2015
DOI: 10.1007/978-3-319-25258-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Online Admission Control and Embedding of Service Chains

Abstract: The virtualization and softwarization of modern computer networks enables the definition and fast deployment of novel network services called service chains: sequences of virtualized network functions (e.g., firewalls, caches, traffic optimizers) through which traffic is routed between source and destination. This paper attends to the problem of admitting and embedding a maximum number of service chains, i.e., a maximum number of source-destination pairs which are routed via a sequence of to-be-allocated, capa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 84 publications
(61 citation statements)
references
References 30 publications
0
61
0
Order By: Relevance
“…Therefore, the competitive-ratio of the admission mechanism for the multicast services is O(2 max{ϕ, φ}) = O(max{ϕ, φ}). Algorithm 2: JRP algorithm for a single service request for n k ∈ F k do 8 Add l ← (n k , n k+1 ) to L I ; 9 C l (r) = C(n k ); 10 end 11 end 12 For multicast services, find an MST-based Steiner tree from s 0 to D | V | , while utilizing the cost functions in (25) and (26), and save on P; 13 For unicast services, find a Dijkstra shortest path from s 0 to t | V | , while utilizing the cost functions in (25) and (26), and save on P; 14 return P; component of the runtime is due to the Dijkstra shortest path for unicast services and MST-based Steiner tree for multicast services that is run over the network transformation which has |N |(K + 1) nodes.…”
Section: A Auxiliary Network Transformation and Routing And Nf Placementioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the competitive-ratio of the admission mechanism for the multicast services is O(2 max{ϕ, φ}) = O(max{ϕ, φ}). Algorithm 2: JRP algorithm for a single service request for n k ∈ F k do 8 Add l ← (n k , n k+1 ) to L I ; 9 C l (r) = C(n k ); 10 end 11 end 12 For multicast services, find an MST-based Steiner tree from s 0 to D | V | , while utilizing the cost functions in (25) and (26), and save on P; 13 For unicast services, find a Dijkstra shortest path from s 0 to t | V | , while utilizing the cost functions in (25) and (26), and save on P; 14 return P; component of the runtime is due to the Dijkstra shortest path for unicast services and MST-based Steiner tree for multicast services that is run over the network transformation which has |N |(K + 1) nodes.…”
Section: A Auxiliary Network Transformation and Routing And Nf Placementioning
confidence: 99%
“…In the former, all service requests are known a priori, and all service requests are assumed to arrive in one batch. In practice, network services arrive in an online and random manner without knowledge of future requests [12], [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, a VNE based representation of the problem is proposed in [15], where the focus is on the online version of the VNF chaining problem: three greedy algorithms and a tabu-search based heuristic method are proposed to deal with the VNF online mapping and scheduling. The problem of embedding VNF chains is addressed also in [14], where demands may be rejected and the subset of accepted demands must be maximized while limiting the number of service chains considered. In [12], the authors propose an ILP model based on the mapping of VNF chains on a physical network, although without naming it explicitly.…”
Section: A Short Literature Reviewmentioning
confidence: 99%
“…However, with respect to our work no consideration is made on instance sharing explicitly. Beyond offline problems, Lukovszki and Schmid [30] propose deterministic online algorithms for deploying service chains.…”
Section: Related Workmentioning
confidence: 99%