scholarly journals Using Aerial and Vehicular NFV Infrastructures to Agilely Create Vertical Services

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1342
Author(s):  
Borja Nogales ◽  
Miguel Silva ◽  
Ivan Vidal ◽  
Miguel Luís ◽  
Francisco Valera ◽  
...  

5G communications have become an enabler for the creation of new and more complex networking scenarios, bringing together different vertical ecosystems. Such behavior has been fostered by the network function virtualization (NFV) concept, where the orchestration and virtualization capabilities allow the possibility of dynamically supplying network resources according to its needs. Nevertheless, the integration and performance of heterogeneous network environments, each one supported by a different provider, and with specific characteristics and requirements, in a single NFV framework is not straightforward. In this work we propose an NFV-based framework capable of supporting the flexible, cost-effective deployment of vertical services, through the integration of two distinguished mobile environments and their networks: small sized unmanned aerial vehicles (SUAVs), supporting a flying ad hoc network (FANET) and vehicles, promoting a vehicular ad hoc network (VANET). In this context, a use case involving the public safety vertical will be used as an illustrative example to showcase the potential of this framework. This work also includes the technical implementation details of the framework proposed, allowing to analyse and discuss the delays on the network services deployment process. The results show that the deployment times can be significantly reduced through a distributed VNF configuration function based on the publish–subscribe model.

Informatics ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 13
Author(s):  
Konstantinos Papadakis-Vlachopapadopoulos ◽  
Ioannis Dimolitsas ◽  
Dimitrios Dechouniotis ◽  
Eirini Eleni Tsiropoulou ◽  
Ioanna Roussaki ◽  
...  

With the advent of 5G verticals and the Internet of Things paradigm, Edge Computing has emerged as the most dominant service delivery architecture, placing augmented computing resources in the proximity of end users. The resource orchestration of edge clouds relies on the concept of network slicing, which provides logically isolated computing and network resources. However, though there is significant progress on the automation of the resource orchestration within a single cloud or edge cloud datacenter, the orchestration of multi-domain infrastructure or multi-administrative domain is still an open challenge. Towards exploiting the network service marketplace at its full capacity, while being aligned with ETSI Network Function Virtualization architecture, this article proposes a novel Blockchain-based service orchestrator that leverages the automation capabilities of smart contracts to establish cross-service communication between network slices of different tenants. In particular, we introduce a multi-tier architecture of a Blockchain-based network marketplace, and design the lifecycle of the cross-service orchestration. For the evaluation of the proposed approach, we set up cross-service communication in an edge cloud and we demonstrate that the orchestration overhead is less than other cross-service solutions.


2011 ◽  
Vol 467-469 ◽  
pp. 972-977
Author(s):  
Bon Yeh Lin ◽  
Chi Hua Chen ◽  
Chi Chun Lo

The Vehicular Ad-hoc NETwork (VANET) requires a suitable routing protocol to accommodate its special characteristics (e.g., high mobility, short-lived links, and fast-changing topology). There are many routing algorithms which are developed for transmitting information more quickly and cost-effective. In this paper, we propose a routing protocol which relies on Defer-Time Control Function (DTCF) to reduce the hop count, the transmission delay, and the probability of collisions during transmission. We provide an extensive analysis of DTCFs and choose the power-law model for routing protocol optimization. The function can be adjusted dynamically according to the distribution of the neighboring nodes (vehicles) of each hop. We also propose a mechanism to prevent the selected next-hop leaves the transmission range.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Taemin Ahn ◽  
Jihoon Seok ◽  
Inbok Lee ◽  
Junghee Han

Recently, UAVs (unmanned air vehicles) have been developed with high performance, and hence, the range of system utilizing UAVs has also been widening. UAVs are even considered as connected mobile sensors and are claimed to be the future of IoT (Internet of Things). UAVs’ mission fulfillment is relying on the efficiency and performance of communication in a FANET (Flying Ad hoc NETwork) environment where UAVs communicate with each other through an ad hoc network without infrastructure. Especially, for mission-critical applications such as disaster rescue operations, reliable and on-time transmission of rescue information is very critical. To develop the reliable FANETs, a realistic network simulation platform for UAV communication has become an important role. Motivated by this observation, this paper first presents a study on realistic FANET environment simulation platform. On top of the proposed platform, we also design a stable UAV communication protocol with high packet delivery and bounded end-to-end communication delay.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Qianqiao Chen ◽  
Vaibhawa Mishra ◽  
Jose Nunez-Yanez ◽  
Georgios Zervas

The software defined network and network function virtualization are proposed to address the network ossification issue in current Internet infrastructure. Network functions and services are implemented as software applications to increase the programmability of network. However, involving general purpose processors in data plane restricts the bandwidth of network services. Therefore, to keep both the bandwidth and flexibility, a FPGA platform is suggested as a reconfigurable platform to deliver high bandwidth virtual network functions on data plane. In this paper, the FPGA resource has been virtualized by interconnecting partial reconfigurable regions to deliver high bandwidth reconfigurable processing on network streams. With the help of partial reconfiguration technology, network functions on our platform can be configured without affecting other functions on the same FPGA device. The on-chip interconnect system is further evaluated by comparing with existing network-on-chip system. A reconfiguration process is also proposed and demonstrated that it can be performed on our platform. The process can happen in the real time of network services and it is able to keep the original function working during the download of partial bitstream.


The traditional network is configured based on the prescribed network requirements. Sometimes the resources of the network are underutilized and at sometimes there may resource starvation because of the static configuration of the network. As against traditional network, which is operated either as dedicated network or as an overlay network, network services can be operated over a shared network infrastructure. Thus maximum resource utilization under minimal infrastructure cost can be achieved. The on-demand network requirement can be configured dynamically using network slice. The backbone of the rapidly evolving 5G technology is network slice and service networks can be benefited from it. Different network function for multiple tenants can be enabled customized using network slice with each slice operating independently. Network slice can be offered as a service to meet various requirements from the network slice tenant with different granularities. The Software Defined Networking and Network Function Virtualization are the enabling technologies for network slice. This paper discusses various network slicing use case requirements. And also OpenFlow based software defined network environment is simulated to validate the discussions. Experimental results show that the efficiency of the service network is maximized with improved reliability of service


Incessantly a self configuring network for mobile devices known as Mobile Ad hoc Network (MANET) are associated wirelessly .In significant networks, this design might perhaps enforce increased computational costs owing to the costly credentials chaining overheads that would not adapt for ad-hoc applications with increased nodes. Here a survey is carried out to express a view on the secure and authentic MANET systems. The literature reviewed is on different and diverse techniques of related to MANET systems. Reviews of 65 papers is presented and stated the significant analysis. At first the analysis depicts various attacks that are contributed in different papers. Subsequently ,various measures like security, cost, simulation time etc are also analyzed. It analyses the encryption method also that is exploited in each paper. This paper further gives an insight regarding the tools adapted ,chronological review and performance achievements in each case. At the end the review extended for the different research issues to investigate further research on secure and authentic MANET system


Sign in / Sign up

Export Citation Format

Share Document