Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 1 von 66

Details

Autor(en) / Beteiligte
Titel
Online VNF Lifecycle Management in an MEC-Enabled 5G IoT Architecture
Ist Teil von
  • IEEE internet of things journal, 2020-05, Vol.7 (5), p.4183-4194
Ort / Verlag
Piscataway: IEEE
Erscheinungsjahr
2020
Quelle
IEEE Electronic Library (IEL)
Beschreibungen/Notizen
  • The upcoming fifth generation (5G) mobile communications urge software-defined networks (SDNs) and network function virtualization (NFV) to join forces with the multiaccess edge computing (MEC) cause. Thus, reduced latency and increased capacity at the edge of the network can be achieved, to satisfy the requirements of the Internet of Things (IoT) ecosystem. If not properly orchestrated, the flexibility of the virtual network functions (VNFs) incorporation, in terms of deployment and lifecycle management, may cause serious issues in the NFV scheme. As the service level agreements (SLAs) of the 5G applications compete in an environment with traffic variations and VNF placement options with diverse computing or networking resources, an online placement approach is needed. In this article, we discuss the VNF lifecycle management challenges that arise from such heterogeneous architecture, in terms of VNF onboarding and scheduling. In particular, we enhance the intelligence of the NFV orchestrator (NFVO) by providing: 1) a latency-based embedding mechanism, where the VNFs are initially allocated to the appropriate tier and 2) an online scheduling algorithm, where the VNFs are instantiated, scaled, migrated, and destroyed based on the actual traffic. Finally, we design and implement an MEC-enabled 5G platform to evaluate our proposed mechanisms in real-life scenarios. The experimental results demonstrate that our proposed scheme maximizes the number of served users in the system by taking advantage of the online allocation of edge and core resources, without violating the application SLAs.

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX