2015 11th International Conference on the Design of Reliable Communication Networks (DRCN) 2015
DOI: 10.1109/drcn.2015.7148978
|View full text |Cite
|
Sign up to set email alerts
|

Virtual network embedding under uncertainty: Exact and heuristic approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 9 publications
1
12
0
Order By: Relevance
“…Many papers have addressed the problem of slice/SFC resource allocation with uncertain or time-varying requirements and available physical resources, see, e.g., [9,10,[25][26][27][28]. Conservative strategies allocating resources considering worstcase peak traffic conditions [9,10] are costly and usually lead to an inefficient utilization of resources.…”
Section: Related Workmentioning
confidence: 99%
“…Many papers have addressed the problem of slice/SFC resource allocation with uncertain or time-varying requirements and available physical resources, see, e.g., [9,10,[25][26][27][28]. Conservative strategies allocating resources considering worstcase peak traffic conditions [9,10] are costly and usually lead to an inefficient utilization of resources.…”
Section: Related Workmentioning
confidence: 99%
“…An original robust cutting-plane algorithm is proposed in [29] to address the uncertain nature of the jamming problem in wireless networks. A robust optimization approach for the VNE problem is investigated in [30], which is based on a robust MILP formulation using the Γ−robustness model. They also propose a MILPbased two-phase heuristic but do not consider latency constraints or compute demands of the VNFs.…”
Section: Related Workmentioning
confidence: 99%
“…That path is given by the sum of the delays on each link composing the considered path (29). For each service chain c we need to ensure that the sum of the delays suffered by each demand, belonging to c, on each used possible path is not greater than the maximum tolerable one, lat c (30). Finally, the constraints (31) and (32) assure that a switch is active if and only if at least one of its ports is active, otherwise it is considered as idle.…”
Section: Latency Constrained Flow Routingmentioning
confidence: 99%
“…Nevertheless, this infrastructure resource overbooking is costly and most of the time unnecessary, as all individual slice resource demands are very unlikely peaking simultaneously. In [12], the virtual network embedding problem is solved considering uncertain traffic demands. An MILP formulation is considered, where some of the constraints are required to be satisfied with high probability.…”
Section: Introductionmentioning
confidence: 99%