues associated with providing multi-tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. A key multi- tenancy requirement is traffic isolation so that one tenant's traffic is not visible to any other tenant. Another requirement is address space isolation so that different tenants can use the same address space within different virtual networks. Traffic and address space isolation is achieved by assigning one or more virtual networks to each tenant, where traffic within a virtual network can only cross into another virtual network in a controlled fashion (e.g., via a configured router and/or a security gateway). Additional functionality is required to provision virtual networks, associating a virtual machine's network interface(s) with the appropriate virtual network and maintaining that association as the virtual machine is activated, migrated, and/or deactivated. Use of an overlay-based approach enables scalable deployment on large network infrastructures.

Proceedings ArticleDOI
08 Jul 2014
TL;DR: This paper studies a network-assisted UPC service model, where a mobile virtual network operator enables its subscribers to operate as mobile WiFi hotspots and provide Internet connectivity for others and derives the optimal hybrid pricing-reimbursing policy that maximizes the MVNO's revenue.
Abstract: User-provided connectivity (UPC) is a promising paradigm to achieve a low-cost ubiquitous connectivity. In this paper, we study a network-assisted UPC service model, where a mobile virtual network operator (MVNO) enables its subscribers to operate as mobile WiFi hotspots (hosts) and provide Internet connectivity for others. A unique aspect of this service model is that the MVNO offers some free data quota to hosts as reimbursements (incentives) for connectivity sharing. This reim- bursing scheme, together with a usage-based pricing, constitute a revolutionary hybrid data pricing-reimbursing scheme, which has not been considered before. We analyze the different impacts of data price and reimbursement on the host's connectivity sharing decision systematically. Based on this analysis, we further derive the optimal hybrid pricing-reimbursing policy that maximizes the MVNO's revenue. Our numerical result indicates that by using the proposed hybrid pricing policy, the MVNO can increase its revenue by 20% to 135% under an elastic client demand, and by 20% to 550% under an inelastic client demand, comparing to those achieved under a pricing-only policy.

Journal ArticleDOI
TL;DR: The proposed methods carry out the prediction of radio signal coverage considering typical industrial environments characterized by highly dense building blockage and provide a design framework to properly deploy the wireless infrastructure in interference-limited radio access scenarios.
Abstract: Large-scale adoption of dense cloud-based wireless network technologies in industrial plants is mandatorily paired with the development of methods and tools for connectivity prediction and deployment validation. Layout design procedures must be able to certify the quality (or reliability) of network information flow in industrial scenarios characterized by harsh propagation environments. In addition, these procedures must account for possibly coexisting heterogeneous radio access technologies as part of the Internet of Things (IoT) paradigm, easily allow post-layout validation steps, and be integrated by industry-standard CAD-based planning systems. The goal of the paper is to set the fundamentals for comprehensive industry-standard methods and procedures supporting plant designer during wireless coverage prediction, virtual network deployment, and post-layout verification. The proposed methods carry out the prediction of radio signal coverage considering typical industrial environments characterized by highly dense building blockage. They also provide a design framework to properly deploy the wireless infrastructure in interference-limited radio access scenarios. In addition, the model can be effectively used to certify the quality of machine-type communication by considering also imperfect descriptions of the network layout. The design procedures are corroborated by experimental measurements in an oil refinery site [modeled by three-dimensional (3-D) CAD] using industry-standard ISA IEC 62734 devices operating at 2.4 GHz. A graph-theoretic approach to node deployment is discussed by focusing on practical case studies, and also by looking at fundamental connectivity properties for random deployments.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: The Cloud4NFV platform is presented, which follows the major NFV standard guidelines, and a proof-of-concept (PoC) is presented that illustrates how the platform can be used to deliver a novel service to end customers, focusing on Customer Premises Equipment (CPE) related functions.
Abstract: The principle of Network Functions Virtualization (NFV) aims to transform network architectures by implementing Network Functions (NFs) in software that can run on commodity hardware. There are several challenges inherent to NFV, among which is the need for an orchestration and management framework. This paper presents the Cloud4NFV platform, which follows the major NFV standard guidelines. The platform is presented in detail and special attention is given to data modelling aspects. Further, insights on the current implementation of the platform are given, showing that part of its foundations lay on cloud infrastructure management and Software Defined Networking (SDN) platforms. Finally, it is presented a proof-of-concept (PoC) that illustrates how the platform can be used to deliver a novel service to end customers, focusing on Customer Premises Equipment (CPE) related functions.

Patent
04 Apr 2014
TL;DR: In this article, a data center interconnection (DCI) network comprises a data centre controller managing a plurality of data centers (DCs) interconnected by a provider network managed by a network provider controller (NPC).
Abstract: A data center interconnection (DCI) network may comprise a data center controller (DCC) managing a plurality of data centers (DCs) interconnected by a provider network managed by a network provider controller (NPC). The provider network may be an OpenFlow based software defined networking (SDN) transport network. The DCC may initiate a virtual network service (VNS) negotiation with the NPC to connect the DCs and may specify a network abstraction granularity level. The NPC may respond by computing paths through the provider network accordingly and providing the DCC with one or more virtual networks (VNs). The DCC may compute virtual paths through the VNs and send virtual network element (VNE) connection setup commands to the DCC. The DCC may convert the VNE connection setup commands into network element (NE) commands to setup connections in NEs of the provider network. The DCC and the NPC may perform fault monitoring, detection, and recovery.

Patent
17 Dec 2014
TL;DR: In this article, the authors propose a virtual network instance creation method based on a specific scheme that includes: acquiring network service descriptive information, determining virtual network units with expected instance creation according to the network service description, transmitting resource request information and connection information of the virtual network unit with expected instances creation to a lower layer device, transmitting path information to a network device of the lower-layer device, or transmitting the path information in each one of the VMUs, and selecting the transmission path according to path information when the data is under transmission among VMUs.
Abstract: The invention discloses a creation method of a virtual network instance, relates to the field of electronic information and aims to solve the problem that when multiple paths among internal virtual network units in a network service are available for data, the failure of determining one of the paths for transmission causes service interruption. According to a specific scheme, the method includes: acquiring network service descriptive information, determining virtual network units with expected instance creation according to the network service descriptive information, transmitting resource request information and connection information of the virtual network units with expected instance creation to a lower-layer device, transmitting path information to a network device of the lower-layer device, or transmitting the path information to each one of the virtual network units, and selecting the transmission path according to the path information when the data is under transmission among the virtual network units. The creation method is applied to creation of the virtual network instances.

Patent
31 Dec 2014
TL;DR: In this article, the authors provide a software deployment method and software deployment system of a virtual network function network element and relevant equipment, which can be used in cloud deployment scenes and has better adaptability.
Abstract: The invention provides a software deployment method and a software deployment system of a virtual network function network element and relevant equipment. According to the method, firstly, a software updating message is sent to the virtual network function network element or a network element management system corresponding to the virtual network function network element through a VNFM (virtual network function manager), and further, the virtual network function network element or the network element management system carries out software updating on the virtual network function network element according to the software updating message, and returns a software updating notification message. The VNFM updates a software version corresponding to the virtual network function network element according to the software updating notification message, and the consistency of the software version information between the virtual network function network element and the VNFM is ensured. Compared with the prior art, the software deployment method of the virtual network function network element provided by the embodiment of the invention can be used in cloud deployment scenes and has better adaptability.