Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization
|
|
|
- Patrick Sutton
- 10 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 9: 9 (2013) Available at Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Xiaochuan SUN 1,, Hongyan CUI 1, Bin XU 2, Jianya CHEN 1, Yunjie LIU 1 1 Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing , China 2 Hebei United University, Tangshan , China Abstract A major challenge in network virtualization environment is how to fairly and efficiently allocate the various sacred physical resources of infrastructure providers among multiple virtual networks. In this paper, we propose a resource allocation scheme based on multidimensional game theory for network virtualization. We introduce multidimensional game theory to virtual resource allocation, aimed at investigating the interactions among multiple VNs. Firstly, we formulate the payoff function of noncooperative VNs, consisting of the utility function, price function and congestion function. Secondly, in the non-cooperative multidimensional resource game scheme, we prove the existence and uniqueness of its multidimensional Nash equilibrium (NE), and then derive the NE solution. Finally, the experimental results show the effectiveness and convergence of our model, and validate the derived NE solution. Keywords: Resource Allocation; Network Virtualization; Multidimensional Game Theory 1 Introduction Currently, deploying new Internet services is being more and more difficult. The existence of multiple stakeholders with conflicting goals and policies, alterations, even necessary ones, does not allow radical changes of the Internet architecture. To overcome the current ossification of the Internet [1, 2], network virtualization has emerged as a new technology to provide versatile customized services over a shared substrate network. Moreover, it has been recognized as an integral part of the next-generation networking paradigm. In a network virtualization environment, the roles of the Internet Service Providers are divided into different entities [3, 4]: the infrastructure providers (InPs) and the service providers (SPs). Project supported by the National Basic Research Program of China (973 program)(no. 2012CB315805); the Fundamental Research Funds for the Central Universities, (No. 2009RC0124); the National Key Science and Technology Projects, (No. 2010ZX ), the National Natural Science Foundation of China, (No ). Corresponding author. address: [email protected] (Xiaochuan SUN) / Copyright 2013 Binary Information Press DOI: /jcis5819 May 1, 2013
2 3432 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) The InPs, allocating various physical resources (e.g. CPU, bandwidth, delay, storage), charge SPs in order to maximize benefits, while the SPs, creating virtual networks (VNs) to provide reliably end-to-end services, focus on how to gain enough resources for maximum benefits. Hence, network virtualization confronts with great challenges how to fairly and efficiently allocate physical resources among multiple virtual networks (VNs) [5, 6, 7, 8]. To tackle the problem, game theory is a natural and powerful tool, which studies how the SPs cooperate or compete with each other to suffice their own requirements. Essentially, it is a multidimensional game problem that multiple SPs (players) obtain multiple resources (strategies). Recently, many researchers have utilized game theory to handle the resource allocation problem in computer networks, especially wireless networks. Zhou etal. [9] proposed a bandwidth allocation scheme based on the non-cooperative game model to describe the interactions among multiple VNs. The authors in [10] proposed a cooperative game approach to Internet pricing, and demonstrated that the leadercfollower game may lead to a solution that is not Pareto optima. The authors in [11] present a non-cooperative game for concurrent instances of a virtual router in order to better allocate the router s physical resources, and use a market-based approach and game theory to maximize the utilization of router s resources. In [12], the authors proposed a non-cooperative game with strict incomplete information based on the energy-efficient criterion to handle the problem of resource allocation for the uplink of a CDMA wireless communication network. In [13], the authors gave an overview of game-theoretic approaches to energy-efficient resource allocation in wireless data networks. However, the above schemes are not able to consider multidimensional game situation [14], that is, multiple players play games in multiple areas simultaneously. In this paper, we propose a resource allocation scheme for network virtualization based on multidimensional game theory. We consider a model that consists of an InP and multiple SPs. It is generally known that the fairness and efficiency of resource allocation directly affect the performance of VNs, even influencing the whole performance of the network virtualization environment. Based on the argument, our research motivation is focus on how to allocate various limited resources among multiple VNs in the framework of multidimensional game theory. The main contributions of the paper are: We propose a resource allocation scheme based on non-cooperative multidimensional game theory in order to investigate the interactions among VNs. More importantly, we firstly apply the multidimensional game theory to the allocation of multiple resources in network virtualization environment. In the framework of multidimensional game, we formulate the payoff function of VNs, consisting of the utility function, price function and congestion function. Additionally, the InPs charge VNs according to the unified price for certain physical resource. We prove that our resource allocation scheme can achieve multidimensional Nash equilibrium. Furthermore, by the Lagrange multiplier method, we demonstrate the existence and uniqueness of the multidimensional Nash equilibrium, and derive the unique NE solution. Finally, the experimental simulation validates the theoretical result. The rest of the paper is organized as follows. In section 2, we model a resource allocation scheme based on non-cooperative multidimensional game theory in network virtualization environment. In section 3, we prove the existence and uniqueness of the multidimensional Nash equilibrium in our model. Section 4 shows the performance results from running the proposed multidimensional game model. Finally, section 5 gives the short conclusion about our work.
3 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) System Model In network virtualization environment, e.g. Global Environment for Network Innovations (GENI) [15], components are the primary building block of the architecture. For example, a component, corresponding to an edge computer, a customizable router, or a programmable access point, encapsulates a collection of resources (e.g. CPU, memory, disk, bandwidth, delay, etc). Hence, here comes the problem of how to allocate various physical resources in numerous VNs. This is essentially a multidimensional game problem that multiple VNs play games for different resource to obtain maximum benefits. Consider a physical network that consists of M different components, denoted by M = {1, 2,, m}(m 2). There exists N = {1, 2,, n}(n 2) different resources in every component. We use C = {c ij, 1 i m, 1 j n} to represent the capacity of the resource j in the component i. Especially, the scalar c ij = 0 means that the component j does not contain the resource i. Subsequently, we model our scheme as the following multidimensional non-cooperative game. The VNs, i.e. players, are denoted by V = {1, 2,, v}(v 2), which implies that v VNs coexist in our scheme. For the k-th VN, the amount of n resources allocated in m components is expressed as the M -dimensional vector (s 1,, s m ) T k = {(xk 11,, x k 1n); ; (x k m1,, x k mn)}, which naturally follows the restriction of 1 i m, 1 j n, and 1 k v, 0 x k ij c ij. Likewise, x k ij = 0 means that the k-th VN does not share the resource j in the component i. In our scheme, s k =(s 1,, s m ) T k is essentially the strategy space of the k-th VN. Based on the strategies, the v VNs compete with each other for the n limited physical resources, aiming at obtaining more resource to maximize their revenues. Moreover, it is an effective way to increase revenues that the VNs should avoid congestion on certain components as much as possible. Formally, we formulate the payoff function of k-th VN, including the three parts as follows. 1) We consider VN utility to be logarithmic similar to Ref. [16, 17]. In our scheme, the utility function U(s k ) of the k-th VN is defined by extending one-dimensional resource allocation to the M-dimensional case, yielding: U(s k )= m i=1 n αj k log (1+ j=1 Θ jx k ij x l ij ) (1) where Θ j is the decoupling factor for the resource j which is used to distinguish sufficiently the demands of different VNs (Θ j > 1), and αj k > 0 is the utility factor of the resource j for the k-th VN which converts utility units to currency. For all the VNs k = 1, 2,, v, we set x ij = v and ᾱ j = v αj, l respectively. l=1 x l ij l=1 2) The price function P (s k ) defines the total price that the k-th VN should pay for using the assigned resource, given by: m n P (s k )= βj k x k ij (2) i=1 where βj k denotes the price per unit of the resource j for the k-th VN. 3) The congestion function C(s k ) [9] defines the congestion cost due to resource overload of certain components for the k-th VN. If the amount of certain resource on certain component, j=1
4 3434 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) obtained by all VNs, is more than the resource capacity, the congestion cost will be charged. Accordingly, the congestion price is expressed as the following equation: m n C(s k ) = γj k [x k ij (c ij x l ij)] (3) i=1 j=1 where γj k denotes the congestion price per unit of the resource j for the k-th VN. x k ij (c ij x l ij) is used to determine whether to generate congestion, defined as follows: if x k ij< c ij c ij occurs. x l ij, then x k ij (c ij v v x l ij, then x k ij (c ij x l ij) = 0, which indicates that no congestion occurs; if x k ij v x l ij) = c ij v x l ij, which indicates that the congestion With the above three parts, the payoff function Ψ(s k ) of the k-th VN eventually takes the following form: Ψ(s k ) = U(s k ) P (s k ) C(s k ) = m n αj k log (1+ Θ jx k ij ) m n β x l j k x k ij ij (4) m n γj k [x k ij (c ij v x l ij)] 3 Analysis of Multidimensional Nash Equilibrium In this section, we propose the definition of multidimensional Nash equilibrium (MNE)for virtual resource allocation, and prove the existence and uniqueness of MNE. Moreover, we give the MNE solutions for unified price scheme of the InP. 3.1 MNE In our multidimensional non-cooperation game model,the k-th VN s optimization problem is to maximize its payoff. Hence, its objective is to find M-dimensional vector s k = (s 1,, s m) T k that solves the following problem: max Ψ(s k) (5) s k >0 In other words, in pursuing the solution for the above multidimensional game, we have to compute the Multidimensional Nash Equilibrium Point (MNEP). Each VN have incentive to reach its MNEP as far as possible, aiming to maximize its payoff, as stated in the following definition. Definition 1 (Multidimensional Nash Equilibrium Point) Let the vector s k be a solution of the problem (5) for the k-th VN. s k = (s 1,, s m) T k is the MNEP for the multidimensional game if for any s k, we have Ψ(s k) Ψ(s k), k = 1, 2,, v (6) where s k is the set of resource strategies selected by the k-th VN except the MNEP s k.
5 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) Existence and uniqueness of MNE So far we have defined the MNEP, and analyzed how to solve it. Subsequently, we prove the existence and uniqueness of multidimensional Nash equilibrium in Theorem 1. Theorem 1 For multidimensional resource allocation in virtualized environments, there exists a multidimensional Nash equilibrium in Equation (4), and its solution is unique. Proof In this case, we consider that the InP charges VNs at unified prices, i.e. for k = 1, 2,, v, β k j = β j and γ k j = γ j. We use Lagrange multiplier method [18] to optimize the function (5), yielding: L = m m n αj k log(1+ Θ jx k ij x k ij v n γj k [x k ij (c ij λ( v x l ij c ij ) l=1 ) m x l ij)] n βj k x k ij where λ is the Lagrange multiplier. For the k-th VN, we take the first order derivative of L with respect to the resource j on the component i, i.e. x k ij, yielding: for j = 1, 2,, n, (7) L x k ij = Θ j αj k x l ij + Θ jx k ij β j γ j λ (8) By solving L x k ij = 0, we have: x k ij = Θ j Θ j 1 α k j β j + γ j + λ 1 Θ j 1 x ij (9) Moreover, we calculate the sum of x k ij(k = 1, 2,, v) over all the VNs, obtaining: x k ij = k=1 which gives the following equation: x ij = Θ j Θ j 1 k=1 After some manipulation, we deduce that α k j β j + γ j + λ 1 Θ j 1 x ij (10) Θ j ᾱ j Θ j 1 β j + γ j + λ v Θ j 1 x ij (11) k=1 x ij = Θ j ᾱ j Θ j + v 1 β j + γ j + λ (12) which is substituted into Eq.(9), obtaining: x k ij = Θ j 1 ᾱ j Θ j 1 β j + γ j + λ (αk j Θ j + v 1 ) (13)
6 3436 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) Additionally, we also calculate the first order derivative of L with respect to Lagrange multiplier λ as follows: L λ = 0 x ij = c ij (14) and then from Eq.(12) and for λ 0, we obtain: λ = Θ j ᾱ j γ j β j (15) Θ j + v 1 c ij We observe that λ is irrelevant for the variable x k ij. Hence, the second partial derivatives with respect to the x k ij are given by: (x k ij )2 (x = Θ 2 jαj k k ij )2 2 (16) ( x l ij + Θ jx k ij ) and based on the Young s Theorem, the mixed second order partial derivatives x k ij xk ij are given by: x k ij xk ij = 2 L x k ij x k ij x k ij xk ij and = 0 (j j) (17) To test the second order optimality condition, consider the N N Hessian matrix H of the payoff function Ψ(s k ) with the constraint (see (5)) for the component i, written as: H = = (x k i1 )2 x k i2 xk i1 x k i1 xk i2 x k in xk i1 x k i1 xk in 2 L (x k i2 )2 x k i2 xk in... x k in xk i2 (x k in )2 Θ 2 j αk j ( x l i1 +Θ jx k 2 0 i1 )... 0 Θ 2 j αk j ( x l in +Θ jx k 2 in ) Existence : From the Eq.(18), observe that the Hessian matrix H is a diagonal matrix in which all the elements of the principal diagonal are negative. Hence, all n-order leading principal minors has the following characteristics: (18) ( 1) k H k > 0, k = 1, 2,, n (19) where those k-order leading principal minors are negative if k is odd and positive if k is even.
7 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) The authors in [19] proposed the second-order sufficient condition for extremum. That is, for a given objective function f(x), if all leading principal minors of its corresponding Hessian matrix are positive, then f(x) obtains a minimum; if they duly alternate in signs, the first one being negative, then f(x) obtains a maximum. Hence, according to Eq.(19), Ψ(s k ) has the maximum for the component i (i = 1, 2,, m). It means that there exists m NEs on m components, which constitutes a m-dimensional NE. Uniqueness : In [20], Cachon and Netessine proposed the following two theorems to prove the uniqueness of Nash equilibrium (NE). Theorem 2 If the best response mapping is a contraction on the entire strategy space, there is unique NE in the game. Theorem 3 The mapping f(x), R n R n is a contraction if and only if the Hessian matrix of f(x) is the diagonally dominant matrix, that is: n 2 f(x) x i x k < 2 f(x), k = 1, 2,, n (20) i=1, i k x 2 k From Eq.(16)-(17), we can clearly observe that for i = 1, 2,, m, n x k ij xk ij < j=1,j j (x k ij )2 (21) which indicates that the Hessian matrix H satisfies diagonally dominant condition. Hence, from Theorem 3, we can prove that the payoff function Ψ(s k ), subjecting to the constraint given in (5), is a contraction on the entire strategy space of the component i. According to Theorem 2, there exists a unique NE on the component i. Moreover, substituting Eq.(15) into Eq.(13), we obtain the unique NE solution on the component i, given by: for j = 1, 2,, n, x k ij = c ij Θ j 1 Θ j + v 1 (αj k ᾱ j ᾱ j Θ j + v 1 ) (22) For all the components i (i = 1, 2,, m), due to independent among m component, there exists a unique m-dimensional NE, consisting of m unique NEs on m different components. 4 Simulation Results In this section, we evaluate the proposed multidimensional game model (MGM) for virtual resource allocation to provide better understanding of VNs behaviors to achieve maximum payoffs. Moreover, we compare it with the game theory model (GTM) [9] on bandwidth allocation. The models are simulated numerically in the MATLAB environment.we focus on the convergence of the multidimensional NE as regards our model, and investigate the payoffs of VNs with various price parameters. In our experiment, we consider the network topology with four components in Figure 1. Component 1 and 2 (e.g. network links) have bandwidth and delay, while component 3 and 4 (e.g. server)have CPU and storage. Furthermore, we employ two VNs to evaluate the performance of the proposed model on our topology, which implies that both VNs play 4-dimensional game, and every dimension includes two resources.
8 3438 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) Table 1: The list of parameters for the multidimensional game model in both price cases Resource Bandwidth Delay CPU Storage VN VN1 Parameter VN2 VN1 VN2 VN1 VN2 VN1 VN2 Θ α 20 $ 10 $ 5 $ 6 $ 10 $ 15 $ 9 $ 11 $ β 0.05 $/Mbps 0.08 $/ms $/MIP S/GHz 0.03 $/GB γ 0.02 $/Mbps $/MIP S/GHz 0.01 $/GB Component 1 200Mbps, 10ms Component 3 Component MIPS/GHz 500Gb MIPS/GHz 100Gb 800Mbps, 15ms Component 2 Fig. 1: Network topology with four components To evaluate the feasibility of the proposed model, we consider the most complicated case, that is, congestion occurs in every components. Hence, the Eq.(4) can be rewritten as: Ψ(s k ) = U(s k ) P (s k ) C(s k ) = m n αj k log (1+ Θ jx k ij ) m m n γ j (c ij x l ij l=1, v l k x l ij) n β j x k ij (23) We set bandwidth requirement to be 600Mbps for both VNs, but the total capacity for bandwidth is 1000Mbps in the component 1 and 2, which leads to congestion. We assume that if the bandwidth of certain component is required, the corresponding delay is also obtained. Likewise, we set CPU and storage requirements to be MIP S/GHz (MIPS: Million Instructions Per Second) and 350GB for both VNs, respectively, which also leads to congestions. Moreover, as shown in Table 1, we set decoupling factor Θ and price parameters α, β, γ for V N1 and V N2. Initially, the VN1 is allocated 210Mbps on component1, 390Mbps on component2, MIP S/GHz and 250GB on component 3, MIP S/GHz and 60GB on component 4, while the VN2 is allocated 130M bps on component1, 470M bps on component2, MIP S/GHz and 260GB on component 3, MIP S/GHz and 80GB on component 4.
9 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) Bandwidth allocation (Mbps) Mbps 140Mbps 60Mbps 0Mbps VN1 for MGM VN2 for MGM VN1 for GTM VN2 for GTM Iteration number Bandwidth allocation on component 2 (Mbps) Mbps 550Mbps 250Mbps VN1 for MGM VN2 for MGM VN1 for GTM VN2 for GTM 200Mbps Iteration number (a) Component 1 (b) Component 2 Fig. 2: Bandwidth allocation for MGM and GTM in unique prices case. CPU allocation on component 3 (MIPS/GHz) 1.6 x (12350MIPS/GHz, 308GB) (7650MIPS/GHz, 192GB) CPU allocation for VN1 Storage allocation for VN1 CPU allocation for VN2 Storage allocation for VN Iteration number Storage allocation on component 3(GB) CPU allocation on component 4 (MIPS/GHz) (6150MIPS/GHz, 60GB) CPU allocation for VN1 Storage allocation for VN1 CPU allocation for VN2 Storage allocation for VN2 (3850MIPS/GHz, 40GB) Iteration number Storage allocation on component 4 (GB) (a) Component 3 (b) Component 4 Fig. 3: CPU and storage allocation on for MGM in unique prices case. We firstly consider the MNE situations of MGM on four components for the unique prices case. Fig.2(a)-2(b) show bandwidth allocation of MGM and GTM on component 1 and 2, respectively. It should be noted that after one iteration, VN1 and VN2 in both models achieve NEs. In Fig.2(a), the NEPs of VN1 and VN2 for MGM are (140Mbps, 10ms) and (60Mbps, 10ms) on component 1, approximate to the theoretical value (138M bps, 10ms) and (62M bps, 10ms) (from Eq.(22)), while for GTM, the NEPs of VN1 and VN2 are (200Mbps, 10ms) and (0Mbps, 10ms). It implies that compared with the GTM, the proposed MGM can more fairly allocate bandwidth, which helps keep network reliability. The similar situation appears on component 2, as shown in Fig.2(b). Fig.3(a)-3(b) show CPU and storage allocation of VN1 and VN2 for MGM on component 3 and 4. It is also observed that after one iteration, VN1 and VN2 achieve NEs, and the corresponding NEPs are marked in Fig.3(a)-3(b). By computation (from Eq.(22)), we obtain the NE solutions of VN1 and VN2, i.e., ( MIP S/GHz, 188.9GB) and ( MIP S/GHz, 311.1GB) on component 3, ( MIP S/GHz, 37.8GB) and ( MIP S/GHz, 62.2GB) on component 4. We see that there is a close agreement between the simulation results and theoretical values.
10 3440 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) VN1 VN2 140 Total payoff ($) Iteration number Fig. 4: Total payoffs for VN1 and VN2 Fig.4 shows the total payoffs of VN1 and VN2 versus iteration number. It is seen from the figure that when achieving NEs on component 3 and 4 after one iteration, both VNs obtain maximum payoffs. 5 Conclusions This paper presented a resource allocation scheme based on multidimensional game theory in network virtualization environment. Using the tools of game theory, this problem was recognized as a non-cooperative multidimensional game, in which the VNs compete with each other for multiple resources so as to maximize their payoff functions. We formulate the payoff function of VNs and prove the existence and uniqueness of MNE. Furthermore, when the InPs charge different VNs for certain resource at the unified price scheme, we derive the unique NE solution. Finally, through the experiment and analysis, we show the effectiveness and convergence of NE for our model. In future, we will focus on how to model multidimensional game based resource allocation scheme when the InPs charge different VNs at differentiated price. References [1] Anderson T, Peterson L, Shenker S, Turner J, Overcoming the Internet impasse through virtualization, Computer, vol. 38, no. 4, 2005, pp [2] Chowdhury N M M K, Boutaba R, Network virtualization: state of the art and research challenges, Communications Magazine, IEEE, vol. 47, no. 7, 2009, pp [3] Turner J S, Taylor D E, Diversifying the Internet, Global Telecommunications Conference, GLOBECOM 05. IEEE, 2005, pp [4] Jeamster N, Gao L, Rexford J, How to lease the Internet in your spare time, ACM SIGCOMM Computer Communication Review, vol. 37, no. 1, 2007, pp [5] Yu M, Yi Y, Rexford J, Chiang M, Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration, ACM SIGCOMM Computer Communication Review, vol. 38,
11 X. Sun et al. /Journal of Computational Information Systems 9: 9 (2013) no. 2, 2008, pp [6] Zhu Y, Ammar M, Algorithms for Assigning Substrate Network Resources to Virtual Network Components, INFOCOM th IEEE International Conference on Computer Communications. Proceedings, 2006, pp [7] Houidi I, Louati, W, Zeghlache D, A Distributed Virtual Network Mapping Algorithm, Communications, ICC 08. IEEE International Conference on, 2008, pp [8] Chowdhury N M M K, Rahman M R, Boutaba R, Virtual Network Embedding with Coordinated Node and Link Mapping, INFOCOM 2009, IEEE, April 2009, Rio de Janeiro, USA: IEEE, 2009, pp [9] Zhou Y, Li Y, Sun G, Jin D P, Su L, Zeng L G, Game Theory Based Bandwidth Allocation Scheme for Network Virtualization, Global Telecommunications Conference (GLOBECOM 2010), 2010, pp [10] Cao X R, Shen H X, Milito R, Wirth P, Internet pricing with a game theoretical approach: concepts and examples, Networking, IEEE/ACM Transactions on, vol. 10, no. 2, 2002, pp [11] Seddiki M S, Frikha M, Resource Allocation for Virtual Routers through Non-Cooperative Games, Computer Communications and Networks (ICCCN), st International Conference on, 2012, pp [12] Bacci G, Luise, M, Game-Theoretic CDMA Power Control for Code Acquisition during Network Association, Communications (ICC), 2011 IEEE International Conference on, 2011, pp [13] Meshkati F, Poor H V, Schwartz S C, Energy-Efficient Resource Allocation in Wireless Networks, Signal Processing Magazine, IEEE, vol.24, no. 3, 2007, pp [14] Peng R Y, Wang H P, Wang Z P, Lin Y, Decision-making of Aircraft Optimum Configuration Utilizing Multidimensional Game Theory, CHINESE JOURNAL OF AERONAUTICS, vol. 23, no. 2, 2010, pp [15] GENI Planning Group, GENI Design Principles, Computer, vol. 39, no. 9, 2006, pp [16] Hadji M, Louati W, Zeghlache D, Constrained Pricing for Cloud Resource Allocation, Network Computing and Applications (NCA), th IEEE International Symposium on, 2011, pp [17] Al Daoud A, Alpcan T, Agarwal S, Alanyali M, A stackelberg game for pricing uplink power in wide-band cognitive radio networks, Decision and Control, CDC th IEEE Conference on, 2008, pp [18] Ma R T B, Lee S C M, Lui J C S, Yau D K Y, Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach, Networking, IEEE/ACM Transactions on, vol. 14, no. 5, 2006, pp [19] Alpha C. Chiang, Kevin Wainwright. Fundamental Methods of Mathematical Economics, McGraw- Hill/Irwin, New York, 2005, pp [20] Cachon G P, Netessine S, Game Theory in Supply Chain Analysis, INFORMS, Maryland, USA, 2005, pp
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Bandwidth Allocation in a Network Virtualization Environment
Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero [email protected] Xavier Hesselbach [email protected] Department of Telematics Technical University of Catalonia
Dynamic node allocation in Network Virtualization
Dynamic node allocation in Network Virtualization M. Said Seddiki, Ye-Qiong Song, Mounir Frikha To cite this version: M. Said Seddiki, Ye-Qiong Song, Mounir Frikha. Dynamic node allocation in Network Virtualization.
Shared Backup Network Provision for Virtual Network Embedding
Shared Backup Network Provision for Virtual Network Embedding Tao Guo, Ning Wang, Klaus Moessner, and Rahim Tafazolli Centre for Communication Systems Research, University of Surrey Guildford, GU2 7XH,
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing
Journal of Computational Information Systems 11: 16 (2015) 6037 6045 Available at http://www.jofcis.com Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Renfeng LIU 1, Lijun
On Tackling Virtual Data Center Embedding Problem
On Tackling Virtual Data Center Embedding Problem Md Golam Rabbani, Rafael Esteves, Maxim Podlesny, Gwendal Simon Lisandro Zambenedetti Granville, Raouf Boutaba D.R. Cheriton School of Computer Science,
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Simple Channel-Change Games for Spectrum- Agile Wireless Networks
Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
Virtual Network Embedding Algorithms Based on Best-Fit Subgraph Detection
Computer and Information Science; Vol. 8, No. 1; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Virtual Network Embedding Algorithms Based on Best-Fit Subgraph
Resource Estimation for Network Virtualization through Users and Network Interaction Analysis
13 IEEE 1st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems Resource Estimation for Networ Virtualization through Users and Networ Interaction Analysis
Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee
International Journal of Science and Engineering Vol.4 No.2(2014):251-256 251 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of
A New Nature-inspired Algorithm for Load Balancing
A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China [email protected] Bin Liu Tsinghua University Beijing, China [email protected]
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Functional Optimization Models for Active Queue Management
Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA [email protected]
Virtual Network Provisioning and Fault-Management across Multiple Domains
Virtual Network Provisioning and Fault-Management across Multiple Domains Distinguished Speaker Series Democritus University of Thrace, Greece Panagiotis Papadimitriou November 2010 Introduction The Internet
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
A Cournot-Nash Bertrand Game Theory Model of a Service-Oriented Internet with Price and Quality Competition Among Network Transport Providers
of a Service-Oriented Internet with Price and Quality Competition Among Network Transport Providers Anna Nagurney 1 Tilman Wolf 2 1 Isenberg School of Management University of Massachusetts Amherst, Massachusetts
Application of Game Theory in Inventory Management
Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile [email protected] Abstract. Game theory has been successfully applied
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
Multiobjective Multicast Routing Algorithm
Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py
Game Theory Based Iaas Services Composition in Cloud Computing
Game Theory Based Iaas Services Composition in Cloud Computing Environment 1 Yang Yang, *2 Zhenqiang Mi, 3 Jiajia Sun 1, First Author School of Computer and Communication Engineering, University of Science
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Parallel Computing for Option Pricing Based on the Backward Stochastic Differential Equation
Parallel Computing for Option Pricing Based on the Backward Stochastic Differential Equation Ying Peng, Bin Gong, Hui Liu, and Yanxin Zhang School of Computer Science and Technology, Shandong University,
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
Network Virtualization: A Tutorial
Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012
Optimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
Profit-driven Cloud Service Request Scheduling Under SLA Constraints
Journal of Information & Computational Science 9: 14 (2012) 4065 4073 Available at http://www.joics.com Profit-driven Cloud Service Request Scheduling Under SLA Constraints Zhipiao Liu, Qibo Sun, Shangguang
Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing
Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing Hilda Lawrance* Post Graduate Scholar Department of Information Technology, Karunya University Coimbatore, Tamilnadu, India
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
Manipulability of the Price Mechanism for Data Centers
Manipulability of the Price Mechanism for Data Centers Greg Bodwin 1, Eric Friedman 2,3,4, and Scott Shenker 3,4 1 Department of Computer Science, Tufts University, Medford, Massachusetts 02155 2 School
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science
Optimization of IP Load-Balanced Routing for Hose Model
2009 21st IEEE International Conference on Tools with Artificial Intelligence Optimization of IP Load-Balanced Routing for Hose Model Invited Paper Eiji Oki Ayako Iwaki The University of Electro-Communications,
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA [email protected]
A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
PART 1: INSTRUCTOR INFORMATION, COURSE DESCRIPTION AND TEACHING METHODS
PART 1: INSTRUCTOR INFORMATION, COURSE DESCRIPTION AND TEACHING METHODS 1.1 General information Full course title: Quantitative Methods in Economics Type of course: Compulsory Level of course B.A. Year
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Amotz Bar-Noy Computer and Information Science Department Brooklyn College, CUNY, New York Email: [email protected]
Effects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment
Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Dusit Niyato, Zhu Kun, and Ping Wang School of Computer Engineering, Nanyang Technological University (NTU), Singapore
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES Tran Song Dat Phuc - Uyanga Department of Computer Science and Engineering SeoulTech 2014 Table of
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing B.Sudhanantham 1, M.Shankar 2 PG Scholar, Dept. of CSE, Angel College of Engineering and Technology, Tirupur, India 1
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Capacity Management and Equilibrium for Proportional QoS
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Capacity Management and Equilibrium for Proportional QoS Ishai Menache and Nahum Shimkin, Senior Member, IEEE Abstract Differentiated services architectures are scalable
Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
The Characteristic Polynomial
Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem
Distributed Control of Heating, Ventilation and Air Conditioning Systems in Smart Buildings
Distributed Control of Heating, Ventilation and Air Conditioning Systems in Smart Buildings Najmeh Forouzandehmehr Electrical and Computer Engineering Department University of Houston Houston, Texas, USA
Dynamic Scheduling and Pricing in Wireless Cloud Computing
Dynamic Scheduling and Pricing in Wireless Cloud Computing R.Saranya 1, G.Indra 2, Kalaivani.A 3 Assistant Professor, Dept. of CSE., R.M.K.College of Engineering and Technology, Puduvoyal, Chennai, India.
Network Virtualization: State of the Art and Research Challenges
1 Network Virtualization: State of the Art and Research Challenges N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba, University of Waterloo Abstract Recently network virtualization has been pushed forward
A Study on Software Defined Networking
A Study on Software Defined Networking Yogita Shivaji Hande, M. Akkalakshmi Research Scholar, Dept. of Information Technology, Gitam University, Hyderabad, India Professor, Dept. of Information Technology,
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC
EDA ad hoc B program CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC Learning algorithms for power and frequency allocation in clustered ad hoc networks Luca ROSE,
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
COST MINIMIZATION OF RUNNING MAPREDUCE ACROSS GEOGRAPHICALLY DISTRIBUTED DATA CENTERS
COST MINIMIZATION OF RUNNING MAPREDUCE ACROSS GEOGRAPHICALLY DISTRIBUTED DATA CENTERS Ms. T. Cowsalya PG Scholar, SVS College of Engineering, Coimbatore, Tamilnadu, India Dr. S. Senthamarai Kannan Assistant
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061
Algorithmic Mechanism Design for Load Balancing in Distributed Systems
In Proc. of the 4th IEEE International Conference on Cluster Computing (CLUSTER 2002), September 24 26, 2002, Chicago, Illinois, USA, IEEE Computer Society Press, pp. 445 450. Algorithmic Mechanism Design
Enterprise Computer Network Reliability Analysis
, pp. 285-294 http://dx.doi.org/10.14257/ijmue.2015.10.1.28 Enterprise Computer Networ Reliability Analysis Yongfeng Cui, Wei Liu and Ya Li School of Science and Technology, Zhouou Normal University, Zhouou
