2020
DOI: 10.1109/tnsm.2019.2948137
|View full text |Cite
|
Sign up to set email alerts
|

Placement and Chaining for Run-Time IoT Service Deployment in Edge-Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…Aimed at improving the availability of SFC, Qu [14] designed a coordinated protection mechanism that did not consider the cost of backup. Besides, Nguyen [4] considered the delay and bandwidth consumption of the underlying IoT network, as well as the dynamic characteristics of network traffic. He also explained the specific types of IoT devices and how the IoT devices and the SFC collaborate to complete services.…”
Section: B Reliability Improvingmentioning
confidence: 99%
See 3 more Smart Citations
“…Aimed at improving the availability of SFC, Qu [14] designed a coordinated protection mechanism that did not consider the cost of backup. Besides, Nguyen [4] considered the delay and bandwidth consumption of the underlying IoT network, as well as the dynamic characteristics of network traffic. He also explained the specific types of IoT devices and how the IoT devices and the SFC collaborate to complete services.…”
Section: B Reliability Improvingmentioning
confidence: 99%
“…Fig.4.b present the three migration strategies. In Fig.4.a, the two servers (3,4) where FW is hosted have a low utilization rate, which can be indicated by the green circle. However, even if the utilization of two working servers are both low, their energy consumption is still more than a moderately utilized server.…”
Section: ) Migration Schemementioning
confidence: 99%
See 2 more Smart Citations
“…For each operator of the other two layers, the function selects a worst-fit resource that supports the operator requirements. Since the goal is just to select candidate resources and not a deployment placement, if there is no resource fit, it ignores the operator and moves to the next one (lines [11][12][13][14][15][16]. At last, the combination of resources evaluated by the model contains those selected in each layer.…”
Section: Resource Selection Techniquementioning
confidence: 99%