Fig. 1From: Reliable design for virtual network requests with location constraints in edge-of-things computingAn example of VN mappingBack to article page