skip to main content
research-article

An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing

Authors Info & Claims
Published:15 October 2020Publication History
Skip Abstract Section

Abstract

Mobile Edge Computing (MEC) is a promising network architecture that pushes network control and mobile computing to the network edge. Recent studies propose to deploy MEC applications in the Network Function Virtualization (NFV) environment. The mobile network service in NFV is deployed as a Service Function Chaining (SFC). In the dynamic and resource-limited mobile network, SFC placement aiming at optimizing resource utilization is a challenging problem. In this article, we solve the SFC placement problem in the MEC-NFV environment. We formulate the SFC placement problem as a weighted graph matching problem, including two sub-problems: a graph matching problem and an SFC mapping problem. To efficiently solve the graph matching problem, we propose a Linear Programming–(LP) based approach to calculate the similarity between VNFs and physical nodes. Based on the similarity, we design a Hungarian-based algorithm to solve the SFC mapping problem. Evaluation results show that our proposed LP-based solutions outperform the heuristic algorithms in terms of execution time and resource utilization.

References

  1. ETSI GS NFV 003. 2014. Network Functions Virtualisation (NFV): Terminology for Main Concepts in NFV. Retrieved from https://www.etsi.org/deliver/etsi_gs/nfv/001_099/003/01.02.01_60/gs_nfv003v010201p.pdf.Google ScholarGoogle Scholar
  2. Mohammad Al-Fares, Alexander Loukissas, and Amin Vahdat. 2008. A scalable, commodity data center network architecture. In Proceedings of the ACM Special Interest Group on Data Communication Conference (SIGCOMM’08).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. A. Almohamad and Salih O. Duffuaa. 1993. A linear programming approach for the weighted graph matching problem. IEEE Trans. Pattern Anal. Mach. Intell. 15 (1993), 522--525.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Monarch Network Architects. 2012. Sample Optical Network Topology Files. Retrieved from http://www.monarchna.com/.Google ScholarGoogle Scholar
  5. Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. 2015. On orchestrating virtual network functions. In Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM’15), 50--56.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, and Otto Carlos Muniz Bandeira Duarte. 2016. Orchestrating virtualized network functions. IEEE Trans. Netw. Serv. Manage. 13 (2016), 725--739.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Michael Till Beck and Juan Felipe Botero. 2017. Scalable and coordinated allocation of service function chains. Comput. Commun. 102 (2017), 78--88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ilias Benkacem, Tarik Taleb, Miloud Bagaa, and Hannu Flinck. 2018. Optimal VNFs placement in CDN slicing over multi-cloud environment. IEEE J. Select. Areas Commun. 36 (2018), 616--627.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yishan Chen, Shuiguang Deng, Hongtao Ma, and Jianwei Yin. 2020. Deploying data-intensive applications with multiple services components on edge. Mobile Netw. Appl. 25 (2020), 426--441.Google ScholarGoogle ScholarCross RefCross Ref
  10. Zhiqi Chen, Sheng Zhang, Can Wang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, and Imad Jawhar. 2018. A novel algorithm for NFV chain placement in edge computing environments. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM’18), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  11. Margaret Chiosi, Steve Wright, Javan Erfanian, and Brian Smith. SDN and OpenFlow World Congress. 2012. Network Functions Virtualisation (NFV). Retrieved from http://portal.etsi.org/NFV/NFV_White_Paper.pdf.Google ScholarGoogle Scholar
  12. The Internet2 community. 2012. Internet2 research network. Retrieved from https://www.internet2.edu/.Google ScholarGoogle Scholar
  13. Richard Cziva, Christos Anagnostopoulos, and Dimitrios P. Pezaros. 2018. Dynamic, latency-optimal vNF placement at the network edge. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’18), 693--701.Google ScholarGoogle Scholar
  14. Shuiguang Deng, Zhengzhe Xiang, Javid Taheri, Khoshkholghi Ali Mohammad, Jianwei Yin, Albert Zomaya, and Schahram Dustdar. 2020. Optimal application deployment in resource constrained distributed edges. IEEE Trans. Mobile Comput. Early Access (2020), 1--1.Google ScholarGoogle Scholar
  15. Shuiguang Deng, Zhengzhe Xiang, Peng Zhao, Javid Taheri, Honghao Gao, Jianwei Yin, and Albert Y. Zomaya. 2020. Dynamical resource allocation in edge for trustable IoT systems: A reinforcement learning method. IEEE Trans. Industr. Inf. 16 (2020), 6103--6113.Google ScholarGoogle ScholarCross RefCross Ref
  16. Juliver Gil-Herrera and Juan Felipe Botero. 2016. Resource allocation in NFV: A comprehensive survey. IEEE Trans. Netw. Serv. Manage. 13 (2016), 518--532.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yan Guo, Shangguang Wang, Ao Zhou, Jinliang Xu, Jie Yuan, and Ching-Hsien Hsu. 2020. User allocation-aware edge cloud placement in mobile edge computing. Software: Practice and Experience 50 (2020), 489--502.Google ScholarGoogle ScholarCross RefCross Ref
  18. Yun Chao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. Mobile Edge Computing: A Key Technology Towards 5G. Retrieved from https://www.etsi.org/images/files/etsiwhitepapers/etsi_wp11_mec_a_key_technology_towards_5g.pdf.Google ScholarGoogle Scholar
  19. Fatma Ben Jemaa, Guy Pujolle, and Michel Pariente. 2016. QoS-aware VNF placement optimization in edge-central carrier cloud architecture. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM’16), 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  20. Jian Kong, Inwoong Kim, Xi Wang, Qiong Zhang, Hakki C. Cankaya, Weisheng Xie, Tadashi Ikeuchi, and Jason P. Jue. 2017. Guaranteed-availability network function virtualization with network protection and VNF replication. In Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM’17), 1--6.Google ScholarGoogle Scholar
  21. Abdelquoddouss Laghrissi, Tarik Taleb, Miloud Bagaa, and Hannu Flinck. 2017. Towards edge slicing: VNF placement algorithms for a dynamic and realistic edge cloud environment. In Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM’17), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  22. Yuanzhe Li and Shangguang Wang. 2018. An energy-aware edge server placement algorithm in mobile edge computing. In Proceedings of the 2018 IEEE International Conference on Edge Computing (EDGE’18), 66--73.Google ScholarGoogle ScholarCross RefCross Ref
  23. Redowan Mahmud, Kotagiri Ramamohanarao, and Rajkumar Buyya. 2018. Latency-aware application module management for fog computing environments. ACM Trans. Internet Technol. 19 (2018), 9:1--9:21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled Ben Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 19 (2017), 2322--2358.Google ScholarGoogle ScholarCross RefCross Ref
  25. João G. Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Andrei Olteanu, Michio Honda, Roberto Bifulco, and Felipe Huici. 2014. ClickOS and the art of network function virtualization. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI’14).Google ScholarGoogle Scholar
  26. Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. 2016. Network function virtualization: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18 (2016), 236--262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, and Tarik Taleb. 2018. Survey on multi-access edge computing for internet of things realization. IEEE Commun. Surv. Tutor. 20 (2018), 2961--2991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Gamal Sallam and Bo Ji. 2019. Joint placement and allocation of virtual network functions with budget and capacity constraints. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’19) (2019), 523--531.Google ScholarGoogle ScholarCross RefCross Ref
  29. S. Song, C. Lee, H. Cho, G. Lim, and J. Chung. 2019. Clustered virtualized network functions resource allocation based on context-aware grouping in 5G edge networks. IEEE Trans. Mobile Comput. 19 (2019), 1072--1083.Google ScholarGoogle ScholarCross RefCross Ref
  30. University of Southern California2001. Retrieved from GT-ITM topology generator, https://www.isi.edu/nsnam/ns/ns-topogen.html.Google ScholarGoogle Scholar
  31. University of Southern California. 2001. The Network Simulator—ns-2. Retrieved from https://www.isi.edu/nsnam/ns/.Google ScholarGoogle Scholar
  32. Shangguang Wang, Yan Guo, Ning Zhang, Peng Yang, Ao Zhou, and Xuemin Sherman Shen. 2019. Delay-aware microservice coordination in mobile edge computing: A reinforcement learning approach. IEEE Trans. Mobile Comput. Early Access (2019), 1--1.Google ScholarGoogle Scholar
  33. Shangguang Wang, Yali Zhao, Lin Huang, Jinliang Xu, and Ching-Hsien Hsu. 2019. QoS prediction for service recommendations in mobile edge computing. J. Parallel Distrib. Comput. 127 (2019), 134--144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Shangguang Wang, Yali Zhao, Jinlinag Xu, Jie Yuan, and Ching-Hsien Hsu. 2019. Edge server placement in mobile edge computing. J. Parallel Distrib. Comput. 127 (2019), 160--168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Zhengzhe Xiang, Shuiguang Deng, Javid Taheri, and Albert Zomaya. 2020. Dynamical service deployment and replacement in resource-constrained edges. Mobile Netw. Appl. 25 (2020), 674--689.Google ScholarGoogle ScholarCross RefCross Ref
  36. Jinliang Xu, Shangguang Wang, Bharat K. Bhargava, and Fangchun Yang. 2019. A blockchain-enabled trustless crowd-intelligence ecosystem on mobile edge computing. IEEE Trans. Industr. Inf. 15 (2019), 3538--3547.Google ScholarGoogle ScholarCross RefCross Ref
  37. Louiza Yala, Pantelis A. Frangoudis, and Adlen Ksentini. 2018. Latency and availability driven VNF placement in a MEC-NFV environment. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM’18), 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  38. Qiang Ye, Weihua Zhuang, Xu Li, and Jaya Rao. 2019. End-to-end delay modeling for embedded VNF chains in 5G core networks. IEEE IoT J. 6 (2019), 692--704.Google ScholarGoogle Scholar
  39. Zilong Ye, Xiaojun Cao, Jianping Wang, Hong-Fang Yu, and Chunming Qiao. 2016. Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization. IEEE Netw. 30 (2016), 81--87.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Cheng Zhang, Hailiang Zhao, and Shuiguang Deng. 2018. A density-based offloading strategy for IoT devices in edge computing systems. IEEE Access 6 (2018), 73520--73530.Google ScholarGoogle ScholarCross RefCross Ref
  41. Zhilong Zheng, Jianzhao Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, and Jianping Wu. 2019. Octans: Optimal placement of service function chains in many-core systems. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’19) (2019), 307--315.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!