2017
DOI: 10.1109/tnsm.2017.2681025
|View full text |Cite
|
Sign up to set email alerts
|

Semantically Enhanced Mapping Algorithm for Affinity-Constrained Service Function Chain Requests

Abstract: Abstract-Network Function Virtualization (NFV) and Software Defined Networking (SDN) have been proposed to increase the cost-efficiency, flexibility and innovation in network service provisioning. This is achieved by leveraging IT virtualization techniques and combining them with programmable networks. By doing so, NFV and SDN are able to decouple the network functionality from the physical devices on which they are deployed. Service Function Chains (SFCs) composed out of Virtual Network Functions (VNFs) can n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…In general, a distributed cyber-security framework needs coordination in selecting, instantiating and placing security functions, and in delivering the set of collected data, measurements, and events among them. This should guarantee consistency with the detection needs, as well as respect the overall resource constraints and allocation policies for the service [4,8].…”
Section: Challenges and Benefits For Distributed Cybersecurity Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, a distributed cyber-security framework needs coordination in selecting, instantiating and placing security functions, and in delivering the set of collected data, measurements, and events among them. This should guarantee consistency with the detection needs, as well as respect the overall resource constraints and allocation policies for the service [4,8].…”
Section: Challenges and Benefits For Distributed Cybersecurity Frameworkmentioning
confidence: 99%
“…The better the suitability of the feature extracted, the more effective the security service in its detection and analysis operations (security services will be described in detail in Sect. 4…”
Section: Context Brokermentioning
confidence: 99%
“…1) Infrastructure Topology: As in [17,37], a k-ary fattree infrastructure topology is considered, see Figure 8. The leaf nodes represent the RRHs.…”
Section: A Resource Provisioning Vs Direct Embeddingmentioning
confidence: 99%
“…Numerous studies are relevant to big-data-based NFV, including how to determine and place network functions. N Bouten et al [2] presented a set of affinity and anti-affinity constraints that can be used by TSPs to define big-data-based placement constraints. They proposed a semantic conflict mechanism to evaluate SFC requests that filters invalid mechanisms to reduce the mapping time.…”
Section: Related Workmentioning
confidence: 99%
“…Telecommunication service providers (TSPs) desire flexible and cost-efficient methods for dispatching network services as market demands increase. NFV provides an opportunity to efficiently and dynamically deploy service function chains (SFCs) [1][2][3] without modifying dedicated infrastructure, which is costly and has become complex over time. The basic idea behind NFV is to decouple these network functions (e.g., firewall, WAN optimizers, and proxies) from the underlying customized devices and accomplish equivalent network functions via software-based functions running in virtual machines deployed on devices.…”
Section: Introductionmentioning
confidence: 99%