2019
DOI: 10.3390/electronics8101106
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Source Reliable Multicast Routing with QoS Constraints of NFV in Edge Computing

Abstract: Edge Computing (EC) allows processing to take place near the user, hence ensuring scalability and low latency. Network Function Virtualization (NFV) provides the significant convenience of network layout and reduces the service operation cost in EC and data center. Nowadays, the interests of the NFV layout focus on one-to-one communication, which is costly when applied to multicast or group services directly. Furthermore, many artificial intelligence applications and services of cloud and EC are generally comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…Recently, many studies focus on multicast mechanisms in SDN [9,20] and NFV-enabled multicasting [10,21]. For instance, Chiang et al [9] proposed a dynamic group management approach, Online Branch-aware Steiner Tree (OBST).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, many studies focus on multicast mechanisms in SDN [9,20] and NFV-enabled multicasting [10,21]. For instance, Chiang et al [9] proposed a dynamic group management approach, Online Branch-aware Steiner Tree (OBST).…”
Section: Related Workmentioning
confidence: 99%
“…Alhussein et al [21] presented a multicast service orchestration framework to deal with joint routing and VNF placement problem, while maximizing the throughput of the physical substrate and minimizing the provisioning cost. He et al [10] took into account QoS constraints to build a reliable multicast tree with recovery nodes and passing a service chain. e overhead could be large for data recovery using response messages if the network is unstable.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The number of VNFs contained in an SFC request obeys the uniform distribution of [2], [4], and the types of VNFs are different. The computing resource demands of VNFs obey the uniform distribution of [7], [10], and the bandwidth demands of SFCs obey the uniform distribution of [5], [8]. The maximum allowable transmission delay of SFC obeys the uniform distribution of [6], [8].…”
Section: A Simulation Environmentmentioning
confidence: 99%
“…Therefore, logs are one of the most valuable data sources for device management, root cause analysis, and IoT solutions updating. Log analysis plays an important role in IoT system management to ensure the reliability of IoT services [12]. Log anomaly detection is a part of log analysis that analyzes the log messages to detect the anomalous state caused by sensor hardware failure, energy exhaustion, or the environment [13].…”
Section: Introductionmentioning
confidence: 99%