2015
DOI: 10.1109/jlt.2015.2388585
|View full text |Cite
|
Sign up to set email alerts
|

Network Function Placement for NFV Chaining in Packet/Optical Datacenters

Abstract: In an operator's datacenter, optical technologies can be employed to perform network function (NF) chaining for larger aggregated flows in parallel with the conventional packet-based fine-grained traffic steering schemes. When network function virtualization (NFV) is enabled, virtualized NFs (vNF) can be placed when and where needed. In this study, we identify the possibility of minimizing the expensive optical/electronic/optical (O/E/O) conversions for NFV chaining in packet/optical datacenters, which is intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 179 publications
(57 citation statements)
references
References 10 publications
0
55
0
Order By: Relevance
“…Luizellie et al formalize the NF placement and chaining problem and propose an ILP model to solve it [24]. Xia et al propose a Binary Integer Programming (BIP) model for optimal VNF placement subject to minimizing the expensive optical/electronic/optical conversions for NFV chaining in packet/optical data centers [25]. Sahhaf et al…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Luizellie et al formalize the NF placement and chaining problem and propose an ILP model to solve it [24]. Xia et al propose a Binary Integer Programming (BIP) model for optimal VNF placement subject to minimizing the expensive optical/electronic/optical conversions for NFV chaining in packet/optical data centers [25]. Sahhaf et al…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Equation (23 prevents the internal embedding of the virtual edge (v, w) at that location. Equation (25) stipulates that two virtual edges need to be mapped onto the same virtual path. Equation (24) ensures that the corresponding endpoints of the virtual edge are mapped onto the same host.…”
Section: E Affinity and Anti-affinity Constraintsmentioning
confidence: 99%
“…A comprehensive survey [57] reviews papers on resource allocation. For example, Xia et al [58] focused on a service chaining problem in an electrical/optical hybrid data center. They propose a heuristic algorithm for on-demand VNF placement that minimizes the number of optical/electrical/optical (O/E/O) conversions.…”
Section: Management and Network Orchestration (Mano)mentioning
confidence: 99%
“…This calls for heuristics such as those proposed in [163], [164], [165], [132]. For example, Xia et.…”
Section: Resource Allocationmentioning
confidence: 99%
“…For example, Xia et. al [163] formulate the placement and chaining problem as binary integer programming (BIP), and propose a greedy heuristic to improve computational efficiency. The proposed greedy algorithm first sorts VNFs according their resource demand, and thereafter, VNFs with the highest resource demands are given priority for placement and chaining.…”
Section: Resource Allocationmentioning
confidence: 99%