2019
DOI: 10.1109/jiot.2018.2853708
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Delay Modeling for Embedded VNF Chains in 5G Core Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 108 publications
(41 citation statements)
references
References 31 publications
0
41
0
Order By: Relevance
“…However, given an embedded NF chain, one can model (or measure) the E2E delay, upon which an (iterative) algorithm can be developed to re-adjust the embedding solution of violated NF chains. For instance, in our previous work [37], we propose an analytical E2E packet delay modeling framework, based on queueing network modeling, for multiple embedded NF chains while taking into account the computing and transmission resource sharing. By incorporating the proposed E2E delay model, we will investigate how to develop a delay-aware NF chain embedding algorithm in our future work.…”
Section: A Joint Placement and Routing For Single-service Scenariomentioning
confidence: 99%
“…However, given an embedded NF chain, one can model (or measure) the E2E delay, upon which an (iterative) algorithm can be developed to re-adjust the embedding solution of violated NF chains. For instance, in our previous work [37], we propose an analytical E2E packet delay modeling framework, based on queueing network modeling, for multiple embedded NF chains while taking into account the computing and transmission resource sharing. By incorporating the proposed E2E delay model, we will investigate how to develop a delay-aware NF chain embedding algorithm in our future work.…”
Section: A Joint Placement and Routing For Single-service Scenariomentioning
confidence: 99%
“…To exploit the full potential of network resources and optimize system performance, network slicing is adopted to allocate resources to particular users for their specific service requirements based on network virtualization technique [238], [239]. The technique has been applied in the next-generation network, and can be applied in the EVN by extending the resource allocation on power resource.…”
Section: V2g Technologymentioning
confidence: 99%
“…We derive the throughput and delay for each queue by using the equations in (6), (7). The average delay that arrives in the first and the second base station are described below respectively.…”
Section: Scaled-up Systemmentioning
confidence: 99%