2021
DOI: 10.1017/s1471068421000016
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic QoS-aware Placement of VNF Chains at the Edge

Abstract: Deploying Internet of Things (IoT)-enabled virtual network function (VNF) chains to Cloud-Edge infrastructures requires determining a placement for each VNF that satisfies all set deployment requirements as well as a software-defined routing of traffic flows between consecutive functions that meets all set communication requirements. In this article, we present a declarative solution, EdgeUsher, to the problem of how to best place VNF chains to Cloud-Edge infrastructures. EdgeUsher can determine all eligible p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…Similarly to us, declarative techniques have been employed to resolve different Cloudrelated problems. There are proposals to manage Cloud resources (e.g., [43]), to improve network usage (e.g., [44]), to assess the security and trust levels of different application placements (e.g., [45]) and to securely place VNF chains and steer traffic across them (e.g., [46]).…”
Section: Declarative Approachesmentioning
confidence: 99%
“…Similarly to us, declarative techniques have been employed to resolve different Cloudrelated problems. There are proposals to manage Cloud resources (e.g., [43]), to improve network usage (e.g., [44]), to assess the security and trust levels of different application placements (e.g., [45]) and to securely place VNF chains and steer traffic across them (e.g., [46]).…”
Section: Declarative Approachesmentioning
confidence: 99%
“…[39]) or to express and document management policies in centralised systems [40]. Only recently, few works exploited logic programming to incrementally determine eligible application placements in Fog scenarios [9], to place VNF chains and steer traffic across them [41], and to enable the assessment of the security and trust levels of different placements by means of algebraic structures [42]. From a different perspective, [43] employed a declarative approach to describe application requirements based on OpenTOSCA and to automatically deploy applications on different platforms.…”
Section: Related Workmentioning
confidence: 99%
“…Herden et al 50 ). More recently, declarative programming was fruitfully exploited to incrementally determine eligible application placements in Fog scenarios, 13 to place VNF chains and steer traffic across them, 51 and to enable the assessment of the security and trust levels of different placements 52 . From a different perspective, Harzenetter et al 53 employed a declarative approach to describe application requirements based on OpenTOSCA and to automatically deploy applications on different platforms.…”
Section: Related Workmentioning
confidence: 99%