Network Functions Virtualization, or NFV, is a network architecture philosophy that utilizes virtualization technologies to manage core networking functions via software as opposed to having to rely on hardware to handle these functions. The NFV concept is based on building blocks of virtualized network functions, or VNFs, that can be combined to create full-scale networking communication services.
In Network Functions Virtualization, virtualized network functions handle specific network functions that run in one or more virtual machines on top of the hardware networking infrastructure (both wired and wireless) such as routers, switches, servers or cloud computing systems.
Examples of the types of networking functions that can be managed by NFV include network security and firewalls, network address translation (NAT), domain name services (DNS), caching, intrusion detection and more.
Potential Benefits of Network Functions Virtualization
Network Functions Virtualization (NFV) officially emerged in October 2012 when the European Telecommunications Standards Institute’s (ETSI) “Network Functions Virtualisation Working Group” published a white paper defining the NFV concept and its goals.
The NFV Working Group’s goals for Network Functions Virtualization include reducing both capital and operating expenses involved in networking infrastructure and management, providing better flexibility for scaling up or scaling down network services as needed, improving the return on investment from adding new networking services, and reducing the time frame for bringing new network services to market.
Network Functions Virtualization and Software-Defined Networking
Network Functions Virtualization is similar in nature to software-defined networking (SDN) in that both concepts involve migrating network management from the hardware layer to the software layer. But Network Functions Virtualization focuses more on porting network functions to virtual environments, whereas SDN focuses more on the separation of the network control layer from its forwarding layer, according to ETSI.
So while the two concepts are complementary in many cases, Network Functions Virtualization and Software-Defined Networking exist independently of each other.
- Samsung Galaxy S5
The fifth generation of Samsung’s Galaxy smartphone mobile device and the follow-up to the Samsung Galaxy S4, which debuted in April 2013. The Android-based Samsung Galaxy S5 was unveiled in February 2014, with official availability coming a little over a month later in April. Revolutionary or Evolutionary Upgrade for Galaxy S5? While more of an […]
- Heartbleed Bug, an OpenSSL vulnerability
The Heartbleed Bug is an OpenSSL vulnerability that would allow malicious hackers to steal information from websites that would normally be protected by the SSL/TLS encryption. The open source OpenSSL cryptography library is used to implement the Internet’s Transport Layer Security (TLS) protocol. Named by the researchers who discovered the security flaw, the Heartbleed Bug […]
- Microsoft OneDrive for Business (Cloud Storage)
OneDrive for Business is a Microsoft cloud storage service for business. It is a personal library intended for storing and organizing your work documents. Recent changes to Microsoft’s service plan indicates that the company is preparing OneDrive for Business to serve as a feature-packed, social collaboration platform. In addition to business-grade file storage, sync and […]
- Big Data Analytics
Big data analytics refers to the process of collecting, organizing and analyzing large sets of data (called big data) to discover patterns and other useful information. Big data analytics can help organizations to better understand the information contained within the data and will also help identify the data that is most important to the business […]
Geo-fencing, or geofencing, is a term that refers to software tools or applications that utilize global positioning systems (GPS) or radio frequency identification (RFID) to establish a virtual perimeter or barrier around a physical geographical area. Geo-fence apps and tools monitor when mobile devices or other physical objects enter or exit an established geo-fenced area […]