SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
DOI: 10.5121/ijcnc.2019.11204 53
ALLOCATION OF VIRTUAL FIREWALL FUNCTIONS
IN NFV-BASED NETWORKS WITH MINIMUM
NETWORK COST
Shin-ichi Kuribayashi
Department of Computer and Information Science, Seikei University, Japan
ABSTRACT
NFV-based network implements a variety of network functions with software on general-purpose servers
and this allows the network operator to select any capacity and location of network functions without any
physical constraints. It is essential for economical NFV-based network design to determine the place where
each network function should be located in the network and what its capacity should be. The authors
proposed an algorithm of virtual routing function allocation in the NFV-based network for minimizing the
network cost and provided effective allocation guidelines for virtual routing functions.
This paper proposes the deployment algorithm of virtual firewall function in addition to virtual routing
function for minimizing the network cost. Our evaluation results have revealed the following: (1) Installing
a packet filtering function, which is a part of the firewall function, in the sending-side area additionally can
reduce wasteful transit bandwidth and routing processing and thereby reduce the network cost. (2) The
greater the number of packets filtered by packet filtering function in the sending-side area, the more the
reduction of network cost is increased. (3) The greater the bandwidth cost relative to the routing function
cost, the greater the effect of statistical multiplexing on reducing the network cost. (4) The proposed
algorithm would be approaching about 95% of the deployment with the optimal solution.
KEYWORDS
NFV, resource allocation, the virtual routing function, minimum total network cost
1. INTRODUCTION
Virtualization is a technique to make a single physical entity appear multiple logical entities or,
conversely, to make multiple physical entities look like a single logical entity. Network functions
virtualization (NFV) [1]-[4] represents an application of virtualization technology to network
functions. It enables a piece of software that can conventionally operate only on a specific piece
of hardware to operate on a general-purpose server, making it possible to build a network quickly
and to operate it in a flexible manner. It has already been commercially introduced in public
mobile networks [5].
In an NFV-based network, a variety of network functions is implemented in software on general-
purpose servers. This makes it possible to select the capacity and location of each function
without any physical constraints. It is essential to optimize the location and capacity of each
network function for economical NFV-based network design. A new deployment method should
be required, as the existing deployment method that has limitations on capacity and deployment
location cannot be used as it is. As a deployment method for NFV-based network, there is a
method of efficiently allocating already installed physical resources to the virtual network
function as a short-term perspective. This has been studied as VNE (Virtual Network Assignment)
problems [6]. In addition, the research from a medium-term to long-term perspective is required
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
54
to decide the optimal physical resource capacity and deployment location, when expanding the
network or adding new network functions. Many types of researches have been carried out on the
former, but less research has not been done on the latter.
From a medium-term to long-term perspective, the authors previously focused on the routing
function, which is an important network function, and proposed the algorithm for allocating
virtual routing functions in a way that minimizes the network cost or the network power
consumption [7]. The authors evaluated the proposed algorithm on a ladder model that simulates
the shape of Japan, and developed multiple effective functional allocation guidelines. The
guidelines show the trend for the capacity required for each network function and the optimal
location of each function, which depend on the routing function cost relative to the bandwidth
cost and the inter-area traffic distribution. The authors also clarified the influence of quality
conditions such as the maximum allowable network delay on its deployment guidelines [8]. These
guidelines provide network operators with critical information needed in designing and building
an NFV-based network. For example, whether the total network cost can be reduced by 2% or by
20% can significantly affect the business decision. In an example presented in reference [8], it
was shown that if the number of areas that the packets are allowed to pass through is up to three,
the network cost rises by about 40%, and the service fee would go up accordingly. If the network
operator desires to limit a rise in the service fee to 20% or less, it is necessary to allow packets to
pass through up to four areas in the above example. In this way, a quantitative evaluation can
provide network design guidelines.
Assuming the deployment of firewall function in addition to routing function, this paper proposes
the joint deployment algorithm of virtual routing function and virtual firewall function to
minimize the NFV-based network cost and derives effective allocation guidelines for two virtual
network functions.
The rest of this paper is organized as follows. Section 2 explains related works. Section 3
proposes the joint deployment algorithm of virtual routing function and virtual firewall function
to minimize the NFV-based network cost. In particular, it is proposed to place an additional
packet filtering function, which is a part of the firewall function, in the sending-side area. Section
4 evaluates the proposed joint deployment algorithm and proposes the allocation guidelines for
virtual routing function and the virtual firewall function. Finally, Section 5 provides conclusion.
This paper is an extension of the study in Reference [22].
2. RELATED WORKS
One of the related studies is the VNE (virtual network resource allocation) problem, which is a
problem of allocating virtual nodes and links to a physical network efficiently [6], [9], [10].
Reference [11] evaluates the allocation of multiple VNFs. Reference [12] proposes a functional
allocation assuming a hybrid arrangement in which dedicated hardware and virtual functions are
used. References [13] and [14] proposes dynamic resource allocation and scheduling. Reference
[15] evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW)
functions in a mobile network in terms of network load and network delay. Based on an
evaluation made on a network that simulates the network structure of the U.S.A., it shows that
four data centers that completely virtualize these GWs are required. Reference [16] proposes a
method for solving the virtual DPI allocation problem with minimum cost.
The authors proposed a resource allocation method in a cloud environment in which computing
power and access bandwidths are allocated simultaneously [17]-[20]. The key point of this
method is how to pack as many requirements (simultaneously requiring two different types of the
resource of computing power and access bandwidths with service quality being not uniform) as
possible into multiple sets of computing power and bandwidths.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
55
Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite
physical network resources efficiently. In contrast, reference [8] and this paper try to develop
allocation guidelines that indicate how much capacity is required for each virtual network
function and where each function should be allocated in the network, both of which depend on the
relative costs of the routing function and the bandwidth and the inter-area traffic distribution.
These guidelines should be required for network carriers when they design and build an NFV-
based network.
3. ALLOCATION ALGORITHM OF ROUTING AND FIREWALL FUNCTIONS
WITH MINIMUM NETWORK COST
3.1 Conditions for Firewall Function Allocation and Proposed Allocation Algorithm
As shown in Figure 1, network functions can be classified into three categories [21]: those that
output a smaller volume of traffic than the volume of their input traffic, those that output volume
traffic equal to the volume of their input traffic, and those that output a larger
Figure 1. Network functions classified by input and output changes in traffic volume
Volume of traffic than the volume of their input traffic. The firewall function is one of the
important network functions and belongs to the first category. It is necessary to deal with
unauthorized intrusion prevention in accordance with the situation and condition. Therefore,
firewall functions are generally placed on the receiving-side, not on the sending-side. Unlike the
routing function, it is difficult to assume that the firewall function of one area will be integrated
into that of another area. Thus, it is proposed that the firewall function is left deployed on the
receiving-side area and only the packet filtering function, which is a part of its function, is placed
in the sending-side area additionally, in order to reduce the network cost. As the packet filtering
function filters packets based on only each packet’s IP address and port number, and is
irrespective of the particular traffic situation, it is easy to place it to another area.
Figure 2 illustrates an example of placing an additional packet filtering function in the sending-
side area, assuming that a routing function is allocated in every area. This packet filtering
function is the same as that in the firewall function which is placed in the receiving-side area. If
each packet filtering function removes 30% of the traffic (100pps in Figure 2) generated in the
sending-side area, it reduces the volume of traffic that is sent to the receiving-side area by 30%.
As a result, the bandwidth cost for carrying 60*L bps (L: packet length in bits), the routing
function cost for handling 90pps, and the firewall function cost for handling 30pps are
respectively saved compared to the case where no packet filtering function is placed in the
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
56
sending-side area. That is, the additional packet filtering function will be placed only when the
total cost reduction is greater than the cost of the additional packet filtering function for handling
100pps.
Figure 2. Example of the effect of additional packet filtening function deployment
3.2 Additional Deployment Judgment on Packet Filtering Function
Although the additional deployment (not moving) judgment on the packet filtering function could
be performed on each sending-side area, it is assumed in this study that all target sending-side
areas are collectively carried out. Here, the target sending-side area is an area where the traffic is
generated for the receiving-side area. The following judgment is performed independently for
each receiving-side area from an area with a small area number. If the network cost can be
reduced when the additional deployment is performed only for the packet filtering function in all
target sending-side areas, additional deployment is made to all target sending-side areas. The
capacity of the packet filtering function additionally deployed is determined as the amount of
traffic towards the receiving-side area from each sending-side area. If the network cost cannot be
reduced, it is not additionally deployed. Figure 3 shows the additional deployment judgment flow
of packet filtering function.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
57
3.3 Guidelines for Routing Function Allocation
Guidelines for allocating routing functions need to be studied for each different traffic type, as
shown in Figure 4:
(1) Input traffic to an output traffic from each area
As discussed in Section 3.1, a firewall function is placed in each receiving-side area. Therefore, a
virtual routing function to handle the input traffic to and the output traffic from
Figure 3. Additional deployment judgement flow of packet filtering function
start
Additional deployment of packet filtering functions in all
target sending-side areas (for receiving-side area i)
end
i: Receiving-side area number
j: Sending-side area number
N: Number of areas
xi: Sum of cost reduction
yi: Sum of cost increase
xij: Reduction cost related traffic
from area i to area j
yij: Increase cost related traffic
from area i to area j
yij = Additional packet filtering function cost
xij = Sum of routing function cost, bandwidth cost and
packet filtering function cost
No
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
58
Figure 4. Two different traffic types for allocation routing functions
Each area is placed in each area. This is different from the previous study [8] where only virtual
routing functions were considered.
(2) Relay traffic between areas
As in the case where the allocation of only virtual routing functions was considered [8], virtual
routing functions are placed in specific areas in such a way that the network cost is minimized.
The statistical multiplexing effects, which can be gained by binding multiple traffic flows, are
taken into consideration this time. The cost-reducing effect of circuit multiplexing is explained
below using Figure 5. This figure assumes that there are three traffic flows going in the same
direction. Their maximum speeds are respectively V1, V2 and V3. When these flows are
statistically multiplexed by the virtual routing function in a relay area, the maximum speed of the
resulting traffic becomes V0, which is lower than the total of V1 to V3. If the reduction in the
bandwidth cost of the subsequent relay areas is larger than the cost of the virtual routing function
used, this multiplexing is adopted. Otherwise, the traffic flows are not multiplexed.
The following algorithm for routing function allocation is proposed. First, a routing function is
placed in every relay area based on the traffic flows between areas. In other words, relay
bandwidths are allocated on the assumption that the statistical multiplexing effect is large enough.
Next, the relay area farthest from the network center is selected. If the removal of the routing
function in the selected area results in a reduction in the network cost, that routing function is
removed. This means that the statistical multiplexing effect is not sought. Then, the next farthest
V1
V2
V3
V1
V2
V3
V0
V0 < V1+V2+V3
<No multiplexing>
<Statistical multiplexing>
Relay area
Vi: Peak speed of traffic i
Routing
function
Figure 5. Effect of statistical multiplexing
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
59
relay area from the network center is selected, and the same decision-making process as above is
executed. This is repeated for all the remaining relay areas.
4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION
ALGORITHM
4.1 Evaluation Conditions
1) We have developed a simulation program in C language that executes the algorithm for
allocating the routing function and the firewall function proposed in Section 3.
2) Network structure: The ladder-shaped model illustrated in Figure 6, which simulates the shape
of Japan, is used as in Reference [8].
3) Traffic flow: The traffic flow is the same as that used in Reference [8]. It is also supposed that
the amount of traffic between Area #5 and each of the remaining area is M times that of traffic
between other areas [8].
4) Routing policy: The same routing policy as adopted in reference [8] is also applied.
5) Network cost calculation: The network cost is greatly affected by the ratio (ZC) of the routing
function cost to the bandwidth cost, and the ratio (WC) of the firewall function cost to the
bandwidth cost. These ratios are defined as follows:
ZC = αC/βC (1)
WC = γC/βC (2)
Where αC is the routing function cost per packet per second, βC is the bandwidth cost per Mbps
per 10km, and γC is the firewall function cost per packet per second. The fixed cost, which is the
necessary cost even if traffic is 0, is not taken into consideration here, as in reference [8].
6) Filtering coefficient: The probability at which input traffic passes through a packet filtering
function is defined as Pr. For example, Pr=0.9 means that the 90% of entire traffic passes through
while Pr=0 means that all packets in the traffic are discarded. It is assumed in this study that the
value of Pr is the same for all areas.
7) Filtering cost coefficient: The ratio of the packet filtering function cost to the entire firewall
function cost is defined as f. For example, f=0.3 means that 30% of the firewall function cost is a
packet filtering function cost.
Figure 6. Ladder-shaped network topology which simulates the shape of Japan
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
60
8) Statistical multiplexing coefficient: The ratio of the bandwidth resulting from multiplexing
communication flows statistically to the bandwidth required before this multiplexing is defined as
g. For example, g=0.7 means that the bandwidth required after multiplexing is 70% of the
bandwidth required before multiplexing.
4.2 Evaluation Results and Discussions
The evaluation results are shown in Figures. 7 to 14. Figure 7 shows the effect of Pr, Figure 9 the
effect of WC, Figure 10 the effect of f, Figure 11 the effect of g, and Figure 13 the effect of ZC.
The vertical axis of each figure shows a normalized total network cost. Figures 7, 9, 10, 11 and 13
also include data for the solution with the minimum network cost and the details of network cost
data. Figure 8 shows the final allocation of additional packet filtering functions. Figure 12 and 14
shows the final allocations of routing functions for inter-area relay traffic as affected by g and ZC
respectively. Figures 1 to 14 are the results calculated assuming the following parameter values;
Zc=0.02, Wc=0.1, f=0.4, M=5, g=0.5, Pr=0.8. When using a different parameter value, its value is
described in the figure.
This paper also compares the proposed algorithm with the optimal solution which has the lowest
cost (‘solution with minimum network cost’, in each Figure) and can be obtained by checking all
possible cases.
The following points are clear from these Figures:
(a) The smaller the filtering coefficient, Pr, the smaller the network cost.
<Reason> The smaller the Pr is, the smaller the volume of traffic that is passed by the packet
filtering function. This reduces the routing function cost and the bandwidth cost. In Figure 7, the
total of the firewall function cost and the packet filtering function cost for the cases of Pr=0.4 and
Pr=0.8 is more or less the same as that for the case of no additional packet filtering function.
However, both the bandwidth cost and the routing function cost are reduced by half.
In the condition of Figure 7, the additional deployment of packet filtering functions can be
advantageous when Pr is not less than 0.7. One of the main objectives of this paper is to provide
such network design guidelines.
(b) Assuming NFV-based packet filtering function, it is possible to add small additional capacity
which could not be realized by the conventional non-NFV based method. In the example of
Pr=0.7 in Figure 7, the network cost can be reduced by about 20% compared with the
conventional network equipment, by the additional packet filtering deployment based on NFV.
The additional packet filtering functions are not placed in all areas as it is not economical in the
conventional network design, as illustrated in Figure 8. It should be an example of the effect
unique to NFV.
(c) The smaller the Wc is and the smaller f is, the smaller the network cost.
<Reason> As Wc becomes smaller; the costs of the firewall function and the additional packet
filtering function become smaller, as shown in Figure 9. Meanwhile, the routing function cost and
the bandwidth cost remain unchanged. Thus, the total network cost is reduced. Moreover, in the
example shown in Figure 10, halving the value of f does not change the firewall function cost, the
routing function cost or the bandwidth cost, but reduces the cost of the additional packet filtering
function. Thus, the network cost can be reduced.
(d) The smaller the statistical multiplexing coefficient, g, and the smaller the cost ratio, Zc, the
smaller the network cost. Also, the smaller g is and the smaller Zc is, the more distributed the
final allocation of routing functions for relay traffic become.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
61
<Reason> The smaller the g is, the greater the effect of statistical multiplexing. This results in a
smaller demand for bandwidth. As shown in Figure 11, all types of cost other than the bandwidth
cost for the case of g=0.4 are more or less the same as those for g=0.8. However, the bandwidth
cost is almost halved. Moreover, as g becomes smaller, it becomes more advantageous to allocate
routing functions for inter-area relay traffic. As a result, the final allocation of the routing
functions for this type of traffic becomes more distributed, as shown in Figure 12. As shown in
Figure 13, the smaller Zc is, the smaller the network cost. Moreover, as Zc becomes smaller, the
amount of reduction in the routing function cost becomes larger, making it more advantageous to
allocate routing functions for inter-area relay traffic, as shown in Figure 14.
(e) The proposed algorithm would be approaching about 95% of the deployment with minimum
network cost, as in Figures 7 and 10.
The above evaluations are based on a ladder-shaped network model with 10 areas (Figure 6).
Even if the number of areas is increased to 100, for example, or a star-shaped or a loop-shaped
model is used, the proposed function allocation algorithm can be applied basically. Therefore, the
main trends discussed above and the proposed network design guidelines can be also be
applicable to such cases. However, additional evaluations are necessary to decide where and how
many virtual network functions should be allocated.
Figure 7. Impact of Pr on network cost
<Details of network cost data>
Networkcost(Normalizedvalue)
Value of Pr
Proposed algorithm
Solution with minimum
network cost
Networkcost
(Normalizedvalue)
A: Routing function cost, B:Circuit bandwidth cost
C: Firewall function cost, D: Additional Packet filtering cost
Pr
Figure 8. Final topology of additional packet filtering
function allocation to each area
(Pr=0.7 in Figure 7)
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
62
Networkcost(Normalizedvalue)
Value of Wc
<Details of network cost data>
Networkcost
(Normalizedvalue)
A: Routing function cost, B:Circuit bandwidth cost
C: Firewall function cost, D: Additional Packet filtering cost
Figure 9. Impact of Wc on network cost
Wc
Pr=0.8
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
63
Figure 10. Impact of f on network cost
<Details of network cost data>
Networkcost(Normalizedvalue)
Networkcost
(Normalizedvalue)
A: Routing function cost, B:Circuit bandwidth cost
C: Firewall function cost, D: Additional Packet filtering cost
Value of f
Proposed algorithm (Pr=0.8)
Solution with
minimum network
cost (Pr=0.8)
Proposed algorithm(Pr=0.2)
Solution with
minimum network
cost (Pr=0.2)
Pr=0.8
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
64
Networkcost(Normalizedvalue)
Value of g
<Details of network cost data>
Networkcost
(Normalizedvalue)
A: Routing function cost, B:Circuit bandwidth cost
C: Firewall function cost, D: Additional Packet filtering cost
Figure 11. Impact of g on network cost
g
Figure 12. Final topology of routing function
allocation for inter-area relay traffic
<g=1.0>
<g=0.8>
<g=0.1>
Pr=0.8
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
65
Networkcost(Normalizedvalue)
Value of Zc ratio
<Details of network cost data>
Networkcost
(Normalizedvalue)
A: Routing function cost, B:Circuit bandwidth cost
C: Firewall function cost, D: Additional Packet filtering cost
Figure13. Impact of Zc on network cost
Zc ratio
Figure 14. Final topology of routing function
allocation for inter-area relay traffic
<Zc=1.0>
<Zc=0.5>
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
66
5. CONCLUSIONS
This paper has proposed the joint deployment algorithm of virtual routing function and virtual
firewall function for minimizing the network cost, and has evaluated the proposed algorithm on a
ladder model that simulates the shape of Japan, and developed multiple effective functional
allocation guidelines.
It will be necessary to evaluate the proposed algorithm taking the fixed costs for routing function,
firewall function, and bandwidth into consideration. It will be also necessary to study the optimal
function allocation for cases where virtual cache function, WAN optimization function or DPI
function is required.
ACKNOWLEDGMENT
We would like to thank Mr. Kenichiro HIDA for his help with the evaluation.
REFERENCES
[1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers,
Challenges and Call for Action,” ETSI NFV, Oct. 2012.
[2] “Network Functions Virtualisation (NFV); Architectual Framework,” ETSI GS NFV 002 v1.2.1, Dec.
2014.
[3] file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf
[4] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function
Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys &
Tutorials, Vol. 18, Issue 1, pp.236-262, 2016.
[5] NTT docomo press release
https://www.nttdocomo.co.jp/english/info/media_center/pr/2016/0219_00.html
[6] J.G.Herrera and J.F.Botero, “Resource allocation in NFV: A comprehensive survey,” IEEE Trans. on
Network and Service Management, Vol.13, No.3, pp.518-532, 2016.
[7] KenichiroHida and Shin-ichi Kuribayashi, “Virtual routing function allocation method for
minimizing total network power consumption,” 18th International Conference on Information and
Communication Systems (ICICS Venice 2016), Aug. 2016.
[8] KenichiroHida and Shin-ichi Kuribayashi, “NFV-based virtual routing function deployment under
network delay,” 19th International Conference on Computer Communications and Applications
(ICCCA Kyoto 2017), Nov. 2017.
[9] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A
Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013.
[10] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud
Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014.
[11] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network
functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014,
pp. 7–13.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019
67
[12] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network
functions,” in Network and Service Management (CNSM), 2014 10th International Conference on,
Nov 2014, pp. 418–423.
[13] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of
Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on
Network Softwarization (NetSoft), pp.1-9, 2015.
[14] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual
Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014.
[15] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE
Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular:
Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014.
[16] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,”
International Journal of Network Management, pp.490-506, 2015.
[17] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer
communications networks”, APCC2006, 2F-4 (2006.8)
[18] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing
Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS),
Vol.2, No.1, pp.1-8, Feb. 2011.
[19] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different
Service Quality to Users at Multiple Access”, International Journal of Computer Networks &
Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015.
[20] S.Kuribayashi,“Evaluation of Congestion control Methods for Joint Multiple Resource Allocation in
Cloud Computing Environments”, International Journal of Computer Networks & Communications
(IJCNC) Vol.9, No.3, pp.41-54, May 2017.
[21] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network
functions,”2014 IEEE 3rd International Conference onCloud Networking (CloudNet),pp.7-13,Oct
2014.
[22] K. Hida and S. Kuribayashi, “Joint Deployment of Virtual Routing Functionand Virtual Firewall
Function in NFV-Based Network with Minimum Network,” Advances in Network-Based
Information Systems-2019, pp.333-345, Aug. 2018.
AUTHOR
Shin-ichi Kuribayashi received the B.E., M.E., and D.E. degrees from Tohoku
University, Japan, in 1978, 1980, and 1988 respectively. He joined NTT Electrical
Communications Labs in 1980. He has been engaged in the design and development of
DDX and ISDN packet switching, ATM, PHS, and IMT 2000 and IP-VPN systems. He
researched distributed communication systems at Stanford University from December
1988 through December 1989. He participated in international standardization on ATM
signaling and IMT2000 signaling protocols at ITU-T SG11 from 1990 through 2000.
Since April 2004, he has been a Professor in the Department of Computer and Information Science, Faculty
of Science and Technology, Seikei University. His research interests include resource management for NFV
and SDN-based networks, QoS control, traffic control for cloud computing environments and green
network. He is a member of IEEE and IEICE.

More Related Content

What's hot

Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsVijay Karan
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...dbpublications
 
Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachWasif Hafeez
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEIJERA Editor
 
Jrs ieee com mag network sharing ftth pon august 2014
Jrs ieee com mag network sharing ftth pon august 2014Jrs ieee com mag network sharing ftth pon august 2014
Jrs ieee com mag network sharing ftth pon august 2014fwe fwef
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
 

What's hot (20)

Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
C046022025
C046022025C046022025
C046022025
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
 
Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approach
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
 
03
0303
03
 
Jrs ieee com mag network sharing ftth pon august 2014
Jrs ieee com mag network sharing ftth pon august 2014Jrs ieee com mag network sharing ftth pon august 2014
Jrs ieee com mag network sharing ftth pon august 2014
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
 

Similar to ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING

VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...IJCNCJournal
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GEricsson
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceEricsson
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsredpel dot com
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...ieeepondy
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function VirtualisationIJERA Editor
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service CompositionIJERD Editor
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networksijwmn
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksAIRCC Publishing Corporation
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksIJCSIS Research Publications
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
 

Similar to ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING (20)

VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5G
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
 
Scheduling wireless virtual networks functions
Scheduling wireless virtual networks functionsScheduling wireless virtual networks functions
Scheduling wireless virtual networks functions
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
N fv good
N fv goodN fv good
N fv good
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function Virtualisation
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service Composition
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 DOI: 10.5121/ijcnc.2019.11204 53 ALLOCATION OF VIRTUAL FIREWALL FUNCTIONS IN NFV-BASED NETWORKS WITH MINIMUM NETWORK COST Shin-ichi Kuribayashi Department of Computer and Information Science, Seikei University, Japan ABSTRACT NFV-based network implements a variety of network functions with software on general-purpose servers and this allows the network operator to select any capacity and location of network functions without any physical constraints. It is essential for economical NFV-based network design to determine the place where each network function should be located in the network and what its capacity should be. The authors proposed an algorithm of virtual routing function allocation in the NFV-based network for minimizing the network cost and provided effective allocation guidelines for virtual routing functions. This paper proposes the deployment algorithm of virtual firewall function in addition to virtual routing function for minimizing the network cost. Our evaluation results have revealed the following: (1) Installing a packet filtering function, which is a part of the firewall function, in the sending-side area additionally can reduce wasteful transit bandwidth and routing processing and thereby reduce the network cost. (2) The greater the number of packets filtered by packet filtering function in the sending-side area, the more the reduction of network cost is increased. (3) The greater the bandwidth cost relative to the routing function cost, the greater the effect of statistical multiplexing on reducing the network cost. (4) The proposed algorithm would be approaching about 95% of the deployment with the optimal solution. KEYWORDS NFV, resource allocation, the virtual routing function, minimum total network cost 1. INTRODUCTION Virtualization is a technique to make a single physical entity appear multiple logical entities or, conversely, to make multiple physical entities look like a single logical entity. Network functions virtualization (NFV) [1]-[4] represents an application of virtualization technology to network functions. It enables a piece of software that can conventionally operate only on a specific piece of hardware to operate on a general-purpose server, making it possible to build a network quickly and to operate it in a flexible manner. It has already been commercially introduced in public mobile networks [5]. In an NFV-based network, a variety of network functions is implemented in software on general- purpose servers. This makes it possible to select the capacity and location of each function without any physical constraints. It is essential to optimize the location and capacity of each network function for economical NFV-based network design. A new deployment method should be required, as the existing deployment method that has limitations on capacity and deployment location cannot be used as it is. As a deployment method for NFV-based network, there is a method of efficiently allocating already installed physical resources to the virtual network function as a short-term perspective. This has been studied as VNE (Virtual Network Assignment) problems [6]. In addition, the research from a medium-term to long-term perspective is required
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 54 to decide the optimal physical resource capacity and deployment location, when expanding the network or adding new network functions. Many types of researches have been carried out on the former, but less research has not been done on the latter. From a medium-term to long-term perspective, the authors previously focused on the routing function, which is an important network function, and proposed the algorithm for allocating virtual routing functions in a way that minimizes the network cost or the network power consumption [7]. The authors evaluated the proposed algorithm on a ladder model that simulates the shape of Japan, and developed multiple effective functional allocation guidelines. The guidelines show the trend for the capacity required for each network function and the optimal location of each function, which depend on the routing function cost relative to the bandwidth cost and the inter-area traffic distribution. The authors also clarified the influence of quality conditions such as the maximum allowable network delay on its deployment guidelines [8]. These guidelines provide network operators with critical information needed in designing and building an NFV-based network. For example, whether the total network cost can be reduced by 2% or by 20% can significantly affect the business decision. In an example presented in reference [8], it was shown that if the number of areas that the packets are allowed to pass through is up to three, the network cost rises by about 40%, and the service fee would go up accordingly. If the network operator desires to limit a rise in the service fee to 20% or less, it is necessary to allow packets to pass through up to four areas in the above example. In this way, a quantitative evaluation can provide network design guidelines. Assuming the deployment of firewall function in addition to routing function, this paper proposes the joint deployment algorithm of virtual routing function and virtual firewall function to minimize the NFV-based network cost and derives effective allocation guidelines for two virtual network functions. The rest of this paper is organized as follows. Section 2 explains related works. Section 3 proposes the joint deployment algorithm of virtual routing function and virtual firewall function to minimize the NFV-based network cost. In particular, it is proposed to place an additional packet filtering function, which is a part of the firewall function, in the sending-side area. Section 4 evaluates the proposed joint deployment algorithm and proposes the allocation guidelines for virtual routing function and the virtual firewall function. Finally, Section 5 provides conclusion. This paper is an extension of the study in Reference [22]. 2. RELATED WORKS One of the related studies is the VNE (virtual network resource allocation) problem, which is a problem of allocating virtual nodes and links to a physical network efficiently [6], [9], [10]. Reference [11] evaluates the allocation of multiple VNFs. Reference [12] proposes a functional allocation assuming a hybrid arrangement in which dedicated hardware and virtual functions are used. References [13] and [14] proposes dynamic resource allocation and scheduling. Reference [15] evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW) functions in a mobile network in terms of network load and network delay. Based on an evaluation made on a network that simulates the network structure of the U.S.A., it shows that four data centers that completely virtualize these GWs are required. Reference [16] proposes a method for solving the virtual DPI allocation problem with minimum cost. The authors proposed a resource allocation method in a cloud environment in which computing power and access bandwidths are allocated simultaneously [17]-[20]. The key point of this method is how to pack as many requirements (simultaneously requiring two different types of the resource of computing power and access bandwidths with service quality being not uniform) as possible into multiple sets of computing power and bandwidths.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 55 Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite physical network resources efficiently. In contrast, reference [8] and this paper try to develop allocation guidelines that indicate how much capacity is required for each virtual network function and where each function should be allocated in the network, both of which depend on the relative costs of the routing function and the bandwidth and the inter-area traffic distribution. These guidelines should be required for network carriers when they design and build an NFV- based network. 3. ALLOCATION ALGORITHM OF ROUTING AND FIREWALL FUNCTIONS WITH MINIMUM NETWORK COST 3.1 Conditions for Firewall Function Allocation and Proposed Allocation Algorithm As shown in Figure 1, network functions can be classified into three categories [21]: those that output a smaller volume of traffic than the volume of their input traffic, those that output volume traffic equal to the volume of their input traffic, and those that output a larger Figure 1. Network functions classified by input and output changes in traffic volume Volume of traffic than the volume of their input traffic. The firewall function is one of the important network functions and belongs to the first category. It is necessary to deal with unauthorized intrusion prevention in accordance with the situation and condition. Therefore, firewall functions are generally placed on the receiving-side, not on the sending-side. Unlike the routing function, it is difficult to assume that the firewall function of one area will be integrated into that of another area. Thus, it is proposed that the firewall function is left deployed on the receiving-side area and only the packet filtering function, which is a part of its function, is placed in the sending-side area additionally, in order to reduce the network cost. As the packet filtering function filters packets based on only each packet’s IP address and port number, and is irrespective of the particular traffic situation, it is easy to place it to another area. Figure 2 illustrates an example of placing an additional packet filtering function in the sending- side area, assuming that a routing function is allocated in every area. This packet filtering function is the same as that in the firewall function which is placed in the receiving-side area. If each packet filtering function removes 30% of the traffic (100pps in Figure 2) generated in the sending-side area, it reduces the volume of traffic that is sent to the receiving-side area by 30%. As a result, the bandwidth cost for carrying 60*L bps (L: packet length in bits), the routing function cost for handling 90pps, and the firewall function cost for handling 30pps are respectively saved compared to the case where no packet filtering function is placed in the
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 56 sending-side area. That is, the additional packet filtering function will be placed only when the total cost reduction is greater than the cost of the additional packet filtering function for handling 100pps. Figure 2. Example of the effect of additional packet filtening function deployment 3.2 Additional Deployment Judgment on Packet Filtering Function Although the additional deployment (not moving) judgment on the packet filtering function could be performed on each sending-side area, it is assumed in this study that all target sending-side areas are collectively carried out. Here, the target sending-side area is an area where the traffic is generated for the receiving-side area. The following judgment is performed independently for each receiving-side area from an area with a small area number. If the network cost can be reduced when the additional deployment is performed only for the packet filtering function in all target sending-side areas, additional deployment is made to all target sending-side areas. The capacity of the packet filtering function additionally deployed is determined as the amount of traffic towards the receiving-side area from each sending-side area. If the network cost cannot be reduced, it is not additionally deployed. Figure 3 shows the additional deployment judgment flow of packet filtering function.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 57 3.3 Guidelines for Routing Function Allocation Guidelines for allocating routing functions need to be studied for each different traffic type, as shown in Figure 4: (1) Input traffic to an output traffic from each area As discussed in Section 3.1, a firewall function is placed in each receiving-side area. Therefore, a virtual routing function to handle the input traffic to and the output traffic from Figure 3. Additional deployment judgement flow of packet filtering function start Additional deployment of packet filtering functions in all target sending-side areas (for receiving-side area i) end i: Receiving-side area number j: Sending-side area number N: Number of areas xi: Sum of cost reduction yi: Sum of cost increase xij: Reduction cost related traffic from area i to area j yij: Increase cost related traffic from area i to area j yij = Additional packet filtering function cost xij = Sum of routing function cost, bandwidth cost and packet filtering function cost No
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 58 Figure 4. Two different traffic types for allocation routing functions Each area is placed in each area. This is different from the previous study [8] where only virtual routing functions were considered. (2) Relay traffic between areas As in the case where the allocation of only virtual routing functions was considered [8], virtual routing functions are placed in specific areas in such a way that the network cost is minimized. The statistical multiplexing effects, which can be gained by binding multiple traffic flows, are taken into consideration this time. The cost-reducing effect of circuit multiplexing is explained below using Figure 5. This figure assumes that there are three traffic flows going in the same direction. Their maximum speeds are respectively V1, V2 and V3. When these flows are statistically multiplexed by the virtual routing function in a relay area, the maximum speed of the resulting traffic becomes V0, which is lower than the total of V1 to V3. If the reduction in the bandwidth cost of the subsequent relay areas is larger than the cost of the virtual routing function used, this multiplexing is adopted. Otherwise, the traffic flows are not multiplexed. The following algorithm for routing function allocation is proposed. First, a routing function is placed in every relay area based on the traffic flows between areas. In other words, relay bandwidths are allocated on the assumption that the statistical multiplexing effect is large enough. Next, the relay area farthest from the network center is selected. If the removal of the routing function in the selected area results in a reduction in the network cost, that routing function is removed. This means that the statistical multiplexing effect is not sought. Then, the next farthest V1 V2 V3 V1 V2 V3 V0 V0 < V1+V2+V3 <No multiplexing> <Statistical multiplexing> Relay area Vi: Peak speed of traffic i Routing function Figure 5. Effect of statistical multiplexing
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 59 relay area from the network center is selected, and the same decision-making process as above is executed. This is repeated for all the remaining relay areas. 4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION ALGORITHM 4.1 Evaluation Conditions 1) We have developed a simulation program in C language that executes the algorithm for allocating the routing function and the firewall function proposed in Section 3. 2) Network structure: The ladder-shaped model illustrated in Figure 6, which simulates the shape of Japan, is used as in Reference [8]. 3) Traffic flow: The traffic flow is the same as that used in Reference [8]. It is also supposed that the amount of traffic between Area #5 and each of the remaining area is M times that of traffic between other areas [8]. 4) Routing policy: The same routing policy as adopted in reference [8] is also applied. 5) Network cost calculation: The network cost is greatly affected by the ratio (ZC) of the routing function cost to the bandwidth cost, and the ratio (WC) of the firewall function cost to the bandwidth cost. These ratios are defined as follows: ZC = αC/βC (1) WC = γC/βC (2) Where αC is the routing function cost per packet per second, βC is the bandwidth cost per Mbps per 10km, and γC is the firewall function cost per packet per second. The fixed cost, which is the necessary cost even if traffic is 0, is not taken into consideration here, as in reference [8]. 6) Filtering coefficient: The probability at which input traffic passes through a packet filtering function is defined as Pr. For example, Pr=0.9 means that the 90% of entire traffic passes through while Pr=0 means that all packets in the traffic are discarded. It is assumed in this study that the value of Pr is the same for all areas. 7) Filtering cost coefficient: The ratio of the packet filtering function cost to the entire firewall function cost is defined as f. For example, f=0.3 means that 30% of the firewall function cost is a packet filtering function cost. Figure 6. Ladder-shaped network topology which simulates the shape of Japan
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 60 8) Statistical multiplexing coefficient: The ratio of the bandwidth resulting from multiplexing communication flows statistically to the bandwidth required before this multiplexing is defined as g. For example, g=0.7 means that the bandwidth required after multiplexing is 70% of the bandwidth required before multiplexing. 4.2 Evaluation Results and Discussions The evaluation results are shown in Figures. 7 to 14. Figure 7 shows the effect of Pr, Figure 9 the effect of WC, Figure 10 the effect of f, Figure 11 the effect of g, and Figure 13 the effect of ZC. The vertical axis of each figure shows a normalized total network cost. Figures 7, 9, 10, 11 and 13 also include data for the solution with the minimum network cost and the details of network cost data. Figure 8 shows the final allocation of additional packet filtering functions. Figure 12 and 14 shows the final allocations of routing functions for inter-area relay traffic as affected by g and ZC respectively. Figures 1 to 14 are the results calculated assuming the following parameter values; Zc=0.02, Wc=0.1, f=0.4, M=5, g=0.5, Pr=0.8. When using a different parameter value, its value is described in the figure. This paper also compares the proposed algorithm with the optimal solution which has the lowest cost (‘solution with minimum network cost’, in each Figure) and can be obtained by checking all possible cases. The following points are clear from these Figures: (a) The smaller the filtering coefficient, Pr, the smaller the network cost. <Reason> The smaller the Pr is, the smaller the volume of traffic that is passed by the packet filtering function. This reduces the routing function cost and the bandwidth cost. In Figure 7, the total of the firewall function cost and the packet filtering function cost for the cases of Pr=0.4 and Pr=0.8 is more or less the same as that for the case of no additional packet filtering function. However, both the bandwidth cost and the routing function cost are reduced by half. In the condition of Figure 7, the additional deployment of packet filtering functions can be advantageous when Pr is not less than 0.7. One of the main objectives of this paper is to provide such network design guidelines. (b) Assuming NFV-based packet filtering function, it is possible to add small additional capacity which could not be realized by the conventional non-NFV based method. In the example of Pr=0.7 in Figure 7, the network cost can be reduced by about 20% compared with the conventional network equipment, by the additional packet filtering deployment based on NFV. The additional packet filtering functions are not placed in all areas as it is not economical in the conventional network design, as illustrated in Figure 8. It should be an example of the effect unique to NFV. (c) The smaller the Wc is and the smaller f is, the smaller the network cost. <Reason> As Wc becomes smaller; the costs of the firewall function and the additional packet filtering function become smaller, as shown in Figure 9. Meanwhile, the routing function cost and the bandwidth cost remain unchanged. Thus, the total network cost is reduced. Moreover, in the example shown in Figure 10, halving the value of f does not change the firewall function cost, the routing function cost or the bandwidth cost, but reduces the cost of the additional packet filtering function. Thus, the network cost can be reduced. (d) The smaller the statistical multiplexing coefficient, g, and the smaller the cost ratio, Zc, the smaller the network cost. Also, the smaller g is and the smaller Zc is, the more distributed the final allocation of routing functions for relay traffic become.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 61 <Reason> The smaller the g is, the greater the effect of statistical multiplexing. This results in a smaller demand for bandwidth. As shown in Figure 11, all types of cost other than the bandwidth cost for the case of g=0.4 are more or less the same as those for g=0.8. However, the bandwidth cost is almost halved. Moreover, as g becomes smaller, it becomes more advantageous to allocate routing functions for inter-area relay traffic. As a result, the final allocation of the routing functions for this type of traffic becomes more distributed, as shown in Figure 12. As shown in Figure 13, the smaller Zc is, the smaller the network cost. Moreover, as Zc becomes smaller, the amount of reduction in the routing function cost becomes larger, making it more advantageous to allocate routing functions for inter-area relay traffic, as shown in Figure 14. (e) The proposed algorithm would be approaching about 95% of the deployment with minimum network cost, as in Figures 7 and 10. The above evaluations are based on a ladder-shaped network model with 10 areas (Figure 6). Even if the number of areas is increased to 100, for example, or a star-shaped or a loop-shaped model is used, the proposed function allocation algorithm can be applied basically. Therefore, the main trends discussed above and the proposed network design guidelines can be also be applicable to such cases. However, additional evaluations are necessary to decide where and how many virtual network functions should be allocated. Figure 7. Impact of Pr on network cost <Details of network cost data> Networkcost(Normalizedvalue) Value of Pr Proposed algorithm Solution with minimum network cost Networkcost (Normalizedvalue) A: Routing function cost, B:Circuit bandwidth cost C: Firewall function cost, D: Additional Packet filtering cost Pr Figure 8. Final topology of additional packet filtering function allocation to each area (Pr=0.7 in Figure 7)
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 62 Networkcost(Normalizedvalue) Value of Wc <Details of network cost data> Networkcost (Normalizedvalue) A: Routing function cost, B:Circuit bandwidth cost C: Firewall function cost, D: Additional Packet filtering cost Figure 9. Impact of Wc on network cost Wc Pr=0.8
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 63 Figure 10. Impact of f on network cost <Details of network cost data> Networkcost(Normalizedvalue) Networkcost (Normalizedvalue) A: Routing function cost, B:Circuit bandwidth cost C: Firewall function cost, D: Additional Packet filtering cost Value of f Proposed algorithm (Pr=0.8) Solution with minimum network cost (Pr=0.8) Proposed algorithm(Pr=0.2) Solution with minimum network cost (Pr=0.2) Pr=0.8
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 64 Networkcost(Normalizedvalue) Value of g <Details of network cost data> Networkcost (Normalizedvalue) A: Routing function cost, B:Circuit bandwidth cost C: Firewall function cost, D: Additional Packet filtering cost Figure 11. Impact of g on network cost g Figure 12. Final topology of routing function allocation for inter-area relay traffic <g=1.0> <g=0.8> <g=0.1> Pr=0.8
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 65 Networkcost(Normalizedvalue) Value of Zc ratio <Details of network cost data> Networkcost (Normalizedvalue) A: Routing function cost, B:Circuit bandwidth cost C: Firewall function cost, D: Additional Packet filtering cost Figure13. Impact of Zc on network cost Zc ratio Figure 14. Final topology of routing function allocation for inter-area relay traffic <Zc=1.0> <Zc=0.5>
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 66 5. CONCLUSIONS This paper has proposed the joint deployment algorithm of virtual routing function and virtual firewall function for minimizing the network cost, and has evaluated the proposed algorithm on a ladder model that simulates the shape of Japan, and developed multiple effective functional allocation guidelines. It will be necessary to evaluate the proposed algorithm taking the fixed costs for routing function, firewall function, and bandwidth into consideration. It will be also necessary to study the optimal function allocation for cases where virtual cache function, WAN optimization function or DPI function is required. ACKNOWLEDGMENT We would like to thank Mr. Kenichiro HIDA for his help with the evaluation. REFERENCES [1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers, Challenges and Call for Action,” ETSI NFV, Oct. 2012. [2] “Network Functions Virtualisation (NFV); Architectual Framework,” ETSI GS NFV 002 v1.2.1, Dec. 2014. [3] file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf [4] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp.236-262, 2016. [5] NTT docomo press release https://www.nttdocomo.co.jp/english/info/media_center/pr/2016/0219_00.html [6] J.G.Herrera and J.F.Botero, “Resource allocation in NFV: A comprehensive survey,” IEEE Trans. on Network and Service Management, Vol.13, No.3, pp.518-532, 2016. [7] KenichiroHida and Shin-ichi Kuribayashi, “Virtual routing function allocation method for minimizing total network power consumption,” 18th International Conference on Information and Communication Systems (ICICS Venice 2016), Aug. 2016. [8] KenichiroHida and Shin-ichi Kuribayashi, “NFV-based virtual routing function deployment under network delay,” 19th International Conference on Computer Communications and Applications (ICCCA Kyoto 2017), Nov. 2017. [9] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013. [10] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014. [11] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014, pp. 7–13.
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.2, March 2019 67 [12] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network functions,” in Network and Service Management (CNSM), 2014 10th International Conference on, Nov 2014, pp. 418–423. [13] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on Network Softwarization (NetSoft), pp.1-9, 2015. [14] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014. [15] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular: Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014. [16] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,” International Journal of Network Management, pp.490-506, 2015. [17] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer communications networks”, APCC2006, 2F-4 (2006.8) [18] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2, No.1, pp.1-8, Feb. 2011. [19] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access”, International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015. [20] S.Kuribayashi,“Evaluation of Congestion control Methods for Joint Multiple Resource Allocation in Cloud Computing Environments”, International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.3, pp.41-54, May 2017. [21] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network functions,”2014 IEEE 3rd International Conference onCloud Networking (CloudNet),pp.7-13,Oct 2014. [22] K. Hida and S. Kuribayashi, “Joint Deployment of Virtual Routing Functionand Virtual Firewall Function in NFV-Based Network with Minimum Network,” Advances in Network-Based Information Systems-2019, pp.333-345, Aug. 2018. AUTHOR Shin-ichi Kuribayashi received the B.E., M.E., and D.E. degrees from Tohoku University, Japan, in 1978, 1980, and 1988 respectively. He joined NTT Electrical Communications Labs in 1980. He has been engaged in the design and development of DDX and ISDN packet switching, ATM, PHS, and IMT 2000 and IP-VPN systems. He researched distributed communication systems at Stanford University from December 1988 through December 1989. He participated in international standardization on ATM signaling and IMT2000 signaling protocols at ITU-T SG11 from 1990 through 2000. Since April 2004, he has been a Professor in the Department of Computer and Information Science, Faculty of Science and Technology, Seikei University. His research interests include resource management for NFV and SDN-based networks, QoS control, traffic control for cloud computing environments and green network. He is a member of IEEE and IEICE.