2022
DOI: 10.1109/tnsm.2022.3147146
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Scaling Policies for NFV Providing 5G/6G Reliability Levels With Fallible Servers

Abstract: The softwarization of mobile networks enables an efficient use of resources, by dynamically scaling and re-assigning them following variations in demand. Given that the activation of additional servers is not immediate, scaling up resources should anticipate traffic demands to prevent service disruption. At the same time, the activation of more servers than strictly necessary results in a waste of resources, and thus should be avoided. Given the stringent reliability requirements of 5G applications (up to 6 ni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 49 publications
1
8
0
Order By: Relevance
“…target failure probabilities T f = {10 −3 , 10 −5 } and evaluate the resulting failure probability and power consumption provided by A3S for the 'rack servers' configuration. As a benchmark, we consider the static optimal configuration provided by our previous work [25], which assumes Poisson arrivals and exponential service times. We summarize the obtained results in Table 2.…”
Section: Stationary Real Life Tracesmentioning
confidence: 99%
“…target failure probabilities T f = {10 −3 , 10 −5 } and evaluate the resulting failure probability and power consumption provided by A3S for the 'rack servers' configuration. As a benchmark, we consider the static optimal configuration provided by our previous work [25], which assumes Poisson arrivals and exponential service times. We summarize the obtained results in Table 2.…”
Section: Stationary Real Life Tracesmentioning
confidence: 99%
“…In the literature, various approaches have been proposed to predict the VM load to boot VMs before these VMs, which are under operation, become overloaded. These approaches can be categorized into those based on the moving average, including the exponential weighted moving average (EMA) [8], [14], autoregressive moving average (ARMA) [15], [16], and autoregressive integrated moving average (ARIMA) [17], [18], those based on machine learning [19], those based on Markov models [20], [21], and those based on queueing models [22]- [30]. In the following, we summarize each category briefly.…”
Section: Related Workmentioning
confidence: 99%
“…Queueing model-based approaches were studied in [22]- [30]. In their developed models, the authors considered the setup time both with [22] and without [23] defections.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…System components place considerable limits on context, information, and mobility to ensure the best system accessibility and reliability and the ultra-low latency required for haptic Internet systems [13,14]. Industry and research organizations are constantly seeking to create and apply novel technologies and models in communication networks, such as the distributed edge computing, e.g., mobile edge computing (MEC) and fog computing, artificial intelligence (AI), software-defined networking (SDN), blockchain, and network function virtualization (NFV), in order to maintain growth and fulfill ever-changing demands [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%