2019
DOI: 10.1109/access.2019.2944874
|View full text |Cite
|
Sign up to set email alerts
|

Cost Efficient and Low-Latency Network Service Chain Deployment Across Multiple Domains for SDN

Abstract: With the fast development of Internet, network traffic rapidly grows and the size of Internet scale gradually becomes bigger. It brings serious challenges to Network Service Chain (NSC) deployment across multiple domains which are managed by different network operators and service providers. It is difficult for each server in the multi-domain network to obtain a global topology view and available resource information of other domains. Meanwhile, there exist various operational strategies for different network … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…Service federation is an ingredient component of the 5G and beyond networks architecture [1], [2]. The problem of service federation is formulated as a Integer Linear Programming model in [12], which is extended in the subsequent works to consider energy efficiency [13], [14] and network services latency [15]. From the implementation point of view, service federation was studied in [16] and [17].…”
Section: Related Workmentioning
confidence: 99%
“…Service federation is an ingredient component of the 5G and beyond networks architecture [1], [2]. The problem of service federation is formulated as a Integer Linear Programming model in [12], which is extended in the subsequent works to consider energy efficiency [13], [14] and network services latency [15]. From the implementation point of view, service federation was studied in [16] and [17].…”
Section: Related Workmentioning
confidence: 99%
“…Such vulnerabilities lead to weakening the network's security and allowing the attackers to execute several security attacks. http://journals.cihanuniversity.edu.iq/index.php/cuesj CUESJ 2021, 5 (1): [20][21][22][23][24][25][26][27] There are also instances in which the attackers create their controllers as per their set of policies and protocols and trick the network elements through the same. The network elements trust the fake controller as the original and various attacks are executed.…”
Section: Attacks At Controller Layermentioning
confidence: 99%
“…Therefore, it must manage access to the SDN using several administrative and technical security controls. [20] The administrative controls shall include enhanced security policies and protocols to control the access. In contrast, the technical controls shall include the use of technically advanced mechanisms such as multistep authentication, single sign-on, and likewise for the control of access.…”
Section: Access Managementmentioning
confidence: 99%
“…From the theoretical point of view, the problem is formulated as optimization models, and due to the complexity of the problem, heuristic algorithms are proposed to find sub-optimal solutions in [5], [20], [21]. These preliminary works were extended later to consider more complex objective functions, e.g., energy efficiency [22], [23], and network service latency [24]. To tackle the complexity of the problem, a topology aggregation technique [25] and a deep learning-based solution [26] were also proposed recently.…”
Section: Related Workmentioning
confidence: 99%