Top PDF Network Service Virtualization Requirements

Network Service Virtualization Requirements

Network Service Virtualization Requirements

Workload consolidation can be achieved by scaling facilities so that traffic load is concentrated on a smaller number of servers outside business hours so that all the other servers can be switched off or put into energy saving mode. Priority: < Low > [Mod.][EE.2] The NSV frameworks shall be able to provide mechanisms to enable an authorized entity to control and optimize energy consumption on demand by, for example, scaling scheduling and placing VNS instances on specific resources, including hardware and/or hypervisors, placing unused resources in energy saving mode and managing power states as needed. Energy efficiency mechanisms should consider maintaining service continuity requirements and network stability requirements. Priority: < Low >
Show more

10 Read more

Network Function Virtualization: A Primer

Network Function Virtualization: A Primer

We first discuss the benefits of NFV from the industry perspective. NFV has originated from use- case driven requirements of the industry. It aims to reduce the cost of operation of on-the-line network services and improve the capacity of operation using the power of scalable virtualization of hardware resources for different software implemented network functions. It speeds up innovation in networking services by lowering the maturity cycle duration and cost of deployment and speeding up infrastructure upgrade processes. It also enables them to scale various services to cater to different levels of traffic, in turn, opening up various research areas related to dynamic scalability and network element placement for optimal use of network infrastructural resources.
Show more

8 Read more

Data Center Evolution and Network Convergence

Data Center Evolution and Network Convergence

FC, FCoE, NAS, iSCSI, DCB, traditional LAN, internet/WAN, HPC, clusters, clouds, server virtualization, storage virtualization, network virtualization, and more are all colliding in your data center. Redundancy, resiliency, security, I/O consolidation, network convergence, dynamic application distribution, and thin provisioning with high levels of service are desired at all layers and all data center sizes across a broad spectrum of use cases. You worry about operational

29 Read more

Providing Service Using A Virtualization Infrastructure

Providing Service Using A Virtualization Infrastructure

OASIS’ (2006) reference model defines SOA as a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. It provides a uniform means to offer, discover, interact with and use capabilities to produce desired outcomes consistent with measurable preconditions and expectations. IBM (2009) depicts it as a business-centric IT architectural approach that supports integrating business as linked, repeatable business tasks, or services. SOA is also seen as an IT strategy to enable business transformation that builds IT systems out of parts. Another useful description of SOA is provided by Bell (2008) who views SOA as separating functions into distinct units called services, which developers make accessible over a network in order that users can combine and reuse them in the production of applications. The driving force behind the SOA approach is that organizations do not want to give up the functions they have already used for decades from the legacy systems. Instead of developing these already well-defined and deployed functions again from the scratch for the new platform they are transitioning to, the companies look for a way to reuse and integrate them with the new system. The value of SOA is predicated on this concept of re-use which is also a part of the green IT initiative. Reuse of internal and/or external services also accelerates the return on investment for any SOA strategy. SOA initiative is typically process-driven, standard-based and loosely-coupled but requires well-defined interfaces. With this approach companies can centralize business logic and services can be aligned with business process steps. Services then can be changed incrementally as processes change, which allows companies to have faster response to customer needs and shifting markets. Linthicum (2009) emphasizes this agility of service oriented architecture as the value proposition versus traditional architecture. Since everything is depicted as services, they can be configured and reconfigured either in composite applications, such as mashups, or binded into processes, or abstracted into applications.
Show more

6 Read more

Resource Analysis of Network Virtualization through User and Network

Resource Analysis of Network Virtualization through User and Network

1) Connection Completion Rate: To calculate the connection completion rate, we would need to know user behavior characteristics and network conditions. For example, user arrival rate in the daytime is typically higher than at night. Thus, to maintain the same Quality of Service, infrastructure providers should allocate more capacity in the daytime. Moreover, service providers may make requests for higher Quality of Service. They may expect a higher connection load from customers. If the necessary information is not available (e.g., initially), traffic conditions need to be measured. However, since network equilibrium changes with time, it is not efficient to measure traffic conditions continuously. One possible approach for infrastructure providers to cater to changing demands of customers and service providers is to increase capacity gradually and then check whether the assigned resources can satisfy the Quality of Service requirements. Although straightforward, this method is inefficient and slow. We therefore use our demand/supply model to develop a mechanism that can estimate the amount of necessary capacity based on measurement data collected by infrastructure providers. We note that each VN can run its own services. Because user behavior differs from service to service, we assume that the data used for estimation purposes must be collected from the same type of service, e.g., data collected from web services should not be applied to video services. Since, in their basic construction, the models presented above are similar, we use the model for web traffic as an example to demonstrate the proposed mechanism. Recall that the traffic equilibrium is a balance between an inflow controlled by users and an outflow due to the network.
Show more

7 Read more

Exclusive Sharing & Virtualization of the Cellular Network

Exclusive Sharing & Virtualization of the Cellular Network

The rush to digital was demanded as a consequence of the failed analog networks of Germany and France. In European terms NMT was clearly a successful transnational system; owing to its widespread adoption and standardized nature it had a comparatively high customer take-up. In 1982, Groupe Special Mondiale (GSM), later Global System for Mobile Communications, was formed by the NMT group and a few other countries that had previously adopted NMT under the auspices of CEPT to explore the feasibility of developing a digital cellular system; one capable of carrying both voice and limited data, i.e. the short message service (SMS). By 1987, GSM has successful prototypes in operation. However, polit- ical considerations also played their part in GSM’s success. The EU, then the European Economic Community, was ever striving towards an ’ever closer union’. One manifestation of this was the progressive creation of a single market, a market across Europe for the barrier-free movement of goods, services
Show more

12 Read more

The 2013 Guide to Network Virtualization and SDN

The 2013 Guide to Network Virtualization and SDN

Locator/ID Separation Protocol (LISP). OTV is optimized for inter-data center VLAN extension over the WAN or Internet using MAC-in-IP encapsulation. It prevents flooding of unknown destinations across the WAN by advertising MAC address reachability using IS-IS routing protocol extensions. LISP is an encapsulating IP-in-IP technology that allows end systems to keep their IP address (ID) even as they move to a different subnet within the network (Location). By using LISP VM-Mobility, IP endpoints such as VMs can be relocated anywhere regardless of their IP addresses while maintaining direct path routing of client traffic. LISP also supports multi-tenant environments with Layer 3 virtual networks created by mapping VRFs to LISP instance-IDs. Inter-data center network virtualization could also potentially be based on Layer 3 vSwitches that support MPLS VPNS and implement network virtualization using RFC 4023 MPLS over IP/GRE tunnels through an IP enterprise network to connect to an MPLS VPN service. SPBM is unique in that it offers extensions over the WAN natively without requiring additional protocols such as OTV or MPLS VPNs.
Show more

73 Read more

Review on Network Security Virtualization Schemes

Review on Network Security Virtualization Schemes

In this paper [3], authors present the design and implementation of an innovative cloud networking system called CloudNaaS. Customers can leverage CloudNaaS to deploy applications augmented with an extensible and rich flnetwork functions sets such as virtual network isolation, custom addressing, service differentiation, and flexible interposition of numerous middleboxes. CloudNaaS primitives are implemented within the cloud infrastructure directly using high-speed & programmable network elements, making CloudNaaS highly efficient. They evaluate an OpenFlow-based CloudNaaS prototype and find that it can be used to instantiate various network functions in the cloud, and that its performance is highly robust even in the times of large scale provisioned link/device and services failures.
Show more

6 Read more

Automation Change Manager

Automation Change Manager

ACM eliminates many of the key manual components for network change and configuration management, thereby vastly reducing the time and effort of manual methods and eliminating the unnecessary risks of associated human error. To accommodate the dynamic requirements of cloud computing and virtualization, ACM includes the ability to change and reconfigure a network much faster than any manual- based approach, and with far less risk of mistakes.

5 Read more

Scalable Network Virtualization Using FPGAs

Scalable Network Virtualization Using FPGAs

As the Internet evolves, increasingly diverse network applications will be deployed to accommodate business and social needs. Often, network applications call for strikingly divergent performance requirements in terms of security, predictability, and throughput. Although physically separate networks could be constructed to meet these varied service requirements, a common physical substrate minimizes equipment investment, operating cost, and power consumption. Network virtualization, which supports the simultaneous operation of multiple virtual networks over shared network resources, provides a powerful way to customize each network to a specific purpose and service requirement while minimizing hardware resources [8]. Although virtual networks use the same hardware resources, individual network data and control planes are effectively isolated, providing protection against misconfigurations and intrusions from other networks. Such an approach also allows for customized protocols and/or configurations that may be experimental in nature without burdening pre-existing networks.
Show more

10 Read more

A Virtualization-based Approach to Dependable Service Computing

A Virtualization-based Approach to Dependable Service Computing

2. Related work. Fault tolerance includes detection and recovery. Fault detection in LSDS was ap- proached in [2] through an adaptive system. The detection of faults is achieved by monitoring the system and dynamically adapting the detection thresholds to the runtime environment behavior. The prediction of the next threshold uses a Gaussian distribution and the last known timeout samples. The solution has several limita- tions. It cannot differentiate between high response times that are due to the transient increase of the load in the communication layer and those due to service failures, so that both are interpreted as service failures. We solve these problems and propose a solution which adapts to both the failures in the infrastructures, but also to the different requirements imposed by applications (for example, real-time application require a higher response time, instead of failure detection accuracy).
Show more

14 Read more

Implementation on identifying packet misbehavior in network 
		virtualization

Implementation on identifying packet misbehavior in network virtualization

The recital criterion is used to measure or keep in track of performance of each packet delivery. This is used mainly to similitude the performance of each packets from the sender and are sent to the receiver. Here the safety, time conception, resources, quality of service etc are judged. This is a key to evaluate how packets are transmitted to their own target places more accurately. A good performance metrics yield the results based on improvements. This criterion is used to improve packets performance while transmitting and its behavior with respect of missing them.
Show more

13 Read more

AKAMAI WHITE PAPER. Network Function Virtualization

AKAMAI WHITE PAPER. Network Function Virtualization

With respect to resource elasticity, being able to deploy network services in virtual machines running on commodity processors instead of deploying purpose-built appliances means reducing the time-to-market for introducing new services, as well as making it easy to re-provision the resources allocated to existing services as demand dictates. With respect to the software ecosystem, being able to leverage general-purpose building block services instead of integrating stove-piped applications from a limited set of vendors makes it easier to introduce incremental value-added functionality into the network, and as a consequence, opens the space for innovation by third-party service providers. With respect to reducing operating costs, extending the cloud into the access network introduces both a risk and an opportunity. Since network operators are both cloud users (they introduce and operate applications running on the cloud platform) and cloud providers (they own and operate the underlying network/computing infrastructure), the risk is that a proliferation of services will introduce a proliferation of OSS/BSS procedures. At the same time, however there is an opportunity to introduce a unified approach to OSS/BSS across a wide set of services.
Show more

8 Read more

An Effective Owl Search Based Optimized Resource Allocation Framework For Network Slicing In An LTE Network

An Effective Owl Search Based Optimized Resource Allocation Framework For Network Slicing In An LTE Network

the Stackelberg equilibrium (SE) based on exhaustive search. Nonetheless, once the network size became relatively large, it was impossible for game players to achieve SE within minimal decision-making time. GRRM and LRRMs were seen as restricted rational players facing this challenge, and low- complexity algorithms were developed to help them achieve optimal local solutions leading to a poor SE version. K. Teague et.al [17] explored the challenge of selecting base stations (BSs) to install a virtual network that fulfills a service provider's specific requirements and adaptive resource sharing between the demand points of the service provider. For modeling the problem of joint BS selection and adaptive slicing, a two-stage stochastic optimization system was implemented. To evaluate an approximation for the two-stage stochastic optimization model, two methods were presented. The first method uses a sampling technique applied to the stochastic model's determinist equivalent system. The second method uses a BS choice and adaptive slicing genetic algorithm through a single- stage linear optimization problem. A number of scenarios have been developed for testing using a lognormal model designed to emulate demand from cellular networks in the real world. Y. Tun et.al [18] discussed the issue of two-level allocation in network slicing, thus allowing for efficient use of resources;
Show more

7 Read more

THE RHETORIC OF REFUGEES: LITERACY, NARRATIVE AND IDENTITY FOR SOMALI WOMEN

THE RHETORIC OF REFUGEES: LITERACY, NARRATIVE AND IDENTITY FOR SOMALI WOMEN

Recent innovations in network virtualization and elastic optical networks (EONs) enable flexible deployment of optical networks as a service. However, one open challenge is how to embed virtual network (VN) requests onto the physical substrate network to maximize the sharing of physical resources, which is the so called virtual network embedding (VNE) prob- lem. This chapter presents a novel virtual network embedding algorithm called alignment and consecutiveness-aware virtual network embedding (ACT-VNE), which takes into account the spectrum alignment and consecutiveness between adjacent fiber links when mapping virtual nodes/links onto the physical substrate nodes/links. This chapter also introduces a relative importance factor in ACT-VNE as importance, alignment and consecutiveness-aware virtual network embedding (iACT-VNE) that assigns virtual nodes to substrate nodes within close proximity to establish connection with less bandwidth utilization. Since EONs are prone to defragmentation, this chapter also proposes a min-max reconfiguration scheme called relative consecutiveness loss-aware and misalignment-aware virtual network reconfiguration (RCLM- VNR) that minimizes relative consecutiveness loss and maximizes alignment with adjacent links when reconfiguring the virtual network. Simulation results show that ACT-VNE and RCLM-VNR yield a lower blocking probability and a higher link utilization ratio, which leads to better utilization of the physical resources and increased revenue.
Show more

124 Read more

Solution Network Virtualization. Allied Telesis - delivering value with Network Virtualization

Solution Network Virtualization. Allied Telesis - delivering value with Network Virtualization

As applications, computers, and networks have become more and more intrinsically linked, the convergence of services on the network requires higher availability for mission critical applications. Those providing advanced services to customers are well aware of the need to balance maximizing operational efficiency with meeting Service Level Agreements (SLAs). Virtualization provides the means to meet these increasing demands, with the unique ability to also provide businesses with cost benefits that include

10 Read more

Service Oriented Network virtualization Architecture for Internet of Things

Service Oriented Network virtualization Architecture for Internet of Things

In light of the features and requirements of the semantic description methods of Internet of Things services, and then discusses the resource representation model and resource management model with the network virtualization. This paper focuses on the network resources optimization design algorithm matching with the service behaviours of users and the resources optimization-based virtual networking mapping algorithm under the environment establishes the Internet of Things services-oriented 3S virtual network model. Finally, the proposed scheme realize the optimization of resources distribution in the user-side network under the environment of Internet of Things and thus provide a nice solution to the large scale application of Internet of Things.
Show more

7 Read more

A service oriented broker-based approach for dynamic resource discovery in virtual networks

A service oriented broker-based approach for dynamic resource discovery in virtual networks

A Node can be either a PhysicalNode or VirtualNode. Represented in the class Node, a node has a GeoLocation and encompasses common attributes needed for describ- ing a network node, namely, a network stack, a type (i.e. virtual switch, virtual router, virtual machine, etc.) and an IP address. Besides attributes such as the vendor, model, and substrate node group, a physical node may aggregate virtual nodes and interfaces, whereas a Vir- tualNode (VN) is uniquely identified; and has an initial and maximum capacity in terms of computational cap- abilities. Each VN aggregates one or multiple virtual interfaces. An Interface represents a physical/virtual net- work interface controller (NIC); and has a type (i.e. Ethernet, radio), rate and MAC address. Depending on its capacity, a physical link can be divided into slices using virtualization techniques (i.e. ATM, MPLS) to sup- port one or multiple virtual links. A Link has characteris- tics such as minimal delay, type, bandwidth, throughput, good-put and type of connectivity; and an end point that determines the source node and destination node. Each VirtualLink has a tag, and initial and maximum allocated bandwidth. Virtual interfaces are connected by a virtual link. A physicalLink has a limited number of supported virtual links and an additional attribute for defining avail- able bandwidth. A Path represents a set of links. A path starts at beginNode and ends at endNode.
Show more

30 Read more

mesdn: Mobile Extension of SDN Mostafa Uddin Advisor: Dr. Tamer Nadeem Old Dominion University

mesdn: Mobile Extension of SDN Mostafa Uddin Advisor: Dr. Tamer Nadeem Old Dominion University

 p TDMA is a simple prototype of meSDN for WLAN virtualization service.  Manage airtime share between network[r]

30 Read more

NFV Forum Progression to Launch

NFV Forum Progression to Launch

• With the advent of virtualization, the “home” service provider instantiates virtualized network functions in the “visited”. service provider’s tenant domain[r]

29 Read more

Show all 10000 documents...