Considerations for a Successful Network Service Chain Deployment

Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis, C. H. Lung, Mohamed Ibnkahla

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Network Functions Virtualization (NFV) along with the Service Chaining paradigm have changed the way that network services are deployed in the underlying network infrastructure. The decoupling of network functions from dedicated middleboxes into software entities has led the Service Providers to offer highly specialized services tailored to the needs of the end users. However, in order to achieve the high performance that the expensive hardware appliances can guarantee, an efficient virtualized network functions (VNF) deployment should be performed. This paper proposes a novel VNF placement approach with the goal to minimize the deployment cost and maximize the achieved throughput. Results reveal the need of considering the throughput degradation when consolidating multiple VNFs on the same server in order to increase the overall performance.

Original languageEnglish (US)
Title of host publication2018 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages366-371
Number of pages6
ISBN (Print)9781538646335
DOIs
StatePublished - Sep 10 2018
Event4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018 - Montreal, Canada
Duration: Jun 25 2018Jun 29 2018

Publication series

Name2018 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018

Other

Other4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018
Country/TerritoryCanada
CityMontreal
Period6/25/186/29/18

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Considerations for a Successful Network Service Chain Deployment'. Together they form a unique fingerprint.

Cite this