A proposal of survivable virtual network embedding algorithm

被引:8
|
作者
Xiao, Xian-cui [1 ,2 ]
Zheng, Xiang-wei [1 ,2 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
[2] Shandong Prov Key Lab Distributed Comp Software N, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; survivability; Group Search Optimizer (GSO); primary and secondary resource flow;
D O I
10.3233/JHS-160546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
People heavily depend on Internet in their daily lives and propose diversified requirements, such as security and privacy. Network virtualization is considered a promising approach to overcome the disadvantages of the current networks. Therefore, how to reduce the node or link failures resulting from network outages and achieve high-quality network services should be the goal for Internet service providers to improve network security and quality of service. For network survivability, a failure protection mechanism that reserves secondary resources before any failure occurs is presented in this paper. In this study, network link resources are divided into primary and secondary flow resources. Primary flow resources are used under normal network operation, whereas secondary flow resources are used as backup resources when the network fails. When a VN request arrives, a survivable VN embedding algorithm based on a group search optimizer (GSVNE) is employed to search for optimal embedding solutions. The resource allocation proportions of the primary and secondary flow resources can be dynamically adjusted. Simulation results show that GSVNE outperforms the conventional greedy algorithm, which reflects desirable results in authoritative papers, in terms of cost and acceptance rate.
引用
收藏
页码:241 / 251
页数:11
相关论文
共 50 条
  • [21] Survivable Virtual Network Mapping Using Optimal Backup Topology in Virtualized SDN
    Wang Zhiming
    Wu Jiangxing
    Wang Yu
    Qi Ning
    Lan Julong
    CHINA COMMUNICATIONS, 2014, 11 (02) : 26 - 37
  • [22] Load Distribution-Survivable Lightpath Routing for the optical virtual private network
    Prommak, C
    Tipper, D
    HPSR 2002: WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, PROCEEDINGS: MERGING OPTICAL AND IP TECHNOLOGIES, 2002, : 278 - 282
  • [23] Survivable Virtual Network Mapping With Fiber Tree Establishment in Filterless Optical Networks
    Ayoub, Omran
    Bovio, Andrea
    Musumeci, Francesco
    Tornatore, Massimo
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 37 - 48
  • [24] COVE: Co-operative Virtual Network Embedding for Network Virtualization
    Feng, Min
    Liao, Jianxin
    Qing, Sude
    Li, Tonghong
    Wang, Jingyu
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2018, 26 (01) : 79 - 107
  • [25] Secure multi-cloud virtual network embedding
    Alaluna, Max
    Ferrolho, Luis
    Figueira, Jose Rui
    Neves, Nuno
    Ramos, Fernando M., V
    COMPUTER COMMUNICATIONS, 2020, 155 : 252 - 265
  • [26] Survivable K-Node (Edge) Content Connected Virtual Optical Network (KC-VON) Embedding over Elastic Optical Data Center Networks
    Li, Xin
    Gao, Tao
    Zhang, Lu
    Tang, Ying
    Zhang, Yongjun
    Huang, Shanguo
    IEEE ACCESS, 2018, 6 : 38780 - 38793
  • [27] Virtual Network Embedding through Security Risk Awareness and Optimization
    Gong, Shuiqing
    Chen, Jing
    Huang, Conghui
    Zhu, Qingchao
    Zhao, Siyi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 2892 - 2913
  • [28] Spectrum and energy-efficient survivable routing algorithm in elastic optical network
    Ren, Rongrong
    Hou, Weigang
    Guo, Lei
    Liu, Yejun
    Wu, Jingjing
    Yang, Yitong
    OPTIK, 2016, 127 (20): : 8795 - 8806
  • [29] Spectrum and Energy-Efficient Routing Algorithm in Survivable and Elastic Optical Network
    Yang, Yitong
    Hou, Weigang
    Guo, Lei
    2014 12TH INTERNATIONAL CONFERENCE ON OPTICAL INTERNET (COIN), 2014,
  • [30] A genetic algorithm for solving virtual topology reconfiguration problem in survivable WDM networks with reconfiguration constraint
    Din, Der-Rong
    Chiu, Yu-Sheng
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2520 - 2533