2020
DOI: 10.1109/access.2020.3017667
|View full text |Cite
|
Sign up to set email alerts
|

NFV Provisioning in Large-Scale Distributed Networks With Minimum Delay

Abstract: Network function virtualization (NFV) and software-defined networking (SDN) are two technologies that have emerged to reduce capital and operational costs, and to simplify network management. In this paper, we propose an SDN-based system that provisions virtual network functions (VNFs) to minimize round trip time (RTT) delay and synchronization delay requirements. Our system uses graphic-theoretic approaches to place newly requested VNFs including four centrality functions -betweenness, degree, closeness, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 36 publications
(30 reference statements)
0
4
0
Order By: Relevance
“…Achievable sum rate(bps) Total consumed power(watts) (29) • Average Packet Delay One of the QoS requirements for 5G networks is to reduce the amount of delays [76], [77]. A packet's downlink delay is a result of delays in transmission, propagation, processing, and queuing [78], [79].…”
Section: Ee(bits/joule) =mentioning
confidence: 99%
“…Achievable sum rate(bps) Total consumed power(watts) (29) • Average Packet Delay One of the QoS requirements for 5G networks is to reduce the amount of delays [76], [77]. A packet's downlink delay is a result of delays in transmission, propagation, processing, and queuing [78], [79].…”
Section: Ee(bits/joule) =mentioning
confidence: 99%
“…This step greatly reduces the workload of subsequent capacity allocation. Especially in the case of a large amount of data, the K-means algorithm is more efficient than other algorithms [17][18].…”
Section: K-means Algorithmmentioning
confidence: 99%
“…8,9 In recent years, its use for quantifying resilience has evolved to become an essential component in multiple applications within the field of computer network security. [10][11][12][13][14] One of the main resilience metrics, referred to as robustness, is the ability of a network to keep providing the same level of service in the presence of disruptions. 6,7 In general, resilience is determined by centrality measures that quantify the significance of nodes; robustness is evaluated after the node with the highest centrality measure has been attacked.…”
Section: Introductionmentioning
confidence: 99%
“…Graph theory has long been used for network analysis, including designing, modeling, and optimizing networks 8,9 . In recent years, its use for quantifying resilience has evolved to become an essential component in multiple applications within the field of computer network security 10‐14 . One of the main resilience metrics, referred to as robustness, is the ability of a network to keep providing the same level of service in the presence of disruptions 6,7 .…”
Section: Introductionmentioning
confidence: 99%