An Opportunistic Resource Sharing and Topology-Aware Mapping Framework for Virtual Networks
|
|
|
- Randell Small
- 10 years ago
- Views:
Transcription
1 An Opportunistic Resource Sharing and Topology-Aware Mapping Framework for Virtual Networks Sheng Zhang, Zhuzhong Qian, Jie Wu, and Sanglu Lu State Key Lab. for Noel Software Technology, Nanjing Uniersity, China Department of Computer and Information Sciences, Temple Uniersity, USA Abstract Network irtualization proides a promising way to oercome Internet ossification. A major challenge is irtual network mapping, i.e., how to embed multiple irtual network requests with resource constraints into a substrate network, such that physical resources are utilized in an efficient and effectie manner. Since this problem is known to be NP-complete, a ariety of heuristic algorithms hae been proposed. In this paper, we reexamine this problem and propose a irtual network mapping framework, ORS T A, which is based on Opportunistic Resource Sharing and Topology-Aware node ranking. Opportunistic resource sharing is taken into consideration at the entire network leel for the first time and we deelop an online approximation algorithm, FFA, for soling the corresponding time slot assignment problem. To measure the topology importance of a substrate node, a node ranking method, MCRank, based on Marko chain is presented. We also deise a simple and practical method to estimate the residual resource of a substrate node/link. Extensie simulation experiments demonstrate that the proposed framework enables the substrate network to achiee efficient physical resource utilization and to accept many more irtual network requests oer time. Index Terms irtual network mapping; opportunistic resource sharing; bin packing; topology-aware; marko chain I. Introduction The Internet has been extremely successful in optimizing the way we exchange and process information. Howeer, due to the competing policies and interests of its stakeholders and the eer-expanding scale of Internet use, the Internet has become resistant to fundamental changes [, 2]. Network irtualization has been proposed as a promising approach that claims to oercome the current ossification of the Internet [ 4]. In a network irtualization enironment, infrastructure proiders (InPs) maintain physical/substrate networks (SNs), while serice proiders (SPs) purchase slices of physical resources (e.g., CPU, bandwidth, memory space, disk storage) from InPs and then create customized irtual networks (VNs) to offer their own alue-added serices to end users. This decoupling of traditional Internet serice proiders brings a layered serice architecture, which proides flexibility and diersity to eeryone. One of the fundamental problems in network irtualization is the irtual network embedding/mapping (V NE) problem, i.e., how to embed multiple irtual network requests with resource constraints into a substrate network, such that physical resources are utilized in an efficient and effectie manner. As this problem is proen to be NP-complete [5], many heuristic algorithms [6 5] hae been proposed. Howeer, these early algorithms did not take workload fluctuation, e.g., Auckland Data Trace [6], into consideration. Most web-based serice proiders potentially target users all oer the world, so it is extremely difficult to predict the workload before they are ready to sere end users. To cope with a peak workload on demand, serice proiders often oerpurchase physical resources, which may lead to a considerable waste of resources for a normal workload. What is more, infrastructure proiders may lose some upcoming customers due to inefficient resource utilization. In this paper, we re-examine the irtual network mapping problem through two noel aspects, Opportunistic Resource Sharing and Topology-Aware node ranking, and we propose a noel framework, ORS T A, which proides efficient physical resource utilization and deployment. Inspired by opportunistic spectrum access [7], we enision opportunistic resource sharing. Generally speaking, we model the workload in a irtual network as the combination of a basic sub-workload, which always exists, and a ariable subworkload, which occurs with some probability. Then, multiple ariable sub-workloads from different irtual networks are allowed to share some common resources to achiee efficient resource utilization, while for a basic sub-workload, we allocate the corresponding, required resources as usual. Furthermore, topology-awareness is considered due to the following fact: suppose that there are two substrate nodes with the same residual CPU resources, but the residual resources on their neighbors ary a lot. It is then reasonable to choose the substrate node with more resources in its proximity, so as to heuristically reduce the length of embedded irtual links. Hence, to facilitate the efficient embedding of irtual networks, we deelop a Marko Chain-based substrate node ranking algorithm to measure the importance of each substrate node by assigning a numerical alue. The contributions of this paper are the following. (i) To the best of our knowledge, this is the first attempt that considers irtual network mapping in the context of opportunistic resource sharing at the entire network leel. In our preious work [8], we only considered how to share bandwidth among
2 multiple irtual links in a single substrate link. (ii) We propose a formal formulation of opportunistic resource sharing-based time slot assignment and deelop an online approximation solution, FFA. (iii) We take topology into consideration and design a Marko chain-based node ranking method, MCRank, to measure the importance of a substrate node. (i) A simple and practical method for estimating the residual resource of a substrate node/link is deised. () Extensie simulations alidate the effectieness of ORS T A. The remainder of this paper is organized as follows. Section II presents our motiation. We describe the assumptions, notations, and problem formulation in Section III. Then in Sections IV and V, we gie an oeriew of ORS T A and detailed algorithms, respectiely. We ealuate ORS T A using experiments in Section VI. Before concluding this paper in Section VIII, we surey related work in Section VII. II. Motiation SPs lease physical resources from InPs to create their own irtual networks and deploy serices aimed at end users. As we mentioned before, SPs oer-purchase resources to cater for potentially high workload rates, otherwise, customers will suffer bad experiences when SPs purchase no more than basic resources. In doing so, SPs may waste the additional purchased resources due to traffic fluctuation. From the perspectie of an InP, the physical resources he owns are limited and constant in a relatiely long period, so he may wish to make efficient use of his resources and accept more irtual networks, which allows for more reenue. A motiational example is illustrated as follows. Suppose that an infrastructure proider, InP-A, owns a physical link with a capacity of MB/s, and all of the other serice proiders, SP-, SP-2 and SP-3, require a irtual link with a capacity of 4MB/s. We assume that InP-A charges dollar for MB/s bandwidth in unit time. In the case without opportunistic resource sharing, InP-A can accept only two requests among three because 4MB/s 3 = 2MB/s > MB/s. Therefore, InP-A gets 8 dollars per unit time in this case. Let us take network traffic fluctuation into consideration and assume that each 4MB/s traffic flow is composed of a basic sub-flow 3MB/s, which always exists, and a ariable sub-flow MB/s, which occurs with probability.. Now, InP-A has an allocation method to accept all three irtual links: by letting three ariable sub-flows share the same MB/s and allocating the residual 9MB/s to three basic sub-flows. We assume that flows in different irtual links are independent of each other, which is reasonable, thus the probability that more than two ariable sub-flows occur (a collision) is: ( ) =.9 For ariable sub-flows, InP-A should decrease the charge, e.g.,. US dollar for MB/s in unit time. Therefore, in this case with opportunistic resource sharing, InP-A can get (3 +.) 3 = 9.3 dollars, which is more than the original income; SP- or SP-2 or SP-3 just needs to pay 3+.=3. dollars, which is less than the preious charge of 4 dollars. In general, although opportunistic resource sharing brings performance degradation when irtual networks encounter a peak workload, it enables better utilization of physical resources, increases the InPs reenue and decreases the SPs rent. We beliee that opportunistic resource sharing can benefit all parties through reasonable pricing. We will not discuss how to set prices in this paper as it is out of the scope. A. Assumptions III. Problem Formulation CPU and bandwidth are the main constraints we consider in this paper, which is the typical case in almost all of the related literatures [6 5] on irtual network mapping so far. To unify the resource notations, we assume that the substrate network is based on time diision multiplexing, where time is partitioned into multiple frames of equal length, and each frame is further diided into L equal time slots, ts, ts 2,..., ts L. In this way, both CPU and bandwidth can be expressed in time slots. An SP only needs to specify the number of the time slots for a particular irtual node/link when he makes a request for irtual network mapping. Therefore, we will only focus on opportunistic bandwidth sharing in Section V-A; the results can be directly applied to opportunistic CPU sharing without any major changes. SPs deploy end-to-end alue-added serices aimed at the end users, who access the serices and leae at any time. These dynamic customers lead to workload fluctuations and further cause a waste of physical resources. As it is difficult to capture the characteristics of workload fluctuation, we use a simplified model: the work load wl i of irtual network i is composed of a basic sub-workload basic i, which exists all of the time, and a ariable sub-workload aria i, which occurs with a small probability pwl i in unit time. We let bwl i = basic i /wl i represent basic sub-workload percentage. Workloads in different irtual networks are assumed to be independent of each other. We beliee that this model is reasonable although it is simple. For example, in a layered ideo streaming serice [9], each ideo frame is encoded into multiple ideo packets corresponding to multiple quality layers. These ideo packets are classified as a base or enhancement layer to meet different network conditions. The workload in this scenario is ery similar to our model. We hope that this simplified model can proide some insights on the design of other VNE algorithms. Since both the network traffic and CPU time will fluctuate as the workload fluctuates, both the amounts of network flow in a irtual link and the CPU time in a irtual node are assumed to be proportional to the workload for simplicity. More specifically, the flow in a irtual link is composed of a basic part, whose percentage is bwl i, and a ariable part, which occurs with probability pwl i. And the same statement holds for the CPU time. B. Notations Substrate Network: a substrate network is modeled as a weighted undirected graph, G s = (N s, E s, C s, B s ), where N s
3 Fig.. Notations of irtual network embedding is the set of substrate nodes, and E s is the set of substrate links. C s is the set of CPU capacity attributes, and B s is the set of bandwidth capacity attributes. We use RC s (n s ) and RB s (e s ) to denote the residual CPU of substrate node n s and residual bandwidth of substrate link e s, respectiely. Here, we would mention that the amount of residual resources in the presence of opportunistic resource sharing is not obious, we will discuss it later when necessary. We use P s to denote the set of loop-free paths in G s. Virtual Network: we denote a irtual network by a weighted undirected graph, G i = (Ni, E i, C i, B i, bwl i, pwl i ). Ni is the set of irtual nodes, and Ei is the set of irtual links. Ci is the set of CPU constraints, and B i is the set of bandwidth constraints. bwl i represents the percentage of a basic sub-workload in an oerall workload. pwl i means the probability of a ariable sub-workload occurring in unit time. The notations are summarized in Table I for reference. The notation system in this paper is similar to that in [8,, 2]. The principle behind these notations is that superscript indicates substrate/irtual networks. Fig. shows an example of these notations. The corresponding number near each ertex/edge is the CPU/bandwidth capacity/constraint. For irtual link a b in the VN request G, the basic sub-traffic is 8.9 = 7.2, the ariable sub-traffic is = and occurs with probability.. Virtual Network Mapping: irtual network mapping is usually defined as a mapping M from G i to a subset of G s, such that some predefined constraints are satisfied. It can be decomposed into two major components: node mapping M n and link mapping M l. The node mapping M n : Ni N s maps a irtual node to a substrate node, subject to: n, m Ni M n (n ) N s M n (n ) = M n (m ) iff m = n RC s (M n (n )) C i (n ) The link mapping M l : Ei P s maps a irtual link to a substrate loop-free path, subject to: e = (m n ) Ei M l (m n ) P S (M n (m ), M n (n )) RB s (M l (m n )) B i (e ) In Fig., the node mapping for the VN request G is {a C, b E, c D}, and the link mapping is {(ab) Notation G s N s E s C s B s RC s RB s P s G i Ni Ei Ci B i bwl i pwl i TABLE I Notations in this paper Meaning Substrate network Set of nodes Set of links Set of CPU capacity attributes Set of bandwidth capacity attributes Set of residual CPU resources Set of residual bandwidth resources Loop-free paths set The i th irtual network Set of nodes of G i Set of links of G i Set of CPU constraints in G i Set of bandwidth constraints in G i A basic sub-workload percentage in G i Probability of a ariable sub-workload in G i {CB, BE}, (bc) {ED}, (ca) {DC}}. The node mapping for the VN request G 2 is {d A, e F}, and the link mapping is {(de) {AG, GF}}. C. Objectie Virtual network mapping is done by InPs. From InPs standpoint, a natural objectie is to increase reenue and to decrease cost. Howeer, an SP is only willing to pay fee proportional to his requested resources, that is, the reenue, R(G i ), of embedding a irtual network, G i, can be defined as (following the definitions in preious works [8, ]): R(G i ) = ω c Ci (n ) + ω b B i (e ) () n N e E where ω c and ω b are the weights for CPU and bandwidth, respectiely. We learn from this definition that, gien a VN request, the reenue is fixed. Therefore, in order to get more reenue, the InP should try to accept more VN requests but meet their resource constraints at the same time. To this end, irtual networks should be properly and efficiently deployed on top of a substrate network. Due to the NP-completeness of the V NE problem [5], many heuristic algorithms hae been proposed. Howeer, in this paper we re-isit this problem from two noel aspects: opportunistic resource sharing and topology-aware node mapping. IV. Framework Oeriew We present a high leel oeriew of our framework, ORS T A, as illustrated in Algorithm, in this section and the details of ORS T A in the next section. Initially, we compute the amount of residual resources for each substrate node/link (lines 3-4 of Alg. ), i.e., the aailable CPU/bandwidth capacity. Note that, when we perform opportunistic resource sharing, the estimation of residual resources becomes complicated; we will explain our method in Section V-B. Afterwards, inspired by the PageRank algorithm [2] which is used by Google to assign a numerical rank to eery web page, we deise a similar ranking algorithm based on Marko chain [22] to compute the rank of each substrate node, denoted by MCRank (line 5 of Alg. ), which is illustrated
4 in Section V-C. This MCRank takes both residual resources and topology into consideration in an effort to improe the deployment of irtual networks. When a VN request arries, we adopt the following simple greedy heuristic. In the node mapping phase (lines 7- of Alg. ), all irtual nodes are sorted in a decreasing order of their CPU constraints and are placed in a queue; then, we map each irtual node in the sorted queue to the unused substrate node with the highest MCRank. In the link mapping phase (lines -3 of Alg. ), we map each irtual link to the k-shortest path between its end hosts (for increasing k) to minimize the length of the substrate paths that irtual links are mapped to. Then, considering workload fluctuation, we employ opportunistic resource sharing to efficiently utilize substrate resources at the expense of collisions (line 4 of Alg. ). We formulate this opportunistic resource sharing-based local time slot assignment problem as an optimization problem and deise an online approximation algorithm, which is inspired by the bin packing problem [23]. The details are presented in section V-A. When a irtual network request is successfully embedded, the framework ORS T A updates RC s (n s ), RB s (e s ) and MCRank(n s ), and waits for another irtual network request. Algorithm The Opportunistic Resource Sharing and Topology-Aware Mapping Framework (ORS T A) : Initialization Phase 2: while true do 3: n s N s, update RC s (n s ) 4: e s E s, update RB s (e s ) 5: Run MCRank(γ) 6: Wait until a VN request, say G i, arries 7: Q s sorted irtual nodes in G i according to Ci 8: for i = to Q s.length do 9: Map Q s [i] to the unused substrate node with the highest MCRank : end for : for all e s E s do 2: Map e s to the k-shortest path for increasing k 3: end for 4: n s N s and e s E s, run FFA(p th ) 5: end while V. Detailed Algorithms A. Opportunistic Resource Sharing-based Local Time Slot Assignment ) Preliminaries: in ORS T A, the irtual network embedding is completed after line 3 of Alg. in a macroscopical sense, i.e., node-to-node and link-to-path matching is accomplished. Howeer, at a single node/link leel, we also need to deal with opportunistic resource sharing-based local time slots assignment. Note that both CPU and bandwidth can be represented as time slots, so we focus on assigning time slots in a substrate link among multiple irtual links. The results can be applied to a substrate node without any major changes. Fig. 2. Time slot assignment in a irtual link Opportunistic resource sharing for irtual network mapping is proposed in [8] for the first time. In that paper, we studied opportunistic bandwidth sharing in a single physical link and deised two heuristic algorithms from different perspecties. Here, we employ the results from our preious work and improe them by deeloping an online approximation algorithm. As we assumed, both the network traffic and the CPU busy time are proportional to the workload; for a irtual link, e i, from irtual network G i, the traffic is composed of basic sub-traffic, which equals bwl i B i (e ), and ariable sub-traffic, which equals ( bwl i ) B i (e ) and happens with probability pwl i. For basic sub-traffic, the InP has no choice but to allocate the required number of time slots, thus we will only consider ariable sub-traffic in the subsequent discussion. To consere time slots for upcoming requests, we prefer that each time slot can be assigned to as much ariable subtraffic as possible. Howeer, when more than one ariable subtraffic occurs at the same time slot, a collision happens. To break the tradeoff between utilization and collision, we hae the following optimization problem. Problem : Gien a probability threshold, p th, and a set of n ariable sub-traffic from e i, i =, 2,..., n, each requires ( bwl i ) B i (e i ) time slots with probability pwl i. Find an assignment of time slots for the ariable sub-traffic to minimize the number of time slots used, such that: ) for each ariable sub-traffic flow from e i, the number of time slots assigned to it is at least ( bwl i ) B i (e i ); 2) the collision probability at each time slot is no more than p th. The collision probability can be obtained as follows. Let X i indicate whether ariable sub-traffic in e i occurs, i.e., Pr[X i = ] = pwl i. For time slot k, let D k denote the set of ariable sub-traffic that it is assigned to. Then, the probability of a collision happening at slot k, denoted by Pr collision (D k ), is: Pr collision (D k ) = Pr[ = ( pwl i ) i D k X i ] i D k (pwl i i D k j D k, j i ( pwl j )) Fig. 2 shows a feasible assignment. ts can be assigned to three sub-traffic flows from e, e 2, and e 3 because they collide with a probability.64 (by Eq. (2)), which is less then p th =.. ts 3 can not be assigned to e and e 4 simultaneously because the collision probability is.3 =.2 > p th. (2)
5 2) A first-fit-based online approximation algorithm: the design of our algorithm is based on the following obseration: when each ariable sub-traffic requires one single time slot, i.e., ( bwl i ) B i (e i ) = for all i, Problem is ery similar to bin packing. Howeer, the occupied size in each bin is the sum of the sizes of all of the packed items in bin packing, whereas in Problem, the collision probability in a time slot, as shown in Eq. 2, is neither linear nor multiplicatie. First-fit [23] is a heuristic algorithm with an approximation factor of 2 for bin packing. In first-fit, items are considered in an arbitrary order, and for each item, first-fit attempts to place the item in the first bin that can accommodate the item. If not, the item is placed into a new bin. First-fit can be executed online and has a low time complexity. Their resemblance sheds light on the design of FFA, which is based on the core idea of first-fit. The FFA Algorithm is presented in Algorithm 2. Algorithm 2 FFA(p th ) : Wait until ariable sub-traffic from e i arries 2: counter 3: While(counter < ( bwl i ) B i (e i )) 4: Let pos 5: While(Collision(ts pos, e i ) > p th) 6: pos pos + 7: Assign ts pos to e i 8: counter counter + 3) Incremental Calculation: Collision(ts pos, e i ) is a function that returns the probability of a collision at ts pos if ts pos is assigned to e i. To calculate the collision probability efficiently, we adopt the following incremental approach. Let D k be the set of ariable sub-traffic that ts k is currently assigned to. Also let: A(D k ) = ( pwl i ) i D k B(D k ) = (pwl i ( pwl j )) i D k j D k, j i then, the collision probability Pr collision (D k ) = A(D k ) B(D k ). When slot k is to be assigned to a new sub-traffic from e h, then: A(D k {e h }) = A(D k)( pwl h ) B(D k {e h }) = B(D k)( pwl h ) + A(D k ) pwl h (3) This can be used to calculate the new collision probability. 4) Approximation Ratio: we denote by S f f a the solution generated by FFA, and by S opt, the optimal solution. Abusing the notation a bit, we will also use S f f a and S opt to denote the number of time slots needed by these two solutions, respectiely, if no confusion can be caused. Let, p min = min i n pwl i, d min =min i n (( bwl i ) B i (e i )) p max = max i n pwl i, d max =max i n (( bwl i ) B i (e i )) Bin packing [23]: gien n items with sizes s,s 2,...,s n (, ], find a packing method in unit-sized bins that minimizes the number of bins used. Case I: we use a particular ariable sub-traffic flow, which requires d min time slots and occurs with probability p min, to replace all of the ariable sub-traffic. Then, the maximal allowable number of sub-traffic, ol I, in a substrate slot is determined by: ( p min ) ol I ol I p min ( p min ) ol I = p th Hence, in this case, the number of time slots required by all of the n sub-traffic is: S I = n d min ol I Case II: we use another particular ariable sub-traffic flow, which requires d max time slots and occurs with probability p max, to replace all of the ariable sub-traffic. Then, the maximal allowable number of sub-traffic, ol II, in a substrate slot is determined by: ( p max ) ol II ol II p max ( p max ) ol II = p th Similarly, the number of time slots required by all of the n sub-traffic in this case is: S II = n d max ol II then: Theorem : S f f a (d max ol I )/(d min ol II ) S opt Proof: it is straightforward to see that: < S I S opt S f f a S II S f f a S opt S II S I The theorem follows immediately. B. Residual Resource Estimation = d max ol I d min ol II The amount of the residual resource in a substrate node/link is an important metric in VNE process. In a traditional scenario, where opportunistic resource sharing is not considered, the residual CPU, RC s (n s ), of a substrate node, n s, and residual bandwidth, RB s (e s ), of a substrate link, e s, are defined as: RC s (n s ) = C s (n s ) f c (n, n s ) n RB s (e s ) = B s (e s ) f b (e, e s ) e where f c (n, n s ) denotes the CPU resources of n s allocated to n, and f b (e, e s ) denotes the bandwidth resources of e s allocated to e. Howeer, with opportunistic resource sharing, the residual resource becomes complicated. Fig. 3 shows a snapshot of the time slot allocation in a substrate link. Intuitiely, the residual resource consists of the right part and the aailable room in the middle part which is allocated to ariable sub-traffic. The former is easy to compute while the latter is not so obious. Suppose that the capacity of a substrate link, e s, is B s (e s ), and there are L time slots in a frame. There are b slots allocated to basic sub-traffic and another d slots allocated to ariable
6 Fig. 3. A snapshot of time slot allocation in a substrate link sub-traffic. Therefore, RB s (e s ) is (L b d)/l B s (e s ) plus the aailable room in the middle d slots. A simple and practical measurement of residual room, rb k, in a single time slot, ts k (b < k < b + d + ), is defined as the probability of a ariable sub-traffic flow that would cause the collision probability to be higher than p th if ts k is assigned to it. Hence, by Eq. (3), we hae: A(D k )( rb k ) (B(D k )( rb k ) + A(D k ) rb k ) = p th That is: rb k = A(D k) + B(D k ) + p th B(D k ) = p th Pr collision (D k ) B(D k ) Thereby, the aailable room in the middle d slots that are allocated to ariable sub-traffic is: In summary: RB s (e s ) = L b d L = (L b d + B s (e s ) L b+d k=b+ rb k B s (e s ) + Bs (e s ) L b+d k=b+ RC s (n s ) can be analyzed in a similar way. b+d k=b+ rb k p th Pr collision (D k ) ) Bs (e s ) B(D k ) L C. Marko Chain-based Node Ranking (MCRank) ) Preliminaries: PageRank [2] nicely reflects the popularity and quality of web pages. In PageRank, the rank of a page measures the importance of that page. A page has a higher rank if it is pointed to by more highly-ranked pages. The more pages that one page points to, the less its influence on their rankings is. This intuitie idea can be formalized as follows. The World-Wide-Web is treated as a directed graph, with web pages as ertices and hyper-links as directed edges. The rank of a page p, denoted by rank(p), is supposed to satisfy: rank(g) rank(p) = (6) d + (g) g:(g,p) E where d + (g) means the number of edges going out of page g. Note that the sum is oer edges going into p. Inspired by PageRank, we consider using a similar method to measure the topology importance of a substrate node. To understand the topology importance, suppose that there are two substrate nodes with the same residual resources, but the resources of their neighbors (or neighbors of neighbors) (4) (5) ary greatly. In order to heuristically decrease the length of irtual links (substrate paths), we prefer the substrate node with more resources in its icinity. Therefore, we propose in the following, a Marko chain-based node ranking method, MCRank. 2) MCRank: we define the resource, R(n s ), of a substrate node, n s, as the product of its residual CPU resource and a half of the collectie bandwidth resources of its outgoing links: R(n s ) = RC s (n s ) 2 RBs (e s ) e s NeighE(n s ) where NeighE(n s ) denotes the set of links that are adjacent to n s. The coefficient /2 can be seen as the bandwidth of a link is equally shared between its endpoints, though it is not in fact. We then normalize R s (n s ). NormR(n s R s (n s ) ) = m s N s Rs (m s (7) ) Intuitiely, if the MCRank(n s ) of a substrate node, n s, is high, the possible reasons are: (i) the node itself has ample resources; (ii) its neighbors hae abundant resources. Hence, we define the MCRank(n s ) as: MCRank(n s ) = w MCRank(n s ) NormR(n s ) + w 2 h s NeighN(m s ) NormR(h s ) MCRank(ms ) m s NeighN(n s ) (8) where w and w 2 are the corresponding weights. NormR(n s )/ h s NeighN(m s ) NormR(h s ) can be seen as the impact of m s on n s. Let P be a matrix with rows and columns corresponding to substrate nodes, and n s, m s N s : w if m s = n s P(m s, n s NormR(n ) = w 2 s ) h s NeighN(m s ) NormR(h s ) if (m s, n s ) E s (9) otherwise Then, Eq. (8) can be expressed in the following matrix form: MCRank P = MCRank () Let w + w 2 = ; it is easy to erify that P is stochastic, i.e.: P(m s, n s ) = P(m s, m s ) + P(m s, n s ) = n s N s n s NeighN(m s ) Hence, MCRank is actually a stationary distribution of the Marko chain with transition matrix P. The following theorem gies the existence of a stationary distribution. Theorem 2: the Marko chain, determined by P, has a stationary distribution. Proof: it is sufficient to proe that: (i) MCRank has finite states, as there are a finite number of substrate nodes; (ii) the substrate network is strongly connected, so the Marko chain is irreducible; (iii) the substrate node iteslf has an impact on its MCRank, i.e., the chain is a lazy random walk, so it is aperiodic. The theorem follows immediately. Based on [2], we gie our algorithm to calculate the stationary distribution, i.e., MCRank, in Algorithm 3, where γ seres as a threshold to control iterations.
7 Algorithm 3 MCRank(γ) : MCRank NormR, i 2: repeat 3: MCRank i+ MCRank i P 4: δ MCRank i+ MCRank i 5: i i + 6: until δ < γ E[C ] E[B ] E[bwl] E[pwl] TABLE II Parameters Expectation of CPU requirement on a irtual node Expectation of bandwidth requirement on a irtual link Expectation of a basic sub-workload percentage Expectation of a ariable sub-workload occurring probability VI. Experimental Ealuation In this section, we first describe our ealuation enironment, then present main ealuation results. A. Ealuation Enironment As network irtualization is still an open field, our ealuations follow settings similar to [7, 8, 2, 2]. We use ANSNET and ARPANET as the substrate network topologies. Both the CPU capacity at substrate nodes and bandwidth capacity at substrate links are generated uniformly from [5,]. The arrials of VN requests are modeled as a Poisson process with an aerage rate of 5 requests per minute. For each irtual network, the number of nodes is determined by a uniform distribution between 2 and ; each pair of irtual nodes is connected with probability.5. The lifetime of each irtual network is assumed to be exponentially distributed with an aerage of minutes. The collision probability threshold is set to. throughout our ealuation. We summarize the parameters that we ary in our ealuations in Table II. Comparing our framework with preious research on irtual network mapping is difficult because it is the first attempt that considers irtual network mapping in the context of opportunistic resource sharing at the entire network leel. Therefore, our ealuation focuses primarily on quantifying the benefits of opportunistic resource sharing and topology-aware node ranking. The notations that we use to refer to different algorithms are enumerated in Table III. In the following subsection, we present the aerage results after running oer ANSNET times. (Results oer ARPANET are similar and omitted due to space limitation.) B. Ealuation Results We first present the comparison results between ORS T A, T A, ORS, and Greedy (refer to Table III). Figs 4, 5, and 6 show the acceptance ratio oer time, CDF (cumulatie distribution function) of node utilization ratios, and link utilization ratios, respectiely. In these experiments, both E[C ] and E[B ] are set to be ; E[bwl] =.5; E[pwl] =.5, and w =.7. In Fig. 4, the acceptance ratio of ORS T A is higher than all of the other algorithms, which indicates that opportunistic resource sharing and topology-aware node ranking indeed improes the deployment of irtual networks and further enables the substrate network to accept more VN requests. We also notice that the acceptance ratio of these four algorithms is aeragely less than, which is a little low. The main reason behind this may be because links in the substrate network (ANSNET has 32 nodes and 58 links, ARPANET has 2 nodes and 32 links) are sparse, while each pair of nodes in a irtual network is connected with probability.5. This leads to the topology becoming the dominating factor in irtual network embedding. Fig. 4 also shows that the acceptance ratio of T A is much higher than ORS and Greedy, while ORS achiees nearly the same acceptance ratio as Greedy. This implies that distinguishing between substrate nodes is helpful in irtual network mapping while opportunistic resource sharing is not significantly effectie when there is no topology-aware node ranking. In Figs 5 and 6, the node/link utilization ratio means the ratio of the allocated resources to the capacity of a substrate node/link. We obsere similar results where ORS T A performs better than T A, ORS, and Greedy. We then try to ealuate the effects of w, E[C ], E[B ], E[bwl], and E[pwl], respectiely. Fig. 7 shows the comparison between ORS T As with different w settings. We see that ORS T A(w =.5) achiees the highest acceptance ratio while ORS T A(w =.3) gets the lowest. This is anticipated because in MCRank, w =.5 indicates the rank of a substrate node is half determined by itself; w =.3 causes the rank of a substrate node to be greatly dominated by the amount of residual resources of other nodes. Howeer, the difference is not considerably significant, which means the stationary distribution of our Marko chain nicely represents the importance of substrate nodes, irrespectie of whether w is large or small. In Fig. 8, we show the results of E[C ] and E[B ]. We note that in the case when E[C ] and E[B ] are small, the acceptance ratio is high. Howeer, with E[C ] and E[B ] increasing, the substrate network resources become scarce, which causes more and more VN requests to be rejected. In this figure, ORS T A(E[C ] = E[B ] = 5) achiees almost the same acceptance ratio as ORS T A(E[C ] = E[B ] = 2). A reasonable explanation is that, E[C ] = E[B ] = 5 is sufficiently large compared to the aerage amount of CPU/bandwidth capacities of substrate nodes/links, i.e., 75. Fig. 9 illustrates the effects of E[bwl] and E[pwl]. Remember that bwl is the percentage of a basic sub-workload in the oerall workload, and pwl is the probability of a ariable sub-workload happening. In this figure, ORS T A(E[bwl] =.3, E[pwl] =.5) presents the best performance, and ORS T A(E[bwl] =.5, E[pwl] =.5) achiees the second best. This is to say, bwl plays a more important role than pwl. In summary, our proposed framework, ORS T A, increases the acceptance ratio through opportunistic resource sharing, which enables the substrate network to support more VN requests and topology-aware node ranking, which treats substrate nodes differently to shorten the length of substrate paths that irtual links are mapped to.
8 Notation ORS T A ORS T A Greedy TABLE III Algorithms in Comparison Description The entire framework, including opportunistic resource sharing, topology-aware ranking, and greedy node/link mapping A partial framework, including opportunistic resource sharing, and greedy node/link mapping A partial framework, including topology-awareness, and greedy node/link mapping The traditional greedy embedding algorithm, including greedy node/link mapping Acceptance Ratio ORSTA TA ORS Greedy CDF ORSTA TA ORS Greedy CDF ORSTA TA ORS Greedy Time Fig. 4. Acceptance ratio oer time..3.5 Node Utilization Ratio Fig. 5. CDF of node utilization ratios..3.5 Link Utilization Ratio Fig. 6. CDF of link utilization ratios Acceptance Ratio ORSTA(w =.3) ORSTA(w =.5) ORSTA(w =.7) ORSTA(w =.9) Acceptance Ratio ORSTA(E[C ]=E[B ]=5) ORSTA(E[C ]=E[B ]=) ORSTA(E[C ]=E[B ]=5) ORSTA(E[C ]=E[B ]=2) Acceptance Ratio ORSTA(E[bwl]=.5,E[pwl]=.5) ORSTA(E[bwl]=.5,E[pwl]=.5) ORSTA(E[bwl]=.5,E[pwl]=5) ORSTA(E[bwl]=.3,E[pwl]=.5) ORSTA(E[bwl]=.7,E[pwl]=.5) Time Fig. 7. Effect of w Time Fig. 8. Effect of E[C ] and E[B ] Time Fig. 9. Effect of E[bwl] and E[pwl] A. Network Virtualization VII. Related Work In networking literature, irtual priate networks (VPNs), oerlay networks, and network irtualization deal with selecting nodes to construct logical paths. Howeer, the differences are: (i) VPNs only need to determine the locations of logical links while network irtualizaiton simultaneously considers locations of logical nodes and links [7, 8]; (ii) only link constraints are considered in VPNs while both link and node constraints are considered in network irtualization [7, 8]; (iii) oerlays are designed in the application layer on top of the network layer [4]. The most releant work in the oerlay networks is [24], where Fan et al. inestigated the dynamic topology configuration problem in serice oerlay networks. They first acquired general properties of the optimal reconfiguration topology by obsering small cases, and then used obserations as heuristics to design algorithms for largescale cases of networks. In network irtualization, Ishibashi et al. [25] enisioned cognitie radio-based irtual wireless networks and tried to make efficient use of residual wasted bandwidth of the primary serice proiders. Shiomoto et al. [26] deeloped a network irtualization method to represent the resources in the optical backbone network of the serice network. Zhu et al. [27] tried to lower the barrier for deploying wide-area serices through introducing the connectiity layer, which, in fact, is a special irtual network that proides a necessary geographic footprint, reliability, and performance. He et al. [28] proposed DaVinci architecture, where resource allocation is dynamic and used optimization theory to show that adaptie resource allocation can be stable and can maximize the aggregate performance across irtual networks. B. Virtual Network Embedding To cope with the NP-hardness of the VNE problem, researchers resorted to heuristics to reduce computational time. Ricci et al. [6] considered only bandwidth constraints and proposed the Assign algorithm based on simulated annealing with the assumption that the substrate node can only be used by one irtual node. Lu et al. [9] deeloped a method for the VNE problem in a cost-efficient way and attempted to find the best topology in a family of backbone-star topologies. Zhu et al. [7] assumed that the substrate nodes and links hae unlimited CPU and bandwidth resources and focused on load balancing and on-demand assignments. Yu et al. [] assumed that SN supports path splitting and proposed a twostage online algorithm: firstly, map the irtual nodes greedily, then deal with link mapping based on the multi-commodity flow problem. Lischka et al. [] proposed a backtracking algorithm based on subgraph isomorphism detection, but restricted the length of the substrate paths. Chowdhury et al. [8]
9 proposed a V NE algorithm with better coordination between node mapping and link mapping based on linear programming and deterministic/randomized rounding, but added location constraints to simplify the problem. Chowdhury et al. [3] presented a policy-based decentralized inter-domain irtual network embedding framework and also designed a locationaware VN request forwarding mechanism. Zhang et al. [2] focused on flexibility and proposed a simulated annealingbased algorithm to control the tradeoff between result accuracy and the running time of the embedding algorithm. Zhang et al. [8] inestigated the opportunistic bandwidth sharing in a single physical link among multiple irtual links from different VNs; howeer, in this paper, we study opportunistic resource sharing at the entire network leel. C. Topology-Awareness in Virtual Network Mapping To the best of our knowledge, there are only two research articles [2, 4] that incorporate topology into irtual network embedding. Butt et al. [4] differentiated substrate resources by introducing scaling factors: Critical Index, which measures the likelihood of a residual substrate network partition due to its unaailability, and Popularity Index, which measures how many different VNs are affected when a link or a node is unaailable. Cheng et al. [2] formulated a Marko random walk model to compute the topology-aware resource ranking of nodes in a substrate network; howeer, in this paper, we obsere that we only need to consider a walk from a substrate node to itself or one of its neighbors because the impact is recursie in a Marko chain. VIII. Conclusions This paper re-examines the irtual network mapping problem in network irtualization from two noel perspecties, i.e., opportunistic resource sharing and topology-aware node ranking, which are incorporated into our proposed framework, ORS T A. ORS T A contains three main parts, opportunistic resource sharing-based local time slot assignment, estimation of residual resources and topology-aware node ranking. The effectieness of our framework is confirmed by extensie simulations. We are currently seeking the proof of the NP- Completeness of Problem and are exploring methods of scheduling packets when a collision occurs in a time slot. Acknowledgments We would like to thank Yitong Yin for his Randomized Algorithms and Combinatorics courses, and the anonymous reiewers for their insightful suggestion. This work is supported in part by the National NSF of China under Grant No and No. 6262; Key Project of Jiangsu Research Program under Grant No.BE279; Jiangsu Natural Science Foundation under Grant No. BK25; the National 973 Basic Research Program of China under Grant No. 29CB3275 and No. 2CB328; US NSF grants ECCS 2829, CNS 65444, CCF 2867, CNS 94884, and CCF References [] J. Turner and D. Taylor, Diersifying the Internet, in IEEE GLOBE- COM 25, ol. 2, , pp. 6 pp. 76. [2] T. Anderson, L. Peterson, S. Shenker, and J. Turner, Oercoming the Internet impasse through irtualization, Computer, ol. 38, no. 4, pp. 34 4, april 25. [3] N. Feamster, L.-X. Gao, and J. Rexford, How to lease the Internet in your spare time, ACM SIGCOMM Comput. Commun. Re., ol. 37, no., pp. 6 64, 27. [4] N. Chowdhury and R. Boutaba, A surey of network irtualization, Computer Networks, ol. 54, no. 5, pp , 2. [5] D. G. Andersen, Theoretical approaches to node assignment, Dec. 22, unpublished Manuscript. [6] R. Ricci, C. Alfeld, and J. Lepreau, A soler for the network testbed mapping problem, ACM SIGCOMM Comput. Commun. Re., ol. 33, no. 2, pp. 65 8, 23. [7] Y. Zhu and M. Ammar, Algorithms for assigning substrate network resources to irtual network components, in IEEE INFOCOM 26, april 26, pp. 2. [8] N. Chowdhury, M. Rahman, and R. Boutaba, Virtual network embedding with coordinated node and link mapping, in IEEE INFOCOM 29, , pp [9] J. Lu and J. Turner, Efficient mapping of irtual networks onto a shared substrate, Washington Uniersity, Tech. Rep. WUCSE-26-35, 26. [] M. Yu, Y. Yi, J. Rexford, and M. Chiang, Rethinking irtual network embedding: substrate support for path splitting and migration, ACM SIGCOMM Comput. Commun. Re., ol. 38, no. 2, pp. 7 29, 28. [] J. Lischka and H. Karl, A irtual network mapping algorithm based on subgraph isomorphism detection, in ACM VISA 29, 29, pp [2] X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, and J. Wang, Virtual network embedding through topology-aware node ranking, SIGCOMM Comput. Commun. Re., ol. 4, pp , April 2. [3] M. Chowdhury, F. Samuel, and R. Boutaba, Polyine: policy-based irtual network embedding across multiple domains, in ACM SIGCOMM VISA 2. New York, NY, USA: ACM, 2, pp [4] N. Butt, N. Chowdhury, and R. Boutaba, Topology-awareness and reoptimization mechanism for irtual network embedding, in Networking, 2, pp [5] I. Houidi, W. Louati, D. Zeghlache, P. Papadimitriou, and L. Mathy, Adaptie irtual network proisioning, in ACM SIGCOMM VISA 2. ACM, 2, pp [6] Auckland Data Trace. [7] Q. Zhao and B. Sadler, A surey of dynamic spectrum access, IEEE Signal Processing Magazine,, ol. 24, no. 3, pp , May 27. [8] S. Zhang, Z. Qian, B. Tang, J. Wu, and S. Lu, Opportunistic bandwidth sharing for irtual network mapping, in IEEE Globecom 2, December 2. [9] H. Schwarz, D. Marpe, and T. Wiegand, Oeriew of the scalable ideo coding extension of the h.264/ac standard, IEEE TCSVT, ol. 7, no. 9, pp. 3 2, sept. 27. [2] S. Zhang, Z. Qian, S. Guo, and S. Lu, FELL: A flexible irtual network embedding algorithm with guaranteed load balancing, in IEEE ICC 2, June 2. [2] L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web. Stanford InfoLab, Technical Report , Noember 999. [22] Marko chain, chain. [23] V. V. Vazirani, Approximation Algorithms. Berlin: Springer, 23. [24] J. Fan and M. H. Ammar, Dynamic topology configuration in serice oerlay networks: A study of reconfiguration policies, in IEEE INFO- COM 26, april 26, pp. 2. [25] B. Ishibashi, N. Bouabdallah, and R. Boutaba, Qos performance analysis of cognitie radio-based irtual wireless networks, in IEEE INFOCOM 28, april 28, pp [26] K. Shiomoto, I. Inoue, and E. Oki, Network irtualization in high-speed huge-bandwidth optical circuit switching network, in IEEE INFOCOM 28 Workshops, april 28, pp. 6. [27] Y. Zhu, R. Zhang-Shen, S. Rangarajan, and J. Rexford, Cabernet: connectiity architecture for better network serices, in ACM CoNEXT 28. New York, NY, USA: ACM, 28, pp. 64: 64:6. [28] J. He, R. Zhang-Shen, Y. Li, C.-Y. Lee, J. Rexford, and M. Chiang, Dainci: dynamically adaptie irtual networks for a customized internet, in ACM CoNEXT 28. ACM, 28, pp. 5: 5:2.
Shared Backup Network Provision for Virtual Network Embedding
Shared Backup Network Provision for Virtual Network Embedding Tao Guo, Ning Wang, Klaus Moessner, and Rahim Tafazolli Centre for Communication Systems Research, University of Surrey Guildford, GU2 7XH,
Bandwidth Allocation in a Network Virtualization Environment
Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero [email protected] Xavier Hesselbach [email protected] Department of Telematics Technical University of Catalonia
Maximizing Revenue with Dynamic Cloud Pricing: The Infinite Horizon Case
Maximizing Reenue with Dynamic Cloud Pricing: The Infinite Horizon Case Hong Xu, Baochun Li Department of Electrical and Computer Engineering Uniersity of Toronto Abstract We study the infinite horizon
Virtual Network Embedding Through Topology-Aware Node Ranking
Virtual Network Embedding Through Topology-Aware Node Ranking iang Cheng, Sen Su, Zhongbao Zhang, Hanchi Wang, Fangchun Yang Beijing University of Posts and Telecommunications {chengxiang,susen, zhongbaozb,
Virtual Network Embedding Algorithms Based on Best-Fit Subgraph Detection
Computer and Information Science; Vol. 8, No. 1; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Virtual Network Embedding Algorithms Based on Best-Fit Subgraph
On Tackling Virtual Data Center Embedding Problem
On Tackling Virtual Data Center Embedding Problem Md Golam Rabbani, Rafael Esteves, Maxim Podlesny, Gwendal Simon Lisandro Zambenedetti Granville, Raouf Boutaba D.R. Cheriton School of Computer Science,
Dynamic node allocation in Network Virtualization
Dynamic node allocation in Network Virtualization M. Said Seddiki, Ye-Qiong Song, Mounir Frikha To cite this version: M. Said Seddiki, Ye-Qiong Song, Mounir Frikha. Dynamic node allocation in Network Virtualization.
Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization
Journal of Computational Information Systems 9: 9 (2013) 3431 3441 Available at http://www.jofcis.com Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Xiaochuan
Dark Pool Trading Strategies, Market Quality and Welfare. Online Appendix
Dark Pool Trading Strategies, Market Quality and Welfare Online ppendix Sabrina Buti Barbara Rindi y Ingrid M. Werner z December, 015 Uniersity of Toronto, Rotman School of Management, [email protected]
IBM SmartCloud Monitoring - Application Insight. User Interface Help SC27-5618-01
IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 ii IBM SmartCloud Monitoring - Application
Virtual Data Center Allocation with Dynamic Clustering in Clouds
BNL-106312-2014-CP Virtual Data Center Allocation with Dynamic Clustering in Clouds Li Shi 33rd IEEE International Performance Computing and Communications Conference (IPCCC 2014) Austin, TX December 5-7,
206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY 2012
206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY 2012 ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping Mosharaf Chowdhury, Student Member, IEEE, Muntasir
Virtual Network Provisioning and Fault-Management across Multiple Domains
Virtual Network Provisioning and Fault-Management across Multiple Domains Distinguished Speaker Series Democritus University of Thrace, Greece Panagiotis Papadimitriou November 2010 Introduction The Internet
On the maximum average degree and the incidence chromatic number of a graph
Discrete Mathematics and Theoretical Computer Science DMTCS ol. 7, 2005, 203 216 On the maximum aerage degree and the incidence chromatic number of a graph Mohammad Hosseini Dolama 1 and Eric Sopena 2
Algorithms for Assigning Substrate Network Resources to Virtual Network Components
Algorithms for Assigning Substrate Network Resources to Virtual Network Components Yong Zhu and Mostafa Ammar Networking and Telecommunications Group Georgia Institute of Technology, Atlanta, Georgia Email:
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
Introducing the Virtual Network Mapping Problem with Delay, Routing and Location Constraints
Introducing the Virtual Network Mapping Problem with Delay, Routing and Location Constraints Johannes Inführ and Günther R. Raidl Abstract Network virtualization is a main paradigm of Future Internet research.
Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers
1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of
GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *
GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks Md. Zakirul Alam Bhuiyan, Guojun Wang,andJieWu School of Information Science and Engineering Central South Uniersity, Changsha
Factors to Consider When Designing a Network
Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
Optimal Pricing for Multiple Services in Telecommunications Networks Offering Quality of Service Guarantees
To Appear in IEEE/ACM Transactions on etworking, February 2003 Optimal Pricing for Multiple Serices in Telecommunications etworks Offering Quality of Serice Guarantees eil J. Keon Member, IEEE, G. Anandalingam,
Vehicle-based Sensor Networks for Traffic Monitoring
Vehicle-based Sensor Networks for Traffic Monitoring Xu Li, Wei Shu, Ming-Lu Li and Min-You Wu Department of Computer Science and Engineering, Shanghai Jiao Tong Uniersity, Shanghai, China Department of
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
How To Model The Effectiveness Of A Curriculum In Online Education Using Bayesian Networks
International Journal of adanced studies in Computer Science and Engineering Modelling the Effectieness of Curriculum in Educational Systems Using Bayesian Networks Ahmad A. Kardan Department of Computer
OPTIMIZING RAILCAR MANAGEMENT
OPTIMIZING RAILCAR MANAGEMENT Optimizing Railcar Management 1 Optimizing Railcar Management By Harpal Singh Time to Take a Second Look at Railcar Planning The cost required to distribute bulk products
Tracking Object Positions in Real-time Video using Genetic Programming
Tracking Object Positions in Real-time Video using Genetic Programming W. Smart and M. Zhang School of Mathematics, Statistics and Computer Science, Victoria Uniersity of Wellington, P. O. Box 600, Wellington,
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference
IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference Note Before using this information and the product it supports,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Scalability of Control Planes for Software Defined Networks:Modeling and Evaluation
of Control Planes for Software Defined Networks:Modeling and Evaluation Jie Hu, Chuang Lin, Xiangyang Li, Jiwei Huang Department of Computer Science and Technology, Tsinghua University Department of Computer
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
Network Virtualization: A Tutorial
Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012
Network Virtualization
Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Traffic Engineering in SDN/OSPF Hybrid Network
2014 IEEE 22nd International Conference on Network Protocols Traffic Engineering in SDN/OSPF Hybrid Network Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi,and Jianping Wu Department of Computer Science
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES Tran Song Dat Phuc - Uyanga Department of Computer Science and Engineering SeoulTech 2014 Table of
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Amotz Bar-Noy Computer and Information Science Department Brooklyn College, CUNY, New York Email: [email protected]
Cloud Computing is NP-Complete
Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,
Load Balancing by MPLS in Differentiated Services Networks
Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Beyond the Stars: Revisiting Virtual Cluster Embeddings
Beyond the Stars: Revisiting Virtual Cluster Embeddings Matthias Rost Technische Universität Berlin September 7th, 2015, Télécom-ParisTech Joint work with Carlo Fuerst, Stefan Schmid Published in ACM SIGCOMM
Approximate String Membership Checking: A Multiple Filter, Optimization-Based Approach
Approximate String Membership Checking: A Multiple Filter, Optimization-Based Approach Chong Sun, Jeffrey Naughton 2, Siddharth Barman 3 Computer Science Department, Uniersity of Wisconsin, Madison 2 W.
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).
Network Virtualization issues on Market Oriented. Eui-Nam Huh
Network Virtualization issues on Market Oriented Cloud Computing Presented By Eui-Nam Huh Kyung Hee University Contents Introduction ti of Network Virtualization ti Related Projects Research Direction
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China [email protected] Bin Liu Tsinghua University Beijing, China [email protected]
Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud
Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more
Multimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: [email protected]
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs Mahdi Ghamkhari and Hamed Mohsenian-Rad Department of Electrical Engineering University of California at Riverside,
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks
Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks Benjamin Schiller and Thorsten Strufe P2P Networks - TU Darmstadt [schiller, strufe][at]cs.tu-darmstadt.de
Survivable Virtual Infrastructure Mapping in Virtualized Data Centers
1 Survivable Virtual Infrastructure Mapping in Virtualized Data Centers Jielong Xu, Jian Tang, Kevin Kwiat, Weiyi Zhang and Guoliang Xue Abstract In a virtualized data center, survivability can be enhanced
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Supply Chain Optimization
Triple Point Brochure Supply Chain Optimization demand planning & collaboration/supply chain planning & scheduling/ Sales & Operations Planning TRIPLE POINT TECHNOLOGY TPT.COM Triple Point Supply Chain
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
