Shared Backup Network Provision for Virtual Network Embedding
|
|
|
- Constance Lynch
- 10 years ago
- Views:
Transcription
1 Shared Backup Network Provision for Virtual Network Embedding Tao Guo, Ning Wang, Klaus Moessner, and Rahim Tafazolli Centre for Communication Systems Research, University of Surrey Guildford, GU2 7XH, United Kingdom {t.guo, n.wang, k.moessner, r.tafazolli, Abstract Network virtualization has been recognized as a promising solution to enable the rapid deployment of customized services by building multiple Virtual Networks (VNs) on a shared substrate network. Whereas various VN embedding schemes have been proposed to allocate the substrate resources to each VN requests, little work has been done to provide backup mechanisms in case of substrate network failures. In a virtualized infrastructure, a single substrate failure will affect all the VNs sharing that resource. Provisioning a dedicated backup network for each VN is not efficient in terms of substrate resource utilization. In this paper, we investigate the problem of shared backup network provision for VN embedding and propose two schemes: shared on-demand and shared proactive backup schemes. Simulations experiments show that both proposed schemes make better utilization of substrate resources than the dedicated backup scheme without sharing, while each of them has its own advantages. I. INTRODUCTION The concept of network virtualization has recently attracted significant attentions as a promising solution to provide versatile customized services over a shared substrate network [1]. Multiple service providers can lease the sliced physical resources from one or more infrastructure providers to form their own Virtual Networks (VNs) without significant investment on hardware. Each VN is implemented by connecting virtual nodes with virtual links. Each VN request may arrive and leave online. From the point of view of a service provider, enough physical resources should be secured to run customized services, such as node processing resources and link bandwidth. From the point of view of an infrastructure provider, the cost of hosting an individual virtual network should be minimized in order to maximize the long-term revenue by accepting more VN requests. The efficient embedding/mapping of virtual networks to physical networks provide an immediate challenge toward future virtualized Internet. While a number of schemes have been recently proposed for resource allocation in network virtualization environments [2] [6], they did not provide the backup mechanisms to combat potential node/link failures except [6]. Given a failure-prone Internet due to various disruption causes such as maintenance, fiber cut, policy change and misconfiguration, the substrate nodes/links may not operate properly all the time. In case of a substrate node/link failure, all the virtual networks using This work has been supported by the Virtual Centre of Excellence in Mobile & Personal Communications (Mobile VCE) Core 5 Program. that node/link will be affected. The infrastructure providers may incur economic penalty due to the breaking of Service Level Agreements (SLAs) with the service providers. In [6], a reactive backup mechanism is proposed for virtual network embedding to protect against single substrate link failures. Before any VN request arrives, the bandwidth of a substrate link is divided into two parts: one reserved for primary flows and the other reserved for backup flows. When a VN request arrives, it will be mapped to the residual primary bandwidth of the substrate links. In the event of a substrate link failure, a reactive online optimization mechanism is invoked to allocate the resources from the available backup bandwidth of the substrate links for rerouting the affected primary traffic. With the increase of the transmission capabilities, any failure may cause a vast amount of data loss and it may not be possible to activate the restoration mechanisms after the failure. Furthermore, while the effect of different bandwidth divisions for the substrate links has been evaluated in [6], it did not provide a mechanism to find the optimal division solution. In this paper, we investigate the problem of allocating the protection resources for virtual networks before a failure happens. As a first step, we consider the solutions to protect against any single substrate link failure since multiple concurrent failures rarely occur in real world. In principle, a dedicated backup network can be allocated to each virtual network. However, it is not resource efficient from the perspective of an infrastructure provider. It is expected that the backup resources can be reused by other virtual networks to make room for accepting more VN requests. We propose two shared backup network provision mechanisms for virtual network embedding: Shared On-Demand approach (SOD BK) and Shared Proactive approach (SP BK). In the first approach, backup resources are allocated upon the arrival of each VN request. In the second approach, backup resources are pre-allocated during the configuration phase before any VN request arrives to protect against any potential single link failure. In either approach, the backup paths have been configured with capable bandwidth when the VN request is mapped. The rest of the paper is organized as follows. Section II summarizes the related work. Section III formally defines the problem of backup network provision for virtual network embedding. Section IV presents the shared backup network design approaches. In Section V, the performance of the
2 proposed schemes is evaluated in a comparison to a baseline backup scheme without sharing and the original virtual network embedding scheme without backup. Finally, Section VI summarizes the key points and draws a conclusion. II. RELATED WORK The problem of virtual network embedding itself is already extremely challenging and is NP-hard even in the offline case. Heuristic based approaches have been proposed in [2] to perform a two-stage embedding approach by selecting the capable substrate nodes firstly and connecting the selected nodes based on the shortest path routing thereafter. To make better resource utilization and improve acceptance ratio of VN requests, a multi-commodity flow approach has been presented in [3] to implement link mapping. By mapping a virtual link to multiple physical paths, the bandwidth constraint of the virtual link can be satisfied as long as the available bandwidth sum of the physical paths is no less than the requested bandwidth. Chowdhury et al. [4] has proposed a mathematical programming based scheme to coordinate node and link mapping. A backtracking algorithm based on subgraph isomorphism detection has been proposed in [5] to map nodes and links during the same stage. Survivable network design has been a fruitful area for optical and Multiprotocol Label Switching (MPLS) networks [7] [9]. However, the problems studied there are an offline version and/or assume the traffic demand matrix has been given in advance. Under the unpredicted arrival and demand pattern of VN requests, the problem of provisioning the backup networks becomes very challenging. The complexities of the available solutions for the survivable network design are typically prohibitive for online invoking, especially when practical considerations such as the number limit and the hopcount limit of the bypass paths are taken into account. A. Substrate Network III. PROBLEM FORMULATION The substrate network is modelled as an undirected graph G S = (N S, E S ), where N S is the set of substrate nodes and E S is the set of substrate links. Each substrate node x N S is associated with a CPU computing capability CP U(x) and a location LOC(x). Each substrate link s E S is associated with a bandwidth transport capability B(s). Note that both the CPU and bandwidth capabilities are allocated by the infrastructure providers based on their own policies and agreements with the service providers, and thus, they do not have to be equivalent to the capabilities of the physical routers and cables. B. VN Request Similar to the substrate network, a VN request is also modelled as an undirected graph G V = (N V, E V ), where N V is the set of virtual nodes and E V is the set of virtual links. Each virtual node y N V has a CPU computing demand CP U(y) and a preferred location LOC(y). Each virtual link v E V has a bandwidth transport demand B(v) and a delay constraint DELAY (v). In addition, each VN request defines a distance constraint DIST V for the virtual nodes, which specifies how deviated y can be placed from its preferred location. C. VN Embedding The process of original VN embedding is to find a mapping M from G V to G S such that all the demands and constraints in G V are satisfied. In particular, a virtual node is mapped to a substrate node in a one-to-one manner such that both the CPU demand of the virtual node and its location constraint can be satisfied. A virtual link is mapped to a set of substrate paths such that the total available bandwidth of the substrate paths can support the bandwidth demand of the virtual link and each individual substrate path meets the Quality of Service (QoS) constraint of the virtual link. Let P a (x 1, x 2 ) denotes the set of all possible substrate paths from substrate node x 1 to x 2, R N (x) denotes the residual CPU resource at substrate node x and R E (P P a (x 1, x 2 )) denotes the total residual bandwidth of a P a s subset P from x 1 to x 2. This process can be formulated as follows: Node mapping M N ( y N V ): M N (y) N S M N (y) = M N (y ), iff y = y Link mapping M E ( v = (y 1, y 2 ) E V ): D. VN Backup M E (v = (y 1, y 2 )) P a (M N (y 1 ), M N (y 2 )) CP U(y) R N (M N (y)) dist ( LOC(y), LOC(M N (y)) ) DIST V B(v) R E (M E (v)) delay(p) DELAY (v), p M E (v) In addition to mapping the primary flows of a VN request, the backup paths and bandwidth need to be allocated for the VN request such that in case of any single substrate link failure it is guaranteed that the affected traffic can be routed via the backup paths immediately without disrupting the current services. A VN request can be admitted only if its CPU demands, primary flow demands and restoration flow demands are all satisfied. E. Objectives From the point of view of infrastructure providers, they hope to maximize their revenue in the long run. The revenue here corresponds to the economic profit of accepting VN requests. Assuming each VN request has similar location and QoS constraints, the revenue of accepting a VN request is mainly determined by the total demands of the VN. We define the revenue of accepting a VN request as: Rev(G V ) = T (G V ) ( ) B(v) + w CP U(x) (1) v E V x N V
3 where T (G V ) is the duration of the VN request and w is the weight to determine the relative importance of the CPU and bandwidth resource. Note that the allocated backup resource does not produce profit directly. However, this requirement is normally implicitly included in the SLAs between the infrastructure provider and the service provider. Therefore, it is left for the infrastructure provider to decide how to provide effective protection mechanisms. IV. SHARED BACKUP NETWORK PROVISION In this section, we present two shared backup network provision approaches for VN embedding. To protect against a link failure, the restoration can be implemented at link or path level. In link restoration, each link with primary flows is protected by a set of pre-configured bypass paths. Upon a failure of a link, traffic on this link will be locally routed over the bypass paths. In path restoration, each primary path will be protected by a disjoint backup path from source to destination. Upon a failure of a link, error information will be sent to the source and the source will activate the backup path. In context of VN embedding, each substrate link may be concurrently shared by a number of VNs. Path restoration may cause large error information propagation overhead and latency. In this paper, link restoration is adopted for fast recovery. Similar to [6], a set of possible bypass paths is pre-computed for each substrate link. The number of paths and QoS constraint can be forced when pre-computing the set of candidate bypass paths. A. Shared On-Demand Approach (SOD BK) In this approach, we allocate the substrate bandwidth to both the primary flows of a VN request for normal working and the restoration flows for fast recovery upon the arrival of the VN request. For the primary flows of a VN request, no bandwidth sharing is possible since they need to be operating all the time. For the restoration flows to protect against different substrate link failures, they can share the bandwidth to minimize the resource utilization for backup purpose. When a VN request arrives, node embedding phase is first implemented to figure out the placement of virtual nodes. For a virtual link v = (y 1, y 2 ) E V connecting two virtual nodes y 1 and y 2, M N (y 1 ) = x 1 N S and M N (y 2 ) = x 2 N S. Let P (v) P a (x 1, x 2 ) denote the set of pre-selected QoS constrained candidate paths for the virtual link v, and let R(s) denote the set of candidate bypass paths for a substrate link s E S. We use I s (p) as an indicator to indicate whether or not a substrate link s is on a substrate path p. I s (p) = 1, if s p, 0 otherwise. Let R s denote the residual bandwidth of a substrate link s, Z s denote the already reserved backup bandwidth on s, and Ys f denote the bandwidth requirements of the restoration flows on s in case of another substrate link f failure. The linear program formulation is presented as follows: Variables: x p (v): The primary flow on the substrate path p for the virtual link v. y r (f): The restoration flow on the substrate path r in case of the substrate link f failure. z s : The total bandwidth need to be reserved on the substrate link s for the restoration flows. Objective: Minimize: R s + δ ( I s (p)x p (v) + z s ) (2) s E S 1 Capacity constraint: I s (p)x p (v) + z s R s, s E S (3) Primary flow constraint: x p (v) = B(v), v E V (4) p P (v) Restoration flow constraint: y r (f) = Restoration bandwidth constraint: I s (r)y r (f) z s + Z s Y s (f), Domain Constraints: x p (v) 0, I f (p)x p (v), s E S (5) v E V, p P (v) s E S, f E S (6) y r (f) 0, f E S, r R(f) (7) z s 0, s E S The objective function (2) tries to minimize the total resource need to be reserved for both primary flows and restoration flows as well as balance the load to avoid a bottleneck link separating the substrate topology. δ 0 is a small positive constant to avoid division by zero. Constraint (3) bounds the total reserved bandwidth to be at most the residual substrate link capability. Constraint (4) represents that the requirements of the primary flows of all the virtual links should be satisfied. Constraint (5) represents that in case of a substrate link failure, all the affected primary traffic on that link should be able to reroute through the bypass paths. Constraint (6) ensures that the accumulated reserved bandwidth for backup purpose including the previously reserved bandwidth before the VN arrives should be able to support all the restoration traffic of all the VNs. After the VN request is embedded, the residual CPU, total residual bandwidth, total reserved backup bandwidth and the restoration flow information need to be updated. We use t and t + 1 to denote the time point before a VN request arrives and after it is admitted, respectively. For each substrate link s E S, R s (t + 1) = R s (t) I s(p)x p (v) z s, Z s (t + 1) = Z s (t) + z s, and Ys f (t + 1) = Ys f (t) + I s(r)y r (f). At the end of the lifetime of the VN request, the corresponding resource
4 allocated for the VN should be released. Similarly, we use t and t+1 to denote the time point before and after a VN request departures, respectively. For each substrate link s E S, we first update Ys f (t+1) = Ys f (t) I s(r)y r (f), then we find Z s (t+1) = max f E S (Ys f (t+1)), and finally, R s (t+1) = R s (t) + v E p P V (v) I s(p)x p (v) + Z s (t) Z s (t + 1). B. Shared Proactive Approach (SP BK) In this approach, we pre-allocate the backup bandwidth for each substrate link during network pre-configuration phase. As it is impossible to predict the arrival and demand pattern of the future VN requests, the allocated bandwidth should be able to protect the maximum allowed primary flows on each substrate link. The linear program formulation is presented as follows: Variables: α s : The percentage of the bandwidth allocated on a substrate link s for mapping primary flows. y r (f): The restoration flow on the substrate path r in case of the substrate link f failure. Objective: Maximize: s E S α s B(s) (8) Restoration flow constraint: y r (f) = α f B(f), f E S (9) Restoration bandwidth constraint: I s (r)y r (f) (1 α s )B(s), Domain Constraints: s E S, f E S (10) y r (f) 0, f E S, r R(f) α s 0, s E S (11) The objective function (8) tries to maximize the total protected bandwidth of the substrate network for mapping primary flows. Constraint (9) represents that the bandwidth allocated on each substrate link for mapping primary flows should be fully protected via the restoration flows over its bypass paths. Constraint (10) ensures that for any substrate link failure, the bandwidth demand of the restoration flows can be satisfied by the pre-allocated backup bandwidth. This preallocation approach only needs to be implemented once before any VN request arrives, and thus can significantly reduce the computing load during VN embedding. Furthermore, any proposed VN embedding schemes can be directly applied after the pre-allocation phase. V. PERFORMANCE EVALUATION In this section, the performance of the proposed schemes is evaluated in a comparison to a baseline on-demand backup scheme without sharing (OD BK) and the original VN embedding scheme without backup (NO BK). For simplicity, the greedy heuristic in [2] [3] is used for node embedding. TABLE I AVERAGE SIMULATION RESULTS Schemes CPU Demands: [0, 5] CPU Demands: [0, 20] P ac Rev P bk P ac Rev P bk NO BK OD BK SOD BK SP BK A. Simulation Environment A discrete-event simulator is implemented to evaluate the performance of all the four schemes. The simulation setup is similar to previous work [3] [4] [6]. A substrate network topology with 50 nodes and around 250 links is generated via the GT-ITM tool [10], the scale of which corresponds a medium-sized Internet domain. All the nodes are randomly distributed in a grid.the substrate node CPU and link bandwidth capacities follow a uniform distribution between 50 and 100 resource units. The VN requests arrive in a Poisson manner with an average rate of 5 VNs per 100 time units. The duration of the requests follows an exponential distribution with an average lifetime of 1000 time units. In a VN request, the number of virtual nodes follows a uniform distribution between 2 and 10. Each VN node has a preferred location uniformly distributed in the same grid as the substrate topology and the distance constraint DIST v is assumed to be 5 for all the VN requests. The average connectivity ratio between a pair of virtual nodes is 0.5.The delay constraints DELAY v for the virtual links are included during P (v) pre-selection. The bandwidth demands of the virtual links are uniformly distributed between 0 and 30 resource units. The CPU demands of the virtual nodes are varied in the simulations. The simulation experiments are run for around time units. Without loss of generality, we use the k- shortest paths (k = 5) as the set of QoS constrained candidate paths. And a similar procedure is used to derive the set of candidate bypass paths for each substrate link. The GLPK tool [11] is used to solve the linear programs in this paper. B. Simulation Results Three metrics are defined for evaluation purpose: VN request acceptance ratio P ac, generated revenue Rev and backup bandwidth occupation ratio P bk. P ac denotes the ratio of the accepted VN requests over the total VN requests that have arrived. Since each VN request may have different resource demands, we also evaluate the generated revenue from the infrastructure provider s perspective. Without loss of generality, we assume w = 1 in (1) which indicates that the importance of the CPU and bandwidth resource is similar. P bk is defined as the ratio of the total reserved bandwidth for backup purpose over the total bandwidth capacities. In the first experiment, the CPU demands of the virtual nodes are uniformly selected in [0,5]. In the second one, they are uniformly selected in [0,20]. Table I lists the average simulation results over the whole simulation durations. It is unsurprising that NO BK scheme
5 accepts the most requests and generates the most revenue. However, the revenue may be seriously compromised given a failure-prone Internet. The infrastructure provider may have to pay a costly penalty for the lack of backup mechanisms. By enabling backup bandwidth sharing among VNs, both proposed schemes can reduce the allocated bandwidth for backup purpose, and thus, admit more VN requests and generate more revenue than the scheme without sharing. On average, SOD BK scheme and SP BK scheme generate 31% and 24% more revenue than OD BK scheme with the CPU demands in [0,5], respectively. Whereas SOD BK scheme performs slightly better than SP BK scheme, SP BK scheme removes the requirement to find a backup network each time a VN request arrives and thus, reduces the online calculation time. When the CPU demands of the VN requests increase, all the schemes admit less requests since the node constraints become more important and many requests are rejected due to the difficulty of finding substrate nodes with enough CPU resource. However, the generated revenue may be increased as more CPU demands of each VN request bring the infrastructure provider more node revenue. It is worth mentioning that with more advanced node embedding procedure such as [4] the performance of all the schemes will be improved. To show the performance of each scheme in the long run, we also plot the performance metrics Rev and P bk against time with the CPU demands in [0,20]. Both metrics are averaged over a time window T w during the simulations (T w = 500 time units in this work). As shown in Fig.1, the revenue is increased with the arrivals of the VN requests at the beginning. When the admitted requests have occupied the substrate resource, more requests will be rejected. Fig.2 shows the the backup bandwidth utilizations over time. Both proposed schemes significantly reduce the bandwidth requirements for backup purpose when the substrate network operates in a saturated state, in which more requests have to be rejected. However, SP BK scheme needs to maintain the backup bandwidth regardless of the arrivals of the VN requests. It may not be effective if the demands of the VN requests are not heavy compared to the substrate resource capacities. VI. CONCLUSION To enable a reliable virtualized infrastructure for future Internet, effective backup mechanisms are required to combat substrate network failures. In this paper, we propose two shared backup network provision schemes for virtual network embedding: shared on-demand approach and shared proactive approach. By sharing the bandwidth used by the restoration flows from different VNs, the required backup bandwidth can be greatly reduced and more substrate resource can be left for admitting future VN requests. Whereas the first approach needs to be implemented during each VN embedding process, the second approach pre-allocates the bandwidth for backup purpose offline before any VN requests arrives. However, the second approach has to always maintain the backup bandwidth regardless of the VN requests, which may not be effective at low VN request loads. Revenue ( Rev) Backup Bandwidth Occupation Ratio ( P bk ) NO_BK OD_BK SOD_BK SP_BK Time Fig. 1. Revenue over time (CPU demands: [0, 20]) OD_BK SOD_BK SP_BK Time Fig. 2. Backup bandwidth occupation ratio over time (CPU demands: [0, 20]) REFERENCES [1] T. Anderson, L. Peterson, S. Shenker, and J. Turner, Overcoming the Internet impasse through virtualization, Computer, vol. 38, no. 4, pp , [2] Y. Zhu and M. Ammar, Algorithms for assigning substrate network resources to virtual network components, in Proc. IEEE INFOCOM 06, [3] M. Yu, Y. Yi, J. Rexford, and M. Chiang, Rethinking virtual network embedding: substrate support for path splitting and migration, ACM SIGCOMM CCR, vol. 38, no. 2, pp , [4] N. M. M. K. Chowdhury, M. R. Rahman, and R. Boutaba, Virtual network embedding with coordinated node and link mapping, in Proc. IEEE INFOCOM 09, [5] J. Lischka and H. Karl, A virtual network mapping algorithm based on subgraph isomorphism detection, in Proc. ACM SIGCOMM VISA 09, [6] M. R. Rahman, I. Aib, and R. Boutaba, Survivable virtual network embedding, in Proc. NETWORKING 10, [7] W. D. Grover, Mesh-based Survivable Networks: Options and Strategies for Optical, MPLS, and ATM Networking. Prentice Hall PTR, [8] Y. Liu, D. Tipper, and P. Siripongwutikorn, Approximating optimal spare capacity allocation by successive survivable routing, IEEE/ACM Trans. Netw., vol. 13, no. 1, pp , Dec [9] R. Banner and A. Orda, Designing low-capacity backup networks for fast restoration, in Proc. IEEE INFOCOM 10, [10] E. W. Zegura, K. L. Calvert, and S. Bhattacharjee, How to model an internetwork, in Proc. IEEE INFOCOM 96, [11] GNU Linear Programming Kit:
On Tackling Virtual Data Center Embedding Problem
On Tackling Virtual Data Center Embedding Problem Md Golam Rabbani, Rafael Esteves, Maxim Podlesny, Gwendal Simon Lisandro Zambenedetti Granville, Raouf Boutaba D.R. Cheriton School of Computer Science,
206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY 2012
206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY 2012 ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping Mosharaf Chowdhury, Student Member, IEEE, Muntasir
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
Algorithms for Assigning Substrate Network Resources to Virtual Network Components
Algorithms for Assigning Substrate Network Resources to Virtual Network Components Yong Zhu and Mostafa Ammar Networking and Telecommunications Group Georgia Institute of Technology, Atlanta, Georgia Email:
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Multiobjective Multicast Routing Algorithm
Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py
Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE
568 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE Abstract MPLS recovery
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University
Traffic protection in MPLS networks using an off-line flow optimization model
Traffic protection in MPLS networks using an off-line flow optimization model A.E. Krzesinski and K.E. Müller Department of Computer Science University of Stellenbosch, 76 Stellenbosch, South Africa Phone:
A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
Introducing the Virtual Network Mapping Problem with Delay, Routing and Location Constraints
Introducing the Virtual Network Mapping Problem with Delay, Routing and Location Constraints Johannes Inführ and Günther R. Raidl Abstract Network virtualization is a main paradigm of Future Internet research.
Bandwidth Allocation in a Network Virtualization Environment
Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero [email protected] Xavier Hesselbach [email protected] Department of Telematics Technical University of Catalonia
An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu
THE current Internet architecture has been supporting
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 10, NO. 2, JUNE 2013 105 SVNE: Survivable Virtual Network Embedding Algorithms for Network Virtualization Muntasir Raihan Rahman and Raouf Boutaba,
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China [email protected] Bin Liu Tsinghua University Beijing, China [email protected]
A hierarchical multicriteria routing model with traffic splitting for MPLS networks
A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
Network Protection with Multiple Availability Guarantees
Network Protection with Multiple Availability Guarantees Greg Kuperman MIT LIDS Cambridge, MA 02139 [email protected] Eytan Modiano MIT LIDS Cambridge, MA 02139 [email protected] Aradhana Narula-Tam MIT Lincoln
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar [email protected] Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
Virtual Network Embedding Algorithms Based on Best-Fit Subgraph Detection
Computer and Information Science; Vol. 8, No. 1; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Virtual Network Embedding Algorithms Based on Best-Fit Subgraph
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
Optical interconnection networks with time slot routing
Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Survivable Virtual Infrastructure Mapping in Virtualized Data Centers
1 Survivable Virtual Infrastructure Mapping in Virtualized Data Centers Jielong Xu, Jian Tang, Kevin Kwiat, Weiyi Zhang and Guoliang Xue Abstract In a virtualized data center, survivability can be enhanced
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES Tran Song Dat Phuc - Uyanga Department of Computer Science and Engineering SeoulTech 2014 Table of
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network Faisal Aslam, Saqib Raza and Zartash Afzal Uzmi Department of Computer Science Lahore University of Management Sciences, Pakistan
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
How To Share Bandwidth On A Diffserv Network
Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
A Performance Study of IP and MPLS Traffic Engineering Techniques under Traffic Variations
A Performance Study of IP and MPLS Traffic Engineering Techniques under Traffic Variations Sukrit Dasgupta Department of ECE Drexel University Philadelphia, PA, USA [email protected] Jaudelice C. de
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Autonomous Fast Rerouting for Software Defined Network
Autonomous ast Rerouting for Software Defined Network 2012.10.29 NTT Network Service System Laboratories, NTT Corporation Shohei Kamamura, Akeo Masuda, Koji Sasayama Page 1 Outline 1. Background and Motivation
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
Dynamic node allocation in Network Virtualization
Dynamic node allocation in Network Virtualization M. Said Seddiki, Ye-Qiong Song, Mounir Frikha To cite this version: M. Said Seddiki, Ye-Qiong Song, Mounir Frikha. Dynamic node allocation in Network Virtualization.
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information
1 Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Abstract Path protection and link protection schemes are the main
Benchmarking Virtual Network Mapping Algorithms
University of Massachusetts - Amherst ScholarWorks@UMass Amherst Masters Theses 1896 - February 214 Dissertations and Theses 212 Benchmarking Virtual Network Mapping Algorithms Jin Zhu Electrical and Computer
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
A Load Balancing Scheme for Congestion Control in MPLS Networks
A Load Balancing Scheme for Congestion Control in MPLS Networks Elio Salvadori, Roberto Battiti UniversitàdiTrento Dipartimento di Informatica e Telecomunicazioni via Sommarive 14, 38050 Povo (TN), Italy
Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization
Journal of Computational Information Systems 9: 9 (2013) 3431 3441 Available at http://www.jofcis.com Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Xiaochuan
Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]
Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
A New Forwarding Policy for Load Balancing in Communication Networks
A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France [email protected] Abstract We present in this
An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation
1 An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation Xiaomin Chen, Yuesheng Zhong, Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: [email protected],[email protected],
Factors to Consider When Designing a Network
Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS
PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS James E Burns and Teunis J Ott Telcordia Technologies Inc, 445 South Street, Morristown NJ 07960-6438, USA Anthony E Krzesinski and Karen E Müller
TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS
TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS AThesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment
Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing
Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh
Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).
Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network
A Localized Adaptive Proportioning Approach to QoS Routing
QOS ROUTING A Localized Adaptive Proportioning Approach to QoS Routing Srihari Nelakuditi and Zhi-Li Zhang, University of Minnesota Here we assume source routing with bandwidth guarantees. ABSTRACT In
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
Power-efficient Virtual Machine Placement and Migration in Data Centers
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Power-efficient Virtual Machine Placement and Migration
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
A Cloud Data Center Optimization Approach Using Dynamic Data Interchanges
A Cloud Data Center Optimization Approach Using Dynamic Data Interchanges Efstratios Rappos Institute for Information and Communication Technologies, Haute Ecole d Ingénierie et de Geston du Canton de
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Shared Backup Path Optimization in Telecommunication Networks
Shared Backup Path Optimization in Telecommunication Networks Balázs Gábor Józsa and Dániel Orincsay Abstract This paper presents new approaches for off-line global path optimization in telecommunication
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
A Scalable Monitoring Approach Based on Aggregation and Refinement
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL 20, NO 4, MAY 2002 677 A Scalable Monitoring Approach Based on Aggregation and Refinement Yow-Jian Lin, Member, IEEE and Mun Choon Chan, Member, IEEE
Enabling Service Function Chaining through Routing Optimization in Software Defined Networks
Enabling Service Function Chaining through Routing Optimization in Software Defined Networks Andrey Gushchin Cornell University Ithaca, New York 14850 [email protected] Anwar Walid Bell Labs, Alcatel-Lucent
Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing
Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu
David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design
WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or
