Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

IEEE COMMUNICATIONS SURVEYS & TUTORIALS 1

Network Function Virtualization: State-of-the-art


and Research Challenges
Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, Raouf Boutaba

Abstract—Network Function Virtualization (NFV) has drawn that due to the high competition, both amongst themselves
attention from both industry and academia as an important shift and from services being provided over-the-top on their data
in telecommunication service provision. By decoupling network channels, increasing prices only leads to customer churn.
functions from the physical devices on which they run, NFV
has the potential to lead to reductions in OPEX and CAPEX Therefore, TSPs have been forced to find ways of building
and to allow for deployment of new services with increased more dynamic and service-aware networks with the objective
agility and faster time-to-value. Since NFV is a recently proposed of reducing product cycles, operating & capital expenses and
paradigm, there is need for the research community to develop improving service agility.
new architectures, software and systems, and to evaluate different Network Function Virtualization (NFV) [3], [4] has been
possibilities and trade-offs in developing technologies for its
deployment. In this paper, after discussing NFV and its rela- proposed as a way to address these challenges by leveraging
tionship with complementary fields software defined networking virtualization technology to offer a new way to design, deploy
(SDN) and cloud computing, we survey the state-of-the-art in and manage networking services. The main idea of NFV is the
NFV, and explore promising research directions in this area. decoupling of physical network equipment from the functions
We also explore key NFV projects, standardization efforts, early that run on them. This means that a network function - such
implementations, use cases and commercial products.
as a session border controller function - can be dispatched
Index Terms—Network function virtualization, virtual network to a TSP as an instance of plain software. This allows for
functions, future Internet, software defined networking, cloud the consolidation of many network equipment types onto
computing.
high volume servers, switches and storage, which could be
located in datacenters, distributed network nodes and at end
I. I NTRODUCTION user premises. This way, a given service can be decomposed
into a set of virtual network functions (VNFs), which could
Service provision within the telecommunications industry
then be implemented in software running on one or more
has traditionally been based on network operators deploying
industry standard physical nodes. The VNFs may then be
physical proprietary devices and equipment for each function
relocated and instantiated at different network locations (e.g.,
that is part of a given service. In addition, service components
aimed at introduction of a service targeting customers in a
have strict chaining and/or ordering that must be reflected
given geographical location) without necessarily requiring the
in the network topology and in the localization of service
purchase and installation of new hardware.
elements. These, coupled with requirements for high quality,
NFV promises TSPs with more flexibility to further open
stability and stringent protocol adherence, have led to long
up their network capabilities and services to users and other
product cycles, very low service agility and heavy dependence
services, and the ability to deploy or support new network
on specialized hardware.
services faster and cheaper so as to realize better service
However, the requirements by users for more diverse and
agility. To achieve these benefits, NFV paves the way to a
new (short-lived) services with high data rates continue to
number of differences in the way network service provisioning
increase. Therefore, Telecommunications Service Providers
is realized in comparison to current practice. In summary, these
(TSP) must correspondingly and continuously purchase, store
differences can be listed as [5]:
and operate new physical equipment. This does not only
Decoupling software from hardware. As the network ele-
require high and rapidly changing skills for technicians op-
ment is no longer a composition of integrated hardware and
erating and managing this equipment, but also requires dense
software entities, the evolution of both are independent of
deployments of network equipment such as base stations. All
each other. This allows separate development timelines and
these lead to high CApital and OPerational Expenditure costs
maintenance for software and hardware.
(CAPEX and OPEX) for TSPs [1], [2].
Flexible network function deployment. The detachment of
Moreover, even with these high customer demands, the
software from hardware helps reassign and share the in-
resulting increase in capital and operational costs cannot be
frastructure resources, thus together, hardware and software,
translated in higher subscription fees, since TSPs have learned
can perform different functions at various times. This helps
R. Mijumbi, J. Serrat and J.L. Gorricho are with the Network Engineering network operators deploy new network services faster over
Department, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain. the same physical platform. Therefore, components can be
N. Bouten and F. De Turck are with Department of Information Technology, instantiated at any NFV-enabled device in the network and
Ghent University - iMinds, B-9050 Ghent, Belgium.
R. Boutaba is with D.R. Cheriton School of Computer Science, University their connections can be set up in a flexible way.
of Waterloo, Waterloo, Ontario, N2L 3G1, Canada. Dynamic scaling. The decoupling of the functionality of the
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 2

Public IP Private IP Public IP Private IP


Services Services Services Services

vider
Service Provider Service Provider
vCore Router
Virtual Functions
Core Router
vRouting UPnP

vUPnP
vFirewall vNAT

Customer Sites Customer Sites


CPE 1 CPE 2 CPE 1 CPE 2 CPE 3 CPE N
Routing Routing

Radio Radio Radio Radio Radio


Radio

Firewall
UPnP

UPnP
Firewall
UPnP

UPnP
Switch Switch Switch
... Switch

NAT NAT
Modem Modem Modem Modem Modem Modem
Switch Switch

Fig. 1. Traditional CPE Implementations Fig. 2. Possible CPE Implementation with NFV

network function into instantiable software components pro- since, for example, updating the DHCP for all customers
vides greater flexibility to scale the actual VNF performance would only involve changes at the ISP. In the same way, adding
in a more dynamic way and with finer granularity, for instance, another function such as parental controls for all or a subset
according to the actual traffic for which the network operator of customers can be done at once. In addition to saving on
needs to provision capacity. operational costs for the ISP, this potentially leads to cheaper
CPEs if considered on a large scale.
A. NFV Example: Customer Premises Equipment
In Figures 1 and 2, we use an example of a customer
B. History of Network Function Virtualization
premises equipment (CPE) to illustrate the economies of
scale that may be achieved by NFV. Fig. 1 shows a typical The concept and collaborative work on NFV was born in
(current) implementation of a CPE which is made up of October 2012 when a number of the world’s leading TSPs
the functions: Dynamic Host Configuration Protocol (DHCP), jointly authored a white paper [4] calling for industrial and
Network Address Translation (NAT), routing, Universal Plug research action. In November 2012 seven of these operators
and Play (UPnP), Firewall, Modem, radio and switching. In (AT&T, BT, Deutsche Telekom, Orange, Telecom Italia, Tele-
this example, a single service (the CPE) is made up of eight fonica and Verizon) selected the European Telecommunica-
functions. These functions may have precedence requirements. tions Standards Institute (ETSI)[6] to be the home of the
For example, it may be required to perform firewall functions Industry Specification Group for NFV (ETSI ISG NFV). Now,
before NAT. Currently, it is necessary to have these functions more than two years later, a large community of experts are
in a physical device located at the premises of each of the working intensely to develop the required standards for NFV
customers 1 and 2. With such an implementation, if there is a as well as sharing their experiences of its development and
need to make changes to the CPE, say, by adding, removing or early implementation. The membership of ETSI ISG NFV has
updating a function, it may be necessary for a technician from grown to over 240 individual companies including 37 of the
the ISP to individually talk to or go to each of the customers. world’s major service providers as well as representatives from
It may even require a complete change in the device in case both telecoms and IT vendors [6]. ETSI’s ISG NFV has suc-
of additions. This is not only expensive (operationally) for the cessfully completed Phase 1 of its work with the publication of
ISPs, but also for the customers. 11 ETSI Group Specifications [7]. These specifications build
In Figure 2, we show a possible implementation based on on the first release of ETSI ISG NFV documents published in
NFV in which some of the functions of the CPE are transferred October 2013 and include an infrastructure overview, updated
to a shared infrastructure at the ISP, which could also be a architectural framework, and descriptions of the compute,
datacenter. This makes the changes described above easier hypervisor and network domains of the infrastructure. They
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 3

also cover management and orchestration, security and trust,


resilience and service quality metrics.
Since ETSI ISG NFV is not a standards body, its aim Virtual Network Functions
is to produce requirements and potential specifications that
TSPs and equipment vendors can adapt for their individual
environments, and which may be developed by an appropriate Virtual Services

Management and Orchestration

Management and Orchestration


standards development organization (SDO). However, since
standards bodies such as the 3GPP [8] are in liaison with Computing, Storage, Network Resources
the ETSI ISG NFV, we can expect these proposals will be
generally accepted and enforced as standards. 3GPP’s Tele- Virtual Resources
com Management working group (SA5) is also studying the
management of virtualized 3GPP network functions.
Computing, Storage, Network Resources

C. Related Work and Open Questions Physical Resources


However, while both industry and academia embrace NFV Network Function Virtualization Infrastructure
at unprecedented speeds, the development is still at an early
stage, with many open questions. As TSPs and vendors look Fig. 3. Network Function Virtualization Architecture
at the details of implementing NFV and accomplishing its
foreseen goals, there are concerns about the realization of
some of these goals and whether implementation translates to implement environments involving all of them. In Sections
the benefits initially expected. There are important unexplored IV and V, we survey the major projects on NFV as well as
research challenges such as testing and validation [9], resource early implementations, use cases and commercial products.
management, inter-operability, instantiation, developing VNFs Based on a qualitative analysis of the state-of-the-art, Section
that are able to run at carrier-grade speed, e.t.c., that should be VI identifies key research areas for further exploration, and
addressed. Even areas being explored such as management and the paper is concluded in Section VII.
orchestration still have open questions especially with regard
to support for heterogeneity. II. N ETWORK F UNCTION V IRTUALIZATION
There have been recent efforts to briefly introduce NFV, A RCHITECTURE
explain its performance requirements, architecture, uses cases
According to ETSI ISG NFV, the NFV Architecture is
and potential approaches to challenges [3]. A discussion of
composed of three key elements: NFV Infrastructure (NFVI),
challenges to introducing NFV in mobile networks, with a
Virtual Network Functions (VNFs) and NFV Management and
focus on virtualized evolved packet core is presented in [10],
Orchestration [14]. We represent them graphically in Fig. 3. In
while the reliability challenges of NFV infrastructures are
this Section these elements are defined [5], [15], [14], together
examined in [11]. However, all efforts in current literature are
with a reference business model that illustrates the possible
narrow in at least one of the following main ways: (1) with
business relationships between the different actors in NFV,
regard to scope, they do not consider important aspects of
and important system design considerations.
NFV, such as its relationship with SDN and cloud computing,
(2) limited review and analysis of standardization activities,
and (3) in terms of depth, descriptions of on ongoing research A. NFV Infrastructure (NFVI)
and state-of-the-art efforts and research challenges are not
The NFVI is the combination of both hardware and software
complete.
resources which make up the environment in which VNFs are
This paper examines the state-of-the-art in NFV and identi-
deployed. The physical resources include commercial-off-the-
fies key research areas for future exploration. In addition, we
shelf (COTS) computing hardware, storage and network (made
explore the relationship between NFV and two closely related
up of nodes and links [16]) that provide processing, storage
fields, SDN [12] and cloud computing [13]. We also describe
and connectivity to VNFs. Virtual resources are abstractions of
the different research and industrial initiatives and projects
the computing, storage and network resources. The abstraction
on NFV, as well as early implementation, proof of concepts
is achieved using a virtualization layer (based on a hypervisor),
and product cases. To the best of our knowledge, this paper
which decouples the virtual resources from the underlying
presents, the most comprehensive state-of-the-art survey on
physical resources. In a datacenter environment, the computing
NFV to date.
and storage resources may be represented in terms of one or
more virtual machines (VMs), while virtual networks are made
D. Organization up of virtual links and nodes. A virtual node is a software
The rest of this paper is organized as follows: Section II component with either hosting or routing functionality, for
presents the NFV architecture, including a reference business example an operating system encapsulated in a VM. A virtual
model and important design considerations. In Section III, we link is a logical interconnection of two virtual nodes, appearing
introduce SDN and cloud computing, describing the relation- to them as a direct physical link with dynamically changing
ship between them and NFV, as well as current efforts to properties [17].
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 4

B. Virtual Network Functions and Services


A network function (NF) is a functional block within a
Telecommunications
network infrastructure that has well defined external interfaces Service Provider (TSP) Infrastructure
and well-defined functional behaviour [14]. Examples of NFs Provider (InP)
are elements in a home network, e.g. Residential Gateway Server

(RGW); and conventional network functions, e.g. DHCP Server

servers, firewalls, etc. Therefore, a VNF is an implementation


of an NF that is deployed on virtual resources such as a
VM. A single VNF may be composed of multiple internal
components, and hence it could be deployed over multiple
VMs, in which case each VM hosts a single component Brokers and Virtual User
of the VNF [5]. A virtual service is an offering provided Network Operators
by a TSP that is composed of one or more VNFs, and
deployed on virtual resources such a VM. The number, type
and ordering of VNFs that make it up are determined by the
service’s functional and behavioural specification. Therefore, Fig. 4. NFV Business Model
the behaviour of the service is dependent on that of the
constituent VNFs. running VNFs. They also determine the chaining of these
functions to create services to end users. In a more general
C. NFV Management and Orchestration (NFV MANO)
case, TSPs may sub-lease their virtual resources to other TSPs
According to the ETSI ISG NFV [18], NFV MANO pro- such as with mobile virtual network operators (MVNO) [22].
vides the functionality required for the provisioning of VNFs, In such a case, the former would appear as an InP to the
and the related operations, such as the configuration of the MVNO. In cases where the InP is private or in-house, e.g.
VNFs and the infrastructure these functions run on. It includes provided by TSP network nodes or servers, then the InP and
the orchestration and lifecycle management of physical and/or TSP may be one entity.
software resources that support the infrastructure virtualiza- 3) Brokers: In cases where a single service has to be
tion, and the lifecycle management of VNFs. NFV MANO provided by more than one InP (multi-domain environment),
focuses on all virtualization-specific management tasks neces- it may be important to have brokers who would receive
sary in the NFV framework [19], [20]. resource requests from TSPs and then discover and aggregate
resources from multiple InPs to offer the service to the TSP.
D. Business Model
In fact, MVNOs may also be considered as brokers who lease
The NFV model involves providing physical resources resources from TSPs to provide services to Users.
as-a-service on an on-demand basis. Using the architecture 4) End User: End users are the final consumers of the
described above, we can observe two players: those that services provided by TSPs. They are similar to the end users
provide the infrastructure onto which VMs can be created - in the existing Internet, except that the existence of multiple
the Infrastructure Provider (InP), and those who dynamically services from competing TSPs enables them to choose from a
deploy services/functions onto the VMs - TSPs. In addition, wide range of services. End users may connect to multiple
TSPs have users, and we may have a brokerage function TSPs for different services [16]. As shown in Fig. 4, the
coordinating these three actors. This gives a business model granularity (in terms of amount of resources) of the virtual
with four actors as shown in Fig. 4, the roles of each of which resources can be so high that even users could lease resources
are detailed below. on their own from InPs.
1) Infrastructure Provider (InP): InPs deploy and manage
physical resources in form of datacenters and physical net-
E. NFV Design Considerations
works. It is on top of these resources that virtual resources may
be provisioned and leased through programming interfaces to As NFV matures, it is important to note that it is not
one or more TSPs. The InPs may also determine how the pool only sufficient to deploy NFs over virtualized infrastructures.
of the available resources are allocated to the TSPs. In NFV, Network users are generally not concerned with the complexity
examples of InPs could be public datacenters such as those by (or otherwise) of the underlying network. All users require is
Amazon, or private servers owned by TSPs. If a given InP is for the network to allow them access to the applications they
not able to provide resources fully or in part to a given TSPs, need, when they need them. Therefore, NFV will only be an
negotiations and hence coalitions can be formed with other acceptable solution for TSPs if it meets key considerations
InPs so as to provision multi-domain VNFs [21]. identified below.
2) Telecommunications Service Provider (TSP): TSPs1 1) Network Architecture and Performance: To be accept-
lease resources from one or more InPs, which they use for able, NFV architectures should be able to achieve performance
similar to that obtained from functions running on dedicated
1 In this paper, we use the term Telecommunications Service Provider (TSP)
hardware. This requires that all potential bottlenecks at all
to generally mean all service providers. This includes service providers such
as Netflix that deploy services with caches in different locations, as well as layers of the stack are evaluated and mitigated. As an example,
the traditional TSPs such as Telefonica. if VNFs belonging to the same service are placed in different
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 5

VMs, then there must be a connection between these two VMs, NFV platform must be an open, shared environment capable
and this connection must provide sustained, aggregated high of running applications from different vendors. InPs must be
bandwidth network traffic to the VNFs. To this end, it may free to make their own hardware selection decisions, change
be important for the network to be able to take advantage of hardware vendors, and deal with heterogeneous hardware.
connections to the network interfaces that are high-bandwidth In addition, such platforms should be able to shield VNFs
and low latency due to processor offload techniques such from the specifics of the underlying networking technolo-
as direct memory access (DMA)[23] for data movement and gies (e.g., optical, wireless, sensor etc.) [28]. Finally, and
hardware assist for CRC computation [24], [25]. In addition, equally important, platforms should allow for possibilities of
VNFs should only be allocated the storage and computation an end-to-end service to be created on top of more than
resources they need. Otherwise, NFV deployments may end one infrastructural domain without restrictions, and without
up requiring more resources, and hence there would be no need for technology specific solutions. While virtualization
justification for transiting to NFV. within a single InP reduces cost, inter-provider NFV enables
2) Security and Resilience: The dynamic nature of NFV the productization of the same internal software functions
demands that security technologies, policies, processes and and results in opportunities for revenue growth [29]. As an
practices are embedded in its genetic fabric [26]. In particular, example, if a mobile user subscribing to given TSP roams into
there are two important security risks that should be considered the coverage of another TSP, the user should not be restricted
in NFVI designs: (1) functions or services from different to voice, data and simple messaging services. The real power
subscribers should be protected/isolated from each other. This of NFV would be realized if such a user is able to choose
helps to ensure that functions are resilient to faults and attacks a firewall or security service from the current TSP, or use a
since a failure or security breach in one function/service combination of functions from the host TSP and others from
would not affect another. (2) the NFVI (physical and virtual the one for which he has coverage.
resources) should be protected from the delivered subscriber 5) Legacy Support: Backward compatibility will always be
services. One way to secure the NFVI is to deploy internal an issue of high concern for any new technology. NFV is not
firewalls within the virtual environment [25]. These would an exception. It is even more important for the telecommu-
allow for the NFV MANO to access to the VNFs without nications industry, given that even for a given operator that
letting malicious traffic from the customer networks into the decides to make the transition to NFV, it may take time for
NFVI. Finally, to make service deployment resilient, it may this to be complete, let alone the fact that some operators
be necessary for functions that make up the same service not will do this faster than others. Therefore, support for both
be hosted by physical resources in the same fault or security physical and virtual NFs is important for operators making the
domain during deployment. transition to NFV as they may need to manage legacy physical
3) Reliability and Availability: Whereas in the IT domain assets alongside virtualized functions for sometime. This may
outages lasting seconds are tolerable and a user typically necessitate having an orchestration strategy that closes the gap
initiates retries, in telecommunications there is an underlying between legacy services and NFV. It is important to maintain a
service expectation that outages will be below the recognizable migration path toward NFV, while keeping operators’ current
level (i.e. in the order of milliseconds), and service recovery network investments in place [30]. InPs must be able to func-
is performed automatically. Furthermore, service impacting tion in an environment whereby both virtualized and physical
outages need to be limited to a certain amount of users network functions operate on the network simultaneously.
(e.g. a certain geography) and network wide outages are not 6) Network Scalability and Automation: In order to achieve
acceptable [27]. These high reliability and availability needs the full benefits of NFV, a scalable and responsive networking
are not only a customer expectation, but often a regulatory solution is necessary. Therefore, while meeting the above
requirement, as TSPs are considered to be part of critical design considerations, NFV needs to be acceptably scalable to
national infrastructure, and respective legal obligations for ser- be able to support millions of subscribers. To give an example,
vice assurance/business continuity are in place. However, not most current NFV proof-of-concepts are based on deploying a
every function has the same requirements for resiliency: For VM to host a VNF. Just like a single VM may not be able to
example, whereas telephony usually has the highest require- meet the requirements of a given function, it is not economical
ments for availability, other services, e.g. Short Messaging Ser- to deploy a VM per NFV, as the resulting VM footprint
vice (SMS), may have lower availability requirements. Thus, would be too large, and would lead to scalability problems
multiple availability classes may be defined which should be at the virtualization layer. However, NFV will only scale if all
supported by a NFV framework [27]. Again, functions may of the functions can be automated. Therefore, automation of
be deployed with redundancy to recover from software or processes is of paramount importance to the success of NFV
hardware failures. [4]. In addition, the need for dynamic environments requires
4) Support for Heterogeneity: The main selling point of that VNFs can be deployed and removed on demand and scaled
NFV is based on breaking the barriers that result from propri- to match changing traffic.
etary hardware-based service provision. It is therefore needless
to mention that openness and heterogeneity will be at the
III. R ELATED T ECHNOLOGIES
core of NFV’s success. Vendor-specific NFV solutions with
vendor-specific hardware and platform capabilities defeat the The need for innovativeness, agility and resource sharing is
original NFV concept and purpose. Therefore, any acceptable not new. In the past, the communications industry has invented
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 6

Layered Resources Model Example

Facebook, Google Apps, Twitter,


Software SaaS
Business Applications, ZenDesk, Saleforce.com, Zoho Office
Web Services Windows Azure, Google AppEngine,
Platform PaaS
RedHat OpenShift, force.com
Software Framework
Infrastructure Amazon Web Services (EC2, S3,
DynamoDB), GoGrid, Rackspace
Virtual Machines IaaS
Hardware Data Centres
CPU, Storage, Bandwidth

Fig. 5. Cloud Computing Service Models

and deployed new technologies to help them offer new and Measured service. Cloud systems automatically control and
multiple services in a more agile, cost and resource effective optimize resource use by leveraging a metering capability
way. In this Section, we introduce two such approaches that are at some level of abstraction appropriate to the type of ser-
closely related to NFV; cloud computing and software defined vice (e.g., storage, processing, bandwidth, and active user
networking. We also discuss the relationship between NFV accounts).
and each of them, as well as current attempts to enable all 2) Cloud Computing Service Models: The three service
three to work together. models of cloud computing are shown in Fig. 5, and defined
below.
Software as a Service (SaaS). The user is able to use the
A. Cloud Computing
providers applications running on a cloud infrastructure. The
According to NIST [31] cloud computing is “a model for applications are accessible from various client devices through
enabling ubiquitous, convenient, on-demand network access either a thin client interface, such as a web browser (e.g., web-
to a shared pool of configurable computing resources (e.g., based email), or a program interface.
networks, servers, storage, applications, and services) that can Platform as a Service (PaaS). The user is able to deploy
be rapidly provisioned and released with minimal management onto the cloud infrastructure consumer-created or acquired
effort or service provider interaction”. In a cloud computing applications created using programming languages, libraries,
environment, the traditional role of service provider is divided services, and tools supported by the provider.
into two: the infrastructure providers who manage cloud plat- Infrastructure as a Service (IaaS). The user is able to pro-
forms and lease resources according to a usage-based pricing vision processing, storage, networks, and other fundamental
model, and service pro viders, who rent resources from one computing resources where the consumer is able to deploy and
or many infrastructure providers to serve the end users [13]. run arbitrary software, which can include operating systems
The cloud model is composed of five essential characteristics and applications.
and three service models [31]. We briefly introduce these in 3) Relationship between Cloud Computing and NFV: Being
the following subsections. the cheapest choice for testing and implementation, most NFV
1) Essential Characteristics of Cloud Computing: On- proof of concepts and early implementations have been based
demand self-service. A consumer can unilaterally provision on deploying functions on dedicated VMs in the cloud. The
computing capabilities, such as server time and network flexibility of cloud computing, including rapid deployment
storage, as needed automatically without requiring human of new services, ease of scalability, and reduced duplication,
interaction with each service provider. make it the best candidate that offers a chance of achieving
Broad network access. Capabilities are available over the the efficiency and expense reduction that are motivating TSPs
network and accessed through standard mechanisms that pro- towards NFV.
mote use by heterogeneous thin or thick client platforms (e.g., However, deploying NFs in the cloud will likely change
mobile phones, tablets, laptops, and workstations). every aspect of how services and applications are developed
Resource pooling. The providers computing resources are and delivered. While work continues to be done with respect
pooled to serve multiple consumers using a multi-tenant to networked clouds and inter-cloud networking [38], [39],
model, with different physical and virtual resources dynami- telecommunication networks differ from the cloud computing
cally assigned and reassigned according to consumer demand. environment in at least three ways: (1) data plane workloads
Rapid elasticity. Capabilities can be elastically provisioned in telecom networks imply high pressure on performance,
and released, in some cases automatically, to scale rapidly (2) telecom network topologies place tough demands on the
outward and inward commensurate with demand. network and the need for global network view for management
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 7

TABLE I
C OMPARISON OF NFV IN T ELECOMMUNICATION N ETWORKS AND C LOUD C OMPUTING

Issue NFV (Telecom Networks) Cloud Computing

Approach Service/Function Abstraction Computing Abstraction


Formalization ETSI NFV Industry Standard Group DMTF Cloud Management Working Group [32]
Latency Expectations for low latency Some latency is acceptable
Infrastructure Heterogeneous transport (Optical, Ethernet, Wireless) Homogeneous transport (Ethernet)
Protocol Multiple Control Protocols (e.g OpenFlow [33], SNMP [34]) OpenFlow
Reliability Strict 5 NINES availability requirements [35] Less strict reliability requirements [36]
Regulation Strict Requirements e.g NEBS [37] Still diverse and changing

[40], (3) the telecom industry requires scalability, five-nines scale complex networks, which may require re-policing or re-
availability and reliability. In traditional telecom networks, configurations from time to time. As shown in Figures 6 and 7,
these features are provided by the site infrastructure. If NFV SDN decouples the network control and forwarding functions
should be based on cloud computing, these features need to be enabling the network control to become directly programmable
replicated by the cloud infrastructure in such a way that they via an open interface (e.g., ForCES [49], OpenFlow [50], etc)
can be orchestrated, as orchestrated features can be exposed and the underlying infrastructure to become simple packet for-
through appropriate abstractions, as well as being coupled with warding devices (the data plane) that can be programmed. This
advanced support for discoverability and traceability [41]. It has the potential to dramatically simplify network management
is therefore worth stressing that NFV is not cloud applied to and enable innovation and evolution [51].
carriers. There is need to adapt cloud environments so as to According to the Open Network Foundation (ONF) [52],
obtain carrier-class behaviour [40]. In Table I, we summarize SDN addresses the fact that the static architecture of con-
the relationship between NFV for telecom networks and cloud ventional networks is ill-suited for the dynamic computing
computing. and storage needs of todays datacenters, campuses, and carrier
4) Research on Cloud-based NFV: In order for NFV to environments. The SDN architecture is:
perform acceptably in cloud computing environments, the Directly programmable. Network control is directly pro-
underlying infrastructure needs to provide a certain number grammable because it is decoupled from forwarding functions.
of functionalities which range from scheduling to networking Agile. Abstracting control from forwarding lets adminis-
and from orchestration to monitoring capacities. Some efforts trators dynamically adjust network-wide traffic flow to meet
have already been dedicated to study the requirements needed changing needs.
to make the performance of cloud carrier-grade [42], [43], Centrally managed. Network intelligence is (logically) cen-
[44]. While OpenStack has been identified as one of the main tralized in software-based SDN controllers that maintain a
components of a cloud-based NFV architectural framework, global view of the network, which appears to applications and
it currently does not meet some NFV requirements [45], policy engines as a single, logical switch.
and through measurements some performance degradation has Programmatically configured. SDN lets network managers
been reported [46]. OpenStack has created a working group configure, manage, secure, and optimize network resources
[47] including service providers, equipment providers, and very quickly via dynamic, automated SDN programs, which
OpenStack vendors, to define use cases and identify and pri- they can write themselves because the programs do not depend
oritise the requirements which are needed to deploy, manage, on proprietary software.
and run telecommunication services on top of OpenStack. Open standards-based and vendor-neutral. When imple-
They focus on identifying functional gaps, creating blueprints, mented through open standards, SDN simplifies network de-
submitting and reviewing patches to the relevant OpenStack sign and operation because instructions are provided by SDN
projects and tracking their completion in support of telecom- controllers instead of multiple, vendor-specific devices and
munication services. The work group has also established a protocols.
team to focus on ecosystem development (both vendors and 1) Relationship between SDN and NFV: Just like NFV,
industry co-travelers), collateral development and marketing SDN accelerates innovation by breaking the bond between
messaging to address the needs of TSPs who are interested in proprietary hardware and control or application software. Both
deploying OpenStack. NFV and SDN seek to leverage automation and virtualization
to achieve greater agility while reducing both OPEX and
CAPEX [53]. However, while NFV and SDN are highly
B. Software Defined Networking related and complimentary, and although combining them may
Software-Defined Networking (SDN) [48] is currently at- lead to greater value, they are not dependent on each other
tracting significant attention from both academia and industry [4]. They are complementary because they address different
as an important architecture for the management of large aspects of a software-driven networking solution. SDN can
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 8

Network/Business Applications

Load Balancer Routing . . . MAC Learning


APIs

Application Layer

Network Services

SDN Controller
Interface e.g.
Openflow
Control Layer

Forwarding
Switches

Traditional Network: Distributed Control and


Middleboxes (e.g. Firewall, Intrusion Detection, etc.)
Infrastructure Layer

Fig. 6. Traditional Network


Fig. 7. Software Defined Network

TABLE II
C OMPARISON OF S OFTWARE D EFINED N ETWORKING AND T ELECOMMUNICATION E NVIRONMENTS

Issue NFV (Telecom Networks) Software Defined Networking

Approach Service/Function Abstraction Networking Abstraction


Formalization ETSI NFV Industry Standard Group Open Network Foundation (ONF) [52]
Advantage Reduced complexity and cost, increased agility Reduced complexity and cost, increased agility
Protocol Multiple Control Protocols (e.g OpenFlow, SNMP) OpenFlow
Applications run Commodity servers and switches Commodity servers and switches
Leaders Mainly Telecom service providers Mainly networking software and hardware vendors
Business Initiator Service Providers Born on the campus, matured in the datacenter

accelerate NFV deployment by offering a scalable, elastic, the unique demands of NFV will potentially necessitate a
and on-demand architecture well suited for the dynamic NFV massively complex forwarding plane, blending virtual and
communication requirements for both virtual and physical physical appliances with extensive control and application
networking infrastructures. In the same way, in addition to software, some of it proprietary [53]. There are two major
aligning closely with the SDN objectives to use commodity aspects of SDN that may need to be improved in order to
servers and switches, NFV may support SDN by providing meet the requirements of NFV: the Southbound API (mainly
the infrastructure upon which the SDN software can be run. OpenFlow), and controller designs. We discuss advances in
However, it can be observed that the highest efforts in each of these two aspects below.
promoting and standardizing SDN is in datacenter and cloud
1) Southbound API: OpenFlow: OpenFlow is the de facto
computing arenas while telecom carriers are driving similar
implementation southbound API for SDN. However, before
efforts for NFV. In addition, while NFV is intended to optimize
we consider NFV support, even in current SDN environments
the deployment of NFs, SDN is focused on optimizing the
OpenFlow is by no means a mature solution [57]. Since Open-
underlying networks. Finally, an important distinction is that
Flow targets L2-L4 flow handling, it has no application-layer
while NFV can work on existing networks because it resides
protocol support and switch-oriented flow control. Therefore,
on servers and interacts with specific traffic sent to them, SDN
users have to arrange additional mechanism for upper-layer
requires a new network construct where the data and control
flow control. Furthermore, executing a lot of flow matching
planes are separate. We summarize the relationship between
on a single switch (or virtual switch) can cause difficulties in
SDN and NFV relationship in Table II.
network tracing and overall performance degradation [58].
It is therefore obvious that OpenFlow will have to be
C. Research on SDN-based NFV extended to include layers L5-L7 to be able to support NFV.
There is currently a lot of work involving the combination Basta et al. [59] investigated the current OpenFlow implemen-
of SDN and NFV to enhance either of them; including: a tation in terms of the basic core operations such as QoS, data
ForCES-based framework [54], NFV-based monitoring for classification, tunneling and charging, concluding that there
SDN [55], an abstraction model for both the forwarding model is a need for an enhanced OpenFlow to be able to support
and for the network functions [56]. As these efforts show, some functions in NFV environment. In an implementation of
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 9

a virtual EPC function [60], [61] extends OpenFlow 1.2 by Separates network deployment
defining virtual ports to allow encapsulation and to allow flow from service provision: Leads to
routing using the GTP Tunnel Endpoint Identifier (TEID). agility, reduced CAPEX and OPEX
Finally, while OpenFlow assumes a logically centralized
controller, which ideally can be physically distributed, current
deployments rely on a single controller. This does not scale
well and can adversely impact reliability. In addition, network
devices in an NFVI require collaboration to be able to provide
NFV
Service/Function Abstraction

services, which cannot currently be provided by SDN. There Automation Orchestration


is therefore still a need to improve SDN by considering Isolation Resource Pooling
distributed architectures [62], [63]. It may also be important Agility Elasticity
for TSPs, InPs and ETSI ISG NFV to consider other possible
solutions such as NETCONF [64].
2) Controller: OpenDaylight: While there are multiple con-
trollers that may be used in an SDN environment, all of them
require improvements to be able support NFV requirements,
SDN
Networking Abstraction OpenFlow
Cloud
Computation Abstraction
especially distribution and scalability. OpenNF [65], [58]
proposes a control plane that allows packet processing to be
Creates network abstractions to Allows flexibility and resource pooling
redistributed across a collection of NF instances, and provides hence benefits from economies of
enable faster innovation, network
a communication path between each NF and the controller flexibility and holistic management scale
for configuration and decision making. It uses a combination
of events and forwarding updates to address race conditions, Fig. 8. Relationship between NFV, Cloud Computing & SDN
bound overhead, and accommodate a variety of NFs. [66]
also designed a protocol to implement the communication
between the controllers and the VNFs. Finally, [67] proposes On the hand, NFV goals can be achieved using non-SDN
an architecture that considers the control of both SDN and mechanisms, and relying on the techniques currently in use in
NFV. many datacenters. However, approaches relying on the sepa-
OpenDaylight is one of the few SDN control platforms ration of the control and data forwarding planes as proposed
that supports a broader integration of technologies in a sin- by SDN can enhance performance, simplify compatibility with
gle control platform [68]. OpenDaylight [69], collaborative existing deployments, and facilitate operation and maintenance
project hosted by the linux foundation, is a community-led procedures. In the same way, NFV is able to support SDN by
and industry-supported open source framework to accelerate providing the infrastructure upon which the SDN software can
adoption, foster new innovation and create a more open and be run.
transparent approach to SDN and NFV. The objective of the IV. R ESEARCH P ROJECTS W ORKING ON NFV
OpenDaylight initiative is to create a reference framework for
programmability and control through an open source SDN and As the ETSI ISG NFV continues work on NFV, several
NFV solution. The argument of OpenDaylight is that building other standards organizations and research projects are work-
upon an open source SDN and NFV controller enables users ing in parallel with diverse objectives, and some of them in
to reduce operational complexity, extend the life of their close collaboration with the ETSI ISG NFV. In this section,
existing infrastructure hardware and enable new services and we explore these NFV activities.
capabilities only available with SDN.
A. NFV Standardization Activities
1) IETF Service Function Chaining Working Group: Func-
D. Summary: NFV, SDN and Cloud Computing tions in a given service have strict chaining and/or ordering
To summarize the relationship between NFV, SDN, and requirements that must be considered when decisions to place
cloud computing, we use Fig. 8. We observe that each of them in the cloud are made. The Internet Engineering Task
these fields is an abstraction of different resources: compute Force (IETF) [70] has created the Service Function Chaining
for cloud computing, network for SDN, and functions for NFV. Working Group (IETF SFC WG) [71] to work on function
The advantages that accrue from each of them are similar; chaining. The IETF SFC WG is aimed at producing an
agility, cost reduction, dynamism, automation, resource scaling architecture for service function chaining that includes the nec-
etc. essary protocols or protocol extensions to convey the service
The question is not whether NFs will be migrated to the function chain (SFC) and service function path information
cloud, as this is in fact the general idea of NFV. It is [72] to nodes that are involved in the implementation of service
whether the cloud will be a public one like Amazon, or if functions and SFCs, as well as mechanisms for steering traffic
TSPs will prefer to user private ones distributed across their through service functions. It is also trying to examine existing
infrastructure. Either way, work will have to be done to make identifier schemes to establish if there is a need for such
the cloud carrier-grade in terms of performance, reliability, identifiers in the context of the Generic SFC encapsulation,
security, communication between functions, etc. before defining any new identifier scheme.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 10

TABLE III
S UMMARY OF N ETWORK F UNCTION V IRTUALIZATION S TANDAIZATION E FFORTS

Description Focus Area Description of NFV-Related Work


NFV architectural framework, infrastructure description, management
ETSI ISG Industry-led ETSI Standards
NFV and orchestration, security and trust, resilience and service quality
NFV Group
metrics.
3GPP’s Telecom Management Mobile Working in liaison with the ETSI ISG NFV. Studying the management
3GPP SA5
working group Broadband of virtualized 3GPP network functions.
To propose a new approach to service delivery and operation, an
IETF SFC
IETF Working Group NFV architecture for service function chaining, management and security
WG
implications.
Organizing NFV-related research activities in both academia and
IRTF
IRTF Research Group NFV industry through workshops, research group meetings etc. at premier
NFVRG
conferences.
ATIS NFV Developing specifications for NFV, focusing on inter-carrier
Industry-led Standards Group NFV
Forum interoperability.
Standardizing the OpenFlow protocol and related technologies. Defines
Industry-led consortium for
ONF SDN OpenFlow as the first standard communications interface defined
standardization of OpenFlow
between the control and forwarding layers of an SDN architecture.
DMTF’s OVF and the CIM may be used as one option for capturing
DMTF OVF Industry-led consortium Cloud
some or all of the VNF package and/or VDU [18] Descriptor.
Industry-led consortium that NFV in Collaborating with the ETSI ISG NFV to achieve a consistent
BB Forum develops broadband network Broadband approach and common architecture for the infrastructure needed to
specifications Networks support VNFs.

2) IRTF NFV Research Group (NFVRG): The Internet that are complementary with existing industry work products
Research Task Force (IRTF) has created a research group, and that extend the current environment for inter-provider
NFVRG [73], to promote research on NFV. The group is aimed NFV. The forum also engages open source activities for the
at organizing meetings and workshops at premier conferences implementation of these capabilities in software.
and inviting special issues in well-known publications. The 4) Broadband Forum: The Broadband Forum (BB Forum)
group focuses on research problems associated with NFV- [74] is an industry consortium dedicated to developing broad-
related topics and on bringing a research community together band network specifications. Members include telecommuni-
that can jointly address them, concentrating on problems that cations networking and service provider companies, broadband
relate not just to networking but also to computing and storage device and equipment vendors, consultants and independent
aspects in such environments. The group has defined four near- testing labs (ITLs). BB Forum collaborates with the ETSI
term work items: (1) policy-based resource management, (2) ISG NFV after agreeing a formal liaison relationship in 2013.
analytics for visibility and orchestration, (3) VNF performance The collaboration aims to achieve a consistent approach and
modeling to facilitate transition to NFV, and (4) service verifi- common architecture for the infrastructure needed to support
cation with regard to security and resiliency. For each of these VNFs, and to help the industry channel its efforts towards
items, the goal is exploring system architecture, optimization, achieving a rapid roll-out of NFV solutions. In addition,
and open interfaces across components, through experimental the BB Forum is working on how NFV can be used in
results, simulations, and/or real-world implementations. the implementation of the multi-service broadband network
3) ATIS NFV Forum: The ATIS NFV Forum [29] is an in- (MSBN). To this end, the forum has many work items in
dustry group created by the Alliance for Telecommunications progress, including: migrating to NFV in the context of TR-
Industry Solutions (ATIS), a North American telecom stan- 178 (WT-345), introducing NFV into the MSBN (SD-340),
dards group. The group is aimed at developing specifications virtual business gateway (WT-328), flexible service chaining
for NFV, focusing on unique aspects of NFV which include (SD-326) [75].
inter-carrier inter-operability and new service descriptions and 5) Standardization of Related Paradigms: In addition to
automated processes, including APIs that will enable network the NFV standardization efforts, other bodies continue to
operators to expose virtualized network functions to other work on standardization of related fields, SDN and cloud
operators and to enterprises in order to make new services computing, which may also play a significant role in the
possible. ATIS NFV Forum plans to develop technical re- success of NFV. The DMTF defined the Open Virtualization
quirements, the catalog of needed capabilities and the service Format (OVF) [76] as a virtual machine packaging standard
chaining necessary for a third party service provider or en- for a single virtual machine or a complex set of virtual
terprise to integrate the functions into a business application. machines. OVF and the Common Information Model (CIM)
This process is expected to result in creation of specifications [77] may be used as one option for capturing some or all
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 11

of the VNF package and/or Virtual Deployment Unit (VDU) To this end, the project plans to develop an automated,
Descriptor [18], [78]. In the same way, the ONF - an industry dynamic service creation platform, leveraging a fine-granular
consortium formed in 2011 - is standardizing the OpenFlow service chaining architecture. They will also create a service
protocol and related technologies. ONF defines OpenFlow as abstraction model and a service creation language to enable
the first standard communications interface defined between dynamic and automatic placement of networking, computing
the control and forwarding layers of an SDN architecture. ONF and storage components across the infrastructure. Finally, they
has more than 123 member companies, including equipment will develop a global orchestrator with optimization algorithms
vendors, semiconductor companies, computer companies, soft- to ensure optimal placement of elementary service components
ware companies, telecom service providers, etc. In Table III, across the infrastructure.
we summarize all the activities in the standardization of NFV 5) T-NOVA: T-NOVA [20] aims at promoting the NFV con-
and related technologies. cept, by proposing an enabling framework, allowing operators
not only to deploy VNFs for their own needs, but also to offer
B. Collaborative NFV Projects them to their customers, as value added services. For this pur-
pose, T-NOVA leverages SDN and cloud management archi-
1) TM Forum Zoom: Zero-time Orchestration, Operations tectures to design and implement a management/orchestration
and Management (ZOOM) [79] is a TM Forum project aimed platform for the automated provision, configuration, moni-
at enabling more rapid deployment of new services by au- toring and optimization of Network Functions-as-a-Service
tomating the provisioning process. Its objectives include: (1) (NFaaS) over virtualized Network/IT infrastructures.
define a vision of the new virtualized operations environment
6) CONTENT: CONTENT [83] is an EU funded project
necessary to enable the delivery and management of virtu-
aimed at offering a network architecture and overall infras-
alized network and services while enabling both low cost
tructure solution to facilitate the deployment of conventional
operations and innovation, (2) define an architecture that is
cloud computing as well as mobile cloud computing. The
based on the seamless interaction between physical and virtual
main objectives of the project include: (1) proposing a cross-
components that are easily and dynamically assembled into
domain and technology virtualization solution allowing the
personalized services, (3) identify and define new security ap-
creation and operation of infrastructure slices including subsets
proaches that will protect infrastructure, functions and services
of the network and computational physical resources, and (2)
across all layers of software and hardware. The project also
supporting dynamic end-to-end service provisioning across the
complements efforts from ETSI ISG NFV and other fora on
network segments, offering variable QoS guarantees, through-
NFV.
out the integrated network.
2) Open Platform for NFV (OPNFV): OPNFV [80] is
an open source project founded and hosted by the Linux
Foundation, and composed of TSPs and vendors, with a focus
C. Summary
on accelerating the evolution of NFV. It aims to establish
a carrier-grade, integrated, open source reference platform To summarize, in Table IV we present all the projects
that industry peers will build together to advance the evo- giving their main objective, their focus with respect to NFV
lution of NFV and to ensure consistency, performance and and related areas, and entities leading or funding them. All
inter-operability among multiple open source components. Its these projects are guided by the proposals coming out of the
initial scope is to build a NFVI, Virtualized Infrastructure standardization described earlier, in particular ETSI ISG NFV,
Management (VIM), and including application programmable 3GPP and DMTF.
interfaces (APIs) to other NFV elements, which together form
the basic infrastructure required for VNFs and Management
and Network Orchestration (MANO) components. OPNFV V. S TATE - OF - THE - ART
aims at enhancing performance and power efficiency; improve
reliability, availability, and serviceability; and deliver compre- In order to prove the possibility to implement the ideas pro-
hensive platform instrumentation. posed by NFV, and to determine performance characteristics,
3) Mobile Cloud Networking (MCN): MCN [81] is a con- a number of use cases for NFV, mostly based on those defined
sortium consisting of network operators, cloud providers, ven- by ETSI ISG NFV [60], have already been implemented.
dors, university and research institutes, as well as SMEs. The These have mainly been based on implementing single virtual
objective is to cloudify all components of a mobile network functions such as gateway [84], Broadband Remote Access
operation such as: the access - Radio Access Network(RAN); Server [85], policy server [86], deep packet inspection [87],
the core - Evolved Packet Core (EPC); the services - IP Evolved Packet Core (EPC) [88], [67], Radio Access Network
Multimedia Subsystem (IMS), Content Delivery Networks (RAN) [89], [90], [91], [92], monitoring [55], CPE [93],
(CDN) and Digital Signage(DSS); the Operational Support [94], [95], [96], [97], [98], GPRS [99], routing [100] and
Systems (OSS) and the Business Support Systems (BSS). access control [101], in cloud environments. All these originate
4) UNIFY: UNIFY [82] is aimed at researching, developing from the research community. Perhaps not surprisingly, the
and evaluating the means to orchestrate, verify and observe biggest implementations have arisen the equipment vendors.
end-to-end service delivery from home and enterprise net- In the remainder of this Section, we introduce some key NFV
works through aggregation and core networks to datacenters. implementations and products from industry.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 12

TABLE IV
S UMMARY OF N ETWORK F UNCTION V IRTUALIZATION P ROJECTS

Leader and/or
Project Type Focus Areas Open Source Main Objective
Funding
Enable more rapid deployment of services by
Association
ZOOM TM Forum NFV Yes automating the provisioning process and
of SPs
modernizing OSS/BSS models.
Collaborative Linux Build an open source reference platform to advance
OPNFV NFV Yes
Project Foundation the evolution of NFV.
Research European Cloudify all components of a mobile network
MCN SDN, NFV Yes
Project Union operation.
Research European Develop an automated, dynamic service creation
UNIFY NFV Yes
Project Union platform, leveraging fine-granular service chaining.
Research European
T-NOVA SDN, NFV Yes Design and implement a MANO platform for NFV.
Project Union
Providing a technology platform interconnecting
Mobile
Research European geographically distributed computational resources
CONTENT Networks, Yes
Project Union that can support a variety of Cloud and mobile
Cloud
Cloud services.
Working OpenStack Identify requirements needed to deploy, manage,
Openstack Cloud, NFV Yes
Group Foundation and run telecom services on top of OpenStack.
Collaborative Linux
OpenDaylight SDN, NFV Yes Develop an open platform for SDN and NFV.
Project Foundation

A. HP OpenNFV provide use cases for multi venders inter-operability around


NFVI, and VNF-based services.
The HP OpenNFV [102] is a platform upon which services
and networks can be dynamically built. It is aimed at ac-
celerating the design, proof-of-concept, trial, and deployment C. Intel Open Network Platform (Intel ONP)
of new cloud-enabled network services and innovations. It is
Intel ONP [105] offers a commercial approach to sim-
composed of applications and services designed to virtualize
plify and accelerate adoption of SDN and NFV. It offers an
core networks and network functions. It is made up of three
ecosystem enablement and engineering guidance, rather than
main elements: (1) an open standards-based NFV Reference
a productized offering or a prescriptive set of requirements. it
Architecture, (2) HP’s work with their partners to develop
provides an application-ready solution supported by the open
NFV applications and services, and (3) a HP OpenNFV Lab
software community, commercial software, system integration
for testing related applications and hardware. The HP NFV
alliances, and industry standards bodies. Its reference designs,
Reference Architecture uses the ETSI ISG NFV architecture
for physical and virtual switches, and physical servers, provide
[5], [103], as a starting point, and includes processors, cache,
equipment manufacturers a recipe for developing solutions for
operating systems, storage, networking, switching, hypervi-
NFV and SDN and is available from Intel, Intel partners, and
sors, middleware, management systems, orchestration, appli-
from the open source community.
cations, and other components optimized for NFV processing.

D. CloudNFV
B. NFV Open Lab
CloudNFV [106] is an open platform for implementing
The Huawei NFV Open Lab [104] is aimed at stimulating NFV based on cloud computing and software defined net-
innovation, industry development and collaborative benefits for working technologies in a multi-vendor environment. It is
global telecom networks supporting NFV, SDN and cloud- a platform to test the integration of cloud computing, SDN
computing technologies. The lab is dedicated to being open and NFV, and the TM Forums Information Framework (SID)
and collaborative, expanding joint service innovations with and business services suite in an open, real environment. It
partners, and developing the open eco-system of NFV to is a product of cooperation between six companies (6WIND,
aggregate values and help customers achieve business success. CIMI Corporation, Dell, EnterpriseWeb, Overture Networks,
It is aimed at providing an environment to ensure that NFV and Qosmos) who set about to prove the value of NFV in
solutions and carrier grade infrastructure are compatible with the era of the cloud. It uses the specifications of the ETSI
emerging NFV standards and with the Open Platform NFV ISG NFV to deploy any mixture of VNFs, cloud application
source (OPNFV) [80]. They also plan to collaborate with the components, real network devices and services, and multi-
open source community to innovate on NFV technologies to operator federated services.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 13

E. CloudBand H. F5 Software Defined Application Services


Alcatel-Lucent’s CloudBand [107] is a two-level platform F5 Software Defined Application Services (F5 SDAS) [113],
implementing NFV. First, it includes nodes that provide re- [114], [115] provides Layer 4-7 capabilities to supplement
sources like VMs and storage, and then, the CloudBand existing Layer 2-3 network and compute initiatives such as
Management System which is the functional heart of the SDN. It enables service injection, consumption, automation,
process. It operates as a work distributor that makes hosting and orchestration across a unified operating framework of
and connection decisions based on policy, acting through pooled resources. It is is comprised of three key components:
cloud management APIs. Virtual functions are deployed using (1) The application service platform supports programmability
recipes that define packages of deployable components and of both control and data paths. It is extensible and enables new
instructions for their connection. It is these Recipes that service creation. (2) The application services fabric provides
can set policies and determine how specific components are core services such as scalability, service isolation, multi-
instantiated and then connected. The platform uses the Nuage tenancy, and integration with the network, and (3) Application
SDN technology [108] and its related links to create an services, which are the heart of F5 SDAS, are a rich catalog
agile connection framework for the collection of nodes and of services across the application delivery spectrum.
functions, and to facilitate traffic management.
I. ClearWater
ClearWater [116] is an open source implementation of an
F. Broadcom Open NFV IMS built using web development methods to provide voice,
The Broadcom Open NFV platform [109] is aimed at accel- video and messaging services to users. Architected from the
erating creation of NFV applications across multiple system on ground up for scalable deployments within virtualized public
chip (SoC) [110] processors, and to allow system vendors to be or private elastic compute clouds, ClearWater combines the
able to migrate virtual functions between platforms based on economics of over-the-top (OTT) style service platforms with
various vendor solutions. Broadcom’s platform supports open the standards compliance and reliability expected of carrier-
API standards such as Linaro’s Open Data Plane (ODP)[111] grade communications network solutions. With a goal of
to access acceleration components for scaling critical function- increasing the velocity of innovation in carrier networks,
ality and reducing time-to-market. The ETSI ISG NFV has Metaswitch [117] contributed the initial code base for the
recently accepted a VNF state migration and inter-operability ClearWater project to the worldwide community of industry
proof of concept in which Broadcom is demonstrating an software developers and systems integrators, and continues to
implementation of an EPC and migrating the virtual function drive the evolution of the code base.
state from operating on one instruction set architecture (ISA)
to a different ISA. J. Overture Virtual Service Edge (vSE)
Overture vSE [25] is an open carrier ethernet platform for
hosting VNFs at the service edge. It allows TSPs to instantly
G. Cisco Evolved Services Platform deploy on-demand VNFs at the customer premise. It combines
The Cisco Evolved Services Platform (Cisco ESP) [112] carrier Ethernet access with the benefits of virtualization, open-
combines SDN and NFV to deliver prepackaged services from ness and software-defined services. The result is one platform
a flexible pool of resources that can be reused and personalized for both services and network access. A single platform for
for each customer, automatically and on demand. It virtualizes both services and network access, it allows for a myriad of
functions for both mobile and fixed networks, and is based VNFs to be turned up, turned down, expanded and removed
on the ETSI NFV MANO. It makes new network services dynamically so that compute and storage resources are used
and applications easy to deploy by providing four functions; only when needed. Additionally, it supports multiple wireline
a service broker, a platform, an orchestration engine, and a and wireless connections to the WAN, allowing access to all
catalog of physical/virtual functions. The service broker is the end customer locations.
service provider’s storefront, providing a self-service catalog
and portal that enables operators to translate business intent K. EmPOWER
into actionable service creation and initiation. The platform EmPOWER [118] is an open testbed aimed at providing
enables the operator to create and customize service profiles experimental facilities for SDN&NFV research and exper-
allowing them to provide a set of service attributes and imentation. The testbed is composed by 30 nodes and is
policies, linked through the orchestration engine, so they can currently used by students at the University of Trento and
automate and accelerate the delivery of personalized services. by the research staff at CREATE-NET [119]. Experiments can
The orchestration engine automates the creation, monitoring, take full control of a slice of the network which is kept isolated
and assurance of all required physical and virtual infrastruc- (at a logical level) from the other slices. Traffic can come
ture, resources, and functions, when they are needed. Finally, from either users that decide to opt-in a certain experiment
the catalog of physical/virtual functions is an extensible and or by mirroring the traffic of a production. In addition, the
modular set of virtualized network and application capabilities experimenter can monitor in realtime and with the desired
links to services profiles to create the offers that can be resolution the actual energy consumption at either device or
deployed anywhere and scaled on demand. slice level [120], [121].
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 14

TABLE V
S UMMARY OF S TATE - OF - THE - ART NFV I MPLEMENTATIONS

Functionality Platform Driving Standards


HP Open standardsbased NFV reference architecture, labs as a
OpenStack ETSI ISG NFV
OpenNFV sandbox in which carriers and equipment vendors can test vEPC.
NFV Open Support the development of NFV infrastructure, platforms and
OpenStack, OpenDaylight ETSI ISG NFV
Lab services.
Provides developers with a validated template for quickly
Intel ONP developing and showcasing next-generation, cloud-aware network OpenStack, OpenDaylight 3GPP or TMF
solutions.
Provides a platform for virtual network service creation, TMF and ETSI ISG
Cloud NFV OpenStack
deployment, and management. NFV
Can be used for standard IT needs as well as for CSPs who are Red Hat Linux OpenStack
CloudBand ETSI ISG NFV
moving mobile networks into the cloud. Platform
BroadBand Migrate virtual functions between platforms based on various
ETSI ISG NFV
NFV vendor solutions.
Automated service delivery, improved network and datacenter
Cisco ESP OpenStack, OpenDaylight ETSI ISG NFV
use, fast deployment of personalized offerings.
IETF, 3GPP,
Extensible, context-aware, multi-tenant system for service OpenStack, BIG-IP,
F5 SDAS GSMA, ETSI ISG
provisioning BIG-IQ [113]
NFV, ONF
SIP-based call control for voice and video communications and Apache Cassandra, 3GPP IMS, ETSI
ClearWater
for SIP-based messaging applications. Memcached, OpenSSL TS
Host multiple VNFs in one box, Accelerate service creation,
Linux Overture Ensemble
Overture vSE activation and assurance, Decrease inventory and management
OSA [25], OpenStack
costs, Optimize service flexibility, Eliminate trucks rolls

L. Summary changes are required, not just to provide network and service
In Table V we summarize the different state-of-art im- solutions as before, but also to exploit the dynamism and
plementations stating their functionality, the standards bodies flexibility made possible by NFV [122], [123]. It will likely
they closely follow and platforms on which they run. It is lead to scenarios where functions that provide a service to
worth remarking that although NFV is gaining momentum, a given customer are scattered across different server pools.
it is still an emerging technology and solutions based on The challenge then will be to have an acceptable level of
final specifications, and widespread deployments for end-users orchestration to make sure that on a per service (or user)
may take a few years to appear. As the survey above shows, level, all the required functions are instantiated in a coherent
many organizations are investing in and are willing to test and on-demand basis, and to ensure that the solution remains
NFV-based solutions. In addition, it can be observed from manageable [124].
these early implementations and platforms, that two aspects ETSI ISG NFV is working on a management and orches-
re-appear in a big number of them: the high focus on open tration framework [18] required for the provisioning of VNFs,
source, inter-operability and the ability of current SDN and and the related operations, such as the configuration of the
cloud technologies to support NFV. VNFs and the infrastructure these functions run on. In a related
effort, Cloud4NFV [125], [126] has proposed an end-to-end
VI. R ESEARCH C HALLENGES management platform for VNFs, which is based on the ETSI
ISG NFV architectural specification. Clayman et al. [127]
Even with all the anticipated benefits, and despite the
describe an architecture based on an orchestrator that ensures
immense speed at which it is being accepted by both academia
the automatic placement of the virtual nodes and the allocation
and industry, NFV is still in early stages. There still remains
of network services on them supported by a monitoring system
important aspects that should be investigated and standard
that collects and reports on the behaviour of the resources.
practices which should be established. This section discusses
NetFATE [128] proposes an orchestration approach for virtu-
crucial research directions that will be invaluable as NFV
alized functions, taking into account the service chains needed
matures.
by traffic flows and the desired Quality of Experience (QoE).
In addition, other management and orchestration frameworks
A. Management and Orchestration and architectures have been proposed in [129], [130], [131],
The deployment of NFV will greatly challenge current [132], [133].
management systems and will require significant changes to However, all these efforts (including those by ETSI ISG
the way networks are deployed, operated and managed. Such NFV) have so far only focussed on the management of
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 15

environments that are made up of purely virtualized functions. [148], [149] formulate the problem as a Resource Constrained
In the early days of NFV, virtual functions will most likely co- Project Scheduling Problem (RCPSP) [150] and solve it using
exist with non virtualized ones. It is therefore necessary for a a job shop scheduling approach [151].
management approach to take this hybrid nature of the func- It can be observed that there are still many open areas with
tions into consideration. In addition, the need for dynamism regard to how physical resources are shared amog the virtual
in function means that functions will likely move, which functions. Each of the above areas may still be improved. In
underscores the importance of a higher focus on possibilities addition, given the dynamic requirements of NFV, there is
of an availability monitoring mechanism as part of the end-to- need for resource allocation proposals that are able to find
end management solution. Finally, the orchestration layer will solutions online, consider the multi-InP environment [152],
be an equally important component of such a management network survivability [153], dynamic resource management
solution, and should also to be able to manage a hybrid [154] etc.
network, make first decisions, and ensure convergence.
C. Energy Efficiency
B. Function Placement, Migration and Scheduling One of the selling points of NFV is reduced energy con-
To achieve the economies of scale expected from NFV, sumption resulting from a reduced number of physical devices
physical resources should be used efficiently. It has been needed by a TSP. While NFV will likely make datacenters
shown that default deployment of some current use cases may an integral part of telecommunication networks, datacenters
result in sub-optimal resource allocation and consumption [9]. usually exhibit high-concentrated power draws and energy
This calls for efficient algorithms to determine on to which consumption per site [155]. Therefore NFV will put InPs
physical resources (servers) network functions are placed, and under even more pressure to manage energy consumption
be able to move functions from one server to another for such [133] not to only to cut down energy expenses, but also to
objectives as load balancing, energy saving, recovery from meet regulatory and environmental standards.
failures, etc. The task of placing functions is closely related While the design of energy-efficient datacenters has recently
to virtual network embedding [134] and virtual datacenter received considerable attention [156], there will likely be more
embedding [135] and may therefore be formulated as an pressure introduced by NFV, especially due to the need for
optimization problem, with a particular objective. Such an communications between functions. This is because a high
approach has been followed by [136], [137], [138], [139]. percentage of the power consumption in datacenters is due to
However, when formulated as an optimization problem, it intraserver communications [157].
would reduce to a binary integer program, which is NP-Hard
[140], and hence intractable for big instances of the problem. D. Information Centric Networking
For this reason, some proposals have been for heuristics [141], Motivated by the fact that the Internet is increasingly
[142], [143], [144], [127] used for information dissemination rather than for pair-wise
In addition, NFV systems should allow for one or a group communication between end hosts, Information-Centric Net-
of VNFs to be migrated to disparate physical servers. The working (ICN) [158] has emerged as a promising candidate for
physical servers may be in different InP domains, and hence the architecture of the Future Internet. ICN addresses named
use different tunneling addresses or be managed by different data rather than named hosts. This way, content distribution
protocols. This does not only call for efficient algorithms to is implemented directly into the network fabric rather than
determine where the functions can be moved, but will also relying on the complicated mapping, availability, and security
require comprehensive management of function and server mechanisms currently used to map content to a single location.
states, as well as maintain communications. ViRUS [145] The separation between information processing and for-
allows the runtime system to switch between blocks of code warding in ICN is related to both the decoupling of functions
that perform equivalent functionality at different Quality-of- from devices in NFV, and to the decoupling of control from
Service levels when the system is under stress, while [146] data plane in SDN. While the relationship between NFV, SDN
presents a model that can be used to derive some performance and cloud computing has already received some attention, that
indicators, such as the whole service downtime and the total between NFV and ICN has not. Yet, ICN may be used in
migration time, so as to make function migration decisions. NFV to determine the best position to place network functions.
Finally, to ensure scalable NFV implementations, functions For example, Arumaithurai et al. [159] propose a function-
should only be allocated the resources they need. Contrary centric service chaining (FCSC) approach which exploits ICN
to most current proof of concept implementations, it is not to provide flexibility and dynamism in placing VNFs.
feasible to deploy a VM per subscriber or per function as the
resulting VM footprint would be so high. In this case, depend-
ing on the type and function requirements, two approaches E. Security, Privacy and Trust
are possible: (1) deploy functions on linux containers [147] Despite the enormous potential of cloud computing, con-
instead of VMs, or (2) depending on the QoS requirements sumer uncertainty and concern regarding issues of privacy,
of a particular service, to deploy multiple functions onto a security and trust remain a major barrier to the switch to
single VM, and use scheduling techniques to process the cloud models [160]. Therefore, cloud privacy issues will be
functions. For this latter approach, the proposals in [141], among the key concerns for TSPs if they have to move to
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 16

public clouds. Because the functions to be virtualized represent project TEC2012-38574-C02-02 from Ministerio de Economia
subscriber services, personally identifiable information may be y Competitividad.
transferred to the cloud. This will present unique challenges
R EFERENCES
especially as the functions will be distributed, making it hard
to know where this data is and who has access to it. In the [1] J. Wu, Z. Zhang, Y. Hong, and Y. Wen, “Cloud radio access network
(C-RAN): a primer,” Network, IEEE, vol. 29, no. 1, pp. 35–41, Jan
case where the functions are deployed in third party clouds, 2015.
users and Telecom service providers would not have access to [2] China Mobile Research Institute, “C-RAN: The Road Towards Green
the physical security system of datacenters. Even if the service RAN. White Paper. Version 2.5.” October 2011.
[3] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, “Network function
providers do specify their privacy and security requirements, virtualization: Challenges and opportunities for innovations,” Commu-
it may still be hard to ensure that they are fully respected. nications Magazine, IEEE, vol. 53, no. 2, pp. 90–97, Feb 2015.
The ETSI ISG NFV is working on the security and trust [4] R. Guerzoni, “Network Functions Virtualisation: An Introduction,
Benefits, Enablers, Challenges and Call for Action. Introductory white
guidance [26] that is unique to NFV development, architecture paper,” in SDN and OpenFlow World Congress, June 2012.
and operation. However, it does not consist of prescriptive [5] ETSI GS NFV 002, “Network Functions Virtualisation (NFV); Ar-
requirements or specific implementation details, which should chitectural Framework,” http://www.etsi.org/, December 2014, ETSI
Industry Specification Group (ISG).
be built from the considerations supplied. Therefore, security, [6] ETSI , “European Telecommunications Standards Institute, Industry
privacy and trust are other important research directions in Specification Groups (ISG) - NFV,” http://www.etsi.org/, 2015, Ac-
NFV. cessed: February 05, 2015.
[7] ETSI GS NFV-SWA 001, “ETSI Group Specifications on Network
Function Virtualization. 1st Phase Documents,” http://docbox.etsi.org/
VII. C ONCLUSION ISG/NFV/Open/Published/, January 2015.
[8] “The 3rd Generation Partnership Project (3GPP),” http://www.3gpp.
Due to user demands for real-time, on-demand, online, org/about-3gpp/about-3gpp, 2015, Accessed: February, 10 2015.
inexpensive, short-lived services, TSPs have been forced to [9] P. Veitch, M. J. McGrath, and V. Bayon, “An instrumentation and
analytics framework for optimal and robust nfv deployment,” Com-
look for new ways of delivering these services in ways that munications Magazine, IEEE, vol. 53, no. 2, pp. 126–133, Feb 2015.
are agile, and with OPEX and CAPEX savings. NFV has [10] H. Hawilo, A. Shami, M. Mirahmadi, and R. Asal, “NFV: state of the
emerged as a possible approach to allow TSPs to become more art, challenges, and implementation in next generation mobile networks
(vEPC),” Network, IEEE, vol. 28, no. 6, pp. 18–26, Nov 2014.
open and flexible, faster at service innovation enhancements, [11] D. Cotroneo, L. De Simone, A. Iannillo, A. Lanzaro, R. Natella, J. Fan,
reduce operation & maintenance (O&M) costs, and expand and W. Ping, “Network Function Virtualization: Challenges and Direc-
the industrial chain. It is clear that NFV, together with the tions for Reliability Assurance,” in Software Reliability Engineering
Workshops (ISSREW), 2014 IEEE International Symposium on, Nov
closely related and complementary fields SDN and cloud 2014, pp. 37–42.
computing will be a big part of future telecommunication [12] D. Kreutz, F. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg,
service provision. S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
prehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76,
In this paper, we introduced NFV, described its architecture Jan 2015.
as defined by ETSI ISG NFV, proposed a reference business [13] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-
model, and explored important design considerations. We then the-art and research challenges.” J. Internet Services and Applications,
vol. 1, no. 1, pp. 7–18, 2010.
compared NFV with closely related fields SDN and cloud [14] ETSI GS NFV 003, “Network Functions Virtualisation (NFV); Termi-
computing, giving the current research focus to combine these nology for Main Concepts in NFV,” http://www.etsi.org/, December
fields. We have also presented the major specification and 2014, ETSI Industry Specification Group (ISG).
[15] Q. P and N. T, “Service Function Chaining Problem Statement.
standardization efforts, research projects, commercial products Internet-Draft draft-ietf-sfc-problem-statement-10,” Active Internet-
and early NFV proof of concept implementations. Draft, IETF Secretariat, Tech. Rep., August 2014.
We noted that despite the significant and rapidly increasing [16] N. M. K. Chowdhury and R. Boutaba, “A survey of network
virtualization,” Computer Networks, vol. 54, no. 5, pp. 862 –
activity on the NFV, there are still major gaps that may slow 876, 2010. [Online]. Available: http://www.sciencedirect.com/science/
NFV deployment and undermine the possibilities to fulfill its article/pii/S1389128609003387
anticipated business case. In the same way, most of the current [17] R. Mijumbi, “Self-managed Resources in Network Virtualization En-
vironments,” Ph.D. dissertation, Technical University of Catalunta,
efforts on NFV focus on almost all aspects of the ETSI ISG Barcelona, Spain, November 2014.
NFV architecture, which may result in solutions which, while [18] ETSI GS NFV-MAN 001, “Network Functions Virtualisation (NFV);
covering everything, may be too general to envelope all the Management and Orchestration,” http://www.etsi.org/, December 2014,
ETSI Industry Specification Group (ISG).
essential pillars of required evolution such as legacy support, [19] Xilouris, G et. al , “Network Functions As-A-Service Over Virtualized
and management of both legacy and NFV-based systems. Infrastructures, Overall System Architecture and Interfaces, Deliverable
Finally, we discussed the key research areas that will be pivotal D2.21,” August 2014.
[20] “T-NOVA: Network Functions-as-a-Service (NFaaS) over Virtualized
to the success of NFV. We believe that before these areas are Infrastructures,” http://www.t-nova.eu/, 2015, Accessed: January, 26
explored, TSPs who deploy NFV may end up being reliant on 2015.
vendor-proprietary solutions to solve these gaps, which would [21] F. Samuel, M. Chowdhury, and R. Boutaba, “PolyViNE: policy-
based virtual network embedding across multiple domains,” Journal
be against the original objective of NFV. of Internet Services and Applications, vol. 4, no. 1, p. 6, 2013.
[22] R. Yrjo and D. Rushil, “Cloud computing in mobile networks 2014;
case mvno,” in Intelligence in Next Generation Networks (ICIN), 2011
ACKNOWLEDGMENT 15th International Conference on, Oct 2011, pp. 253–258.
This work is partly funded by FLAMINGO, a Network [23] Harvey, A. F. et. al, “DMA Fundamentals on Various PC Platforms.
Application Note 011, National Instruments,” http://cires.colorado.edu/
of Excellence project (318488) supported by the European jimenez-group/QAMSResources/Docs/DMAFundamentals.pdf, April
Commission under its Seventh Framework Programme, and 1991.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 17

[24] W. Peterson and D. Brown, “Cyclic codes for error detection,” Pro- [48] F. Hu, Q. Hao, and K. Bao, “A survey on software-defined network and
ceedings of the IRE, vol. 49, no. 1, pp. 228–235, Jan 1961. openflow: From concept to implementation,” Communications Surveys
[25] “Overture 65vSE: Open Platform for Virtualization at the Service Tutorials, IEEE, vol. 16, no. 4, pp. 2181–2206, Fourthquarter 2014.
Edge,” http://www.overturenetworks.com/products/overture-65vse, [49] E. Haleplidis, S. Denazis, O. Koufopavlou, D. Lopez, D. Joachimpillai,
2015, Accessed: February, 06 2015. J. Martin, J. Salim, and K. Pentikousis, “Forces applicability to sdn-
[26] ETSI GS NFV-SEC 003, “Network Functions Virtualisation (NFV); enhanced nfv,” in Software Defined Networks (EWSDN), 2014 Third
NFV Security; Security and Trust Guidance,” http://www.etsi.org/, European Workshop on, Sept 2014, pp. 43–48.
December 2014, ETSI Industry Specification Group (ISG). [50] A. Lara, A. Kolasani, and B. Ramamurthy, “Network innovation using
[27] ETSI GS NFV-REL 001, “Network Functions Virtualisation (NFV); openflow: A survey,” Communications Surveys Tutorials, IEEE, vol. 16,
Resiliency Requirements,” http://www.etsi.org/, December 2014, ETSI no. 1, pp. 493–512, First 2014.
Industry Specification Group (ISG). [51] B. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti,
[28] Andreas Lemke, Alcatel Lucent, “Why service providers need an NFV “A survey of software-defined networking: Past, present, and future of
platform: Strategic White Paper,” January 2015. programmable networks,” Communications Surveys Tutorials, IEEE,
[29] ATIS NFV, “Alliance for Telecommunications Industry Solutions, vol. 16, no. 3, pp. 1617–1634, Third 2014.
Network Functions Virtualization Forum,” http://www.atis.org/NFV/ [52] “Open Networking Foundation (ONF),” https://www.opennetworking.
index.asp, January 2015. org/, 2015, Accessed: February, 03 2015.
[30] Allot, “Evolution of Network Service Enablement Utilizing Network [53] Z. Michael, A. David, C. Marc, D. Nabil, K. Christos, M. Jeff,
Functions Virtualization (NFV). Techinical White Paper,” Allot Com- M. Serge, M. Dave, R. Evelyne, and S. Meral, “OpenFlow-enabled
munications, Tech. Rep., July 2013. SDN and Network Functions Virtualization. ONF Solution Brief,” Open
[31] M. Peter and G. Timothy, “The NIST Definition of Cloud Computing, Networking Foundation, Tech. Rep., February 2014.
Recommendations of the National Institute of Standards and Technol- [54] E. Haleplidis, S. Denazis, O. Koufopavlou, D. Lopez, D. Joachimpillai,
ogy,” http://www.nist.gov/itl/cloud/, National Institute of Standards and J. Martin, J. Salim, and K. Pentikousis, “ForCES Applicability to SDN-
Technology(NIST) Special Publication 800-145, Tech. Rep., September Enhanced NFV,” in Software Defined Networks (EWSDN), 2014 Third
2011. European Workshop on, Sept 2014, pp. 43–48.
[32] Distributed Management Task Force, “Cloud Management Work- [55] T. Choi, S. Kang, S. Yoon, S. Yang, S. Song, and H. Park, “SuVMF:
ing Group (CMWG),” http://www.dmtf.org/standards/cmwg, February Software-defined Unified Virtual Monitoring Function for SDN-based
2015. Large-scale Networks,” in Proceedings of The Ninth International
[33] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, Conference on Future Internet Technologies, ser. CFI ’14. New York,
J. Rexford, S. Shenker, and J. Turner, “Openflow: Enabling NY, USA: ACM, 2014, pp. 4:1–4:6.
innovation in campus networks,” SIGCOMM Comput. Commun. [56] E. Haleplidis, J. Hadi Salim, S. Denazis, and O. Koufopavlou, “Towards
Rev., vol. 38, no. 2, pp. 69–74, Mar. 2008. [Online]. Available: a Network Abstraction Model for SDN,” Journal of Network and
http://doi.acm.org/10.1145/1355734.1355746 Systems Management, pp. 1–19, 2014.
[34] D. R. Mauro and K. J. Schmidt, Essential SNMP, Second Edition. [57] W. Xia, Y. Wen, C. Foh, D. Niyato, and H. Xie, “A survey on software-
O’Reilly Media, Inc., 2005. defined networking,” Communications Surveys Tutorials, IEEE, vol. PP,
no. 99, pp. 1–1, 2014.
[35] G. Wedge and L. Barbara, “Carrier-grade: Five nines, the myth and the
[58] R. Kawashima, “vnfc: A virtual networking function container for
reality,” Pipeline Publications, vol. 3, no. 1, June 2006.
sdn-enabled virtual networks,” in Network Cloud Computing and
[36] K. V. Vishwanath and N. Nagappan, “Characterizing cloud computing
Applications (NCCA), 2012 Second Symposium on, Dec 2012, pp. 124–
hardware reliability,” in Proceedings of the 1st ACM Symposium on
129.
Cloud Computing, ser. SoCC ’10. New York, NY, USA: ACM, 2010,
[59] A. Basta, W. Kellerer, M. Hoffmann, K. Hoffmann, and E.-D. Schmidt,
pp. 193–204. [Online]. Available: http://doi.acm.org/10.1145/1807128.
“A Virtual SDN-Enabled LTE EPC Architecture: A Case Study for S-
1807161
/P-Gateways Functions,” in Future Networks and Services (SDN4FNS),
[37] “Network Equipment-Building System (NEBS),” http://en.wikipedia. 2013 IEEE SDN for, Nov 2013, pp. 1–7.
org/wiki/Network Equipment-Building System, 2015, Accessed:
[60] ETSI GS NFV 001, “ Network Function Virtualization. Use Cases,”
February, 07 2015.
http://docbox.etsi.org/ISG/NFV/Open/Published/, October 2013.
[38] M. Scharf, T. Voith, W. Roome, B. Gaglianello, M. Steiner, V. Hilt, [61] J. Kempf, B. Johansson, S. Pettersson, H. Luning, and T. Nilsson,
and V. Gurbani, “Monitoring and abstraction for networked clouds,” “Moving the mobile Evolved Packet Core to the cloud,” in Wireless
pp. 80–85, Oct 2012. and Mobile Computing, Networking and Communications (WiMob),
[39] A. Mandal, Y. Xin, I. Baldine, P. Ruth, C. Heerman, J. Chase, V. Or- 2012 IEEE 8th International Conference on, Oct 2012, pp. 784–791.
likowski, and A. Yumerefendi, “Provisioning and evaluating multi- [62] A. Tootoonchian and Y. Ganjali, “Hyperflow: A distributed control
domain networked clouds for hadoop-based applications,” in Cloud plane for openflow,” in Proceedings of the 2010 Internet Network
Computing Technology and Science (CloudCom), 2011 IEEE Third Management Conference on Research on Enterprise Networking,
International Conference on, Nov 2011, pp. 690–697. ser. INM/WREN’10. Berkeley, CA, USA: USENIX Association,
[40] D. Lopez, “Network functions virtualization: Beyond carrier-grade 2010, pp. 3–3. [Online]. Available: http://dl.acm.org/citation.cfm?id=
clouds,” in Optical Fiber Communications Conference and Exhibition 1863133.1863136
(OFC), 2014, March 2014, pp. 1–18. [63] V. Yazici, M. Sunay, and A. Ercan, “Architecture for a distributed
[41] Henrik, Basilier and Marian, Darula and Joe, Wilke, “Virtualizing openflow controller,” in Signal Processing and Communications Ap-
network services the telecom cloud. Techinical White Paper,” Ericsson, plications Conference (SIU), 2012 20th, April 2012, pp. 1–4.
Tech. Rep., March 2014. [64] J. Yu and I. Al Ajarmeh, “An empirical study of the netconf protocol,”
[42] R. Glitho, “Cloudifying the 3GPP IP Multimedia Subsystem: Why and in Networking and Services (ICNS), 2010 Sixth International Confer-
How?” in New Technologies, Mobility and Security (NTMS), 2014 6th ence on, March 2010, pp. 253–258.
International Conference on, March 2014, pp. 1–5. [65] A. Gember-Jacobson, R. Viswanathan, C. Prakash, R. Grandl, J. Khalid,
[43] A. Tolonen, “Dynamic Virtualized Network Functions on an OpenStack S. Das, and A. Akella, “OpenNF: Enabling Innovation in Network
Cloud,” Master’s thesis, Aalto University, Espoo, Finland, 9 2014. Function Control,” in Proceedings of the 2014 ACM Conference on
[44] H. Jamjoom, D. Williams, and U. Sharma, “Don’T Call Them Middle- SIGCOMM, ser. SIGCOMM ’14. New York, NY, USA: ACM, 2014,
boxes, Call Them Middlepipes,” in Proceedings of the Third Workshop pp. 163–174.
on Hot Topics in Software Defined Networking, ser. HotSDN ’14. New [66] J. Batalle, J. Ferrer Riera, E. Escalona, and J. Garcia-Espin, “On the
York, NY, USA: ACM, 2014, pp. 19–24. Implementation of NFV over an OpenFlow Infrastructure: Routing
[45] NFV(14)000154r2, “ETSI, OpenStack Liason Statement: NFV Re- Function Virtualization,” in Future Networks and Services (SDN4FNS),
quirements,” https://wiki.openstack.org, September 2014. 2013 IEEE SDN for, Nov 2013, pp. 1–6.
[46] F. Callegati, W. Cerroni, C. Contoli, and G. Santandrea, “Performance [67] M. R. Sama, L. M. Contreras, J. Kaippallimalil, I. Akiyoshi, H. Qian,
of Network Virtualization in cloud computing infrastructures: The and H. Ni, “Software-defined control of the virtualized mobile packet
OpenStack case,” in Cloud Networking (CloudNet), 2014 IEEE 3rd core,” Communications Magazine, IEEE, vol. 53, no. 2, pp. 107–115,
International Conference on, Oct 2014, pp. 132–137. Feb 2015.
[47] “Openstack Telco Working Group,” https://wiki.openstack.org/wiki/ [68] D. Kreutz, F. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg,
TelcoWorkingGroup, 2015, Accessed: January, 26 2015. S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 18

prehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, [92] D. Sabella, P. Rost, Y. Sheng, E. Pateromichelakis, U. Salim, P. Guitton-
Jan 2015. Ouhamou, M. di Girolamo, and G. Giuliani, “Ran as a service:
[69] “OpenDayLight,” http://www.opendaylight.org/project, 2015, Challenges of designing a flexible ran architecture in a cloud-based
Accessed: February, 06 2015. heterogeneous mobile network,” in Future Network and Mobile Summit
[70] “The Internet Engineering Task Force (IETF),” https://www.ietf.org/, (FutureNetworkSummit), 2013, July 2013, pp. 1–8.
2015, Accessed: February, 06 2015. [93] R. Vilalta, R. Muoz, R. Casellas, R. Martinez, V. Lopez, and D. Lopez,
[71] “The Internet Engineering Task Force (IETF) Service Function Chain- “Transport PCE network function virtualization,” in Optical Commu-
ing (SFC) Working Group (WG),” https://datatracker.ietf.org/wg/sfc/ nication (ECOC), 2014 European Conference on, Sept 2014, pp. 1–3.
charter/, 2015, Accessed: February, 06 2015. [94] R. Vilalta, R. Munoz, A. Mayoral, R. Casellas, R. Martinez, V. Lopez,
[72] “The Internet Engineering Task Force (IETF) Service Function Chain- and D. Lopez, “Transport Network Function Virtualization,” Lightwave
ing (SFC) Working Group (WG). Documents,” https://datatracker.ietf. Technology, Journal of, vol. PP, no. 99, pp. 1–1, 2015.
org/wg/sfc/documents/, 2015, Accessed: February, 06 2015. [95] “Arinet vCPE,” https://www.sdxcentral.com/products/
[73] “Internet Research Task Force, Network Function Virtualization Re- virtual-cpe-vcpe-framework/, 2015, Accessed: January, 26 2015.
search Group (NFVRG),” https://irtf.org/nfvrg, 2015, Accessed: Febru- [96] “Anuta Networks vCPE,” http://www.anutanetworks.com/
ary, 03 2015. road-to-virtualizing-cpe/, 2015, Accessed: January, 26 2015.
[74] “The Broadband Forum,” https://www.broadband-forum.org/, 2015, [97] “Calsoftlabs vCPE,” http://sdn.calsoftlabs.com/
Accessed: February, 10 2015. network-function-virtualization/virtual-cpe.html, 2015, Accessed:
[75] “The Broadband Forum, Technical Work in Progress,” January, 26 2015.
https://www.broadband-forum.org/technical/technicalwip.php, 2015, [98] S. Aleksic and I. Miladinovic, “Network virtualization: Paving the
Accessed: February, 28 2015. way to carrier clouds,” in Telecommunications Network Strategy and
[76] D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, Planning Symposium (Networks), 2014 16th International, Sept 2014,
“Blueprint for the intercloud - protocols and formats for cloud com- pp. 1–6.
puting interoperability,” in Internet and Web Applications and Services, [99] M. Nagy and I. Kotuliak, “Utilizing openflow, sdn and nfv in gprs
2009. ICIW ’09. Fourth International Conference on, May 2009, pp. core network,” in Testbeds and Research Infrastructure: Development
328–336. of Networks and Communities, ser. Lecture Notes of the Institute
[77] E. Dobrowolski, “Evolution of the common information model (cim); for Computer Sciences, Social Informatics and Telecommunications
introduction,” in Power Systems Conference and Exposition (PSCE), Engineering, V. C. Leung, M. Chen, J. Wan, and Y. Zhang, Eds.
2011 IEEE/PES, March 2011, pp. 1–1. Springer International Publishing, 2014, vol. 137, pp. 184–193.
[78] Huawei Technologies, “Huawei Observation to NFV. White Paper,” [100] B. O. Josep, “Experimentation on Virtualized Routing Function Mi-
February 2015. gration Using OpenFlow,” Master’s thesis, Universitat Politecnica de
[79] TMF, “Zero-time Orchestration, Operations and Management Catalunya, Barcelona, Spain, 9 2014.
(ZOOM),” TeleManagement Forum, Tech. Rep., August 2014. [101] E. Jacob, J. Matias, A. Mendiola, V. Fuentes, J. Garay, and C. Pinedo,
[80] “Open Platform for NFV (OPNFV),” https://www.opnfv.org/about, “Deploying a virtual network function over a software defined network
2015, Accessed: January, 26 2015. infrastructure: experiences deploying an access control VNF in the
[81] “MCN: The Mobile Cloud Networking EU Project,” http://www. University of Basque Countrys OpenFlow enabled facility,” 2014.
mobile-cloud-networking.eu/site/, 2015, Accessed: February, 12 2015. [102] “HP OpenNFV Reference Architecture,” http://www8.hp.com/us/en/
cloud/nfv-overview.html?, 2015, Accessed: February, 05 2015.
[82] A. Csaszar, W. John, M. Kind, C. Meirosu, G. Pongracz, D. Staessens,
A. Takacs, and F.-J. Westphal, “Unifying Cloud and Carrier Network: [103] ETSI GS NFV-SWA 001, “Network Functions Virtualisation (NFV);
EU FP7 Project UNIFY,” in Utility and Cloud Computing (UCC), 2013 Virtual Network Functions Architecture,” http://www.etsi.org/, Decem-
IEEE/ACM 6th International Conference on, Dec 2013, pp. 452–457. ber 2014, ETSI Industry Specification Group (ISG).
[83] “Convergence of Wireless Optical Network and IT REsources IN Sup- [104] “Huawei NFV Open Lab,” http://pr.huawei.com/en/news/, January
porT of Cloud Services (CONTENT) EU Project,” http://content-fp7. 2015, Accessed: February, 09 2015.
eu/theproject.html, January 2015, accessed on February 09, 2015. [105] “Intel Open Network Platform,” http://www.intel.com/ONP, 2015, Ac-
[84] H. Xie, Y. Li, J. Wang, D. Lopez, T. Tsou, and Y. Wen, “vRGW: cessed: February, 03 2015.
Towards network function virtualization enabled by software defined [106] “CloudNFV,” http://www.cloudnfv.com/, 2015, Accessed: January, 26
networking,” in Network Protocols (ICNP), 2013 21st IEEE Interna- 2015.
tional Conference on, Oct 2013, pp. 1–2. [107] “Alcatel-Lucent’s ClouBand,” http://www.alcatel-lucent.com/solutions/
[85] H. Masutani, Y. Nakajima, T. Kinoshita, T. Hibi, H. Takahashi, cloudband, 2015, Accessed: January, 26 2015.
K. Obana, K. Shimano, and M. Fukui, “Requirements and design of [108] Nuage Networks, “Nuage Networks Virtualized Services Platform,”
flexible NFV network infrastructure node leveraging SDN/OpenFlow,” http://www.nuagenetworks.net/, February 2015, An Alcatel-Lucent
in Optical Network Design and Modeling, 2014 International Confer- venture.
ence on, May 2014, pp. 258–263. [109] “Broadcom Open NFV,” http://www.broadcom.com/press/release.php?
[86] T. C. BĂlan, “Network Policy Function Virtualization via SDN and id=s827048, 2015, Accessed: January, 26 2015.
Packet Processing,” Review of the Air Force Academy, vol. 27, no. 3, [110] A. Khan, “Recent developments in high-performance system-on-chip
pp. 73–78, 2014. ic design,” in Integrated Circuit Design and Technology, 2004. ICICDT
[87] A. Bremler-Barr, Y. Harchol, D. Hay, and Y. Koral, “Deep packet in- ’04. International Conference on, 2004, pp. 151–158.
spection as a service,” in Proceedings of the 10th ACM International on [111] ODP, “OpenDataPlane project,” http://www.opendataplane.org/, Febru-
Conference on Emerging Networking Experiments and Technologies, ary 2015.
ser. CoNEXT ’14. New York, NY, USA: ACM, 2014, pp. 271–282. [112] “Cisco Evolved Services Platform (Cisco ESP),” http://www.cisco.com,
[88] S. Gebert, D. Hock, T. Zinner, P. Tran-Gia, M. Hoffmann, M. Jarschel, February 2015, Accessed: February, 27 2015.
E.-D. Schmidt, R.-P. Braun, C. Banse, and A. Köpsel, “Demonstrating [113] F5, “NFV: Beyond Virtualization. Techinical White Paper,” F5 Net-
the Optimal Placement of Virtualized Cellular Network Functions in works, Inc., Tech. Rep., February 2014.
Case of Large Crowd Events,” in Proceedings of the 2014 ACM [114] F. Yue, “Network Functions Virtualization - Everything Old Is New
Conference on SIGCOMM, ser. SIGCOMM ’14. New York, NY, Again. Techinical White Paper,” F5 Networks, Inc., Tech. Rep., Febru-
USA: ACM, 2014, pp. 359–360. ary 2014.
[89] M. Peng, Y. Li, J. Jiang, J. Li, and C. Wang, “Heterogeneous cloud [115] L. MacVittie, “Software Defined Application Services. Techinical
radio access networks: a new perspective for enhancing spectral and White Paper,” F5 Networks, Inc., Tech. Rep., February 2014.
energy efficiencies,” Wireless Communications, IEEE, vol. 21, no. 6, [116] “Clearwater,” http://www.metaswitch.com/clearwater, 2015, Accessed:
pp. 126–135, December 2014. January, 26 2015.
[90] R. Wang, H. Hu, and X. Yang, “Potentials and challenges of c-ran [117] “Metaswitch,” http://www.metaswitch.com/nfv, 2015, Accessed: Jan-
supporting multi-rats toward 5g mobile networks,” Access, IEEE, vol. 2, uary, 26 2015.
pp. 1187–1195, 2014. [118] R. Riggio, T. Rasheed, and F. Granelli, “EmPOWER: A Testbed for
[91] C.-L. I, J. Huang, R. Duan, C. Cui, J. Jiang, and L. Li, “Recent progress Network Function Virtualization Research and Experimentation,” in
on c-ran centralization and cloudification,” Access, IEEE, vol. 2, pp. Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, Nov
1030–1039, 2014. 2013, pp. 1–5.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 19

[119] CREATE-NET, “Center for REsearch And Telecommunication Exper- Communications and Networking Conference (WCNC), 2014 IEEE,
imentation for NETworked communities,” http://www.create-net.org/, April 2014, pp. 2402–2407.
February 2015. [139] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains
[120] K. Gomez, R. Riggio, T. Rasheed, D. Miorandi, and F. Granelli, of virtual network functions,” in Cloud Networking (CloudNet), 2014
“Energino: A hardware and software solution for energy consumption IEEE 3rd International Conference on, Oct 2014, pp. 7–13.
monitoring,” in Modeling and Optimization in Mobile, Ad Hoc and [140] A. Schrijver, Theory of Linear and Integer Programming. New York,
Wireless Networks (WiOpt), 2012 10th International Symposium on, NY, USA: John Wiley & Sons, Inc., 1986.
May 2012, pp. 311–317. [141] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, and
[121] R. Riggio, C. Sengul, L. Suresh, J. Schulz-Zander, and A. Feldmann, S. Davy, “Design and evaluation of algorithms for mapping and
“Thor: Energy programmable WiFi networks,” in Computer Communi- scheduling of virtual network functions,” in IEEE Conference on
cations Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on, Network Softwarization (NetSoft). University College London, April
April 2013, pp. 21–22. 2015.
[122] J. Keeney, S. v. d. Meer, and L. Fallon, “Towards real-time management [142] M. Xia, M. shirazipour, Y. Zhang, H. Green, and A. Takacs, “Network
of virtualized telecommunication networks,” in Network and Service Function Placement for NFV Chaining in Packet/Optical Datacenters,”
Management (CNSM), 2014 10th International Conference on, Nov Lightwave Technology, Journal of, vol. PP, no. 99, pp. 1–1, 2015.
2014, pp. 388–393. [143] M. Yoshida, W. Shen, T. Kawabata, K. Minato, and W. Imajuku,
[123] L. Bondan, C. R. P. d. Santos, and L. Z. Granville, “Management “MORSA: A multi-objective resource scheduling algorithm for NFV
requirements for ClickOS-based Network Function Virtualization,” in infrastructure,” in Network Operations and Management Symposium
Network and Service Management (CNSM), 2014 10th International (APNOMS), 2014 16th Asia-Pacific, Sept 2014, pp. 1–6.
Conference on, Nov 2014, pp. 447–450. [144] O. Hyeonseok, Y. Daeun, C. Yoon-Ho, and K. Namgi, “Design of
[124] Z. Bronstein and E. Shraga, “NFV virtualisation of the home envi- an Efficient Method for Identifying Virtual Machines Compatible
ronment,” in Consumer Communications and Networking Conference with Service Chain in a Virtual Network Environment,” International
(CCNC), 2014 IEEE 11th, Jan 2014, pp. 899–904. Journal of Multimedia and Ubiquitous Engineering, vol. 11, no. 9, pp.
[125] J. Soares, M. Dias, J. Carapinha, B. Parreira, and S. Sargento, 197–208, 2014.
“Cloud4NFV: A platform for Virtual Network Functions,” in Cloud [145] L. F. Wanner and M. B. Srivastava, “ViRUS: Virtual Function Replace-
Networking (CloudNet), 2014 IEEE 3rd International Conference on, ment Under Stress,” in 6th Workshop on Power-Aware Computing and
Oct 2014, pp. 288–293. Systems, HotPower ’14, Broomfield, CO, USA, October 5, 2014., 2014.
[126] J. Soares, C. Goncalves, B. Parreira, P. Tavares, J. Carapinha, J. P. Bar- [146] W. Cerroni and F. Callegati, “Live migration of virtual network
raca, R. L. Aguiar, and S. Sargento, “Toward a telco cloud environment functions in cloud-based edge networks,” in Communications (ICC),
for service functions,” Communications Magazine, IEEE, vol. 53, no. 2, 2014 IEEE International Conference on, June 2014, pp. 2963–2968.
pp. 98–106, Feb 2015. [147] LXC, “Linux Containers,” https://linuxcontainers.org/, January 2015.
[127] S. Clayman, E. Maini, A. Galis, A. Manzalini, and N. Mazzocca, [148] J. Ferrer Riera, X. Hesselbach, E. Escalona, J. Garcia-Espin, and
“The dynamic placement of virtual network functions,” in Network E. Grasa, “On the complex scheduling formulation of virtual network
Operations and Management Symposium (NOMS), 2014 IEEE, May functions over optical networks,” in Transparent Optical Networks
2014, pp. 1–9. (ICTON), 2014 16th International Conference on, July 2014, pp. 1–5.
[149] J. Ferrer Riera, E. Escalona, J. Batalle, E. Grasa, and J. Garcia-
[128] V. Riccobene, A. Lombardo, A. Manzalini, and G. Schembra, “Net-
Espin, “Virtual network function scheduling: Concept and challenges,”
work Functions At The Edge (NetFATE): Design and Implementation
in Smart Communications in Network Technologies (SaCoNeT), 2014
Issues,” 2014.
International Conference on, June 2014, pp. 1–5.
[129] E. Maini and A. Manzalini, “Management and Orchestration of Vir-
[150] P. Brucker, A. Drexl, R. Mhring, K. Neumann, and E. Pesch,
tualized Network Functions,” in Monitoring and Securing Virtualized
“Resource-constrained project scheduling: Notation, classification,
Networks and Services, ser. Lecture Notes in Computer Science,
models, and methods,” European Journal of Operational Research, vol.
A. Sperotto, G. Doyen, S. Latr, M. Charalambides, and B. Stiller, Eds.
112, no. 1, pp. 3 – 41, 1999.
Springer Berlin Heidelberg, 2014, vol. 8508, pp. 52–56.
[151] J. Baewicz, W. Domschke, and E. Pesch, “The job shop scheduling
[130] W. Shen, M. Yoshida, T. Kawabata, K. Minato, and W. Imajuku, problem: Conventional and new solution techniques,” European Jour-
“vConductor: An NFV management solution for realizing end-to-end nal of Operational Research, vol. 93, no. 1, pp. 1 – 33, 1996.
virtual network services,” in Network Operations and Management [152] A. Ahmed and P. Panagiotis, “MIDAS: Middlebox Discovery and
Symposium (APNOMS), 2014 16th Asia-Pacific, Sept 2014, pp. 1–6. Selection for On-Path Flow Processing,” in IEEE COMSNETS, 2015,
[131] W. Shen, M. Yoshida, K. Minato, and W. Imajuku, “vconductor: p. 8.
An enabler for achieving virtual network integration as a service,” [153] M. G. Rabbani, F. Z. Mohamed, and R. Boutaba, “On achieving high
Communications Magazine, IEEE, vol. 53, no. 2, pp. 116–124, Feb survivability in virtualized data centers,” IEICE Transactions, vol. 97-
2015. B, no. 1, pp. 10–18, 2014.
[132] P. Donadio, G. Fioccola, R. Canonico, and G. Ventre, “A PCE-based ar- [154] R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, F. De Turck, and
chitecture for the management of virtualized infrastructures,” in Cloud S. Latre, “Design and evaluation of learning algorithms for dynamic
Networking (CloudNet), 2014 IEEE 3rd International Conference on, resource management in virtual networks,” in Network Operations and
Oct 2014, pp. 223–228. Management Symposium (NOMS), 2014 IEEE, May 2014, pp. 1–9.
[133] R. Bolla, C. Lombardo, R. Bruschi, and S. Mangialardi, “DROPv2: [155] C. Lange, D. Kosiankowski, R. Weidmann, and A. Gladisch, “Energy
energy efficiency through network function virtualization,” Network, consumption of telecommunication networks and related improvement
IEEE, vol. 28, no. 2, pp. 26–32, March 2014. options,” Selected Topics in Quantum Electronics, IEEE Journal of,
[134] A. Fischer, J. Botero, M. Till Beck, H. de Meer, and X. Hesselbach, vol. 17, no. 2, pp. 285–295, March 2011.
“Virtual network embedding: A survey,” Communications Surveys [156] A. Beloglazov, R. Buyya, Y. C. Lee, and A. Y. Zomaya, “A
Tutorials, IEEE, vol. 15, no. 4, pp. 1888–1906, Fourth 2013. taxonomy and survey of energy-efficient data centers and cloud
[135] M. Rabbani, R. Pereira Esteves, M. Podlesny, G. Simon, L. Zam- computing systems.” Advances in Computers, vol. 82, pp. 47–111,
benedetti Granville, and R. Boutaba, “On tackling virtual data center 2011. [Online]. Available: http://dblp.uni-trier.de/db/journals/ac/ac82.
embedding problem,” in Integrated Network Management (IM 2013), html#BeloglazovBLZ11
2013 IFIP/IEEE International Symposium on, May 2013, pp. 177–184. [157] G. Astfalk, “Why optical data communications and why now?”
[136] A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann, Applied Physics A, vol. 95, no. 4, pp. 933–940, 2009. [Online].
“Applying NFV and SDN to LTE Mobile Core Gateways, the Functions Available: http://dx.doi.org/10.1007/s00339-009-5115-4
Placement Problem,” in Proceedings of the 4th Workshop on All [158] G. Xylomenos, C. Ververidis, V. Siris, N. Fotiou, C. Tsilopoulos,
Things Cellular: Operations, Applications, & Challenges, ser. X. Vasilakos, K. Katsaros, and G. Polyzos, “A survey of information-
AllThingsCellular ’14. New York, NY, USA: ACM, 2014, pp. 33–38. centric networking research,” Communications Surveys Tutorials,
[137] H. Moens and F. D. Turck, “Vnf-p: A model for efficient placement of IEEE, vol. 16, no. 2, pp. 1024–1049, Second 2014.
virtualized network functions,” in Network and Service Management [159] M. Arumaithurai, J. Chen, E. Monticelli, X. Fu, and K. K. Ramakrish-
(CNSM), 2014 10th International Conference on, Nov 2014, pp. 418– nan, “Exploiting ICN for Flexible Management of Software-defined
423. Networks,” in Proceedings of the 1st International Conference on
[138] M. Bagaa, T. Taleb, and A. Ksentini, “Service-aware network function Information-centric Networking, ser. INC ’14. New York, NY, USA:
placement for efficient traffic handling in carrier cloud,” in Wireless ACM, 2014, pp. 107–116.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS 20

[160] S. Pearson and G. Yee, Privacy and Security for Cloud Computing. Filip De Turck received his M.Sc. degree in Elec-
Springer, Series on Computer Communications and Networks, 2013. tronic Engineering from the Ghent University, Bel-
gium, in June 1997. In May 2002, he obtained the
Ph.D. degree in Electronic Engineering from the
same university. He is currently a full-time profes-
sor affiliated with the Department of Information
Technology of the Ghent University and the IBBT
(Interdisciplinary Institute of Broadband Technology
Rashid Mijumbi obtained a Bachelors of Science Flanders) in the area of telecommunication and
Degree in Electrical Engineering from Makerere software engineering. He is author or co-author of
University (Kampala, Uganda) in 2009, and a PhD approximately 250 papers published in international
in Telecommunications Engineering from the Uni- journals or in the proceedings of international conferences. His main research
versitat Politècnica de Catalunya (UPC) (Barcelona, interests include scalable software architectures for telecommunication net-
Spain) in 2014. He is currently a Post Doctoral work and service management, performance evaluation and design of new
Researcher in the Networking Department at the telecommunication and eHealth services.
UPC. His research interests are in management of
networks and services for the future Internet. Current
focus is on resource management in network virtual-
ization environments, software defined networks and
network function virtualization. Raouf Boutaba received the Bachelors degree from
the University of Annaba, Algeria in 1988, a M.S.
degree from the Université de Pierre et Marie Curie,
France, in 1990, a Magister degree from the Univer-
sity of Annaba in collaboration with the University
of Glasgow, Scotland, in 1993, and a Ph.D. degree
Joan Serrat graduated in Telecommunications from the Université de Pierre et Marie Curie in
Engeneering and Doctor in Telecommunications 1994, all in Computer Science. Currently, he is a
Engineeering both by Universitat Politècnica de Professor with the David R. Cheriton School of
Catalunya (UPC), where he became Full Professor Computer Science, University of Waterloo, Canada,
in 2008. In 1995 he started conducting research in and a Distinguished Visiting Professor at the Pohang
network management being involved since then in University of Science and Technology (POSTECH), Korea.
16 competitive-funded research projects. His cur-
rent research interests are in network and service
management and enabling technologies. Prof. Serrat
is author or co-author of 6 books and more than
150 contributions to technical and scientific fora and
magazines. Currently, he is the contact point of the Telemanagement Forum
at UPC.

Juan-Luis Gorricho received a telecommunication


engineering degree in 1993, and a Ph.D. degree in
telecommunication engineering in 1998 both from
the Universitat Politècnica de Catalunya (UPC). He
also received a software engineering Master degree
from the UPC in 2003. In 1994 he joined the
department of Telematics at the UPC as an assistant
professor, becoming associate professor in 2001. His
research interests are in the pervasive computing
area, in particular, the study of different alterna-
tives to implement the activity recognition paradigm,
thanks to the development of different data mining techniques classifying
the input data obtained from complementary sources as, for example, the
streaming of input data provided by embedded sensors present in today’s
smart-phones.

Niels Bouten obtained a masters degree in computer


science from Ghent University, Belgium, in June
2011. In August 2011, he joined the Department of
Information Technology at Ghent University, where
he is active as a Ph.D. student. His main research
interests are the application of autonomic network
management approaches in multimedia delivery. The
focus of this research is mainly on the end-to-end
Quality of Experience optimization, ranging from
the design of a single autonomic control loop to the
federated management of these distributed loops.

You might also like