2013
DOI: 10.1109/surv.2013.013013.00155
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Network Embedding: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
664
0
25

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 1,075 publications
(689 citation statements)
references
References 96 publications
0
664
0
25
Order By: Relevance
“…After the service chaining, the second challenge is to find the best placement for the VNFs, considering: 1) available resources, 2) requirements of the requested NS, and 3) possible impact on the other running NSs. These challenges can be modeled whereby NP-hard optimization problems, such as Location-Routing Problems (LRP) [39] and Virtual Network Embedding (VNE) [40]. The solution to this problem will be passed to the embedded SDN controller in the VIM to instantiate the NS.…”
Section: Convergence Of Nfv Mec and Sdn In 5g Systemsmentioning
confidence: 99%
“…After the service chaining, the second challenge is to find the best placement for the VNFs, considering: 1) available resources, 2) requirements of the requested NS, and 3) possible impact on the other running NSs. These challenges can be modeled whereby NP-hard optimization problems, such as Location-Routing Problems (LRP) [39] and Virtual Network Embedding (VNE) [40]. The solution to this problem will be passed to the embedded SDN controller in the VIM to instantiate the NS.…”
Section: Convergence Of Nfv Mec and Sdn In 5g Systemsmentioning
confidence: 99%
“…The body of research around VNE is vast: many papers present solutions either with exact optimum for limited scale scenarios, or close-to-optimal results achieved by heuristic algorithms. A summary of solutions to the VNE problem is given in [2].…”
Section: Related Workmentioning
confidence: 99%
“…Algorithms for VNE vary according to how they perform the mapping; link and node mapping can be performed separately, as in [40], [39], [27], or in a joint manner as in [8], [7]. Approaches also vary according to their embedding objectives, and optimization strategies used; recent surveys of VNE can be found in [12], [11].…”
Section: Application-aware Network Managementmentioning
confidence: 99%