Enabling Multicast Slices in Edge Networks
Telecommunication networks are undergoing a disruptive transition toward distributed mobile edge networks with virtualized network functions (VNFs) [e.g., firewalls, intrusion detection systems (IDSs), and transcoders] within the proximity of users. This transition will enable network services, espe...
Uloženo v:
| Vydáno v: | IEEE internet of things journal Ročník 7; číslo 9; s. 8485 - 8501 |
|---|---|
| Hlavní autoři: | , , , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 2327-4662, 2327-4662 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Telecommunication networks are undergoing a disruptive transition toward distributed mobile edge networks with virtualized network functions (VNFs) [e.g., firewalls, intrusion detection systems (IDSs), and transcoders] within the proximity of users. This transition will enable network services, especially Internet-of-Things (IoT) applications, to be provisioned as network slices with sequences of VNFs, in order to guarantee the performance and security of their continuous data and control flows. In this article, we study the problems of delay-aware network slicing for multicasting traffic of IoT applications in edge networks. We first propose exact solutions by formulating the problems into integer linear programs (ILPs). We further devise an approximation algorithm with an approximation ratio for the problem of delay-aware network slicing for a single multicast slice, with the objective to minimize the implementation cost of the network slice subject to its delay requirement constraint. Given multiple multicast slicing requests, we also propose an efficient heuristic that admits as many user requests as possible, through exploring the impact of a nontrivial interplay of the total computing resource demand and delay requirements. We then investigate the problem of delay-oriented network slicing with given levels of delay guarantees, considering that different types of IoT applications have different levels of delay requirements, for which we propose an efficient heuristic based on reinforcement learning (RL). We finally evaluate the performance of the proposed algorithms through both simulations and implementations in a real testbed. The experimental results demonstrate that the proposed algorithms are promising. |
|---|---|
| AbstractList | Telecommunication networks are undergoing a disruptive transition toward distributed mobile edge networks with virtualized network functions (VNFs) [e.g., firewalls, intrusion detection systems (IDSs), and transcoders] within the proximity of users. This transition will enable network services, especially Internet-of-Things (IoT) applications, to be provisioned as network slices with sequences of VNFs, in order to guarantee the performance and security of their continuous data and control flows. In this article, we study the problems of delay-aware network slicing for multicasting traffic of IoT applications in edge networks. We first propose exact solutions by formulating the problems into integer linear programs (ILPs). We further devise an approximation algorithm with an approximation ratio for the problem of delay-aware network slicing for a single multicast slice, with the objective to minimize the implementation cost of the network slice subject to its delay requirement constraint. Given multiple multicast slicing requests, we also propose an efficient heuristic that admits as many user requests as possible, through exploring the impact of a nontrivial interplay of the total computing resource demand and delay requirements. We then investigate the problem of delay-oriented network slicing with given levels of delay guarantees, considering that different types of IoT applications have different levels of delay requirements, for which we propose an efficient heuristic based on reinforcement learning (RL). We finally evaluate the performance of the proposed algorithms through both simulations and implementations in a real testbed. The experimental results demonstrate that the proposed algorithms are promising. |
| Author | Galis, Alex Qin, Yugen Xu, Zichuan Ren, Jiankang Wu, Guowei Xia, Qiufen Zhou, Pan Rana, Omer F. |
| Author_xml | – sequence: 1 givenname: Yugen surname: Qin fullname: Qin, Yugen email: qyg@mail.dlut.edu.cn organization: School of Software, Dalian University of Technology, Dalian, China – sequence: 2 givenname: Qiufen orcidid: 0000-0001-7978-4933 surname: Xia fullname: Xia, Qiufen email: qiufenxia@dlut.edu.cn organization: International School of Information Science and Engineering and Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China – sequence: 3 givenname: Zichuan orcidid: 0000-0001-5438-1468 surname: Xu fullname: Xu, Zichuan email: z.xu@dlut.edu.cn organization: School of Software, Dalian University of Technology, Dalian, China – sequence: 4 givenname: Pan orcidid: 0000-0002-8629-4622 surname: Zhou fullname: Zhou, Pan email: panzhou@hust.edu.cn organization: Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China – sequence: 5 givenname: Alex orcidid: 0000-0002-6551-7591 surname: Galis fullname: Galis, Alex email: a.galis@ucl.ac.uk organization: Department of Electronic and Electrical Engineering, Torrington Place, London, U.K – sequence: 6 givenname: Omer F. orcidid: 0000-0003-3597-2646 surname: Rana fullname: Rana, Omer F. email: ranaof@cardiff.ac.uk organization: School of Computer Science and Informatics, Cardiff University, Cardiff, U.K – sequence: 7 givenname: Jiankang surname: Ren fullname: Ren, Jiankang email: rjk@dlut.edu.cn organization: School of Computer Science and Technology, Dalian University of Technology, Dalian, China – sequence: 8 givenname: Guowei orcidid: 0000-0002-3929-3598 surname: Wu fullname: Wu, Guowei email: wgwdut@dlut.edu.cn organization: School of Software, Dalian University of Technology, Dalian, China |
| BookMark | eNp9kE1LAzEQhoNUsNb-APGy4E3Ymsxms5ujlFYr1R6s55DNR0ldd2uSIv57d2kR8eBcZhjeZwaeczRo2sYgdEnwhBDMbx8Xq_UEMOAJcN5tihM0hAyKlDIGg1_zGRqHsMUYd6GccDZEN7NGVrVrNsnTvo5OyRCTl9opExLXJDO9McmziZ-tfwsX6NTKOpjxsY_Q63y2nj6ky9X9Ynq3TBXwLKZcA8sZMEk5N2VhraWmKjPQOZa0KA1obBVQXTEgUFXGsqykVOdWKw2as2yErg93d7792JsQxbbd-6Z7KYBSykhXfYocUsq3IXhjxc67d-m_BMGityJ6K6K3Io5WOqb4wygXZXRtE7109b_k1YF0xpifTxyXGJdl9g30Bm9l |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1109_TMC_2023_3282645 crossref_primary_10_1109_LCOMM_2021_3132134 crossref_primary_10_1109_TNSE_2023_3247625 crossref_primary_10_1186_s13677_023_00510_x crossref_primary_10_1016_j_asoc_2021_107798 crossref_primary_10_1109_JIOT_2022_3164028 crossref_primary_10_1007_s10207_023_00678_y crossref_primary_10_1049_cmu2_12787 crossref_primary_10_1109_ACCESS_2021_3070814 crossref_primary_10_1016_j_pmcj_2025_102075 crossref_primary_10_1109_TNSM_2023_3257187 |
| Cites_doi | 10.1109/TMC.2018.2877623 10.1109/ICNP.2013.6733615 10.1007/978-3-319-25258-2_8 10.1145/633025.633039 10.1109/INFOCOM.2018.8486429 10.1109/CNSM.2014.7014205 10.1109/INFOCOM.2014.6848111 10.1109/FiCloud.2018.00058 10.1109/ICDCS.2018.00023 10.1109/JSAC.2019.2906764 10.1109/INFOCOM.2016.7524565 10.1109/TPDS.2020.2983918 10.1109/MCOM.2015.7081091 10.1109/MCOM.2017.1600951 10.1109/INFOCOM.2018.8486303 10.1109/TPDS.2019.2937524 10.1002/cpe.3967 10.1109/TNET.2019.2895378 10.1109/UCC.2018.00022 10.1145/2486001.2486022 10.17487/rfc6241 10.1109/TPDS.2007.45 10.1145/3337821.3337825 10.1109/INFOCOM.2016.7524613 10.1016/j.comnet.2016.11.006 10.1109/JSAC.2011.111002 10.17487/rfc1098 10.1109/ICDCS.2017.43 10.1109/TCC.2016.2535215 10.1145/2785989.2785999 10.1109/TNSM.2017.2759167 10.17487/rfc7348 10.1109/JSAC.2017.2659298 10.1109/INFCOM.2012.6195503 10.1109/TCC.2017.2721401 10.1109/ICC.2017.7996514 10.1109/ICC.2015.7249214 10.1109/INFOCOM.2016.7524563 10.1016/S0167-6377(01)00069-4 10.1109/INFOCOM.2015.7218511 10.1109/TNSM.2015.2465371 10.1109/TCOMM.2018.2881438 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2020.2991107 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 8501 |
| ExternalDocumentID | 10_1109_JIOT_2020_2991107 9080088 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61802047; 61802048; 61872053 funderid: 10.13039/501100001809 – fundername: Fundamental Research Funds for the Central Universities in China grantid: DUT19RC(4)035; DUT19GJ204 funderid: 10.13039/501100012226 – fundername: “Xinghai Scholar Program” in Dalian University of Technology, China funderid: 10.13039/501100002980 – fundername: DUT-RU Co-Research Center of Advanced ICT for Active Life – fundername: National Natural Science Foundation of China grantid: 61972448 funderid: 10.13039/501100001809 – fundername: National Science Foundation for Postdoctoral Scientists of China grantid: 2016M591431; 2018T110221 funderid: 10.13039/501100002858 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-9d265626a499e87fff4eb832d50a478e2d0fc24db6212bbef63844d5fdcd2d963 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 14 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000571765000054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Mon Jun 30 13:12:49 EDT 2025 Tue Nov 18 21:50:12 EST 2025 Sat Nov 29 06:16:50 EST 2025 Wed Aug 27 02:32:28 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-9d265626a499e87fff4eb832d50a478e2d0fc24db6212bbef63844d5fdcd2d963 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-5438-1468 0000-0002-8629-4622 0000-0002-3929-3598 0000-0001-7978-4933 0000-0002-6551-7591 0000-0003-3597-2646 |
| PQID | 2444611116 |
| PQPubID | 2040421 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_2444611116 crossref_primary_10_1109_JIOT_2020_2991107 ieee_primary_9080088 crossref_citationtrail_10_1109_JIOT_2020_2991107 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-09-01 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 09 year: 2020 text: 2020-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2020 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref13 ref56 ref12 ref53 ref52 ref55 ref54 garey (ref9) 1979 ref17 ref16 ref19 zagarella (ref20) 2018 (ref26) 2018 ref51 ref50 (ref47) 2020 ref46 ref45 rummery (ref14) 1994 ref48 (ref39) 2020 ref42 ref41 sutton (ref44) 2018 ref43 ref49 (ref10) 2020 ref8 ref7 ref4 ref3 ref6 ref5 ref40 ref37 ref36 ref30 ref33 ref32 (ref31) 2020 ref2 ref1 ref38 (ref11) 2020 (ref35) 2020 (ref34) 2020 ref24 ref23 ref25 (ref15) 2015 ref22 ref21 ref27 ref29 huang (ref18) 2014 martins (ref28) 2014 |
| References_xml | – ident: ref52 doi: 10.1109/TMC.2018.2877623 – start-page: 1 year: 1994 ident: ref14 publication-title: On-line Q-learning using connectionist systems – ident: ref55 doi: 10.1109/ICNP.2013.6733615 – year: 2020 ident: ref31 publication-title: Mininet – year: 2020 ident: ref10 publication-title: GÉANT2 – ident: ref27 doi: 10.1007/978-3-319-25258-2_8 – ident: ref46 doi: 10.1145/633025.633039 – year: 2015 ident: ref15 publication-title: Hewlett-Packard Development Company L P Servers for enterprise bladeSystem rack & tower and hyperscale – ident: ref12 doi: 10.1109/INFOCOM.2018.8486429 – ident: ref33 doi: 10.1109/CNSM.2014.7014205 – ident: ref3 doi: 10.1109/INFOCOM.2014.6848111 – year: 2020 ident: ref47 publication-title: RYU Controller Tutorial – ident: ref40 doi: 10.1109/FiCloud.2018.00058 – start-page: 459 year: 2014 ident: ref28 article-title: ClickOS and the art of network function virtualization publication-title: Proc NSDI – ident: ref41 doi: 10.1109/ICDCS.2018.00023 – year: 2020 ident: ref39 publication-title: Raspberry Pi 3 Model B – ident: ref42 doi: 10.1109/JSAC.2019.2906764 – ident: ref22 doi: 10.1109/INFOCOM.2016.7524565 – ident: ref43 doi: 10.1109/TPDS.2020.2983918 – ident: ref29 doi: 10.1109/MCOM.2015.7081091 – ident: ref8 doi: 10.1109/MCOM.2017.1600951 – ident: ref23 doi: 10.1109/INFOCOM.2018.8486303 – ident: ref54 doi: 10.1109/TPDS.2019.2937524 – ident: ref17 doi: 10.1002/cpe.3967 – ident: ref2 doi: 10.1109/TNET.2019.2895378 – ident: ref37 doi: 10.1109/UCC.2018.00022 – year: 2018 ident: ref26 publication-title: LP solve – ident: ref38 doi: 10.1145/2486001.2486022 – ident: ref7 doi: 10.17487/rfc6241 – ident: ref1 doi: 10.1109/TPDS.2007.45 – ident: ref53 doi: 10.1145/3337821.3337825 – ident: ref19 doi: 10.1109/INFOCOM.2016.7524613 – ident: ref36 doi: 10.1016/j.comnet.2016.11.006 – year: 2018 ident: ref20 publication-title: Why Multicast Will Be Essential for Industrial IoT – year: 2014 ident: ref18 publication-title: Scalable steiner tree for multicast communications in software-defined networking – ident: ref21 doi: 10.1109/JSAC.2011.111002 – year: 2020 ident: ref11 publication-title: Modeling topology of large internetworks – ident: ref5 doi: 10.17487/rfc1098 – ident: ref50 doi: 10.1109/ICDCS.2017.43 – ident: ref48 doi: 10.1109/TCC.2016.2535215 – ident: ref13 doi: 10.1145/2785989.2785999 – ident: ref45 doi: 10.1109/TNSM.2017.2759167 – ident: ref30 doi: 10.17487/rfc7348 – year: 2020 ident: ref34 publication-title: Openflow – ident: ref6 doi: 10.1109/JSAC.2017.2659298 – ident: ref32 doi: 10.1109/INFCOM.2012.6195503 – ident: ref16 doi: 10.1109/TCC.2017.2721401 – year: 2020 ident: ref35 publication-title: Open Vswitch – ident: ref49 doi: 10.1109/ICC.2017.7996514 – ident: ref56 doi: 10.1109/ICC.2015.7249214 – ident: ref24 doi: 10.1109/INFOCOM.2016.7524563 – ident: ref25 doi: 10.1016/S0167-6377(01)00069-4 – ident: ref4 doi: 10.1109/INFOCOM.2015.7218511 – ident: ref57 doi: 10.1109/TNSM.2015.2465371 – year: 1979 ident: ref9 publication-title: Computers and Intractability A Guide to the Theory of NP-Completeness – year: 2018 ident: ref44 publication-title: Reinforcement Learning An Introduction – ident: ref51 doi: 10.1109/TCOMM.2018.2881438 |
| SSID | ssj0001105196 |
| Score | 2.2985637 |
| Snippet | Telecommunication networks are undergoing a disruptive transition toward distributed mobile edge networks with virtualized network functions (VNFs) [e.g.,... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 8485 |
| SubjectTerms | Algorithms Approximation Approximation algorithms Computer simulation cost minimization Delays Edge computing Exact solutions Firewalls Heuristic algorithms Internet of Things Internet of Things (IoT) Machine learning Multicast algorithms Multicast communication Multicasting network function virtualization (NFV) Network slicing Performance evaluation Sequences throughput maximization Traffic delay Virtual networks Wireless networks |
| Title | Enabling Multicast Slices in Edge Networks |
| URI | https://ieeexplore.ieee.org/document/9080088 https://www.proquest.com/docview/2444611116 |
| Volume | 7 |
| WOSCitedRecordID | wos000571765000054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH5sw4MXp05xOiUHT8NuaZc16VFkQ0Wm4JTdSpuXyGB0snb-_SZtNhFF8NZDUsqXvt_vywO4FHqgqBLo2SKWxwY89YRgA4_5iWVuCqxS2a8PfDIRs1n0VIOrLRdGKVU2n6mefSxr-biUa5sq60fWvRGiDnXOecXV-sqn-NYZCV3h0qdR__7ucWoCwID2jMq1Yc4301POUvmhgEurMm7-73v2Yc95j-S6Ou4DqKnsEJqbyQzECWoLuiNLiTJWiZQEW5nkBXleWJ1A5hkZ4Zsik6r_Oz-Cl_FoenPruakInjSmufAiDIwPFoSJiVWU4FprplIjlzikCeNCBUi1DBimobFKaaq0kTDGcKhRYoBG3o6hkS0zdQLE135IkSdShpQhpykOpUgkDpGmDFG0gW4Ai6W7MtxOrljEZehAo9hiHFuMY4dxG7rbLe_VfRl_LW5ZULcLHZ5t6GxOJXYSlcfGDWGh1e_h6e-7zmDXvrvq_-pAo1it1TnsyI9inq8uyp_lE2Vqu90 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH5BNNGLqGhEUXfwRBx2o9u6ozEQUJwmouHWbH2dISFg2PDvt90KxmhMvO3QZsvXvd_v6wO4ZGlHEsnQ1kUsm3aCxGaMdmzqxJq5ybBMZb8Ogyhi43H4VIGrNRdGSlk0n8m2fixq-TgXS50quw61e8PYBmx6lLpOydb6yqg42h3xTenSIeH13eBxpEJAl7SV0tWBzjfjU0xT-aGCC7vSq_3vi_Zg1_iP1k154PtQkbMDqK1mM1hGVOvQ6mpSlLJLVkGxFXGWW89TrRWsyczq4pu0orIDPDuEl153dNu3zVwEWyjjnNshusoLc_1YRSuSBWmaUpkoyUSPxDRg0kWSCpdi4iu7lCQyVTJGKXopCnRRSdwRVGfzmTwGy0kdn2AQC-ETigFJ0BMsFughSSgiawBZAcaFuTRcz66Y8iJ4ICHXGHONMTcYN6C13vJe3pjx1-K6BnW90ODZgObqVLiRqYwrR4T6WsP7J7_vuoDt_uhhyIeD6P4UdvR7ym6wJlTzxVKewZb4yCfZ4rz4cT4BVv-_JA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enabling+Multicast+Slices+in+Edge+Networks&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Qin%2C+Yugen&rft.au=Xia%2C+Qiufen&rft.au=Xu%2C+Zichuan&rft.au=Zhou%2C+Pan&rft.date=2020-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=7&rft.issue=9&rft.spage=8485&rft_id=info:doi/10.1109%2FJIOT.2020.2991107&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |