SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
DOI: 10.5121/ijcnc.2016.8502 15
FLEXIBLE VIRTUAL ROUTING FUNCTION
DEPLOYMENT IN NFV-BASED NETWORK
WITH MINIMUM TOTAL NETWORK COST
Shin-ichiKuribayashi
Department of Computer and Information Science, Seikei University, Japan
ABSTRACT
In a conventional network, most network devices, such as routers, are dedicated devices that do not
have much variation in capacity. In recent years, a new concept of Network Functions
Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions
with software on general-purpose servers and this allows the network operator to select any
capabilities and locations of network functions without any physical constraints.
This paper focuses on the deployment of NFV-based routing functions which are one of critical
virtual network functions, and present the algorithm of virtual routing function allocation that
minimize the total network cost. In addition, this paper presents the useful allocation policy of
virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy
takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the
network into consideration. Furthermore, this paper shows that there are cases where the use of
NFV-based routing functions makes it possible to reduce the total network cost dramatically, in
comparison to a conventional network, in which it is not economically viable to distribute small-
capacity routing functions.
KEYWORDS
Virtual routing function, NFV, resource allocation, minimum total network cost.
1. INTRODUCTION
In recent years, a new concept of Network Functions Virtualization (NFV) [1]-[3] has
been introduced. The main idea of NFV is the decoupling of physical network equipment
from the functions that run on them. By virtualizing and consolidating network functions
traditionally implemented in dedicated hardware and using cloud technologies, network
operators expect to achieve greater agility and accelerate new service deployments while
driving down both operational and capital costs.
The NFV implements a variety of virtual network functions with software on general-
purpose servers, enabling the network operator to select any capabilities and locations of
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
16
network functions without any physical constraints. In addition, since NFV makes it easy
to change functions and their locations and capacities dynamically to suit the usage
condition, an economical network can be constructed flexibly. Therefore, the algorithm to
determine the place where network functions are located and how much capacities of
network functions flexibly are required is essential for economical network design.
The rest of this paper is organized as follows. Section 2 explains related works. Section 3
presents points of NFV-based routing function allocation. Section 4 proposes the
algorithm of virtual routing function allocation with minimum total network cost. Section
5 evaluates the proposed algorithm using a ladder-shaped network model, which
simulates the shape of Japan, and identifies the useful function allocation policy. Section
6 presents the conclusions. This paper is an extension of the study presented in [15].
Especially, this paper tries to minimize the total network cost, instead of the total power
consumption.
2. RELATED WORK
Reference [2] summarizes the main differences between the conventional networks and
NFV-based networks as follows:
- Decoupling software from hardware
- Flexible network function deployment
- Dynamic operation
The above features of NFV enable the network operator to select any capacities and
locations of network functions without any physical constraints. Therefore, the efficient
algorithm to determine the place where network functions are located and how much
capacities of network functions are required is essential for economical network design.
The issue of placing network functions would be related to virtual network embedding
(VNE) [4], [5], which is used to allocate physical resources for virtual nodes/links to
construct virtual network. Through dynamic mapping of virtual resources onto physical
hardware, the benefit gained from existing hardware can be maximized. Reference [6]
proposes a virtual network function (VNF) chaining placement that combines location-
routing and VNE problems, solving first the placement and then the chaining. Reference
[7] focuses on a hybrid scenario where services are provided by dedicated physical
hardware and virtualized service instances, and formulates the placement problem as an
Integer Linear Program (ILP) with an objective of allocating a service chain onto the
physical network minimizing the number of servers used. Reference [8] investigates the
influence of virtualizing the S-GW and P-GW functions on the network load and network
delay. It showed differences in performance when the functions were either fully
virtualized and when their data and control planes were separated. The authors showed
that four data centers are required to support a full virtualized gateways deployment for an
exemplary gateway deployment in a US network. Reference [9] formulates the vDPI
(virtual Deep Packet Inspection) placement as a cost minimizing problem, capturing the
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
17
different constraints the operator is facing, and solves it as an integer linear program
(ILP).
References [10]-[12] propose the joint multiple resource allocation method in a cloud
computing environment that consists of multiple data centers with processing ability and
bandwidth to access them, and demonstrate by simulation evaluations that the proposed
methods can reduce the total resource much, compared with the conventional allocation
method. The proposed resource allocation model is related to the online bin packing
problem with composite bins, in which two bins (processing ability bin and bandwidth
bin) are consolidated.
As for dynamic allocation, Reference [13] evaluates the online virtual function mapping
and scheduling problem and proposes a set of greedy algorithms. Reference [14] proposes
the automatic placement of the virtual nodes and the allocation of network services on
them, supported by a monitoring system that collects and reports on the behavior of the
resources.
Most of these studies mainly try to embed the virtual network functions to physical
resources economically and would be useful for the short-term design of the network, to
use the existing resources efficiently. It is also required to expand the network or to add
new network functions in the future.As for long-term design of the network, this paper
tries to determine the optimal capacity and location of virtual network functions without
any physical constrains. This should be necessary for the network operators to design their
network economically. This paper also tries to show that the use of NFV-based routing
functions makes it possible to reduce the total network cost dramatically, in comparison to
a conventional network.
3. POINTS OF NFV-BASED ROUTING FUNCTION ALLOCATION
In general, routing functions would be allocated either in a centralized approach or in a
distributed approach, as illustrated in Figure 1. There are three areas (#A, #B, #C) and a
circle, ○, indicates virtual routing functions deployed at each area in Figure 1.
Ifa distributed approach is adopted, virtual routing functions are deployed in each area and
intra-area traffic does not need to go through routing functions outside the area concerned.
This results in less cost of a circuit than in a centralized approach. In addition, packet
transfer delay is shorter, thereby enhancing the quality of service. On the other hand,
virtual routing functions aredeployed only in Area #A in a centralized approach, resulting
in less cost of virtual routing functions than in a distributed approach. In a conventional
network, the centralized approach would be an economically viable option because
capacity variations of routers are limited. Particularly, small capacity routers are not
available.In NFV-based network, both centralized and distributed approaches could be
considered as routing functions of any capacities can be allocated at any location
economically. It is necessary to take these factors into consideration in considering the
routing function allocation in an NFV-based network.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
18
4. ALGORITHM OF VIRTUAL ROUTING FUNCTION ALLOCATION
WITH MINIMUM TOTAL NETWORK COST
4.1. TWO POSSIBLE ALGORITHMS
<Algorithm 1> Initially, allocate a routing function to every area. Then, select the area
with the minimum number of packets sent or received per unit time (referred to as
“integration-origin area”). If integrating the routing function of the selected area with that
of another area (referred to as “integration-destination area”) reduces the total network
cost, integrate them. Repeat this until the total network cost can no longer be reduced or
there is no integration-origin area left.
<Algorithm 2> Initially, allocate a routing function only to the area where the number of
packets sent or received per unit time is the largest. Then, select the area where the number
of packets sent or received per unit time is the second largest. If making the routing
function of the first area handle the routing of the second area reduces the total network
cost, do so. Repeat this until the total network cost can no longer be reduced or there is no
area which can be handled by the routing function of another area.
In this paper, we adopt Algorithm 1 and clarify the detailed allocation algorithm.
Area #B Area #C
:Virtual routing functions :Terminal or Server
<Centralized> <Distributed>
Router
Area #AArea #A
Area #B Area #C
Router
Router Router
Figure 1. Two main approaches for virtual routing function allocation
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
19
4.2. DETAILED PROCESSING FLOW OF VIRTUAL ROUTING FUNCTION
ALLOCATION
4.2.1. OVERVIEW OF PROCESSING FLOW
The processing flow for determining whether to integrate two areas is described below by
referring to Figure 2.
Step 1. Selection of integration-origin area
Select an area with the least volume of packets sent or received per unit time, so as to
minimize the amount of detour traffic (Area #3 in Figure 2).
Step 2. Selection of integration-destination area
Select all area as integration-destination candidates except integration origin area.
Step 3. Integration
If the total network cost after the integration is smaller than before the integration, the routing
function of the integration-origin area is integrated into that of the integration-destination area
in which the integration results in the minimum total network cost. For example, if
PB1<PB2<PAin Figure 2, the routing function is integrated into the one in Area #1. Note that PA,
PB1 and PB2are total network cost of topology A, B1 and B2 respectively.If the total network
cost after the integration is not smaller than that before the integration, no integration is made.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
20
4.2.2 Allocation Policy For Selecting Integration-Source Area In Step 1
Unless the volumes of traffic flows in the two directions between two areas are greatly
unbalanced, integration-origin area candidates are selected in descending order of the distance
from the center of the network, in Step 2. For example, in the ladder-shaped model shown in
Figure 3 (which simulates the shape of Japan and consists of 10 areas), it is desirable to reduce
the total circuit length by integrating areas into area group G3 (which contains Areas #5 and
#6), which is close to the center of the network so that the total network cost can be reduced.
Areas #1, #2, #9, and #10 included in group G1, which is the farthest from the center of the
network, are first selected one by one as integration-origin area candidates. Whether to
integrate them is determined using the algorithm described in Section 4.2.1. When all the
areas in G1 have been examined, Areas #3, #4, #7, and #8 in G2 are selected as integration-
origin area candidates in Figure 3.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
21
5. EVALUATION OF THE PROPOSED ROUTING FUNCTION
ALLOCATION
5.1 . EVALUATION CONDITIONS
1) Network structure:
The ladder-shaped network illustrated in Figure 3 is used for evaluation. There are 10 areas
and the distance between two adjacent areas in the horizontal direction is 400 km while that in
the vertical direction is 300 km.
2) Traffic Model
It is supposed that there are 110 simultaneously communicating terminals in each area. If it is
assumed that 20% of all terminals are communicating simultaneously, the total number of
terminals in all areas will be about 5000 and this number is representative of that of small-to-
medium enterprises. The terminals are broken down into 11 sets of 10 terminals, and each set
is communicating with a different area. Since it is desirable to consider applications that
require the largest bandwidths and the largest number of packets, video traffic is assumed. The
bandwidth (one way) required for communication by each terminal is set to 1.8 Mbps, and the
packet length is set to 7200 bits. It requires routing capacity of 250 pps (packets/s) per each
communication (one way).In addition, to evaluate unbalanced traffic distribution, it is
assumed that traffic concentrated on the central area (Area #5 in Figure 3). To evaluate the
effect of traffic concentration on Area #5, it is assumed that the volume of traffic between
Area 5 and any of the other areas is M times (referred to as “peak coefficient”) larger than that
between non-Area #5 areas. If M is one, the traffic distribution is uniform.
3) Route selection between areas
The fixed route is selected between areas, as illustrated in Figure 4. Moreover,it is not
considered to select the route dynamically according to the traffic conditions in the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
22
4) Zc is defined as the ratio of the cost of a routing function to that of a circuit is critical, as in
(1):
Zc=α/β (1)
where α is the cost of routing functions per pps, and β is the cost of a circuit per Mbps per 10
km. The fixed cost of routing function or circuit bandwidth when there is no traffic is
disregarded in this paper.
5) Evaluation tool
We built an evaluation tool written in the C language.
5.2 . RESULTS AND EVALUATION
Evaluation results of the final routing function allocation following the proposed allocation
algorithm in Section 4.2 are shown in Figures 5 and 6. The size of a circle, ○, in an area
indicates the capacity of the routing function. Figure 5 shows how the final function allocation
changes as Zc is varied and M is fixed at 2. Figure 6 shows how the final function allocation
changes as M is varied and Zc is fixed at 3. The following points are clear from these Figures:
1) The greater Zc (cost ratio) is, the greater the cost of the routing function relative to
that of the circuit and the more advantageous to integrate the two areas concerned.In the
example of Figure 5, routing functions are allocated in all areas when Zc≦0.9, in half of all
areas when Zc≒2.9, and only in one area when Zc>3.5.
2) The greater M (peak coefficient) is, the greater the effect of integrating the routing
function of one area into that of another area is. This is explained in detail with Figure 7. Two
areas, #A and #B are considered in Figure 7. If area #A is integrated into area #B, the circuit
capacity that is newly required for intra-area communication in the first area consumes
additional cost, x1, while cost x21 and x22 previously consumed by the routing function
capacity that had been required to relay traffic to another area becomes zero. The greater M is,
the greater x22 becomes (even when x1 remains the same), resulting in an increase in the
number of cases where integration is advantageous (the right part in Figure 7).
To ascertain the above-mentioned trend, we examined how the ratio of the number of areas
that have routing functions to the total number of areas, δ, changes when Zc and M are varied.
The result is shown in Figure 8. The horizontal axis represents Zc while the vertical axis
represents δ. The minimum value of δ is 0.1 while its maximum value is 1.0. As in Figures 5
and 6, the greater Zc is and the greater M is, the more advantageous the integration is.
3) Figure 5 shows that, when Zc is 0.8, the final function allocation is to distribute a
routing function to every area. However, this allocation would not be viable in the
conventional non-NFV network because a routing function needs to have a capacity that is
higher than a certain level, Q. For example, if Q is twice the capacity of the routing function
allocated in the case of Figure 5 (Zc = 0.9), the total network cost of the conventional network
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
23
(it is the same topology in the case of Zc> 3.6 in Figure 5) increases by 20%. This takes only
the cost of the routing function capacity and the circuit bandwidth into consideration, and does
not include the fixed cost of servers and circuits, which must be taken into consideration in the
conventional network. Therefore, NFV-based routing function allocation could make it
possible to distribute small-capacity routing functions in a network, resulting in a large
reduction in cost in comparison to the conventional network.
Figure 6. Simulation result 2
<Final topology of virtual routing function allocation (Zc=3)>
Area #1 Area #3 Area #5 Area #7 Area #9
Area #2 Area #4 Area #6 Area #8 Area #9
Peak Area
<M=1>
<M=2>
<M=10>
Centralizedapproach
ismoreattractive
Area #10
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
24
5. CONCLUSION
This paper has proposed the algorithm of virtual routing function allocation in the NFV
network for minimizing the total network cost. The proposed allocation algorithm has been
evaluated with a ladder-shaped network model, which simulates the shape of Japan. It has
been found that, the greater the cost of a routing function relative to that of a circuit is and the
greater the peak coefficient of traffic between areas is, the smaller the total network cost can
be made by integrating the routing functions of some areas into those of a small number of
areas. Furthermore, this paper has indicated that there are cases where the use of NFV-based
routing functions makes it possible to reduce the total network cost much, compared with a
conventional network, in which it is not economically viable to distribute small-capacity
routing functions.
It is required to study the routing function allocation, which considers 1) fixed cost of routing
functions or circuits where there is no traffic, 2) allowable maximum network delay and 3)
dynamic route selection between area. The allocation of other virtual network functions (ex.
DPI, FW) in addition to virtual routing functions should also be studied.
Area #A
<M is small> <M is large>
Area #B Area #A Area #B
Area #A Area #B Area #A Area #B
W:Traffic volume between Area #A and Area #B M*W:Traffic volume between Area #A and Area #B
Figure 7. Comparison of area integration effect
x21
Cost reduction: X21 - X1
x1
Cost reduction: X22 - X1
(Circuit) (Circuit)
(Routing)
X21 <<<<X22
<<<<
x22
(Routing)
x1
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
25
ACKNOWLEDGMENT
I would like to thank Mr. K.Hidafor their help with the simulation.
REFERENCES
[1] M. Chiosi et al., “Network Functions Virtualisation - An Introduction, Benefits, Enablers,
Challenges and Call for Action,” ETSI NFV, Oct. 2012.
https://portal.etsi.org/nfv/nfv_white_paper.pdf.
[2] “Network Functions Virtualisation (NFV); Architectual Framework,” ETSI GS NFV 002 v1.2.1,
Dec. 2014.
http://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf.
[3] R. Mijumbi, J. Serrat, J. Gorricho, N. Bouten, F. D. Trurck and R. Boutaba, “Network Function
Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys &
Tutorials, Vol. 18, Issue 1, pp.236-262, 2016.
[4] A. Fischer, J. F. Botero, M. T. Beck, H. Meer, and X. Hesselbach,” Virtual Network Embedding:
A Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013.
[5] X. Wei, S. Hu, H. Li, F. Yang and Y. Jin, “A Survay on Virtual Network Embedding in Cloud
Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425,
2014.
[6] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network
functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct
2014, pp. 7–13.
Figure 8. Ratio δ vs. value of Zc and M
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
26
[7] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network
functions,” in Network and Service Management (CNSM), 2014 10th International Conference
on, Nov 2014, pp. 418–423.
[8] A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann, "Applying NFV and SDN
to LTE Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things
Cellular: Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014.
[9] M. Bouet, J. Leguay and V. Conan, “Cost-based placement of vDPI functions in NFV
infrastructures,” International Journal of Network Management, pp.490-506, 2015.
[10] S. Tsumura and S. Kuribayashi, “Simultaneous allocation of multiple resources for computer
communications networks”, APCC2006, 2F-4 (2006.8)
[11] S. Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing
Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS),
Vol.2, No.1, pp.1-8, Feb. 2011.
[12] S. Kuribayashi, “Resource Allocation Method for Cloud Computing Environments with Different
Service Quality to Users at Multiple Access”, International Journal of Computer Networks &
Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015.
[13] R. Mijumbi, J. Serrat, J. Gorricho, N. Boutenz, F. Turckz and S. Davy, “Design and Evaluation of
Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st
IEEE Conference on
Network Softwarization (NetSoft), pp.1-9, 2015.
[14] S. Clayman, E. Mainiy, A. Galis, A. Manzaliniz and N. Mazzocca, “The Dynamic Placement of
Virtual Network Functions, ”IEEE Network Operations and Management Symposium
(NOMS),pp.1-9, 2014.
[15] K. Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total
Network Power Consumption,” 18th International Conference on Information and
Communication Systems (ICICS Venice 2016), Aug. 2016.
AUTHOR
Shin-ichiKuribayashi received the B.E., M.E., and D.E. degrees from Tohoku University, Japan, in
1978, 1980, and 1988 respectively. He joined NTT Electrical Communications Labs
in 1980. He has been engaged in the design and development of DDX and ISDN
packet switching, ATM, PHS, and IMT 2000 and IP-VPN systems. He researched
distributed communication systems at Stanford University from December 1988
through December 1989. He participated in international standardization on ATM
signaling and IMT2000 signaling protocols at ITU-T SG11 from 1990 through 2000.
Since April 2004, he has been a Professor in the Department of Computer and
Information Science, Faculty of Science and Technology, Seikei University. His research interests
include optimal resource management, QoS control, traffic control for cloud computing environments
and green network. He is a member of IEEE, IEICE and IPSJ.

More Related Content

What's hot (19)

Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
Gopal Mulgund
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
IRJET Journal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
ijtsrd
 
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
TELKOMNIKA JOURNAL
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
IJCSEIT Journal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
IJCNCJournal
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
vivek pratap singh
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
IJCNCJournal
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
Nexgen Technology
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
IJCNCJournal
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
Shivlal Mewada
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
csandit
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
IJCSEA Journal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKSDYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
IAEME Publication
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
CSCJournals
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
ijcsbi
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
IRJET Journal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
ijtsrd
 
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes ...
TELKOMNIKA JOURNAL
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
IJCSEIT Journal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
IJCNCJournal
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
vivek pratap singh
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
IJCNCJournal
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
IJCNCJournal
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
csandit
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
IJCSEA Journal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKSDYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKS
IAEME Publication
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
CSCJournals
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
ijcsbi
 

Viewers also liked (17)

International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
IJCNCJournal
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
IJCNCJournal
 
Performance improvement of
Performance improvement ofPerformance improvement of
Performance improvement of
IJCNCJournal
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
IJCNCJournal
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifi
IJCNCJournal
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
IJCNCJournal
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
IJCNCJournal
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public key
IJCNCJournal
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
IJCNCJournal
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
IJCNCJournal
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
IJCNCJournal
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
IJCNCJournal
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
IJCNCJournal
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
IJCNCJournal
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
IJCNCJournal
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
IJCNCJournal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
IJCNCJournal
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
IJCNCJournal
 
Performance improvement of
Performance improvement ofPerformance improvement of
Performance improvement of
IJCNCJournal
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
IJCNCJournal
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifi
IJCNCJournal
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
IJCNCJournal
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
IJCNCJournal
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public key
IJCNCJournal
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
IJCNCJournal
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
IJCNCJournal
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
IJCNCJournal
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
IJCNCJournal
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
IJCNCJournal
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
IJCNCJournal
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
IJCNCJournal
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
IJCNCJournal
 

Similar to FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMUM TOTAL NETWORK COST (20)

VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
IJCNCJournal
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functions
redpel dot com
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
Ericsson
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5G
Ericsson
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...
ieeepondy
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function Virtualisation
IJERA Editor
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
ijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
AIRCC Publishing Corporation
 
N fv good
N fv goodN fv good
N fv good
Balasubramaniam Vadapalli
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
ijwmn
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
IJCNCJournal
 
Optimizing the placement of cloud data center in virtualized environment
Optimizing the placement of cloud data center in virtualized  environmentOptimizing the placement of cloud data center in virtualized  environment
Optimizing the placement of cloud data center in virtualized environment
IJECEIAES
 
Ericsson Review: The benefits of self-organizing backhaul networks
Ericsson Review: The benefits of self-organizing backhaul networksEricsson Review: The benefits of self-organizing backhaul networks
Ericsson Review: The benefits of self-organizing backhaul networks
Ericsson
 
Network Virtualization - A Survey
Network Virtualization - A SurveyNetwork Virtualization - A Survey
Network Virtualization - A Survey
GIST (Gwangju Institute of Science and Technology)
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ijgca
 
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
IJCNCJournal
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functions
redpel dot com
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
Ericsson
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5G
Ericsson
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...
ieeepondy
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function Virtualisation
IJERA Editor
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
ijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
AIRCC Publishing Corporation
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
ijwmn
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
IJCNCJournal
 
Optimizing the placement of cloud data center in virtualized environment
Optimizing the placement of cloud data center in virtualized  environmentOptimizing the placement of cloud data center in virtualized  environment
Optimizing the placement of cloud data center in virtualized environment
IJECEIAES
 
Ericsson Review: The benefits of self-organizing backhaul networks
Ericsson Review: The benefits of self-organizing backhaul networksEricsson Review: The benefits of self-organizing backhaul networks
Ericsson Review: The benefits of self-organizing backhaul networks
Ericsson
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ijgca
 

More from IJCNCJournal (20)

Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksDelay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksEnhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksComparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based AutoencoderVisually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksDelay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksEnhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksComparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
IJCNCJournal
 
Formal Abstraction & Interface Layer for Application Development in Automatio...
Formal Abstraction & Interface Layer for Application Development in Automatio...Formal Abstraction & Interface Layer for Application Development in Automatio...
Formal Abstraction & Interface Layer for Application Development in Automatio...
IJCNCJournal
 
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
IJCNCJournal
 
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
IJCNCJournal
 
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
 
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
IJCNCJournal
 
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
IJCNCJournal
 
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
IJCNCJournal
 
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
IJCNCJournal
 
Load Balanced Attack Defense System with Lightweight Authentication and Modif...
Load Balanced Attack Defense System with Lightweight Authentication and Modif...Load Balanced Attack Defense System with Lightweight Authentication and Modif...
Load Balanced Attack Defense System with Lightweight Authentication and Modif...
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksDelay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksEnhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksComparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based AutoencoderVisually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksDelay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksEnhancement of Quality of Service in Underwater Wireless Sensor Networks
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksComparative Analysis of POX and RYU SDN Controllers in Scalable Networks
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
IJCNCJournal
 
Formal Abstraction & Interface Layer for Application Development in Automatio...
Formal Abstraction & Interface Layer for Application Development in Automatio...Formal Abstraction & Interface Layer for Application Development in Automatio...
Formal Abstraction & Interface Layer for Application Development in Automatio...
IJCNCJournal
 
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...
IJCNCJournal
 
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
IJCNCJournal
 
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
 
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...
IJCNCJournal
 
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...
IJCNCJournal
 
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...
IJCNCJournal
 
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...
IJCNCJournal
 
Load Balanced Attack Defense System with Lightweight Authentication and Modif...
Load Balanced Attack Defense System with Lightweight Authentication and Modif...Load Balanced Attack Defense System with Lightweight Authentication and Modif...
Load Balanced Attack Defense System with Lightweight Authentication and Modif...
IJCNCJournal
 

Recently uploaded (20)

Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMUM TOTAL NETWORK COST

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 DOI: 10.5121/ijcnc.2016.8502 15 FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMUM TOTAL NETWORK COST Shin-ichiKuribayashi Department of Computer and Information Science, Seikei University, Japan ABSTRACT In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of Network Functions Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. This paper focuses on the deployment of NFV-based routing functions which are one of critical virtual network functions, and present the algorithm of virtual routing function allocation that minimize the total network cost. In addition, this paper presents the useful allocation policy of virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the network into consideration. Furthermore, this paper shows that there are cases where the use of NFV-based routing functions makes it possible to reduce the total network cost dramatically, in comparison to a conventional network, in which it is not economically viable to distribute small- capacity routing functions. KEYWORDS Virtual routing function, NFV, resource allocation, minimum total network cost. 1. INTRODUCTION In recent years, a new concept of Network Functions Virtualization (NFV) [1]-[3] has been introduced. The main idea of NFV is the decoupling of physical network equipment from the functions that run on them. By virtualizing and consolidating network functions traditionally implemented in dedicated hardware and using cloud technologies, network operators expect to achieve greater agility and accelerate new service deployments while driving down both operational and capital costs. The NFV implements a variety of virtual network functions with software on general- purpose servers, enabling the network operator to select any capabilities and locations of
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 16 network functions without any physical constraints. In addition, since NFV makes it easy to change functions and their locations and capacities dynamically to suit the usage condition, an economical network can be constructed flexibly. Therefore, the algorithm to determine the place where network functions are located and how much capacities of network functions flexibly are required is essential for economical network design. The rest of this paper is organized as follows. Section 2 explains related works. Section 3 presents points of NFV-based routing function allocation. Section 4 proposes the algorithm of virtual routing function allocation with minimum total network cost. Section 5 evaluates the proposed algorithm using a ladder-shaped network model, which simulates the shape of Japan, and identifies the useful function allocation policy. Section 6 presents the conclusions. This paper is an extension of the study presented in [15]. Especially, this paper tries to minimize the total network cost, instead of the total power consumption. 2. RELATED WORK Reference [2] summarizes the main differences between the conventional networks and NFV-based networks as follows: - Decoupling software from hardware - Flexible network function deployment - Dynamic operation The above features of NFV enable the network operator to select any capacities and locations of network functions without any physical constraints. Therefore, the efficient algorithm to determine the place where network functions are located and how much capacities of network functions are required is essential for economical network design. The issue of placing network functions would be related to virtual network embedding (VNE) [4], [5], which is used to allocate physical resources for virtual nodes/links to construct virtual network. Through dynamic mapping of virtual resources onto physical hardware, the benefit gained from existing hardware can be maximized. Reference [6] proposes a virtual network function (VNF) chaining placement that combines location- routing and VNE problems, solving first the placement and then the chaining. Reference [7] focuses on a hybrid scenario where services are provided by dedicated physical hardware and virtualized service instances, and formulates the placement problem as an Integer Linear Program (ILP) with an objective of allocating a service chain onto the physical network minimizing the number of servers used. Reference [8] investigates the influence of virtualizing the S-GW and P-GW functions on the network load and network delay. It showed differences in performance when the functions were either fully virtualized and when their data and control planes were separated. The authors showed that four data centers are required to support a full virtualized gateways deployment for an exemplary gateway deployment in a US network. Reference [9] formulates the vDPI (virtual Deep Packet Inspection) placement as a cost minimizing problem, capturing the
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 17 different constraints the operator is facing, and solves it as an integer linear program (ILP). References [10]-[12] propose the joint multiple resource allocation method in a cloud computing environment that consists of multiple data centers with processing ability and bandwidth to access them, and demonstrate by simulation evaluations that the proposed methods can reduce the total resource much, compared with the conventional allocation method. The proposed resource allocation model is related to the online bin packing problem with composite bins, in which two bins (processing ability bin and bandwidth bin) are consolidated. As for dynamic allocation, Reference [13] evaluates the online virtual function mapping and scheduling problem and proposes a set of greedy algorithms. Reference [14] proposes the automatic placement of the virtual nodes and the allocation of network services on them, supported by a monitoring system that collects and reports on the behavior of the resources. Most of these studies mainly try to embed the virtual network functions to physical resources economically and would be useful for the short-term design of the network, to use the existing resources efficiently. It is also required to expand the network or to add new network functions in the future.As for long-term design of the network, this paper tries to determine the optimal capacity and location of virtual network functions without any physical constrains. This should be necessary for the network operators to design their network economically. This paper also tries to show that the use of NFV-based routing functions makes it possible to reduce the total network cost dramatically, in comparison to a conventional network. 3. POINTS OF NFV-BASED ROUTING FUNCTION ALLOCATION In general, routing functions would be allocated either in a centralized approach or in a distributed approach, as illustrated in Figure 1. There are three areas (#A, #B, #C) and a circle, ○, indicates virtual routing functions deployed at each area in Figure 1. Ifa distributed approach is adopted, virtual routing functions are deployed in each area and intra-area traffic does not need to go through routing functions outside the area concerned. This results in less cost of a circuit than in a centralized approach. In addition, packet transfer delay is shorter, thereby enhancing the quality of service. On the other hand, virtual routing functions aredeployed only in Area #A in a centralized approach, resulting in less cost of virtual routing functions than in a distributed approach. In a conventional network, the centralized approach would be an economically viable option because capacity variations of routers are limited. Particularly, small capacity routers are not available.In NFV-based network, both centralized and distributed approaches could be considered as routing functions of any capacities can be allocated at any location economically. It is necessary to take these factors into consideration in considering the routing function allocation in an NFV-based network.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 18 4. ALGORITHM OF VIRTUAL ROUTING FUNCTION ALLOCATION WITH MINIMUM TOTAL NETWORK COST 4.1. TWO POSSIBLE ALGORITHMS <Algorithm 1> Initially, allocate a routing function to every area. Then, select the area with the minimum number of packets sent or received per unit time (referred to as “integration-origin area”). If integrating the routing function of the selected area with that of another area (referred to as “integration-destination area”) reduces the total network cost, integrate them. Repeat this until the total network cost can no longer be reduced or there is no integration-origin area left. <Algorithm 2> Initially, allocate a routing function only to the area where the number of packets sent or received per unit time is the largest. Then, select the area where the number of packets sent or received per unit time is the second largest. If making the routing function of the first area handle the routing of the second area reduces the total network cost, do so. Repeat this until the total network cost can no longer be reduced or there is no area which can be handled by the routing function of another area. In this paper, we adopt Algorithm 1 and clarify the detailed allocation algorithm. Area #B Area #C :Virtual routing functions :Terminal or Server <Centralized> <Distributed> Router Area #AArea #A Area #B Area #C Router Router Router Figure 1. Two main approaches for virtual routing function allocation
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 19 4.2. DETAILED PROCESSING FLOW OF VIRTUAL ROUTING FUNCTION ALLOCATION 4.2.1. OVERVIEW OF PROCESSING FLOW The processing flow for determining whether to integrate two areas is described below by referring to Figure 2. Step 1. Selection of integration-origin area Select an area with the least volume of packets sent or received per unit time, so as to minimize the amount of detour traffic (Area #3 in Figure 2). Step 2. Selection of integration-destination area Select all area as integration-destination candidates except integration origin area. Step 3. Integration If the total network cost after the integration is smaller than before the integration, the routing function of the integration-origin area is integrated into that of the integration-destination area in which the integration results in the minimum total network cost. For example, if PB1<PB2<PAin Figure 2, the routing function is integrated into the one in Area #1. Note that PA, PB1 and PB2are total network cost of topology A, B1 and B2 respectively.If the total network cost after the integration is not smaller than that before the integration, no integration is made.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 20 4.2.2 Allocation Policy For Selecting Integration-Source Area In Step 1 Unless the volumes of traffic flows in the two directions between two areas are greatly unbalanced, integration-origin area candidates are selected in descending order of the distance from the center of the network, in Step 2. For example, in the ladder-shaped model shown in Figure 3 (which simulates the shape of Japan and consists of 10 areas), it is desirable to reduce the total circuit length by integrating areas into area group G3 (which contains Areas #5 and #6), which is close to the center of the network so that the total network cost can be reduced. Areas #1, #2, #9, and #10 included in group G1, which is the farthest from the center of the network, are first selected one by one as integration-origin area candidates. Whether to integrate them is determined using the algorithm described in Section 4.2.1. When all the areas in G1 have been examined, Areas #3, #4, #7, and #8 in G2 are selected as integration- origin area candidates in Figure 3.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 21 5. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION 5.1 . EVALUATION CONDITIONS 1) Network structure: The ladder-shaped network illustrated in Figure 3 is used for evaluation. There are 10 areas and the distance between two adjacent areas in the horizontal direction is 400 km while that in the vertical direction is 300 km. 2) Traffic Model It is supposed that there are 110 simultaneously communicating terminals in each area. If it is assumed that 20% of all terminals are communicating simultaneously, the total number of terminals in all areas will be about 5000 and this number is representative of that of small-to- medium enterprises. The terminals are broken down into 11 sets of 10 terminals, and each set is communicating with a different area. Since it is desirable to consider applications that require the largest bandwidths and the largest number of packets, video traffic is assumed. The bandwidth (one way) required for communication by each terminal is set to 1.8 Mbps, and the packet length is set to 7200 bits. It requires routing capacity of 250 pps (packets/s) per each communication (one way).In addition, to evaluate unbalanced traffic distribution, it is assumed that traffic concentrated on the central area (Area #5 in Figure 3). To evaluate the effect of traffic concentration on Area #5, it is assumed that the volume of traffic between Area 5 and any of the other areas is M times (referred to as “peak coefficient”) larger than that between non-Area #5 areas. If M is one, the traffic distribution is uniform. 3) Route selection between areas The fixed route is selected between areas, as illustrated in Figure 4. Moreover,it is not considered to select the route dynamically according to the traffic conditions in the network.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 22 4) Zc is defined as the ratio of the cost of a routing function to that of a circuit is critical, as in (1): Zc=α/β (1) where α is the cost of routing functions per pps, and β is the cost of a circuit per Mbps per 10 km. The fixed cost of routing function or circuit bandwidth when there is no traffic is disregarded in this paper. 5) Evaluation tool We built an evaluation tool written in the C language. 5.2 . RESULTS AND EVALUATION Evaluation results of the final routing function allocation following the proposed allocation algorithm in Section 4.2 are shown in Figures 5 and 6. The size of a circle, ○, in an area indicates the capacity of the routing function. Figure 5 shows how the final function allocation changes as Zc is varied and M is fixed at 2. Figure 6 shows how the final function allocation changes as M is varied and Zc is fixed at 3. The following points are clear from these Figures: 1) The greater Zc (cost ratio) is, the greater the cost of the routing function relative to that of the circuit and the more advantageous to integrate the two areas concerned.In the example of Figure 5, routing functions are allocated in all areas when Zc≦0.9, in half of all areas when Zc≒2.9, and only in one area when Zc>3.5. 2) The greater M (peak coefficient) is, the greater the effect of integrating the routing function of one area into that of another area is. This is explained in detail with Figure 7. Two areas, #A and #B are considered in Figure 7. If area #A is integrated into area #B, the circuit capacity that is newly required for intra-area communication in the first area consumes additional cost, x1, while cost x21 and x22 previously consumed by the routing function capacity that had been required to relay traffic to another area becomes zero. The greater M is, the greater x22 becomes (even when x1 remains the same), resulting in an increase in the number of cases where integration is advantageous (the right part in Figure 7). To ascertain the above-mentioned trend, we examined how the ratio of the number of areas that have routing functions to the total number of areas, δ, changes when Zc and M are varied. The result is shown in Figure 8. The horizontal axis represents Zc while the vertical axis represents δ. The minimum value of δ is 0.1 while its maximum value is 1.0. As in Figures 5 and 6, the greater Zc is and the greater M is, the more advantageous the integration is. 3) Figure 5 shows that, when Zc is 0.8, the final function allocation is to distribute a routing function to every area. However, this allocation would not be viable in the conventional non-NFV network because a routing function needs to have a capacity that is higher than a certain level, Q. For example, if Q is twice the capacity of the routing function allocated in the case of Figure 5 (Zc = 0.9), the total network cost of the conventional network
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 23 (it is the same topology in the case of Zc> 3.6 in Figure 5) increases by 20%. This takes only the cost of the routing function capacity and the circuit bandwidth into consideration, and does not include the fixed cost of servers and circuits, which must be taken into consideration in the conventional network. Therefore, NFV-based routing function allocation could make it possible to distribute small-capacity routing functions in a network, resulting in a large reduction in cost in comparison to the conventional network. Figure 6. Simulation result 2 <Final topology of virtual routing function allocation (Zc=3)> Area #1 Area #3 Area #5 Area #7 Area #9 Area #2 Area #4 Area #6 Area #8 Area #9 Peak Area <M=1> <M=2> <M=10> Centralizedapproach ismoreattractive Area #10
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 24 5. CONCLUSION This paper has proposed the algorithm of virtual routing function allocation in the NFV network for minimizing the total network cost. The proposed allocation algorithm has been evaluated with a ladder-shaped network model, which simulates the shape of Japan. It has been found that, the greater the cost of a routing function relative to that of a circuit is and the greater the peak coefficient of traffic between areas is, the smaller the total network cost can be made by integrating the routing functions of some areas into those of a small number of areas. Furthermore, this paper has indicated that there are cases where the use of NFV-based routing functions makes it possible to reduce the total network cost much, compared with a conventional network, in which it is not economically viable to distribute small-capacity routing functions. It is required to study the routing function allocation, which considers 1) fixed cost of routing functions or circuits where there is no traffic, 2) allowable maximum network delay and 3) dynamic route selection between area. The allocation of other virtual network functions (ex. DPI, FW) in addition to virtual routing functions should also be studied. Area #A <M is small> <M is large> Area #B Area #A Area #B Area #A Area #B Area #A Area #B W:Traffic volume between Area #A and Area #B M*W:Traffic volume between Area #A and Area #B Figure 7. Comparison of area integration effect x21 Cost reduction: X21 - X1 x1 Cost reduction: X22 - X1 (Circuit) (Circuit) (Routing) X21 <<<<X22 <<<< x22 (Routing) x1
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 25 ACKNOWLEDGMENT I would like to thank Mr. K.Hidafor their help with the simulation. REFERENCES [1] M. Chiosi et al., “Network Functions Virtualisation - An Introduction, Benefits, Enablers, Challenges and Call for Action,” ETSI NFV, Oct. 2012. https://portal.etsi.org/nfv/nfv_white_paper.pdf. [2] “Network Functions Virtualisation (NFV); Architectual Framework,” ETSI GS NFV 002 v1.2.1, Dec. 2014. http://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf. [3] R. Mijumbi, J. Serrat, J. Gorricho, N. Bouten, F. D. Trurck and R. Boutaba, “Network Function Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp.236-262, 2016. [4] A. Fischer, J. F. Botero, M. T. Beck, H. Meer, and X. Hesselbach,” Virtual Network Embedding: A Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013. [5] X. Wei, S. Hu, H. Li, F. Yang and Y. Jin, “A Survay on Virtual Network Embedding in Cloud Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014. [6] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014, pp. 7–13. Figure 8. Ratio δ vs. value of Zc and M
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 26 [7] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network functions,” in Network and Service Management (CNSM), 2014 10th International Conference on, Nov 2014, pp. 418–423. [8] A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann, "Applying NFV and SDN to LTE Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular: Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014. [9] M. Bouet, J. Leguay and V. Conan, “Cost-based placement of vDPI functions in NFV infrastructures,” International Journal of Network Management, pp.490-506, 2015. [10] S. Tsumura and S. Kuribayashi, “Simultaneous allocation of multiple resources for computer communications networks”, APCC2006, 2F-4 (2006.8) [11] S. Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2, No.1, pp.1-8, Feb. 2011. [12] S. Kuribayashi, “Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access”, International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015. [13] R. Mijumbi, J. Serrat, J. Gorricho, N. Boutenz, F. Turckz and S. Davy, “Design and Evaluation of Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on Network Softwarization (NetSoft), pp.1-9, 2015. [14] S. Clayman, E. Mainiy, A. Galis, A. Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual Network Functions, ”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014. [15] K. Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption,” 18th International Conference on Information and Communication Systems (ICICS Venice 2016), Aug. 2016. AUTHOR Shin-ichiKuribayashi received the B.E., M.E., and D.E. degrees from Tohoku University, Japan, in 1978, 1980, and 1988 respectively. He joined NTT Electrical Communications Labs in 1980. He has been engaged in the design and development of DDX and ISDN packet switching, ATM, PHS, and IMT 2000 and IP-VPN systems. He researched distributed communication systems at Stanford University from December 1988 through December 1989. He participated in international standardization on ATM signaling and IMT2000 signaling protocols at ITU-T SG11 from 1990 through 2000. Since April 2004, he has been a Professor in the Department of Computer and Information Science, Faculty of Science and Technology, Seikei University. His research interests include optimal resource management, QoS control, traffic control for cloud computing environments and green network. He is a member of IEEE, IEICE and IPSJ.