Research Article

Virtual Network Embedding Based on Security Level with VNF Placement

Figure 2

Virtual network request and substrate network. (a) Virtual network request c-d. (b) Virtual network c-d is embedded by placing VNF Fj in node A.
(a)
(b)