21,398 research outputs found
Hardware-accelerator aware VNF-chain recovery
Hardware-accelerators in Network Function Virtualization (NFV) environments have aided telecommunications companies (telcos) to reduce their expenditures by offloading compute-intensive VNFs to hardware-accelerators. To fully utilize the benefits of hardware-accelerators, VNF-chain recovery models need to be adapted. In this paper, we present an ILP model for optimizing prioritized recovery of VNF-chains in heterogeneous NFV environments following node failures. We also propose an accelerator-aware heuristic for solving prioritized VNF-chain recovery problems of large-size in a reasonable time. Evaluation results show that the performance of heuristic matches with that of ILP in regard to restoration of high and medium priority VNF-chains and a small penalty occurs only for low-priority VNF-chains
Container network functions: bringing NFV to the network edge
In order to cope with the increasing network utilization driven by new mobile clients, and to satisfy demand for new network services and performance guarantees, telecommunication service providers are exploiting virtualization over their network by implementing network services in virtual machines, decoupled from legacy hardware accelerated appliances. This effort, known as NFV, reduces OPEX and provides new business opportunities. At the same time, next generation mobile, enterprise, and IoT networks are introducing the concept of computing capabilities being pushed at the network edge, in close proximity of the users. However, the heavy footprint of today's NFV platforms prevents them from operating at the network edge. In this article, we identify the opportunities of virtualization at the network edge and present Glasgow Network Functions (GNF), a container-based NFV platform that runs and orchestrates lightweight container VNFs, saving core network utilization and providing lower latency. Finally, we demonstrate three useful examples of the platform: IoT DDoS remediation, on-demand troubleshooting for telco networks, and supporting roaming of network functions
On environments as systemic exoskeletons: Crosscutting optimizers and antifragility enablers
Classic approaches to General Systems Theory often adopt an individual
perspective and a limited number of systemic classes. As a result, those
classes include a wide number and variety of systems that result equivalent to
each other. This paper introduces a different approach: First, systems
belonging to a same class are further differentiated according to five major
general characteristics. This introduces a "horizontal dimension" to system
classification. A second component of our approach considers systems as nested
compositional hierarchies of other sub-systems. The resulting "vertical
dimension" further specializes the systemic classes and makes it easier to
assess similarities and differences regarding properties such as resilience,
performance, and quality-of-experience. Our approach is exemplified by
considering a telemonitoring system designed in the framework of Flemish
project "Little Sister". We show how our approach makes it possible to design
intelligent environments able to closely follow a system's horizontal and
vertical organization and to artificially augment its features by serving as
crosscutting optimizers and as enablers of antifragile behaviors.Comment: Accepted for publication in the Journal of Reliable Intelligent
Environments. Extends conference papers [10,12,15]. The final publication is
available at Springer via http://dx.doi.org/10.1007/s40860-015-0006-
Recommended from our members
Aggregation and the Role of Trusted Third Parties in SME E-Business Engagement: A Regional Policy Issue
YesIt is against the background of low engagement by SMEs in e-business that this paper seeks to highlight the potential importance of aggregation and of the role of trusted third parties in facilitating higher levels of involvement. The paper is based on an ongoing SME e-business research programme and reports on some recent research on SMEs that were using high complexity e-business applications and explores the extent to which the research findings could address the core concern of low engagement. This qualitative case study based research includes analysis of data collected from 13 community intermediaries, acting as trusted third parties. It concludes that the role of community intermediaries appears to be central to the adoption of critical e-aggregation applications provided by service providers. For policymakers, this important role of critical e-aggregation applications in facilitating e-business engagement by SMEs has emerged as part of this research but there is limited evidence of policy initiatives that reflect this
Sustainability Analysis under Disruption Risks
Resilience to disruptions and sustainability are both of paramount importance to supply chains. This paper presents a hybrid methodology for the design of a sustainable supply network that performs resiliently in the face of random disruptions. A stochastic bi-objective optimization model is developed that utilizes a fuzzy c-means clustering method to quantify and assess the sustainability performance of the suppliers. The proposed model determines outsourcing decisions and buttressing strategies that minimize the expected total cost and maximize the overall sustainability performance in disruptions. Important managerial insights and practical implications are obtained from the model implementation in a case study of plastic pipe industry
Supplier selection under disaster uncertainty with joint procurement
Master of ScienceDepartment of Industrial & Manufacturing Systems EngineeringJessica L. Heier StammHealth care organizations must have enough supplies and equipment on hand to adequately respond to events such as terrorist attacks, infectious disease outbreaks, and natural disasters. This is achieved through a robust supply chain system. Nationwide, states are assessing their current supply chains to identify gaps that may present issues during disaster preparedness and response. During an assessment of the Kansas health care supply chain, a number of vulnerabilities were identified, one of which being supplier consolidation. Through mergers and acquisitions, the number of suppliers within the health care field has been decreasing over the years. This can pose problems during disaster response when there is a surge in demand and multiple organizations are relying on the same suppliers to provide equipment and supplies. This thesis explores the potential for joint procurement agreements to encourage supplier diversity by splitting purchasing among multiple suppliers. In joint procurement, two or more customers combine their purchases into one large order so that they can receive quantity discounts from a supplier.
This research makes three important contributions to supplier selection under disaster uncertainty. The first of these is the development of a scenario-based supplier selection model under uncertainty with joint procurement. This optimization model can be used to observe customer purchasing decisions in various scenarios while considering the probability of disaster occurrence. Second, the model is applied to a set of experiments to analyze the results when supplier diversity is increased and when joint procurement is introduced. This leads to the third and final contribution: a set of recommendations for health care organization decision makers regarding ways to increase supplier diversity and decrease the risk of disruption associated with disaster occurrence
- …