2017 IEEE Conference on Network Softwarization (NetSoft) 2017
DOI: 10.1109/netsoft.2017.8004104
|View full text |Cite
|
Sign up to set email alerts
|

CCVP: Cost-efficient centrality-based VNF placement and chaining algorithm for network service provisioning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(29 citation statements)
references
References 19 publications
0
29
0
Order By: Relevance
“…Constraint (14) ensures that ω v,cpu will be 1 if the CPU capacity of node v is overloaded, while Constraint (15) ensures that ψ cpu will be at least as high as the amount of CPU overload of any node (the appearance of ψ cpu in the objective function will guarantee that it will be exactly the maximum amount of CPU overload and not higher than that). Constraints (16), (17) do the same for memory overloads and Constraints (18), (19) do the same for the overload of link capacity. 5) Interplay of the constraints: To illustrate the interplay of the constraints, we assume that we need to optimize the embedding shown in Fig.…”
Section: A Constraintsmentioning
confidence: 99%
See 2 more Smart Citations
“…Constraint (14) ensures that ω v,cpu will be 1 if the CPU capacity of node v is overloaded, while Constraint (15) ensures that ψ cpu will be at least as high as the amount of CPU overload of any node (the appearance of ψ cpu in the objective function will guarantee that it will be exactly the maximum amount of CPU overload and not higher than that). Constraints (16), (17) do the same for memory overloads and Constraints (18), (19) do the same for the overload of link capacity. 5) Interplay of the constraints: To illustrate the interplay of the constraints, we assume that we need to optimize the embedding shown in Fig.…”
Section: A Constraintsmentioning
confidence: 99%
“…DECREASE first removes as many edges as possible (lines 3-6); when a further decrease is necessary but no more edges can be removed, it reduces the next flow on each link by the same factor to achieve the required reduction (lines 7-9). INCREASE first checks if new instances need to be created to be consistent with the template (lines [12][13][14][15][16], then tries to increase the existing flows (lines [17][18][19]. If this is not sufficient to achieve the necessary increase, it creates further instances and flows (lines 20-23).…”
Section: Heuristic Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Our previous work [17] considered a complete cost model including license, computing and communication cost. They introduced a cost adaptive model for low and high traffics and different units of cost.…”
Section: Related Workmentioning
confidence: 99%
“…We implemented one of the recently proposed cost-efficient VNF placement and chaining algorithms (CCVP [17]) which considers VNF capacity and requirement in taking decision for VNF placement and chaining. In CCVP, the same service with the same order is used for all the flows.…”
Section: Use Casementioning
confidence: 99%