“…[46]) as ratio between the number of adopted CPU cores and of flows supported by the middlebox. Even though this is just a possible and rough estimation for the processing requirement (see [47] for a different strategy based on CPU cycles/s), it allows to TABLE VI PERFORMANCE COMPARISON BETWEEN ILP AND HCA |C| = 3, N user = 300, N iter = 100 |C| = 6, N user = 150, N iter = 100 |C| = 8, N user = 450, N iter = 10 Latency Costs [15] HCA ILP HCA ILP HCA ILP Average number of active NFV nodes ω = 0 ms, κ = 0 ms 2.91 ± 0.057 2.91 ± 0.057 2.95 ± 0.043 2.95 ± 0.043 6.00 ± 0.000 6.00 ± 0.000 ω = 0 ms, κ = 1.75 ms 2.95 ± 0, 052 2.93 ± 0.058 2.99 ± 0.034 2.97 ± 0.034 6.11 ± 0.260 6.00 ± 0.000 ω = 0.4 ms, κ = 0 ms 3.09 ± 0.090 3.07 ± 0.086 3.00 ± 0.028 2.99 ± 0.020 7.86 ± 0.640 6.45 ± 0.410 Results are reported along with 95% confidence intervals understand which are the most processing-hungry VNFs: for example, according to our estimation, a Traffic Monitor is about 15 times more processing-hungry than a Firewall. The six VNFs can be chained in different ways to provide four heterogeneous SFCs, reported in Table V.…”