2020
DOI: 10.1109/jiot.2019.2957961
|View full text |Cite
|
Sign up to set email alerts
|

Toward Optimal Hybrid Service Function Chain Embedding in Multiaccess Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 38 publications
0
19
0
Order By: Relevance
“…Subramanya et al [17] converted the SFC placement problem in an MEC-enabled 5G network into an ILP model, where machine learning methods were adopted for network traffic prediction. Zheng et al [18] studied a hybrid SFC embedding problem in the context of MEC and addressed it by a heuristic algorithm based on hybrid SFC embedding auxiliary graph. Yang et al [19] investigated the VNF placement and routing problem in edge clouds and proposed a randomized rounding approximation algorithm to minimize the maximum link load.…”
Section: Vnf Placement Optimizationmentioning
confidence: 99%
“…Subramanya et al [17] converted the SFC placement problem in an MEC-enabled 5G network into an ILP model, where machine learning methods were adopted for network traffic prediction. Zheng et al [18] studied a hybrid SFC embedding problem in the context of MEC and addressed it by a heuristic algorithm based on hybrid SFC embedding auxiliary graph. Yang et al [19] investigated the VNF placement and routing problem in edge clouds and proposed a randomized rounding approximation algorithm to minimize the maximum link load.…”
Section: Vnf Placement Optimizationmentioning
confidence: 99%
“…Constraints sets ( 5), and ( 6) guarantee that the trust requirements of each virtual link and each virtual node are satisfied, while constraints sets (7), and (8) guarantee that the allocated CPU and bandwidth resources do not exceed the residual capacity for each substrate node and link respectively. Constraints sets (9), and ( 10) are the domain constraints corresponding to variable sets x and f respectively. We note that removing constraints (5), and ( 6) from the last model gives the baseline PB-SCE model.…”
Section: A Path-based Modelmentioning
confidence: 99%
“…The literature on the SFC embedding problem is quite rich. Recently, applications of this problem have been explored in mobile edge and fog computing [9] [10] [11], Space-Air-Ground Integrated Networks (SAGIN) [12], 5G core network [13], multi-domain service provisioning [14] [15], cloud data centers [16], etc. Multiple objectives and design requirements are sought when addressing the SFC embedding problem including but not limited to cost minimization [19], resiliency [20], energy consumption minimization [21], privacy [17], security [18], and trust-awareness [1], etc.…”
Section: Related Workmentioning
confidence: 99%
“…At the hospital, some critical cases need intensive medical care with immediate blood transfer, sometimes the accidant nearest hospital don't own the blood types need, this condtion can lead to fatal consequences. Technologies such as short-range wireless communications, radio-frequency identification (RFID) and wireless sensor networks (WSN) have permitted the Internet to dive into embedded computing [8][9][10][11]. The internet of things (IoT) becomes a known communication paradigm that focuse connecting various kinds of devices to the Internet, in order to concatinate data acquired by remotely control, sensors, monitor environments, appliances and machines, buildings, and vehicles, and so on [12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%