You are on page 1of 39

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/355866688

The Application of Network Functions Virtualization on Different Networks, and


its New Applications in Blockchain: A Survey

Article in Webology · September 2021


DOI: 10.14704/WEB/V18SI04/WEB18179

CITATIONS READS

8 833

2 authors:

Hayder A. Jawdhari Alharith A. Abdullah


Istanbul Technical University University of Babylon
10 PUBLICATIONS 18 CITATIONS 41 PUBLICATIONS 122 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Quantum Image View project

All content following this page was uploaded by Alharith A. Abdullah on 09 November 2021.

The user has requested enhancement of the downloaded file.


Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

The Application of Network Functions Virtualization on Different


Networks, and its New Applications in Blockchain: A Survey
Hayder A. Jawdhari
University of Babylon, Iraq.

Alharith A. Abdullah
University of Babylon, Iraq.

Received April 03, 2021; Accepted July 10, 2021


ISSN: 1735-188X
DOI: 10.14704/WEB/V18SI04/WEB18179

Abstract

Operators of networks are striving to provide functional network-based services, while


keeping the cost of deploying the service to a minimum. Network Function Virtualization
(NFV) is considered to be a promising model to modify such employment by separating
network functions from the basic hardware properties, after which they are converted into
the style of software. These are eventually referred to as Virtual Network Functions
(VNFs). This separation offers numerous benefits, including the decrease of Capital
Expenditure (CAPEX) and Operation Expense (OPEX), in addition to the enhanced
elasticity of service preparation. Network Functions Virtualization (NFV) is found to
cause a remarkable development or even a technological revolution in terms of
network-based services, leading to a decrease in deployment costs for network operators.
NFV reduces hardware tool costs and energy exhaustion, and it improves its operational
performance whereby the network configuration is part of this optimization. Even so,
there are a number of possible security problems which are the main focus in NFV. The
present study surveys the applications and opportunities of NFV in terms of IoT, SDN,
cloud computing and blockchain. A description of the NFV architecture is presented, and
several possibilities of NFV security issues and challenges are discussed. Finally, a
systematic idea is provided on the design of a Blockchain Network Virtualization System.

Keywords

Network Functions Virtualization (NFV), IoT, SDN, Blockchain, Security, Cloud Computing.

1007 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Introduction

The term Network Functions Virtualization (NFV) refers to a technology created with the
important purpose of accelerating the distribution of modern network servicing in the
telecommunication field. NFV's major goal is to expand its future evolution aims. A
closer examination of the communication environments these days shows that it is rather
crowded with many different proprietary hardware devices. The launching of a novel
network service demands the insertion of different hardware entities on account of the
available space, causing much more hardness as its complication increases.

Network Functions Virtualization (NFV) is a new approach to many operations in the


network like scheming and deploying, in addition to supervisory control network services
through disconnecting the hardware of network from the services or all other functions
which work inside them. The NFV has a clear duty which is replacing the
hardware-centric devices by software implemented CPUs which are executed on typical
servers.

The increased number of devices that are connected to the Internet has led to uncertainty
and worries considering the actual capacity of the existing networks. There are a lot of
challenges that network operators face, among which are the very short life cycle of the
device, the delay in the standardization of protocols, and the delay in inserting new
networking features. Network operators are forced to increase the investment necessary to
build hardware, as well as the cost and maintenance of operations. Because of all of the
aspects that have been mentioned above, the network operators noticed that on account of
network abilities, its maintenance may become a hard mission in the long run.
Considering these difficulties and the functional demands of space and ability, the
technology of NFV is found to be a sufficient option. NFV covers these issues through
running network functions in a virtualized behavior, for instance, through animating
network functions inside a cloud technology, in addition to many established criteria
servers.

The major aim of NFV is to convert the functions of the network into a virtualized manner
such as proxies, load balancers, firewalls, routers, or any other network functions that are
implemented into stable hardware and converted in virtual machines (VMs). Such virtual
network functions may be implemented in servers and hardware resources like
computation, storage, and networking hardware, which are seen as a joint resource
collection. They may migrate, or be instantiated in several positions within the networks
depending on the job imposed on the network. It covers the running of functions in

1008 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

software which may present its service on industry-standard servers with no need for the
inauguration of modern entities. Figure (1) refers to the NFV model. Blockchain is
regarded as an adaptable choice for building a secure platform due to its characteristics,
such as the data traceability and resistance of tamper. It has been broadly supposed that
besides its utilization in economic services (e.g. Bitcoin), Blockchain may also be
executed in application-oriented situations.

It is important to mention the link that exists between NFV and SDN (Software-Defined
Networking). NFV is the virtual machine simulation for specific devices, where the
device control plane operates on the server, so the devices are open and compatible.
However, the SDN is a completely new network architecture. The notion of SDN can be
summed up by the cancellation of the device control plane, followed by consolidating the
calculation through the control unit, and issue flow tables. NFV and SDN have been
largely integrated, yet they are not interconnected. Network functionality is based on the
important concept of virtualization and deployment with no SDN.

The aim of Network Function Virtualization in this relationship is to remove the SDN
mechanism and to only use existing data center technologies. The method is based on
separate control levels and data forwarding that the SDN suggests, which can increase the
performance efficiency, and ease the compatibility with the present equipment and basic
process and servicing operations.

NFV has the ability to back SDN via supplying it through its infrastructure to run the
SDN program. In addition, NFV and SDN are very close in that they use backbone
servers and switches to achieve their goals.

The core of SDN is to soften the network and improve the network's programmability and
ease of modification. The SDN does not change the network function but rather
restructures the network architecture. NFV makes no changes to the device function, but it
changes the appearance of the device. The essence of NFV is to convert a custom device
into a generic software device and share the hardware infrastructure.

The increased number of devices that are linked to the Internet has imparted uncertainty
regarding the actual ability of the existing networks. Figure (2) shows that the number of
linked devices might override twenty billion through these years. Therefore, the industry
and the research groups are offering new technologies so as to ensure the efficient running
of networks. Therefore, NFV and SDN are referred to as essential enabling technologies.

1009 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

The Internet of Things (IoT) can lay hold of the utility of the integration of these
technologies so as to give a context-aware medium. The major IoT difficulties that
currently exist are associated with technology assemblage, handling of massive data, the
programmability of the network, fixed ability, and lack of energy and security. The basic
idea beyond NFV is to deploy the network architecture among various physical
architectures/dealers for the employment of a conventional network mission as a virtual
case. In the IoT case, the cooperation amidst SDN and NFV attempts to promote
controlling and deploying IoT devices in a well-organized manner and at lowest cost.

A blockchain is considered to be a distributed ledger, like a database, but instead of being


managed through a central authority (i.e. a company like Google, a tiny organization, or a
person), the record is divided over various computers, which can be placed all across the
world and run by anybody who has an Internet connection.

For decades, blockchain network gained a great reputation through ledgers that non-
changeable in a distribution format along with platforms for independent data-driven
planned. Introduced through the popular venture cryptocurrency project ‘‘Bitcoin’’, the
blockchain network was basically utilized as the essential spine of a public, distributed
ledger system to prepare asset transactions based framework of digital symbols within
Peer-to-Peer (P2P) servants. Blockchain networks, particularly the ones utilizing
open-access systems or policies, are characterized by their essential features of
disintermediation, public approachability of network functionalities, and
tamper-resilience.

A smart contract is a significant managed factor in blockchain-enabled applications as it


offers the capability of automatic control. The secure medium led through blockchain is
tightly bound to processes through executing the smart contract. Implementing
blockchain-enabled resolutions is an anticipated technical route for supporting cloud
computing.

Cloud computing is one of the technologies that involve the transfer of all processing, in
addition to the storage space of computers to the cloud for a server device accessible
through the Internet. IT programs are transferred from products into services. Therefore,
this technology help to remove the issues related to the development and maintenance of
IT issues faced on behalf of the company that makes use of it. Thus, the aspects that are
given most attention are the use of such exclusive services, and the cloud computing
infrastructure that relies on advanced data centers to make big storage area available for
users.

1010 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

In general, “cloud computing” or “cloud services” can be described as the services that
include devices and programs linked to a network of servers. It transfers its data in a
virtual cloud which give the guarantee of continuous connection with no interruption
using several devices, including computers, tablets, and smart phones. A special code is
set for unlocking the network, which enables its access from anywhere and anytime. As
the available technology develops through the Internet, many organizations and
companies are worthy on making the application available through the Internet by means
of cloud computing. Therefore, this technology has widely contributed to the saving of
costs.

Fig.1 The NFV model

Fig. 2 Evolution rates of linked devices in IoT

Network Functions Virtualization (NFV)

NFV is an idea in network structure that separates hardware and network missions
utilizing virtualization mechanisms. Through virtualizing whole classes of network

1011 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

physical device functions toward modular systems, NFV reaches more inclusive
scalability in the collection of physical devices that are interconnected via links. These are
utilized to switch information among the devices in addition to computing services which
are that considered a cross-discipline that includes both the science and technology.

NFV uses common server-virtualization techniques such as those distributed in


enterprise-class IT, however, it is unparalleled. The use of hardware devices through
various network functions is unimportant to virtualized network function (VNF).
Alternatively, one or more virtual machines (VMs) could deploy distinct manners and
software on the switches, Standard High Volume Servers (SHVS), or cloud computing
infra-structure that has the ability to include VNFs.

Network function virtualization examples involve, as has been mentioned above,


virtualized load balancers, session border controllers (SBC), and firewalls. Managers
might be deployed for each of these to deliver network services or defend a network in the
absence of the standard complication and cost of obtaining and installing devices.

Depending on the interpretation of the European Tele-communications Standards Institute


(ETSI), the main objective regarding NFV is to convert the direction in which network
operators design networks through developing the principle of IT virtualization approach.
This will merge numerous network tools into industry-standard like giant-sized servers
and switches in addition to the storage that may positioned on the data center either within
the network or in the end-customer building. NFV swap classic (black boxes) still
predominate the built-up foundation of networks. The following sections present the
architectural features of NFV, as well as their reliability and availability.

A. Architecture of NFV

NFV provides an open architecture with a lot of resilient options for deploying NFVI
solutions. The ideal infrastructure or architecture of NFV is made up of three particular
layers: NFV infrastructure (NFVi) – with regard to equipment and services of cloud to
perform network applications, Virtual Network Functions (VNFs) – application program
which is responsible for providing a particular network job (such as routing, authorization
of access to data, and mobile core), and Management Automation and Network
Orchestration (MANO) which possess the capacity to turn network parts or components in
the issue of hours instead of months and permits to move in dexterity. However, it may
also cause some forms of disorder within the virtualization and NFV process, thereby

1012 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

indicating the necessity for proper management at an early stage as highlighted in Figure
(3).

a. Virtual Network Functions (VNFs): VNFs can be described as a function that is


executed using software based on the infrastructure of NFV. VNF can be
implement onto numerous Virtual Machines, each of which ought to be supervised
via a module referred to as the Element Management System (EMS). This is
considered after the design of the VM-instance and its configuration, control,
performance of security, and achievement of implementation. The EMS is
assigned fundamental information that is necessary for Operations Support
Systems (OSS), and implements the administration functionality for a
VNF-instance.

b. NFV Infrastructure (NFVI): The second layer represents the virtualizing


approach that contains resources of software whereby the VNF-instances are
implemented. The NFVI is run as a series of NFV-nodes built up in several NFVI
(point-of-presence) to hold up various usage cases for an optimal site and latency.
The virtualization layers are considered to be essential elements within an NFVI
field as the guarantee prolonged life cycles to the VNF-instances regardless of the
hardware.

c. Management and Orchestration (MANO): The MANO operating field involves


the orchestration and lifecycle administration of physical and software resources.
MANO has three items that form the infrastructure virtualization and lifecycle
administration of VNFs, whereby the focus is on total virtualization-particular
management missions that are needed in the NFV framework. The Virtualized
Infrastructure Manager (VIM) is a job bulk of the MANO working field which is
in charge of the following things: controlling, managing and monitoring the NFVI
count, the storage, and the resources of the network. This functionality reveals that
VNF Managers and NFV Orchestrators are given the capacity to deploy and
manage VNFs. It also assigns the same job to the hypervisors and controllers in the
NFVI.

d. NFV Orchestrator (NFVO): This aspect is based on various Virtualized


Infrastructure Managers to implement the orchestration of NFVI resources which
generate whole Managers of the VNF, and it is in charge of the management of the
lifecycle of VNF instances. NFVO reacts together with the NFV exterior module
(OSS/BSS) to provide an initial policy-based layout, in addition to its

1013 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

administration abilities. Furthermore, several models of network management


service deployment are run along with VNF packages.

e. VNF Managers (VNFM): The VNF manager is responsible for the administration
of VNFs. They react with both EMS and VNF to obtain an appropriate
provisioning and initial layout administration. The life process of VNF-instances
are managed from VNFM via initializing, scaling, modernizing, and finishing the
VNF instances. Each VNF-instance must be solely related to one VNF Manager.

f. Virtualized Infrastructure Managers (VIMs): These entities run the


orchestration through managing the NFV infrastructure resources. The VIM is
interested in some aspects that belong to the control of NFV infrastructure
resources such as computations, storages, and network resources. There is more
than one functionality provided by VIMs, such as specifying, improving, and
releasing NFV infrastructure resources, as well as managing how the resources are
associated.

Fig. 3 NFV blocks

1014 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

B. NFV Reliability and Availability

As has been mentioned above, the Network Function Virtualization dissociates network
missions from dedicated hardware accessories and executes missions of the network in the
virtual approach via software programming. In addition, it provides flexibility in terms of
scaling the Service Function Chain (SFC) (Medhat, A. M., et al., 2016) orchestration.
Despite the fact that the dynamics and elasticity of VNF improve the defense against
attacks like DoS, the software virtualization context of VNF additionally leads to a list of
security problems, vulnerabilities, and another malware types like backdoors, causing
VNFs to become more weaker to attackers. Corresponding to electromechanical hardware
devices like VMs, protection missions like firewalls and load balancers are placed in the
central location so as to ensure the security of a set of devices. Therefore, counter attacks
toward VNFs is a significant issue in the use of NFV. Reliability remains an important
case in the study regarding NFV SFC, with the focus on flexible service scheduling in the
event of a dynamic server malfunction.

The service availability demands for NFV are required to be at least identical to those for
traditional systems. These requirements can be achieved whenever the components of
NFV provide equal or more acceptable performance in one or more of the following
aspects: average of failure, time of discovery, time of repair, success average of the
discovery and repair, and effect for every failure. In order to meet the service availability
demands, it is necessary that a number of factors are taken into consideration in the VNF
design, such as commodity-grade hardware and presence of various layers of software
(i.e. hypervisor).

As NFV MANO components play a significant part in preserving the availability of


service functions like fast service generation, dynamic acclimation to load, and overload
banning, however they need to be extremely authoritative. The comprehensive service
resiliency is based on the implicit NFVI reliability as well as VNF inner resiliency.

Reasons for Using NFV

The work of Network Functions Virtualization provides numerous benefits to network


operators, including extraordinary developments in the telecom-industry. The most
important benefits which the NFVs supply are CAPEX and OPEX. CAPEX is the money
that the company uses to obtain or renew physical assets such as property, buildings, or
industrial equipment, and it is often used to implement new projects or investments. The
company also carries out this type of expense to maintain or increase its business

1015 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

framework. These expenses may include everything, ranging from repairing the
infrastructure to purchasing a piece of equipment or building a new data center. As for
OPEX, it involves short-term expenses that must cover the running costs of a business in
progress and thus are essentially identical to current expenses. Other benefits include cost
lowering, decrease in power exhaustion, and the depletion in time-to-market for the
deployment of in this time network services.

A. Advantages of NFV

NFV promises a variety of advantages to network operators, which can be stated as


follows:

• NFV improves the services that are introduced via the network, provided through
developable and flexible services automation.
• NFV reduce the present-day period of deployment within the network services.
• Regarding the servers and platform costs, the NFV decreases the expense and power
exhaustion to a minimum.
• NFV assists in a notable decrease in the sequence work of maturation.
• The speed of deployment may be increased by reducing the network providers cycle of
innovation.
• NFV embraces a number of flexibility and extensibility solutions.
• It decreases the expansion expenses of using this technology in addition to the ability of
merging it and examining this process of combination.
• Services of the network may be in constant change based on the demands in NFV.
• NFV provides an increased running capacity because of its network architecture
symmetry.
• It provides the ability to supply more than one user simultaneously while using the same
hardware structure.
• The energy exhaustion is significantly decreased through the use of power controlling
characteristics in criterion storage servers.

B. NFV Tasks

In general, the tasks NFV usages could be classified into two types, namely service-
oriented use cases and architectural use cases.

1016 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

a. Service-oriented Use Cases

• Mobile network-nodes: HLR, RNC. Serving GPRS Support Node.


• Tunneling gateway element: Internet protocol security / secure sockets layer Virtual
Private Network (VPN) gateways.
• Switching components: Broadband network gateway, Carrier-grade NAT,
• Application-level optimization: Delivery network cache of servers, efficient distribution
of network measurement.
• Service Assurance: Levels of service expected from a vendor (service-level agreement),
service tracking, and examination.
• The services of security: Firewalls.

b. Architectural Cases of NFV Use

• NFVIs as services.
• VNFs as services (VNFaaS).
• VNPs as services (VNPaaS).
• VNFs as forwarding graphs [74].

NFV Implementations

The Internet Service Provider (ISP) is the service provider that provides communication
between companies and their branches. With the provision of connectivity, services such
as firewalls, VPN encryption, DNS or Routing and others might be required either for the
network itself or for its connection. Previously, real Firewall devices and other devices
had to be provided by the ISP or service provider so as to achieve such services. At
present, the NFV technology allows the ISP to provide the services mentioned above and
more without purchasing real devices from different companies, as it only needs to
provide servers, storage and a network.

Through these elements, the service provider can provide services quickly and with high
flexibility. For example, a company needs 5 firewalls in its branches. The ISP will create
five Virtual Machines and add firewall copies to them and distribute them on the network.

That is, all services have become virtual and the ISP does not need to buy specific
devices, but rather buy copies or applications that implement these services which are
installed on virtual servers. This will provide high flexibility as services will be on
demand and the cost of services will be low. This means that no devices need to be

1017 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

updated, purchased or maintained, as all this will turn into programs. The section below
explains and reviews some solutions and implementations of NFV in some technologies.

A. Solutions of NFV for IoT

The Internet of Things (IoT) gives an idea of capability of being connective to everything
from everywhere at any time. Thus, this reaction of objects that are physically linked to
the network may be carried out freely, as shown in Figure (4). IoT is closely linked to the
mechanization of sensors, as most instance sensors and actuators are considered to be a
part of a greater IoT network. It has been stated that the utilization of IoT equipment like
computer, portable, mobiles, household appliance, manufacturing systems, electronic
healthcare services devices, monitoring tool, and other extensions linked to the Internet
would override 45.5 billion in 2020. Those IoT sensors in addition to the actuators might
present different sizes of facts and statistics. Thus, the necessity to set up modern network
access and essence devices ought to be raised. To administer the network accessories
sufficiently, the network hardware resources need to be virtualized.

Network Function Virtualization is a free technology. It neither requires nor depends on


the SDN technology, however it improves and eases the overall performance. NFV
supplies a set of virtual applications that are referred to as (VNFs). These may contain
procedures to Deep Packet Inspection (DPI), routing, security, and management of traffic,
which may be merged to provide network services that are characterized to the IoT.
Together, the SDN/NFV structure for IoT given in Figure 3 offers public interactivity of
SDN and NFV to supply a secure connection in addition to the easier access to IoT
platforms. These structures consist of NFVI, VNFs, and MANO plane, which assist one
another so as to realize possible network virtualization and continuous network
connectivity, as well as to execute effective packet influx basics via the SDN controller.

NFV is the technology which has the main goal of changing network functions before
being operating by means of hardware into software, and executing it onto an
unspecialized server. The way of refinement in the execution or performance of general-
purpose servers and the work steps of server virtualization as seen with the virtual
machine monitor (VMM) have made it possible to ensure a secure, scalable, and reliable
performance that is serviceable even to carrier networks. By constructing a virtualized
IoT-dedicated network using NFV technology and by optimally diffusing resources based
on to service demands, it is possible to carry out network infrastructures which are pliable,
economical, and effective to be used within the IoT.

1018 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Fig. 4 A common architecture for NFV merged with SDN-IoT

B. Architectural Solutions to the IoT based- NFV

The present sub-section contains the survey of architectural solutions that have been
suggested in literature regarding function virtualization in environments of IoT. The
majority of the aforementioned solutions are basically a blend of SDN/NFV that present
ideal solutions, as both technologies benefit from each other's abilities. (J. Li, et al., 2015)
suggest an approach with a subsequent architecture for a upper-lower method. That is split
into many interactive layers, being the application layer (for example, services such as
Operation Support System), control layer (for example, SDN controller in addition to the
distributed operating system), and the last layer is the infrastructure layer (for example,
switches as well as gateways that regard to the Internet of Things). The main goal of using
SDN along with NFV is to face the challenges of IoT, such as heterogeneity, the capacity
to be changed in size or scale, safety, and interoperability. The suggested architecture for
NFV merged with SDN-IoT has the ability to supply a centralized control and to
virtualize diverse services of IoT in many fields that are entered directly into user service
such as medical care, transportation, and teaching.

1019 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

(Ojo et al., 2016) offer a different structure for IoT based on virtualized components in the
system support to the SDN. Their work depends on VNFs for several reasons, which
justify the deployment of SDN/NFV gateway nodes. Using these edge communication
devices, the framework has the ability to present services like location information, low
latency, maximum data transfer warranties, and it can ensure the deployment of IoT
equipment in a fast manner. The MANO extension orchestrates the dominance of the
network infrastructure and other different functions of the network through specific
administrators. It also interrelates with the administration extension applications to obtain
a set of rules that dominate the behaviors of network devices and information of
configuration, in addition to the SDN controllers for transmission and services of the
network. The whole architecture is completely identical to the one described in above
Figure (4). According to the rules of logic, the elements of SDN are separated from the
layers of the network function virtualization, and there are several SDN functions are
executed in the NFVI. NFV may additionally be utilized to transfer some of the IoT
gateway tasks for virtual gateways, which ought to permit better scalability, more
comfortable mobility administration, and quicker deployment.

(Du et al., 2016) introduced a prototype for a context-aware IoT architecture which can
transmit and prepare IoT passage within data plane. It is based on contextual data that is
presented through joining the towering application-layer with depressed sensor-layer so as
to plug a hole through IoT. The IP network takes advantage of the SDN merge with NFV
out of software-defined data plane. These problems are associated with scalability,
discoverability, confidence, and reliability, often because of the counting and battery
strength constraints. The term of software-defined data plane is characteristic of
describing novel services for Mobile Virtual Network Operators (MVNOs) which gives
clients many network services at a lower cost, whereby network services are obtained
through Mobile Network Operators (MNOs) so as to reach an infrastructure for wireless
networks. The suggested architecture combines a programmable MVNO switch on
processors that are multi-core in addition to the IoT gateways with an Edison board. The
important thing that is emphasized in this section is based on the architecture of IOT, as
the security in the highest degree, the privacy mechanism, and the optimization of the
performance are essentially required services within the IoT-MVNO area. All data that the
MVNO switch uses may be gathered from the sensors via IoT edge nodes and is
forwarded to the corresponding data service controller to perform a series of operations. A
number of separate MVNO networks are joined with diverse applications to operate
concurrently. The above structure utilizes a protocol from an OpenFlow class to interface
amidst the MVNO switch with the application of IoT. The MVNO switch is constructed

1020 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

on a FLARE testbed that has multiple processor cores. The gateway of IoT software based
on FLARE guarantees the trailer slicing approach, service tasks such as IoT appliance
finding and interconnection, data gathering and encapsulation, and finally the
context-aware packet transmitting series of operations.

C. Security IoT based- NFV

This sub-section lists a number of different solutions regarding the field that utilizes NFV
to ensure the secure performance of IoT. (Massonet, P., et al., 2017) propose expanded
federation cloud architecture for advanced networking to guarantee the security of
connected IoT devices. The security solution uses virtual functions in a lightweight
manner in addition to Service Function Chaining (SFC). A universal security policy could
be obtained through the IoT gateways in edge computing, which can be done through
building a chain of VFs for various aims, like firewall and discovery the intrusion. They
observe the IoT network for weaknesses and attacks and separate the involved devices
whenever discovered. Furthermore, SFC is mainly accountable for the management of the
flow inside the IoT system, as needed for cloud and IoT structures to possess the suitable
infrastructure for support. All this can be obtained or accessed through deploying a
federation agent at the IoT controller. The transmissions themselves are achieved utilizing
REST application software. The IoT network controller receives the configuring
information via the federated network that has the ability to manage the network
controller transmissions, as these are later on sent to the IoT gateways to be run. Lastly,
the network controller has the ability to switch the information with the IoT proxy, which
assists in the managing process of the data plane based on a programmable network
protocol. A module is performed within the IoT network controller so as to secure the
IoT-Cloud network slices.

There are studies made a few alterations to the security direction by suggesting an
approach that includes a unique (IPv4) called address resolution protocol (ARP). This
protocol provisions security NFV services so as to guard upon attacks of ARP spoofing as
well as the process of gathering information from every devices or endpoint. The work
further offers some information about an SDN-based architecture to enforce the control of
both fixed and constantly changing network access to the IoT for smart homes. Each of
the ARP demands passes over a virtualized confided structure called ARP server, which is
characterized by the full capacity to protect the entire operations of ARP, dropping the
messages of ARP broadcast, and simply allowing ARP spoofing during ARP proxy
through designing or adapting the server of ARP. In addition, this work presented some
advice for resolving important issues in packet processing delay by following a

1021 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

technology called high-speed packet processing. These technologies involve Deep Packet
Inspection (DPI), with Carrier-grade Linux, multi-core processors, and virtualizations
facilitating the distribution of cores among applications. Only the NFV-IoT associated
donation focuses on this aspect. The building architecture contains domestic ingredients
such as a data plane in addition to NFV dispatcher, with local security services.

The security agent, which is considered one of the main elements, always picks
information based on the control plane user, IoT policy manager, security services, and
the Ryu controller to ensure that the opposite network reaches the rules of control, often in
a forced manner. The NFV sender receives all copied packages that are sent from the
corresponding port. Next, these packages are sent to the identical security service
depending on the sender index. A security agent obtains associated input to straighten the
security services towards all influx. Depending on a test, a number of security
declarations or alarms will be created. The server validation of IPv4 ARP may defend
against the ARP spoofing, whereby the identical data plane development kit (DPDK)
execution works in a great manner for the smart home IoT network. NFV or SDN fields
possess diverse components, applications, and orchestration managers. A harmful
component in each of them might own dangerous influences on the entire framework. For
instance, a malicious VNF via a normalization software trader, a host OS kernel, or
MANO ingredient, may harm the whole network area. The extent to which those
components are more secured in terms of integrity, confidentiality, and other regards
associated with the principle of security will determine whether it will be referred to as
well-protected. Therefore, we introduce the trend analysis of Internet of Things based on
NFV with other techniques, as presented in Figure (5).

The figure below shows that the trends of IoT with NFV initially start by providing the
scalability and dynamic mobility for the IoT gateways. Then, the work develops and deals
with the 5G network. However, in the middle of the period, there is a trend towards
dealing with big data that comes from the IoT devices based on virtual networks. The
work focused on the quality of services and the security of the IoT-based data, but finally
the trend moves towards the work with Edge Cloud that offers the infrastructure to
securely link billions of IoT devices.

1022 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Fig. 5 Trend analysis of IoT with NVF

D. Relationship between NFV and SDN

SDN is considered to be a part of NFV. In particular, it means that the SDN represents a
related enabler of NFV; however one is different from the other. It is predicted that
communications networks will be formed based on virtualized infrastructures of the next
generation, whereby the network functions are diffused in the virtual environment instead
of common proprietary tools. A principal trend observed in modern and planned
communication is the infrastructure of computing. The infrastructure tends to shift from
being dependent on a set of black boxes provided with specific hardware and preinstalled
with specific programs, to a modern infrastructure having a “white box” operating a
number of specific network programs or software. This is necessary with regards to the
5G network approach, with the requisition for a newly discovered network construction
that directs flexible and dynamically adaptive network components. These can in turn
provide particular services based upon traffic requests with more mobility in terms of time
and space, while maintaining its heterogeneity and variety.

For the sake of obtaining a technological model shift, the SDN and NFV were proven to
form a promising technology to be used in managing networks in the future. Besides their
massive advantages, as well as decreasing costs of operation, using resources in a better
manner, and less restricted management demands, the choice of such a combined
technology is earning important momentum. Expanding network resource exploitations
and diminishing operation prices are some of the common yet important goals in the
epoch of network managing and control. The NFV provides additional flexibility by
transferring network functions from hardware devices to virtual machines in order to

1023 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

operate onto commodity hardware. SDN is the main factor for discovery and difference in
networks, which is involved in the increase of cloud applications and services over
enterprise and cloud contractors. As well, it mainly focuses on infrastructures such as
computing, storages, networks, and software-defined data centers.

This sub-section highlights several problems that emerge and correlated with the two
technologies of NFV and SDN, particularly in terms of its practical significance and
applicability based on combining of the new generation networking epoch in advanced
behavior.

(Gkioulos, V., et al., 2018) present a methodical review of literary works that involve the
utilized SDN technologies, in addition to related services and instruments. Their
observation involved a wider domain of networks including physical and military ones, as
well as WANETs, MANETs, and mission-critical physical structures.

(Gunleifsen, H., et al., 2018) investigate the matter of building separate and dynamically
guarded overlaying networks and reduce the constraints of modern NFV applications
which are created to be deployed inside trusted areas. The overlaying network with
non-dynamic granted links are used for increasing the security within networks. This can
be realized via offering a new architecture for the computerized tunnel identification that
is be encrypted in NFV within a multiple-domain configuration.

(Abbasi, A. A., & Jin, H. 2018) offers a resource combination design that performs
theories that regard to the management network resources over SDN control measures,
enabling the achievement of application-aware theories. Their goal in their work is to set
up a vital wall for tool-based choice support procedures to help the determination of cloud
services within a multiple-domain configuration.

(Medhat, A. M., et al., 2016) offer a different Autonomic Network Management (ANM)
and optimization framework which describes the efficient merging of SDN and
software-defined radios (SDRs) for obtaining a flexible reconfiguration enhanced
performance, and an effective utilization of accessible resources in SDR-based Cognitive
Radio Networks (CRNs).

(Leivadeas, A., et al., 2019) concentrate on the practical and effective VNF placement
inside edge and cloud infra-structures that provide improved networking services to IoT
applications. Especially, they suggest a different procedure to increase the facilitation of
the placement progress as well as the rapid deployment of high-speed of service-chained

1024 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

VNFs in a basic physical structure of network cloud, which may be expanded by utilizing
the Mobile Edge Computing (MEC) physical structure for hosting mission-critical and
delay-sensitive traffic.

(Eramo, V., et al., 2019) presents a scalable NFV orchestration architecture which
supports flexible cloud and bandwidth allocations of resources. As an additional feature,
they made use of Segment Routing (SR) to perform the data plane of the suggested
architecture, obtaining a total solution to overcome complications considering the
orchestrations that would traditionally correspond with it.

(Yao, J., et al., 2019) presented security architecture whereby the 5G network
functionality involves the utilization of the SDN technology so as to perform transactions
with no issues regarding the heterogeneity or other inherent security problems attributable
to the intelligence centralization commonly found in such networks.

Finally, some studies examined the complications and difficulties which are commonly
faced when deploying services and platforms within cloud-based configurations. Such a
study is essential to ensure that the 5G technology is applied successfully. A solution was
proposed for solving such issues offering a new sequence of industrial and administrative
setup for deploying and managing such structures and services in multiple-cloud
configuration They took into consideration any implicit technology, protocol, or
Application Program Interface (API) that may be involved.

E. Network Function Virtualization for Cloud Computing

NFV has the potential ability to migrate enterprise data centers into the cloud. Cloud
computing enables several organizations to obtain the administration of their IT hardware
infrastructure from an outside supplier to, as it is necessary for cloud services suppliers.
However, as indicated in, the process of migration applications from particular data
centers to cloud centers is found to be a rather complex procedure, as some applications
tend to be network-based when providing their services like firewalls, and load balancers.

Considering the tasks that are executed during the resource exploitation within cloud
services, the main focus has been on the placement of VM placement within bare-metal
servers, with little attention paid to the physical network hardware. Despite, a number of
complicated services have been pointed out and eliminated from the services presented by
data centers, such as 3G/4G IP Multimedia Services.

1025 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

In this section, there are a number of challenges identified which need to be fixed so as to
create actual Network Function Centers (NFCs), as well as to increase the network
resource exploitation and to promote a simple network management. As is customary and
in a traditional way previously, network services were implemented as hardware based
network appliance. (Sekar, V., et al., 2012) suggest an architecture that performs these
network appliances as a software-based system with virtualized entities. There are had
been studies offer platforms to run middle-boxes for software-based. The suggested NFC
follows the NFV idea and performs services of network as software-based system entities.
Given the expansion of NFV, and other considers the probability of getting help from an
outsourcing enterprise to perform a series of operations on the middle-box to the cloud. It
offers these outsourcing works to solve numerous difficulties that administrators of
networks face and outsource more than 90% of middle-box hardware in networking
infrastructure.

The placement of the NFVs in the physical boxes (such as personal computer) and usage
of network bandwidth are important for the performance of cloud computing technology.

(Jiang, J. W., et al., 2012) focuses on the online type of the VM placement, whereby a
demand is received each time the VM location is determined, based on a Markov
approximation technique.

There are a number of advanced techniques proposed throughout the past two years which
ultimately target the shift of computing and networking from the current manual order to
fully automated process. Several solutions have been introduced which harmonize with
the remnant infrastructure. Among these technologies are cloud computing and NFV.
Generally, the mentioned solutions are prepared to ensure that computing and networking
processes are extra automated and flexible to assist cloud and virtualized structures.

F. Network Function Virtualization for Blockchain

Blockchain is an actual revolution in the world of financial trading. It even extends


beyond that field to be a thorough technology which can be used as the base for
generating a complete technological system such as the Internet system that is dealt with
nowadays. The blockchain technology is dependent on a peer-to-peer system, which
implies that transactions occur among users of this technology without a third party.
Being a decentralized technology, nobody has the ability to control the operations that
occur via it: no government agency or company could take part in the management or
regulation of the course of work. Blockchain technology is a cryptographic technology

1026 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

whereby the entities between whom the data or money is transmitted, remain anonymous.
To exemplify, if Bob sends some data to Alice, no one will be able to know Bob nor
Alice, because the people in the Blockchain system are simply represented by codes, as
shown in Figure (6).

Fig. 6 General Process of Blockchain

Blockchain is a technology that gives the authority to a person (or company) to transfer
assets of value to another person safely and without the interference of any intermediary.

A blockchain can be defined as a series of records or constant blocks of data, and it is


controlled via a group of computers rather than by a single entity. Blocks of data are
secured and connected together using coding principles.

It is an independent technology that is not subjected to any centric authority. Being


basically a shared ledger and an immutable record, the data inside it is open and available
for anybody to view. So, any platform built on the blockchain is inherently transparent. In
addition, blockchain transactions are free and have no direct cost.

Blockchain is a straightforward and innovative method to push through data between two
persons or entities in a completely automated and secure way. One of the parties
generating the transaction via generating a block which is confirmed via thousands,
possibly millions, of computers, and distributed throughout the network. Then, the
verified block is added to a stored chain within the network, which creates a unique record

1027 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

linked to other records. For a single record to be falsified, the entire series has to be
falsified on millions of computers. This is practically impossible.

From a technical perspective, a blockchain is just a chain of data blocks, hence the term
"blockchains". The terms "block" and "chain" in this context refer to digital information
(a block) stored in a public database (a chain).

The blocks that make up a blockchain consist of a set of digital data. It can be viewed as a
ledger that contains a collection of information related to specific financial transactions.
Once a block is completed, a new block is started to be opened, connected to the former
block, then attached to the chain. A block is permanent; once formed, it can in no way be
altered or changed. Block can generally be divided into two parts:

Block header: The header is made up of several components, such as the software
version number, the previous block hash code, the block registration date, transaction
amounts and other information, as shown in Figure (7).

Block body: The block body contains all the transactions installed in the block, in
addition to information about the people involved in the transactions. Instead of using real
names, transactions and purchases are recorded using a digital signature, which is more
like a user name, and requires no personal information.

Each block contains its own hash code that distinguishes it from the rest of the blocks; this
code is composed of a long string of letters and numbers for example
(0000000ddjyd6d6d87q2bnc024bs023g29ls73). Single block storage capacity can be up
to 1MB of data. This means that a single block can hold many thousands of transactions.
A blockchain may also consist of millions of blocks.

It is possible to compare regular banking transactions with blockchain transactions. A


blockchain is similar to a bank transaction record, as a block can be represented by a
single transaction that an automated teller machine confirms, for example, after a user
withdraws an amount of money from it. When a block stores new data, it is added to the
blockchain that consists of a series of interconnected blocks. There are several reasons
why blockchain is admired by many people:

• Decentralization: it is not a property of one entity.


• Unchangeable: no one can alter the data inside it.
• Transparency: anyone can track the data within it.

1028 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Fig. 7 Blockchain Structure

In light of the reasons mentioned above, a number of characteristics and advantages of


Blockchain technology can be pointed out. Being a technology which is nobody has
control over is considered one of the most appealing features of the Blockchain
technology. As it has a decentralized system, it is denoted that this technology is not the
property to anybody but rather the ownership of the actual users of this technology.
Supporters of Blockchain, and digital currencies in particular, argue that governmental
(or government-related entities such as banks) have no right to control people's money.
They state that the people themselves should have the authority and the right to conduct
monetary transactions without the need for an intermediary, thereby supporting a
mechanism which helps decrease money transmission fees to the minimum.

Another feature is the scale of security and privacy provided by this technology, which is
relatively good. Despite the fact that traditional financing systems owned by banks and
governmental entities do have a certain level of privacy and security, however, their
systems are vulnerable to breakthroughs as they have the risk of being penetrated.
Penetrating blockchain systems is somewhat impossible, as this would require the
alteration of the information and data of millions of devices that are distributed all over
the world.

As for the last feature, since blockchain users are dealing with digital currencies, this
technology guarantees a high level of secrecy and privacy. The users are only referred to
as encrypted codes within the system, and no one has the ability to uncover any piece of

1029 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

private information concerning other users. This can also be traced back to the fact that
this technology is managed through a decentralized system.

In fact, even the world's most powerful economists cannot predict the future of the
Blockchain technology’s eldest son, the digital currency. Yet, no one can deny that
Blockchain technology in general is a technology that deserves attention as it imposes
itself, in one way or another, onto the global stage, and cannot be ignored under any
circumstances.

Concerning the future predictions for this technology, the scene is not completely blurry.
In fact, there are several signs regarding the blockchain technology that can be used to
clarify the scene, as follows:

• Digital currencies are recognized by many countries, especially Bitcoin. There


are many large countries in the world that have begun to adopt Bitcoin as a
recognized currency, including the US, Australia, and the Netherlands.
• Facebook, in cooperation with many other companies, announces the launch of
its digital currency: Libra. (Libra is not a traditional digital currency like other
digital ones, but it is a digital currency of a special nature behind which many
large companies and institutions stand).

Briefly, the blockchain technology refers to a modern revolution in the world of


Information Technology which has the ability to resist different circumstances and
eventually evolves and expands its uses. The number of users is increasing noticeably,
and this is a significant indicator of its development possibilities in the future such as
smart contracts and other uses that may grow to be essential in everyday life. Blockchain
can simply be described as a system that carries a new view of old things.

After having outlined the application of Network Functions Virtualization to blockchains,


it is important to point out the essential aspects that help to face the main challenges in
blockchain applications, as follows:

• Orchestration and Management: It provides a dependable, simple, and flexible


orchestration of VNF services.
• Security: The transportation of network functions occurs safely and the system
protects itself against unauthorized access.
• Monitoring and Auditing: The system case is monitored with the auditability of
differences.

1030 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

A blockchain is a distributed ledger that has a huge capacity to manage a continuously


growing list of records called blocks. Every block has a timestamp and is connected with
the previous block. The blockchain is built so that it can maintain the data stored inside
the ledger and block it from being modified. This means that when a segment of data is
stored in the blockchain, it is not possible to later modify this information. Based on the
aforementioned information, a theoretical review will be presented on how blockchain
embodies the role of security and storage through Network Functions Virtualization.

In Blockchain, each block possesses a hash of the preceding block, whereby the latter is
described as the parent block to the existing block. In other words, the present block is
owned by the parent block and carries a hash from it. In case the data in the existing block
is altered, this will cause the hash of the block to be altered, and eventually influence the
former block. This explains why the present block should carry the address of the former
block.

In light of what has been mentioned and pointed out, the conclusion can be drawn that the
blockchain technology is not as complicated as it seems. They are actually similar to
databases but differ in two aspects: structurally and functionally. Databases tend to use
‘table’ data structures to save data, whereas blockchains save data in blocks. The figure
below illustrates the financial transaction utilizing a blockchain system.

The present work offers a novel approach in a blockchain structure or architecture


whereby the security side (hashing) is replaced with the virtual side (virtual hashing)
based on the NFV technique. In addition, the leger or database of blockchain is also
replaced by virtual database or leger which is totally based on cloud computing.

a. Virtual Hashing

Virtualization software or programs enable users to operate various operating systems


together on an individual physical machine (such as a particular computer). This means
that users are allowed to virtualize the hash function of the blockchain, which represents
part of the work proposed in this study (hardware and software virtualizations). Since the
processing of each transaction input requires time, effort, and costs, it is suggested that the
hashing processes can be reduced within blocks of the blockchain through the use of
NFV. Considering the structure presented in Figure 8 (part 1) below, which is based on a
consensus and validation approach, no transaction will process till a plurality of the nodes
allows the suggested transaction. Whenever the transaction fails, it will be resent

1031 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

continuously until a consensus arrives that permits the process of transaction to finish. At
any rate, which has not been reached, the transaction truly defeats.

Fig. 8 The proposed system

b. Virtual Database

The same process or technology will also be applied to the ledger. In order to create a
virtual database and dispose of the equipment, a storage process is required as shown in
Figure 8 (part 2). The suggested framework in this survey can be summed up in three
phases, as shown in Figure (9).

1. The first phase includes building the private blockchain network based on a specific
environment that starts from (Identify a Suitable Use-case) to (Final Decision).
2. The second phase represents the stage of linking the blockchain with the cloud to apply
the services of NFV.
3. The last phase includes our novel work by virtualizing the hashing blocks and leger
(database of blockchain) through NFV.

1032 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Fig. 9 Framework of the proposed system

Standardization Movements

So as to quicken NFV deployment, several official NFV movements have been executed
through Standard Development Organizations (SDOs), which are represented through
many terms like ETSI and OPNFV. Almost all executions achieved over certain SDOs are
open source, so in peer operators can acquire skills for further deployment. This will
eventually contribute to the development of NFV. Hence, we present the vitalities of
fundamental Standards Developing Organizations (SDOs) which are applied to NFV
sequentially.

a. European Telecommunication Standards Institute

It was primarily found by a study team on NFV during October 2012, which is referred to
as NFV ISG. During the same period, the initial report about the NFV, an in-depth report,
had been published via NFV ISG. With many members connecting in this team, the NFV
in-depth report had been modernized twice in October 2013 and 2014, respectively. One
magnificent success of ETSI NFV ISG was the achievement of the stage-one mission
which included 11 specifications published in the beginning of 2015. Moreover, the
stage-two mission of NFV dealt with many goals such as interoperability, whereas the
stage-three mission of NFV is yet under construction.

1033 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Meanwhile, a different team called Open Source Management and Orchestration


(OSMANA) conducted further examinations in ETSI during the first months of 2016.
Meanwhile NFV ISG concentrates on the all-inclusive structure of NFV, OSM aims to
provide an open development process of MANO stack based on open source mechanisms
and systems. Regarding the connection that links MANO and NFV, OSM provides a
completing task to NFV ISG so as to evolve an open development process NFV
management and orchestration software.

b. Open Networking Foundation

In spite of the fact that the Open Networking Foundation (ONF) aims to quicken network
discovery by SDN, its inability ignores the notable concern which NFV might have on
futurity networking. Therefore, depending on the significant utility that NFV gives to the
economic or technology activity, ONF begins to monitor NFV via distributing a slight
solution whereby SDN can be utilized to enable the use of NFV. Next, ONF publishes a
technical paper that shows the full connection with SDN and NFV in brief based on the
view of infrastructure of networking.

c. Internet Research Task Force

The NFV Research Group (NFVRG) has been built through the Internet Research Task
Force (IRTF) to execute studies about NFV. The major purpose of NFVRG is to present a
general platform that enables researchers all across the globe to have the ability to
distribute and investigate their information regarding this novel study field. Additionally,
NFVRG further holds seminars or lessons at famous conferences.

d. Internet Engineering Task Force (IETF)

As is known, the Function Chain Working Group (SFC WG) services are set up via the
(IETF) and concentrate on creating SFC structure in phases of SFC protocol specification,
and Service Function Path (SFP) estimation. Commonly, the knowledge of SFP is inserted
inside packet headers. Through utilizing that knowledge, SFC passage traffic could
comfortably be driven over essential functions of the network based on a regular approach
prior to arriving at the address. Additionally, administration with the safety of information
are further indoors the fields of SFC WG meanwhile the SFC structure is created.

e. OPNFV

OPNFV decreases the time to merge and distribute NFV physical components and
onboard VNF/CNFs to the ones that provide elements and run the platforms. The OPNFV

1034 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

groups do that through executing, testing, and deploying equipment for matching and
rendering the NFV environment in accordance with the industry reference design.

OPNFV is considered an open development process and has an extremely high-reliability


or carrier-grade project. The totality goal of OPNFV is to promote the growth of distinct
NFV services and outcomes. Additionally, OPNFV further focuses on establishing an
obvious and regular NFV board for world-dependent design through collecting the
activity from different open development schemes (for instance, Open vSwitch (OVS) and
business devices (e.g Huawei).

f. Alliance for Telecommunications Industry Solutions

ATIS NFV Forum (ATIS NFVF) is an official telecommunications community that


focuses on improving NFV terms which are both integral and comprehensive to current
works. Especially, the field of ATIS NFVF involves technological demands, ability index,
and SFC. Additionally, ATIS NFVF contains an alliance association to the ETSI on
performing the following:

1. Current NFVI structure to promoting the resilient deployment of the VNF.


2. Solutions of NFV to promote quick service poses.

g. Broadband Forum (BBF)

BBF is applied to improve the terms of the broadband network. Via offering NFV within
broadband networks, BBF has the ability to investigate extra solutions for service
chaining, in addition to a variety of service applications in broadband networks.

h. Open Virtualization Format (OVF)

OVF (D.M.T.F., 2015) often described as Distributed Management Task Force (DMTF),
does not simply address issues related to virtual machine movement also allows managing
VNFs in a further electronic and defended mode.

i. The 3rd Generation Partnership Project (3GPP)

3GPP Service and System Aspects Working Group 5 (3GPP SA5) aims to search possible
study phases about NFV. Additionally, 3GPP still runs with ETSI on increasing the
normalization of NFV reference subject terms. The unity party of the reference object is a
3GPP-defined object and the opposite party is a functional block described via ETSI.

1035 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Table 1 The network function virtualization calibration movements about various SDOs
Standards Developing Depiction Fields Goal in NFV
Organizations (SDOs)
Industry Specification Industry specification NFV NFV specification, structure,
Group (ISG) within the group based on NFV basic physical and use cases,
European Telecommunications MANO and virtual network
Standards Institute (ETSI) and function, secret and
NFV (ETSI, 2014) confidence, flexibility, and
service
effective quality.
Open networking foundation User-led organization SDN and OpenFlow. OpenFlow capable network
(ONF, 2012) SDN structure to promote the
solution of NFV, alliance type
in SDN and NFV
Internet Research Task Force, NFV research group NFV, SDN, T2T Policy depends on device
NFV, Research Group (IRTF, administration, VNF
2015) execution pattern, service
confirmation, confidence and
flexibility
Internet Engineering Task Service function chain NFV, SDN, Internet Policy structure is basic
Force, Service Function working group Protocol version 6 physical of NFV, device
Chaining Working Group management of service chain,
(IETF, 2015) confirmation of NFVI services
Open Platform NFV (L. Open development NFV First construction of NFVI
Foundation, 2014) process design that and VIM ingredient, evolving
aims to promote the VNF employment and use
evolution of NFV case depending measurement
Alliance for A forum for enterprise Network function Describing correlated use
Telecommunications Industry NFV advents virtualization, fifth case, structure and demands
Solution Network function generation such highlight the advantages
virtualization Forum (ATIS, technology, Internet of NFV in multi-
2015) of Things administrative area conditions
Forum of Broadband Industry organization Wide bandwidth of Cooperating with the ETSI to
(Mijumbi, R., et al., 2015) that concentrates on networks, Network channel completely
wide bandwidth of Function interoperable NFV solutions
networks Virtualization and NFV demonstration of
ideas
Distributed Management Task Packaging format for NFV with cloud NFV the basic physical
Force Open Virtualization programs and other administration, alliance among
Format (D.M.T.F, 2015) operating information ETSI and NFV
to operate in virtual
mediums
Third generation partnership Telecom administration Radio access network In collaboration with ETSI on
project in addition to the working group about the administration of virtual
System Aspects Working 3rd generation partnership
3rd generation
Group 5 (3GPP, 2015) project network functions
partnership project

1036 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Motivation and Distribution

This section starts off by analyzing the current studies and determining the necessity and
motivation for this survey. Subsequently, the fundamental classification or distribution
and collection of literature works is reviewed.

a. Motivation and Current Surveys

NVF, Blockchain, have exclusively attracted observation from the research population.
But, there has been a quite poor attempt to study the novel which joins them. Table 1
prepares studies that have before been prepared, also are relevant to the work in this
survey. It is significant to see that most considerable of them only study or search for a
particular technology.

(Vineel Anvith, P., et al., 2019) examined the NFV technology and pointed out its
features and technology-enabled advantages, and dealt with multiple cases and
difficulties. The SDN technology and its combination with the NFV architecture are also
presented in this survey paper. However, (Yi, B., et al., 2018) presented a comprehensive
study on the applications and issues in NFV. They clarify the principal theories of NFV in
terms of terminology, calibration, and historical events, and the manner of NFV deviates
from the common middle-box based on the network. Then, the official NFV structure is
presented utilizing a bottom-up strategy, depending on which the identical utilized
problems and answers are also demonstrated. Lastly, to quicken the NFV deployment and
dodge traps so far as potential, they view the difficulties met by NFV and the stream for
future trends.

(Zhang, T., 2020) offers a wide survey on NFV platform configuration. His search
targeted current NFV platform applications. He started from the architectural design of the
regular source NFV environment and offered his taxonomy of current NFV environments
based on the primary object of design. Next, he completely examines the design space and
develops the implementation options every structure opts for.

The contribution of (Linguaglossa, L., et al., 2019) goes in two directions. First, they
present a general survey of the hierarchical communications system managed through a
primary computer Network Function Virtualization (NFV) ecosystem, including a wide
domain of technologies, beginning of low-level hardware speedup and bump-in-the-wire
ways towards high-level software speedup clarifications, which include the virtualization
mechanism itself. Second, they draw conclusions upon the principles concerning the

1037 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

design, improvement, and process of NFV-based deployments which reach the elasticity
and capacity to be changed in scale demands of the current connection of networks.

(Yang, W., & Fung, C., 2016) paid attention to the security aspect through their work, and
presented a view on the difficulties and events in NFV security. Also, they specify the
architecture of NFV design and many possible NFV security problems and challenges.
They additionally offer existing NFV security clarifications and results, and further
studied the NFV security usage problems and investigate promising analysis trends in this
field.

Some researchers give one of the applications of NFV as another modern choice learning
tool for computer network sessions. Beyond the conducted tests, the proposed
implementation is capable to meet the effective demands of the computer network
courses. Furthermore, the test outcomes indicate that the execution parameters are
growing forward with the increase of the number of users in a reasonable way.

(Li, J., et al.,2019) suggest that one environment is subsequent a highest-lowermost the
way. Also, they split the work into three interactive layers: the first one is the application
layer (such as services of Operation Support System), the second is called control layer
(such as the SDN controller with the DOS), and the last one is the infrastructure layer
(i.e. tools of Internet of Things).

(Balon, M., & Liau, B., 2012) suggested a pattern for strong security and network
execution administration. They exhibit a use-case to develop a special MVNO (Mobile
Virtual Network Operator) virtualized, that can facilely be extended and scaled for large
capacity passage traffic and a number of users. Additionally, they consider the diverse
elements and enabling factors of MVNO networks, and provide a benefit-cost analysis of
utilizing MVNO.

(Kuribayashi, S. I., 2019) suggested a deployment algorithm of the virtual firewall with
virtual routing functions for reducing the cost of the network. Finally, some works
proposed virtualization strategy to treat the difficulties in the current DLT systems.
However, they are reviewed with regards to Wireless sensor network virtualization.

1038 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Table 2 Review of related Studies and contribution regarding to this work


Authors Year of Major goal Details
Study
(Vineel Anvith, December NFV including its An introduction to the NFV approach,
P., et al., 2019) 2019 properties, NFV including its features, enabling
architecture, Software technologies, advantages, use cases, and
Defined Networking (SDN) difficulties. It describes the NFV structure
technology. in addition to its relationship with the
SDN technology.
(Yi, B., et al., March NFV motivations, A comprehensive research study about
2018) 2018 terminology, NFV, including the motivations for using
standardization, VNF NFV, principal theories of NFV in terms
deployment, scheduling, of terminology, calibration, and historical
immigration, chaining and events, and they review the difficulties
multicasting. faced with NFV.
(Zhang, T., February NFV platform design, A wide survey on NFV platform
2020) 2020 architectural of NFV configuration, targeting existing NFV
platform, platform applications, such as the
architecture of regular source NFV
environment, the taxonomy of the current
NFV environment based on the primary
object of the layout.
(Linguaglossa, March Network function A full summary of the host-based NFV
L., et al., 2019) 2019 virtualization (NFV) that ecosystem; they derive guidelines about
based on the host the layout, improvement, and service of
ecosystem, design, NFV-based deployments.
development, and operation
of NFV
(Alwakeel, A. April 2018 Security threats of NFV, A view of the difficulties and events in
M., et al., 2018) Few of the procedures to NFV security, structure design, and
decrease those security possible NFV security problems.
threats.
(Kuribayashi, S. March virtual firewall function, Virtual firewall function and virtual
I.,2019) 2019 virtual routing function. routing function are provided for reducing
the cost of the network.
(Li, J., et January vDLT A vDLT – service-oriented blockchain
al.,2019) 2019 system is presented including
virtualization and separating
administration/ control and enforcement.
(Rebello, et al., May BSec-NFVO, blockchain, A BSec-NFVO method is suggested that
2019) 2019 OPNFV depends on the blockchain to secure
orchestration services based on virtualized
networks, guaranteeing auditability, non-
renunciation, and integrity.
This work 2021 Blockchain virtualization, The implementation of NFV Network
virtual hashing, virtual Functions Virtualization (NFV) in the
ledger blockchain.

1039 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Recommendation and Future work

The modernity of this topic in addition to the combination of NFV and blockchain in one
work provides numerous benefits, which additionally produce various problems that
require to be fixed to achieve the complete advantages of these technologies. This part
presents a review of future researches and works on the use of NFV with blockchain
technology. In addition, Table (2) presents a review of the related studies and contribution
regarding this work.

A. NFV and Blockchain Security

NFV separates the network into parts that can work on ready systems. Ensuring the
security of those parts requires embedded protection. As the network parts are virtualized,
NFV networks include a standard idea that does not resemble common networks. There is
some complication about the virtual machine monitor (VMM), associated controls, and
procedures for transmitting data, in addition to the boundaries between the virtual and
hardware parts in networks. Although using NFV as a tool with some environments may
enhance the NFV security through using encoding information (encryption), immutability,
Tamper-evident of these environments like (blockchain), yet the security in NFV remains
one of the main difficulties and challenges in executing such an effective and powerful
technology. With the growing number of choices for NFV tools in many applications,
there is an increasing direction towards solving some challenges in terms of security. It is
rather challenging for a number of reasons, including hypervisor dependencies, flexible
network boundaries, and the scalability of available resources. Other significant
challenges include unauthorized access and leakage of data, for which it is recommended
that virtual machines are used for controls of authentication as a solution.

So far, blockchain has received much attention in many fields, but, it additionally is
remarkable difficulties and challenges need to be overcome, such as the majority attack.
This takes place whenever the available resources are attacked to achieve a specific
purpose with the correlative evaluation of the capabilities. Such majority attack could be
best faced by obtaining the highest rating or feasibility whenever most transactions
exceeded the block reward. In addition, the network hash rate was lower with marked
variation and prone to reorganization with a new approach of mining. Other issues involve
fork problems (related to decentralized node version troubles), and scale of blockchain.

When the blockchain increases in growth, the data grows larger, and the operations
(loading of store and computing) additionally become harder. Therefore, lots of time is

1040 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

required for data synchronization, which forms a huge problem to the user when running
the system.

B. NFV and Blockchain Scalability

Users are creating exploding amounts of transactions on different networks. Network


Functions Virtualization (NFV) presents a strategy to uphold these transactions with the
economy, in addition to scaling it through converting network functions on custom-made
hardware into software executed VNFs running on commercially available off-the-shelf
(COTS) devices.

The difficulty of deploying VNFs for many users is the fact that it needs a high-efficiency
distribution of any package flow that comes behind the distribution of the flow to the
required VNFs applicable to the service.

The common data based on blockchain (e.g. Bitcoin) has a fixed size. This small size of
data has become a source of anxiety for delays obtained via transactions. To build things
more critical, the universality of options of third-party validations has been directed to the
more rapid extension of the blockchain.

The problems of blockchain scalability may be classified into three divisions: storage
space, cost-of scalability, and reaching distinct output-with-scalability. Now, the fixed
block volume of the blockchain blocks turns out the greatest impasse. Blockchains are
obverse to an increase in pausing time demanded by transactions because of the small
block volume. Furthermore, for blocks with a short block creation time, several forks are
noticed to be built through the waiting time duration of the former block. This indicates
that the block creation time duration should never be decreased arbitrarily. Consequently,
the blockchain output seems not to increase properly. Blockchain users have to spend
money on the transaction cost that occurs. It becomes onerous to micropayments and
eventually affects the blockchain. Lastly, besides the development in size application and
the extension of blocks, the chain expands and needs storage, therefore, the memory
becomes a problem.

C. NFV and Blockchain Storage

Virtualization has performed a primary part in labeling different difficulties in the fields
of IT. Typically, virtualization indicates mechanizations created to present an abstraction
of essential resources (for example, storage). Through producing a logical design of
resources, instead of a hardware design, virtualization remarkably develops the

1041 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

performance, promotes system development, clarifies system administration and


configuration, and decreases the price of work and operations. In fact, virtualization is
considered to be one of the significant enabling technologies at the back of modern
progress of IT, comprehensive some techniques cloud services, edge computing, and
NFV.

Recently, the great growth of crypto-currencies DLTs such as blockchain has raised
significant attention. A virtualized Distributed Ledger Technology is an operative block
inside the network base which includes clear external interfaces and a clear functional
role. Consequently, a virtualize DLT as a function implies the execution of NFVs which
are used in virtual devices (VM). Significant network issues are faced considering the
shift from the actual infrastructure to NFV-based solutions. The departure of functionality
from the location additionally generates the issue of efficiently putting the virtual
appliances, so as to dynamically create an instance on request. Another aspect to point out
is the time needed to discover and overcome failures in the database of blockchain. As
part of the future works, it is suggested that the process will involve the execution of
multiple DLTs in the main ledger and in the cloud.

Conclusion

The rapid developments in technology tends to raise a number of challenges and


difficulties in light of the increasing number of computer networking resources. NFV has
been introduced to reduce such a state by separating the network uses from the computer
hardware. This separation allows a powerful, scalable and flexible system of
interconnected devices, whereby the administration and orchestration of the network are
computerized. In this respect, both the network operators and the entity that provide the
services have the ability to implement software-based functions (such as VNFs) on
Commercial-Off-The-Shelf (COTS) servers as an alternative purpose-built hardware,
which in turn decrease high CAPital EXpenditure (CAPEX) and the OPeration EXpenses
(OPEX). As well, considering the connection that links SDN, IOT with NFV, an
increasing number of studies are focusing on implementing this integrated architecture
within different situations such as blockchain. Therefore, it is ensured that the NFV would
attend the important aim in the networking trend of so-called "softwarization" soon.

This survey offered a comprehensive study of NFV which covers its basic parts, the
fundamental ideas of NFV (including motivations, technologies, applications, and
structures), its difficulties, and future trends. In particular, the NFV architecture is
proposed in a simple approach so as highlight its main benefits. Moreover, the

1042 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

combination of NFV, IoT, and SDN have clarified a direction to network softwarization.
This process ensure the flexible performance of services so as to quicken the time to get to
the market in providing clients new NFV services. Finally, a novel architecture is
proposed for a blockchain virtualization system that includes building a virtual hash in
addition to virtual leger.

References

Medhat, A.M., Taleb, T., Elmangoush, A., Carella, G.A., Covaci, S., & Magedanz, T. (2016).
Service function chaining in next generation networks: State of the art and research
challenges. IEEE Communications Magazine, 55(2), 216-223.
Li, J., Altman, E., & Touati, C. (2015). A general SDN-based IoT framework with NVF
implementation. ZTE communications, 13(3), 42-45.
Ojo, M., Adami, D., & Giordano, S. (2016). A SDN-IoT architecture with NFV
implementation. In IEEE Globecom Workshops (GC Wkshps), 1-6.
Du, P., Putra, P., Yamamoto, S., & Nakao, A. (2016). A context-aware IoT architecture
through software-defined data plane. In IEEE Region 10 Symposium (TENSYMP),
315-320.
Rebello, G.A.F., Alvarenga, I.D., Sanz, I.J., & Duarte, O.C.M. (2019). BSec-NFVO: A
blockchain-based security for network function virtualization orchestration. In ICC
2019-2019 IEEE International Conference on Communications (ICC), 1-6.
Massonet, P., Deru, L., Achour, A., Dupont, S., Croisez, L.M., Levin, A., & Villari, M. (2017).
Security in lightweight network function virtualisation for federated cloud and IoT.
In IEEE 5th International Conference on Future Internet of Things and Cloud
(FiCloud), 148-154.
Gkioulos, V., Gunleifsen, H., & Weldehawaryat, G.K. (2018). A systematic literature review
on military software defined networks. Future Internet, 10(9), 88.
Gunleifsen, H., Gkioulos, V., & Kemmerich, T. (2018). A tiered control plane model for
service function chaining isolation. Future Internet, 10(6), 46.
Abbasi, A.A., & Jin, H. (2018). v-Mapper: an application-aware resource consolidation scheme
for cloud data centers. Future Internet, 10(9), 90.
Leivadeas, A., Kesidis, G., Ibnkahla, M., & Lambadaris, I. (2019). Vnf placement optimization
at the edge and cloud. Future Internet, 11(3), 69.
Eramo, V., Lavacca, F.G., Catena, T., Polverini, M., & Cianfrani, A. (2019). Effectiveness of
Segment Routing Technology in Reducing the Bandwidth and Cloud Resources
Provisioning Times in Network Function Virtualization Architectures. Future
Internet, 11(3), 71.
Yao, J., Han, Z., Sohail, M., & Wang, L. (2019). A robust security architecture for SDN-based
5G networks. Future Internet, 11(4), 85.
Jiang, J.W., Lan, T., Ha, S., Chen, M., & Chiang, M. (2012). Joint VM placement and routing
for data center traffic engineering. In Proceedings IEEE INFOCOM, 2876-2880.

1043 http://www.webology.org
Webology, Volume 18, Special Issue on Computing Technology and Information
Management, September, 2021

Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K., & Shi, G. (2012). Design and implementation
of a consolidated middlebox architecture. In 9th {USENIX} Symposium on Networked
Systems Design and Implementation ({NSDI} 12), 323-336.
L. Foundation, (2014), Open platform for NFV. https://www.opnfv.org.
IRTF, (2015) Network function virtualization research group (NFVRG). https://irtf.org
IETF, (2015) Service function chaining working group.
https://datatracker.ietf.org/wg/sfc/charter/
ATIS. (2015). Network functions virtualization forum. http://www.atis.org
Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., & Boutaba, R. (2015).
Network function virtualization: State-of-the-art and research challenges. IEEE
Communications surveys & tutorials, 18(1), 236-262.
D.M.T.F. (DMTF). (2015). Open virtualization format (OVF).
http://www.dmtf.org/standards/ovf
The 3rd generation partnership project (3GPP), 2015.
http://www.3gpp.org/about-3gpp/about-3gpp
ETSI, (2014), Network function virtualisation-white paper3, SDN and open flow world
congress, Dusseldorf, Germany, http://portal.etsi.org/NFV/NFV_White_Paper3.pdf.
ONF, (2012), Software-defined networking: The new norm for networks.
https://www.opennetworking.org/
Vineel Anvith, P., Gunavathi, N., Malarkodi, B., & Rebekka, B. (2019). A Survey on Network
Functions Virtualization for Telecom Paradigm. In TEQIP III Sponsored International
Conference on Microwave Integrated Circuits, Photonics and Wireless Networks
(IMICPW), 302-306.
Yi, B., Wang, X., Li, K., & Huang, M. (2018). A comprehensive survey of network function
virtualization. Computer Networks, 133, 212-262.
Zhang, T. (2020). Nfv platform design: A survey. arXiv e-prints, arXiv-2002.
Linguaglossa, L., Lange, S., Pontarelli, S., Rétvári, G., Rossi, D., Zinner, T., & Bianchi, G.
(2019). Survey of performance acceleration techniques for network function
virtualization. Proceedings of the IEEE, 107(4), 746-764.
Yang, W., & Fung, C. (2016). A survey on security in network functions virtualization.
In IEEE NetSoft Conference and Workshops (NetSoft), 15-19.
Alwakeel, A.M., Alnaim, A.K., & Fernandez, E.B. (2018). A survey of network function
virtualization security. In SoutheastCon, 1-8.
Kuribayashi, S.I. (2019). Allocation of Virtual Firewall Functions in NFV-Based Networks
with Minimum Network Cost. International Journal of Computer Networks &
Communications (IJCNC), 11(2).
Li, J., Altman, E., & Touati, C. (2015). A general SDN-based IoT framework with NVF
implementation. ZTE communications, 13(3), 42-45.
Balon, M., & Liau, B. (2012). Mobile virtual network operator. In 15th International
Telecommunications Network Strategy and Planning Symposium (NETWORKS), 1-6.
Seyyed Hosseini, S., Asemi, A., Shabani, A., & Cheshmeh Sohrabi, M. (2017). Scientific
publication behavior versus information seeking behavior: An infodemiological study on
stomach cancer. Webology, 14(1), 21-31.

1044 http://www.webology.org
View publication stats

You might also like