Highly Available Service Access through Proactive Events Execution in LTE NFV

Muhammad Taqi Raza, Fatima Muhammad Anwar, Dongho Kim, Kyu Han Kim

Research output: Contribution to journalArticlepeer-review

3 Scopus citations


The explosion of mobile applications and phenomenal adoption of mobile connectivity by end users make all-IP based 4G LTE as an ideal choice for providing Internet access on the go. LTE core network which handles device control-plane and data-plane traffic becomes susceptible to network resource constraints. To ease these constraints, Network Function Virtualization (NFV) provides high scalability and flexibility by enabling dynamic allocation of LTE core network resources. NFV achieves this by decomposing LTE Network Functions (NF) into multiple instances. However, LTE core network architecture which is designed considering fewer NF boxes does not fit well where decomposed NF instances add delays in network event execution. Certain control-plane events being time critical hurt data-plane traffic requirements defined by LTE standard. This paper proposes Fat-proxy which acts as a stand-alone execution engine of these critical network events. Through space uncoupling, we execute several signalling messages in parallel while skipping unnecessary messages to reduce event execution time and signalling overhead while ensuring highly available service access. We build our system prototype of open source LTE core network over virtualized platform. Our results show that we can reduce event execution time and signalling overhead upto 50% and 40%, respectively.

Original languageEnglish (US)
Article number9509291
Pages (from-to)2531-2544
Number of pages14
JournalIEEE Transactions on Network and Service Management
Issue number3
StatePublished - Sep 2021


  • 4G mobile communication
  • Availability
  • Network function virtualization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Highly Available Service Access through Proactive Events Execution in LTE NFV'. Together they form a unique fingerprint.

Cite this