2020
DOI: 10.1109/jiot.2020.2991753
|View full text |Cite
|
Sign up to set email alerts
|

On Dynamic Service Function Chain Reconfiguration in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 29 publications
0
18
0
Order By: Relevance
“…The simulation results show that the proposed LARA algorithm has better performance in end-to-end delay and reliability assurance. We are still exploring how to combine our proposed LARA algorithm with some machine-learningbased approaches (e.g., GNN [28,29], MLP [30]), which can forecast the future trends of link/node load and traffic variations ahead of time, and thus improve the efficacy of the SSC resource allocation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…The simulation results show that the proposed LARA algorithm has better performance in end-to-end delay and reliability assurance. We are still exploring how to combine our proposed LARA algorithm with some machine-learningbased approaches (e.g., GNN [28,29], MLP [30]), which can forecast the future trends of link/node load and traffic variations ahead of time, and thus improve the efficacy of the SSC resource allocation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…Firstly, the proposed PSO algorithm mainly depends on the online information of substrate resource utilization and security service demands, which still remains no guarantee that the results obtained by the proposed PSO algorithm are the most accurate in the dynamics. We are still exploring how to combine our proposed PSO algorithm with some machinelearning-based approaches (e.g., GNN [7], MLP [47,48], LSTM [49]), which can forecast the future trends of link/node load and traffic variations ahead of time, and thus improve the efficacy of the SSC resource allocation algorithm. Second, we have conducted evaluations on the simulators.…”
Section: Discussionmentioning
confidence: 99%
“…Driven by the diversity of heterogeneous network security services, the network framework design has been transiting from the monolithic pattern to the softwaried paradigm, which is mainly supported by the network function virtualization (NFV) and software-defined network (SDN) technologies [6][7][8][9]. These technologies present themselves as revolution pivotal network architectural design concepts that leverage the virtualization and cloud infrastructure elasticity for the purpose of supporting this quantum leap of the existing packet core which, in turn, leads to the remarkable improvement of provisioned security network services.…”
Section: Introductionmentioning
confidence: 99%
“…The graph neural network was first applied to the SDN /NFV field by the author of [16], who constructed a supervised learning method for service function chain traffic prediction using GNN. The author of [17] also used GNN to predict the resource demand of NFV, which approximated the performance of integer linear programming model in polynomial time and improved the reconfiguration overhead and resource utilization of service provision, respectively. The author of [18] used the graph neural network to predict various network performance indexes under a given routing strategy in the SDN network and achieved good results.…”
Section: Related Workmentioning
confidence: 99%