Fig. 3From: Reliable design for virtual network requests with location constraints in edge-of-things computingNew virtual networkBack to article page