Results 21 to 30 of about 513,807 (226)

Hardware-accelerator aware VNF-chain recovery [PDF]

open access: yes, 2020
Hardware-accelerators in Network Function Virtualization (NFV) environments have aided telecommunications companies (telcos) to reduce their expenditures by offloading compute-intensive VNFs to hardware-accelerators.
Colle, Didier   +3 more
core   +1 more source

Routing-Led Placement of VNFs in Arbitrary Networks [PDF]

open access: yes2020 IEEE Congress on Evolutionary Computation (CEC), 2020
The ever increasing demand for computing resources has led to the creation of hyperscale datacentres with tens of thousands of servers. As demand continues to rise, new technologies must be incorporated to ensure high quality services can be provided without the damaging environmental impact of high energy consumption. Virtualisation technology such as
Billingsley, Joseph   +4 more
openaire   +2 more sources

APVNFC: Adaptive Placement of Virtual Network Function Chains

open access: yesCybernetics and Information Technologies, 2023
Designing efficient and flexible approaches for placement of Virtual Network Function (VNF) chains is the main success of Network Function Virtualization (NFV).
Umrao Brajesh Kumar   +1 more
doaj   +1 more source

Dynamic SFC placement scheme with parallelized SFCs and reuse of initialized VNFs: An A3C-based DRL approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Mobile Edge Computing (MEC) is a well-known network architecture that extends cloud computing to the network edge. Compared with cloud computing, Network Function Virtualization (NFV) can provide flexible services in MEC for mobile users. Virtual Network
Hongsheng Xu   +6 more
doaj   +1 more source

Automated Network Service Scaling in NFV: Concepts, Mechanisms and Scaling Workflow [PDF]

open access: yes, 2018
Next-generation systems are anticipated to be digital platforms supporting innovative services with rapidly changing traffic patterns. To cope with this dynamicity in a cost-efficient manner, operators need advanced service management capabilities such ...
Adamuz-Hinojosa, Oscar   +5 more
core   +3 more sources

Design and Placements of Virtualized Network Functions for Dynamically Changing Service Requests Based on a Core/Periphery Structure

open access: yesIEEE Access, 2020
Network Function Virtualization (NFV) is a system that provides application services by connecting virtual network functions (VNFs), and is expected to accommodate new service requests through the development of new VNF and connection with existing ones.
Yuki Tsukui   +3 more
doaj   +1 more source

Migration energy aware reconfigurations of virtual network function instances in NFV architectures [PDF]

open access: yes, 2017
Network function virtualization (NFV) is a new network architecture framework that implements network functions in software running on a pool of shared commodity servers.
Ammar, Mostafa   +2 more
core   +1 more source

Virtual Network Function Placement for Service Chaining by Relaxing Visit Order and Non-Loop Constraints

open access: yesIEEE Access, 2019
Network Function Virtualization (NFV) is a paradigm that virtualizes traditional network functions and instantiates Virtual Network Functions (VNFs) as software instances separate from hardware appliances.
Naoki Hyodo   +3 more
doaj   +1 more source

Optimizing Service Function Chaining Migration With Explicit Dynamic Path

open access: yesIEEE Access, 2022
Network Function Virtualization (NFV) can support customized on- demand network services with flexibility and cost-efficiency. Virtual Network Function (VNF) instances need to be scaled out, scaled in, and reallocated across the NFV infrastructure (NFVI)
Tuan-Minh Pham
doaj   +1 more source

Container network functions: bringing NFV to the network edge [PDF]

open access: yes, 2017
In order to cope with the increasing network utilization driven by new mobile clients, and to satisfy demand for new network services and performance guarantees, telecommunication service providers are exploiting virtualization over their network by ...
Cziva, Richard, Pezaros, Dimitrios P.
core   +1 more source

Home - About - Disclaimer - Privacy