Openflow-Extended Queue Scheduling for Multi-tenants in Access Network

  • Ting Wang*
  • , Gang Liu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Network slicing is a mechanism that could be used by operators to support multiple virtual networks over underlying hardware infrastructure. Typically, it could leverage Network Function Virtualization (NFV) technology to share the computing/storage resources in data center scenarios, for example, creating multiple VM (virtual machine) instances for different network functions or network tenants. Through different VM instances, most of computing-intensive core network applications (e.g. vEPC, vIMS) could be supported. In order to achieve this goal, in this paper we propose a novel Openflow-extended queue scheduling scheme for multi-tenants in the access network.

Original languageEnglish
Title of host publicationEdge Computing and IoT
Subtitle of host publicationSystems, Management and Security - Second EAI International Conference, ICECI 2021, Proceedings
EditorsKaishun Wu, Lu Wang, Yanjiao Chen
PublisherSpringer Science and Business Media Deutschland GmbH
Pages61-73
Number of pages13
ISBN (Print)9783031042300
DOIs
StatePublished - 2022
Event2nd EAI International Conference on Edge Computing and IoT: Systems, Management and Security, ICECI 2021 - Virtual, Online
Duration: 22 Dec 202123 Dec 2021

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume437 LNICST
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference2nd EAI International Conference on Edge Computing and IoT: Systems, Management and Security, ICECI 2021
CityVirtual, Online
Period22/12/2123/12/21

Keywords

  • Network function virtualization
  • Network slicing
  • Queue scheduling

Fingerprint

Dive into the research topics of 'Openflow-Extended Queue Scheduling for Multi-tenants in Access Network'. Together they form a unique fingerprint.

Cite this