Vis enkel innførsel

dc.contributor.authorSharma, Sachin
dc.contributor.authorUniyal, Navdeep
dc.contributor.authorTola, Besmir
dc.contributor.authorJiang, Yuming
dc.date.accessioned2020-02-20T13:54:55Z
dc.date.available2020-02-20T13:54:55Z
dc.date.created2020-01-07T11:55:32Z
dc.date.issued2019
dc.identifier.isbn978-1-5386-9376-6
dc.identifier.urihttp://hdl.handle.net/11250/2643014
dc.description.abstractNetwork Function Virtualization (NFV) has recently attracted telecom operators to migrate network functionalities from expensive bespoke hardware systems to virtualized IT infrastructures where they are deployed as software components. Scalability, up-gradation, fault tolerance and simplified testing are important challenges in the field of NFV. In order to overcome these challenges, there is significant interest from research communities to scale or decompose network functions using the monolithic and microservice approach. In this paper, we compare the performance of both approaches using an analytic model and implementing test-bed experiments. In addition, we calculate the number of instances of monoliths or microservices in which a network function could be scaled or decomposed in order to get the maximum or required performance. Single and multiple CPU core scenarios are considered. Experimentation is performed by using an open source network function, SNORT and running monoliths and microservices of SNORT as Docker containers on bare metal machines. The experimental results compare the performance of monolith and microservice approaches and are used to estimate the validity of the analytic model. The results also show the effectiveness of our approach in finding the number of instances (monoliths or microservices) required to maximize performance.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.relation.ispartofProceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft 2019)
dc.titleOn Monolithic and Microservice deployment of Network Functionsnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber387-395nb_NO
dc.identifier.doihttp://dx.doi.org/10.1109/NETSOFT.2019.8806705
dc.identifier.cristin1767590
dc.description.localcode© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel