2017
DOI: 10.1002/net.21782
|View full text |Cite
|
Sign up to set email alerts
|

Protection strategies for virtual network functions placement and service chains provisioning

Abstract: Telecom operators worldwide are witnessing squeezed profit margins mainly due to hyper‐competition. Hence, new business models/strategies are needed to help operators reduce Operational and Capital Expenditures. In this context, the Network Function Virtualization (NFV) paradigm, which consists of running Virtual Instances of Network Functions (NFs) in Commercial‐Off‐The‐Shelf (COTS) hardware, represents a solid alternative. Virtual Network Functions (VNFs) are then concatenated together in a sequential order … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…Every time this traffic profile changes (12 hours), a Mixed Integer Linear Programming (MILP) optimization procedure is rerun and the network is reconfigured. In [9] the authors developed algorithms for VNF placement and traffic routing with protection on a single node and link. They performed end-toend protection and compare the results with an unprotected case.…”
Section: Related Workmentioning
confidence: 99%
“…Every time this traffic profile changes (12 hours), a Mixed Integer Linear Programming (MILP) optimization procedure is rerun and the network is reconfigured. In [9] the authors developed algorithms for VNF placement and traffic routing with protection on a single node and link. They performed end-toend protection and compare the results with an unprotected case.…”
Section: Related Workmentioning
confidence: 99%
“…In a recent work, VNF chaining under path-level and linklevel protection strategies is studied in [28], with a particular emphasis on the network embedding, excluding the modeling of different VNF node protection strategies and of the VNF state synchronization link. In another recent work [29], the authors model the VM availability by means of a probabilistic approach and solve the placement problem over a set of servers by means of a nonlinear mathematical formulation and greedy heuristics.…”
Section: Related Workmentioning
confidence: 99%
“…In [30,31] the authors consider the placement of VNF service chains guaranteeing resiliency against both single-node and single-link failure. Three different protection schemes are proposed and compared by solving the corresponding ILPs.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of guaranteeing service continuity in Service Function Chain scenario has started to be investigated recently. Both restoration [9], [10] and protection [11], [12], [13] techniques have been investigated. In [9], the authors address VNF placement and chaining in the presence of physical link failures.…”
Section: Related Workmentioning
confidence: 99%