Next Generation Communications Blog

NFV

Network Functions Virtualization: Learnings from an NFV proof-of-concept

By: Asaf Peled, Cloud Solution Architect, Alcatel-Lucent's CloudBand activity 

We live in exciting times – again. I had been wondering if there was still room for fundamental innovation, for technological disruption – the worn out word. We had the Internet bubble that burst 2001/2002. We had the advent of the smartphone in the recent years. Great innovation, but somehow they reached a plateau. Faster processors, larger screens? It doesn’t seem to make a real difference. Apple’s engine showed the first signs of sputtering.

And yet, there is something brewing behind the scenes that makes the engineer’s heart beat faster: NFV and SDN, a bold new vision about the future of networks (read these blog posts about understanding Network Functions Virtualization and Software Defined Networks). Network functions are to be reduced to pure software - doing away with all the special purpose chips, circuit boards, and cabinets into which we have poured our brains to deliver the ultimate in features, performance, and reliability.

NFV INSIGHTS: Making the [business] case for NFV

By: Joaquin De La Vega Gonzalez-Sicilia, Alcatel-Lucent Sr. Manager, Cloud Consulting Services

I still remember with great excitement how, in October 2012, a group of network operators published a whitepaper that coined the term Network Functions Virtualization. This announcement validated a vision that we had been promoting under the name of “Virtual Telco” for more than two years. The telecommunications world had decided to start a fascinating journey towards the cloud, and we were already in the game with a product. What I could not imagine is how fast things would move.

NFV INSIGHTS: The making of NFV security - "from vision to reality"

By: David Amzallag - Alcatel-Lucent Vice President, Virtual Telecommunications and CloudBand CTO

While network functions virtualization (NFV) introduces new challenges to security, it also presents unique opportunities for addressing security problems due to the unprecedented scale, flexibility, and central control it affords. Compute, storage, and network resources can be optimally allocated and stitched together as required by the security policy. Our approach to address NFV security is based on a recursive, divide-and-conquer methodology, which involves securing the Alcatel-Lucent CloudBand™ NFV Platform, cloud nodes, and the network that interconnects them. CloudBand uses policy-based placement capabilities enabled by the CloudBand Management System to install virtualized functions in their appropriate security zones, and re-uses the security services provided by NFV applications.

I thought it would be a good idea to describe the journey to this approach together with its "making of" episodes.

Featured Events