Network Function Virtualization in Content-Centric Networks
Resumo
Network Functions Virtualization (NFV) offers an alternative way to design, deploy, and manage networking functions and services by leveraging virtualization technologies to consolidate network functions into general-purpose hardware platforms. On the past years extensive effort has been made to evolve and mature NFV tecnologies over IP networks. However, little or no attempts at all have been made to incorporate NFV into Information-Centric Networks (ICN). This work explores the use and implementation of virtual Network Funtions (VNFS)in Content-Centric Networks (CCN), and proposes the use of the Named Function Networking (NFN) paradigm as means to implement network functions and services in this kind of networks, distributing the network functions and services through the networks nodes and providing flexibility to dynamically place functions in the network as required and without the need of a central controller.
Referências
Access Control Enforcement Delegation for Information-Centric Networking Architectures. n.d. Accessed December 31, 2018. https://dl.acm.org/citation.cfm?id=2342507.
Bandyopadhyay, Soma, Munmun Sengupta, Souvik Maiti, and Subhajit Dutta. 2011. "ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY." International Journal of Computer Science and Engineering Survey 2 (3): 94-105.
Bianco, A., R. Birke, L. Giraudo, and M. Palacin. 2010. "OpenFlow Switching: Data Plane Performance." In 2010 IEEE International Conference on Communications (ICC), 1-5. https://doi.org/10.1109/ICC.2010.5502016.
CCN-Lite Project. n.d. Accessed May 2, 2016. http://www.ccn-lite.net.
Dannewitz, Christian, Dirk Kutscher, BöRje Ohlman, Stephen Farrell, Bengt Ahlgren, and Holger Karl. 2013. "Network of Information (NetInf) -An Information-Centric Networking Architecture." Comput. Commun. 36 (7): 721-735. https://doi.org/10.1016/j.comcom.2013.01.009.
ETSI GS NFV-SWA 001 V1.1.1 (2014-12). n.d. Accessed April 30, 2016. http://docplayer.net/3007035-Etsi-gs-nfv-swa-001-v1-1-1-2014-12.html.
Li, Y., and M. Chen. 2015. "Software-Defined Network Function Virtualization: A Survey." IEEE Access 3: 2542-53. https://doi.org/10.1109/ACCESS.2015.2499271.
Mansour, Dima, and Christian Tschudin. 2016. "Towards a Monitoring Protocol Over Information-Centric Networks." In Proceedings of the 3rd ACM Conference on Information-Centric Networking, 60-64. ACM-ICN '16. New York, NY, USA: ACM. https://doi.org/10.1145/2984356.2984378.
Marxer, Claudio, Christopher Scherb, and Christian Tschudin. 2016. "Access-Controlled In-Network Processing of Named Data." In Proceedings of the 3rd ACM Conference on Information-Centric Networking, 77-82. ACM-ICN '16. New York, NY, USA: ACM. https://doi.org/10.1145/2984356.2984366.
Mohaisen, Abedelaziz. 2017. Systems, devices, and methods for protecting access privacy of cached content. United States US9578125B2, filed May 5, 2014, and issued February 21, 2017. https://patents.google.com/patent/US9578125B2/en.
Tschudin, C., and M. Sifalakis. 2014. "Named Functions and Cached Computations." In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th, 851-57. https://doi.org/10.1109/CCNC.2014.6940518.