2021
DOI: 10.1109/access.2021.3051045
|View full text |Cite
|
Sign up to set email alerts
|

Reliability-Aware Service Function Chain Backup Protection Method

Abstract: Network Function Virtualization (NFV) decouples network functions from hardware, improves the flexibility of resource allocation, and enhances network scalability. Any failures of software and hardware in an NFV environment will result in the interruption of Service Function Chains (SFCs). As one of the key technologies of 5G, NFV has more stringent delay and reliability requirements for services. This paper takes software and hardware failures into account, and proposes a reliability-aware service function ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 43 publications
(138 reference statements)
0
1
0
Order By: Relevance
“…A greedy algorithm is a type of algorithm that aims to solve a problem by iteratively selecting the locally optimal choice at each step. Several studies [13,[30][31][32][33][34] have utilized the widely recognized greedy method as a comparative approach for evaluating the SFC deployment problem. While a greedy algorithm is often characterized by its simplicity and efficiency, this does not guarantee the attainment of an optimal solution in all cases.…”
Section: Greedy Algorithmmentioning
confidence: 99%
“…A greedy algorithm is a type of algorithm that aims to solve a problem by iteratively selecting the locally optimal choice at each step. Several studies [13,[30][31][32][33][34] have utilized the widely recognized greedy method as a comparative approach for evaluating the SFC deployment problem. While a greedy algorithm is often characterized by its simplicity and efficiency, this does not guarantee the attainment of an optimal solution in all cases.…”
Section: Greedy Algorithmmentioning
confidence: 99%
“…Network function and hardware are tightly coupled in traditional network. Network services require specialized hardware modules, which increase the difficulties associated with scaling and network management, and result in high resource consumption 1 , 2 . There is a constant increase in network congestion and delay due to the hundreds of millions of smart connected devices and an increase in mobile data traffic.…”
Section: Introductionmentioning
confidence: 99%