Proceedings of the 2014 ACM Conference on SIGCOMM 2014
DOI: 10.1145/2619239.2631428
|View full text |Cite
|
Sign up to set email alerts
|

Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events

Abstract: This demonstration highlights how Network Functions Virtualization (NFV) [1] can be used by a mobile network operator to dynamically provide required mobile core network functions for a large "Mega" event like a football game or a concert. Economic reasons may not justify the deployment or continuous maintenance of expensive dedicated hardware at the event site, which is necessary to cope with the extra load temporarily generated by the visitors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…These have mainly been based on implementing single virtual functions such as routing [94], Broadband Remote Access Server [95], policy server [96], deep packet inspection [97], EPC [98], [73], RAN [99], [100], [101], [102], monitoring [62], CPE [103], [104], [105], [106], [107], [108], GPRS [109] and access control [110], in cloud environments. All these originate from the research community.…”
Section: Nfv Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…These have mainly been based on implementing single virtual functions such as routing [94], Broadband Remote Access Server [95], policy server [96], deep packet inspection [97], EPC [98], [73], RAN [99], [100], [101], [102], monitoring [62], CPE [103], [104], [105], [106], [107], [108], GPRS [109] and access control [110], in cloud environments. All these originate from the research community.…”
Section: Nfv Implementationsmentioning
confidence: 99%
“…IoT [195], [196] Architecture combining NFV and IoT, and an application scenario involving a virtualized sensor function ICN [198] exploits ICN to provide flexibility and dynamism in placing VNFs ETSI Use Cases [62], [73], [94], [95], [96], [97], [98], [100], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110] Implementation, demonstrations and proofs of concepts based on the ETSI use cases More studies on the applicability of hardware acceleration to some NFs, and on the resulting trade-off between performance and flexibility…”
Section: G Research Directions In Selected Nfv Use Casesmentioning
confidence: 99%