2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6655090
|View full text |Cite
|
Sign up to set email alerts
|

Reconfiguration of virtual network mapping considering service disruption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…5,22,26 We adopted values for periodic triggering from the state of the art. 5,22,26 We adopted values for periodic triggering from the state of the art.…”
Section: Validation Results For the Self-adaptive Migration Trigger (mentioning
confidence: 99%
See 1 more Smart Citation
“…5,22,26 We adopted values for periodic triggering from the state of the art. 5,22,26 We adopted values for periodic triggering from the state of the art.…”
Section: Validation Results For the Self-adaptive Migration Trigger (mentioning
confidence: 99%
“…In this section and in Section 10, we present the validation of our RL approach in terms of (i) the assessment of the RL process as the RL episodes progressed and (ii) the comparison between self-adaptive migration triggering and periodic migration triggering. 5,22,26 We adopted values for periodic triggering from the state of the art. 5,22,26 Results report the average of the 31 simulation runs.…”
Section: Validation Results For the Self-adaptive Migration Trigger (mentioning
confidence: 99%
“…The problem of Virtual Network Embedding has been intensively studied [2]- [5] but adaptation of already embedded VNs to dynamically optimize resource utilization has received little attention. To the best of our knowledge only [2], [3], [6]- [8] addressed this problem. The presented adaptation strategies can be classified into two main families: i) periodic and ii) reactive approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Authors of [6] propose a reactive reconfiguration scheme that first detects the unmapped virtual nodes and links causing the rejection of the VN request, and then moves the congested links and nodes to less critical hosts. Authors of [7], [8] propose a reactive strategy that takes into account the cost incurred by the service disruption during re-allocation.…”
Section: Related Workmentioning
confidence: 99%
“…Given the dynamics in Internet, as the VON requests may come and leave randomly, the once efficient VNE mapping may not offer an optimal resource utilization due to the fragmentation of spectral resources [12]. Hence, the incoming VON requests may have to be blocked even though there are sufficient sub-carrier resources available in the SFLs.…”
Section: Introductionmentioning
confidence: 99%