IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057153
|View full text |Cite
|
Sign up to set email alerts
|

Availability-aware mapping of service function chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 126 publications
(45 citation statements)
references
References 13 publications
0
45
0
Order By: Relevance
“…Once drawn u (m) (z) by (16), the MUGF u S (z) of a multitenant SFC system is computed by the following series operator u S (z) = σ u (1)…”
Section: The Multidimensional Ugfmentioning
confidence: 99%
See 1 more Smart Citation
“…Once drawn u (m) (z) by (16), the MUGF u S (z) of a multitenant SFC system is computed by the following series operator u S (z) = σ u (1)…”
Section: The Multidimensional Ugfmentioning
confidence: 99%
“…In order to meet the "five nines" availability requirement for the vIMS, we set A 0 = 1 − 10 −5 and solve numerically the optimization problem (21) by an exhaustive search approach, having imposed a uniform limitation of 4 redundant nodes for each server. A routine (available upon request for non commercial use), written in Mathematica R , implements the proposed MUGF approach: it evaluates the steady-state availability of the vIMS system (9) in every redundancy configuration by computing the MUGF (19) via parallel and series operators (16) and 18, respectively. Then, the…”
Section: A Numerical Examplementioning
confidence: 99%
“…Much recent attention has been focusing on the placement of virtualized network functions (VNF) [23,6,31], traffic steering given placed network functions [26], joint traffic steering and VNF placement [17], availability of service chains [7,36,35], and dynamic network function chaining [32]. For example, Qazi et al developed SIMPLE [26] that enforces high-level routing policies for middlebox-specific traffic, they however did not consider virtualization or dynamic network function placements.…”
Section: Related Workmentioning
confidence: 99%
“…Remarks: The budget B, the number |SC k i | of instances of type-k service chain in data center DC i , and the delay requirement D j of r j determine the violation of constraints (5), (6), and (7) . For example, if N = max i,k,j {|SC k i |, D j , B} = B, budget B has an impact on the violation ratio, which means a larger budget will incur a higher violation of resource constraints because more requests may be admitted.…”
Section: Algorithm Analysismentioning
confidence: 99%
“…Most of the existing works on redundancy allocation in NFV based networks focus on providing two-nines or three-nines service availability [14], [15]. only a few consider carrier-grade service availability [16], [17].…”
Section: Introductionmentioning
confidence: 99%