2021
DOI: 10.1109/tnsm.2020.3045051
|View full text |Cite
|
Sign up to set email alerts
|

Provisioning Optimization for Determining and Embedding 5G End-to-End Information Centric Network Slice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…On the basis of the limitations of computational, network, and storage resources, [26] proposed two fundamental VNE techniques, namely node ranking metric for virtual network embedding (NRM-VNE) and resource consumption ratio for virtual network embedding (RCR-VNE). Authors of [27] suggested a heuristic technique known as information-centric networking-network slice determination and embedding to address challenges associated with network embedding in large-scale networks. The primary value of the proposed algorithm is that it solves the problem without requiring any background information about the topology of the network or the availability of its resources.…”
Section: Slice Isolation and Management Strategiesmentioning
confidence: 99%
“…On the basis of the limitations of computational, network, and storage resources, [26] proposed two fundamental VNE techniques, namely node ranking metric for virtual network embedding (NRM-VNE) and resource consumption ratio for virtual network embedding (RCR-VNE). Authors of [27] suggested a heuristic technique known as information-centric networking-network slice determination and embedding to address challenges associated with network embedding in large-scale networks. The primary value of the proposed algorithm is that it solves the problem without requiring any background information about the topology of the network or the availability of its resources.…”
Section: Slice Isolation and Management Strategiesmentioning
confidence: 99%
“…In the first phase (step [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] where we try to solve computing resource deficit for physical nodes in the set (CN − BN), we do not treat link congestion, because virtual node migration leads to virtual link migration which could change the bandwidth state of physical links. After a physical node's computing resource deficit is solved, we check whether the bandwidth resource deficit still exists, if so the physical node's congestion level is recomputed and insert in to the BN set, and it will be treat in the second phase of the algorithm (step 21-27).…”
Section: Reconfiguration Algorithmmentioning
confidence: 99%
“…The concept of NS spans across the 5G network: from the Radio Access Network (RAN), go through the Transport Network (TN) and the Core Network (CN). In the scientific literature, studies related to 5G NS are classified into two categories [3]: those that focus on virtualizing and softwarizing the radio resources for RAN slicing [4]- [6] and those, referred to as Core slicing, that investigate the placement of Virtual Network Function (VNF) instances on the underlying physical infrastructure [7], [8]. The current paper belongs to the second category.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the combined structure, i.e. Software defined‐information centric network (SD‐ICN), has been paid close attention by a multitude of school groups and enterprises [10–30]. After both architectures interact with each other, SD‐ICN can complement respective advantages and sufficiently make up for a series of drawbacks [31].…”
Section: Introductionmentioning
confidence: 99%