2018
DOI: 10.1109/tnsm.2018.2870733
|View full text |Cite
|
Sign up to set email alerts
|

ClusPR: Balancing Multiple Objectives at Scale for NFV Resource Allocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 60 publications
(79 citation statements)
references
References 28 publications
0
79
0
Order By: Relevance
“…NFs of a chain are randomly chosen out of the set of five services, which are Firewall, DPI, IDS, Proxy, NAT. Flows are assigned primary chains by using ClusPR algorithm [2]. The availability requirement of a flow is selected from the set {0.999, 0.9999, 0.99999}.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…NFs of a chain are randomly chosen out of the set of five services, which are Firewall, DPI, IDS, Proxy, NAT. Flows are assigned primary chains by using ClusPR algorithm [2]. The availability requirement of a flow is selected from the set {0.999, 0.9999, 0.99999}.…”
Section: Resultsmentioning
confidence: 99%
“…Network Function Virtualization (NFV) alters this inflexible architecture by decoupling the software of NFs from the hardware and run the NFs on virtualized environment such as virtual machines (VMs) or containers. NF instances can then be created on the fly depending on the traffic and the network state [2]. The VMs and containers of the NFs are usually hosted on commercial off-the-shelf (COTS) hardware, which are comparatively less expensive than the purpose-built hardware.…”
Section: Introductionmentioning
confidence: 99%
“…However, this approach has two main drawbacks, i.e., 1) one time and randomly choosing the clusters' threshold, and 2) the arbitrarily initial center selection, not being able to guarantee the end-to-end latency to be shortened. Similarly, the MST-based clustering algorithm, as described in [27], is also very dependent on the proximity threshold, which utilized to remove network edges from the MST cluster, whose lengths are greater than the threshold value. Hence, several successive values are required to be generated [28].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…Second, a prediction of NIS usage-ratio is employed to develop a dynamic resource allocation scheme, which optimizes further latency minimization in the corresponding clusters. 5) We evaluate our proposed method along with the recent state-of-the-art approaches, i.e., the simulated annealing [22], the basic sequential algorithmic scheme (BSAS) [26], the minimum spanning tree (MST) [27], and the modified BSAS [28]. The simulation-based experimental comparison is carried out on two network topologies, i.e., FatTree [29] and Abilene [30].…”
Section: Introductionmentioning
confidence: 99%
“…In NFV, several studies (e.g., [4], [13], [14]) consider the placement of a minimum number of VNF instances to cover all flows. A single type of network functions is considered in [4], [13], [15], [16], and the case of multiple network functions is considered in [14], [17], [18], [19], [20]. However, these work neglects either the budget constraint or the multi-dimensional resource allocation.…”
Section: Related Workmentioning
confidence: 99%