2020
DOI: 10.1109/ojcoms.2020.2966689
|View full text |Cite
|
Sign up to set email alerts
|

An End-to-End Performance Analysis for Service Chaining in a Virtualized Network

Abstract: Future mobile networks supporting Internet of Things are expected to provide both high throughput and low latency to user-specific services. One way to overcome this challenge is to adopt Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC). Besides latency constraints, these services may have strict function chaining requirements. In other words, each service has to be processed by a set of network functions in a specific order. The distribution of network functions over different hosts… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 38 publications
(35 reference statements)
0
3
0
Order By: Relevance
“…Then, we use the results of each subsystem in order to derive the analytical expressions for the whole system. A full version of this work can be found in [13]. µ3 = µ4 = µ5 = 0.5, µ6 = 0.9, p = 0.8.…”
Section: Discussion On the Analysis Of Scaled-up Systemsmentioning
confidence: 99%
“…Then, we use the results of each subsystem in order to derive the analytical expressions for the whole system. A full version of this work can be found in [13]. µ3 = µ4 = µ5 = 0.5, µ6 = 0.9, p = 0.8.…”
Section: Discussion On the Analysis Of Scaled-up Systemsmentioning
confidence: 99%
“…They put forth a mathematical model aimed at optimizing costs and ensuring QoS. An end-to-end performance analysis for service chaining in a virtualized network was carried out by Fountoulakis et al [18]. Han et al [19] offered an algorithm to satisfy the demands of low delays, load balancing, and the efficient utilization of substrate resources in operator networks.…”
Section: Related Workmentioning
confidence: 99%
“…It is imperative to ensure that the SFC requests are successfully transmitted from the source nodes. Hence, we propose the incorporation of Constraint (18):…”
Section: Problem Formulation (Ilp)mentioning
confidence: 99%
“…2 To this aim, Internet service providers (ISPs) have initiated to change their own networks with the help of flexible network technologies such as software-defined networking (SDN) 3 and network function virtualization (NFV). 4 SDN proposes a novel network architecture aiming to reduce the current network infrastructure limitations. The main goal is to enhance the network flexibility by decoupling the forwarding process of network packets (data plane) from the routing process (control plane).…”
Section: Introductionmentioning
confidence: 99%
“…Emerging technologies such as big data, cloud computing, and Internet of things (IoT) 1 have led to innovative systems that require dynamic and manageable network capabilities to support their operation 2 . To this aim, Internet service providers (ISPs) have initiated to change their own networks with the help of flexible network technologies such as software‐defined networking (SDN) 3 and network function virtualization (NFV) 4 . SDN proposes a novel network architecture aiming to reduce the current network infrastructure limitations.…”
Section: Introductionmentioning
confidence: 99%