Results 81 to 90 of about 513,807 (226)

Sustainable placement of VNF chains in Intent-based Networking

open access: yesProceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing, 2023
Intent-based networking (IBN) aims at automatically driving network configurations and operations to fulfil high-level intents specified by infrastructure providers and application operators. Deploying Virtual Network Function (VNF) chains onto the available network resources is a way to model and fulfil intents.
Tommaso Di Riccio   +3 more
openaire   +2 more sources

5G Network Slicing as a Service Enabler for the Automotive Sector

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
This paper explores how network slicing can benefit the automotive sector throughout the vehicle lifecycle, from manufacturing to vehicular communications. We analyze the cost equilibrium for network slicing to be effective for car manufacturers, and tests in real 5G networks that demonstrate the performance improvement in OTA updates coexisting with ...
David Candal‐Ventureira   +7 more
wiley   +1 more source

Adaptive placement & chaining of virtual network functions with NFV-PEAR

open access: yesJournal of Internet Services and Applications, 2019
The design of flexible and efficient mechanisms for proper placement and chaining of virtual network functions (VNFs) is key for the success of Network Function Virtualization (NFV). Most state-of-the-art solutions, however, consider fixed (and immutable)
Gustavo Miotto   +3 more
doaj   +1 more source

Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC

open access: yesIEEE Access, 2020
Multi-Access Edge Computing (MEC) promises to provide sufficient computing capacity close to users and realize smart management at the edge of mobile network. To achieve the aforementioned objectives, it is indispensable to implement real-time monitoring
Quan Yuan   +3 more
doaj   +1 more source

NFV Orchestrator Placement for Geo-Distributed Systems

open access: yes, 2017
The European Telecommunications Standards Institute (ETSI) developed Network Functions Virtualization (NFV) Management and Orchestration (MANO) framework. Within that framework, NFV orchestrator (NFVO) and Virtualized Network Function (VNF) Manager (VNFM)
Abu-Lebdeh, Mohammad   +3 more
core   +1 more source

Autonomous Attack Mitigation Through Firewall Reconfiguration

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This graphical abstract shows the workflow of the proposed approach for autonomous attack mitigation through firewall reconfiguration. ABSTRACT Packet filtering firewalls represent a main defense line against cyber attacks that target computer networks daily. However, the traditional manual approaches for their configuration are no longer applicable to
Daniele Bringhenti   +3 more
wiley   +1 more source

Specifying and Placing Chains of Virtual Network Functions

open access: yes, 2014
Network appliances perform different functions on network flows and constitute an important part of an operator's network. Normally, a set of chained network functions process network flows.
Karl, Holger   +2 more
core   +1 more source

Efficient VNF placement for service function chaining

open access: yes, 2021
By deploying the network functions (NFs) as software applications called Virtual Network Functions (VNF), Network Function Virtualization (NFV) helps the Service Provider (SP) to reduce the Capital Expenditure (CAPEX), Operation Expense (OPEX) and save a lot of deployment time. However, there are still many challenges that remain to be solved in NFV (e.
openaire   +1 more source

REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
ABSTRACT The increasing demand for low‐latency, high‐bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during ...
Lyn Hill   +3 more
wiley   +1 more source

MEC Placement Problem in Protected 5G Networks

open access: yesCLEI Electronic Journal
This paper summarizes the thesis ”MEC Placement Problem in Protected 5G Networks”, which tackles the question of where to position Multi-access edge computing nodes (MECs) in 5G networks to achieve stringent 5G requirements at a minimum cost. The thesis
Hernani Delgado Chantre
doaj   +1 more source

Home - About - Disclaimer - Privacy