Post-Disaster Technologies in Network Virtualization. Chen Ma Group Meeting August, 28, 2015



Similar documents
INTRODUCTION TO NETWORK VIRTUALIZATION

Network Virtualization: A Tutorial

White Paper. Requirements of Network Virtualization

Progressive Recovery For Network Virtualization After Large-Scale Disasters

Network Virtualization issues on Market Oriented. Eui-Nam Huh

Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks

Disaster-Resilient Backbone and Access Networks

Business Case for Cisco SDN for the WAN

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Intelligent Load Balancing: Overflow Balance

White Paper on NETWORK VIRTUALIZATION

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

FAQ: BroadLink Multi-homing Load Balancers

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer

Network Virtualization: State of the Art and Research Challenges

Virtual Network Provisioning and Fault-Management across Multiple Domains

Evolution of telecom network infrastructure for broadcast and interactive applications

How To Understand The Power Of Icdn

Wireless Video Best Practices Guide

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

The 700 MHz Band. Impact of the UHF spectrum reallocation on TV markets in Europe. 38 th EPRA meeting, Vilnius, October 2013

Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru

Mobile Broadband Technology & Services: Sustainability Factors

Wireless Clinical Scale!

Network Architecture and Topology

Records management in SharePoint 2010

SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS

A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

The Analysis and Simulation of VoIP

1+1: Protected Microwave Links

CS6204 Advanced Topics in Networking

OTN, MPLS, and Control Plane Strategies

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization

Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology

A Deduplication-based Data Archiving System

A Fast Path Recovery Mechanism for MPLS Networks

symbiant Services Overview technologies Leading the way in flexible billing solutions

Experiment of network services invocation in the Orange testbed The CINA interface

Public Key Infrastructure

Pervasive PSQL Vx Server Licensing

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

An Introduction to SIP

Scalable Video Streaming in Wireless Mesh Networks for Education

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Network Management System (NMS) FAQ

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Recent Developments in Transport SDN

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

Voice and Data Convergence

RIVERBED STEELCENTRAL NETPLANNER

Virtual Privacy vs. Real Security

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN

Network Virtualization

Master the Might of the Hybrid Cloud

Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker

Datawire Secure Transport Value Proposition

International Journal of Advanced Research in Computer Science and Software Engineering

SIP Signaling Router (SSR) Use Cases

Fast Reroute Techniques in MPLS Networks. George Swallow

YOUR WHOLESALE PARTNER IN PORTUGAL

Softwarization: RD & Innovation status of activities and next steps


Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres

Wireless Mesh Networks and Applications in the Alarm Industry. A Technology Overview. Presented by

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Survivable Cloud Network Mapping for Disaster Recovery Support

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Network Design for Highly Available VoIP

Transcription:

Post-Disaster Technologies in Network Virtualization Chen Ma Group Meeting August, 28, 2015

Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 2

References 1. N. M. Mosharaf Kabir Chowdhurry, and Raouf Boutaba, Network Virtualization: State of the Art and Research Challenges, Communication Magazine, 2009. 2. http://www.bloomberg.com/news/articles/2013-10-20/at-t-agrees-to-4-85-billiontower-deal-with-crown-castle 3. http://finance.sina.com.cn/focus/dxgg_ttgs/ 4. Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, 2011. 5. S. S. Savas, et al., Network Adaptability to Disaster Disruptions by Exploiting Degraded-Service Tolerance, Communication Magazine, 2014. 6. N. H. Bao, et al., Global Versus Essential Post-Disaster Re-Provisioning in Telecom Mesh Networks, JOCN, 2015. 7. A. Basta, I. B. Barla, M. Hoffmann, G. Carles, and D. A. Schupke, Failure Coverage in Optimal Virtual Networks, OFC, 2013. 8. C. C. Meixner, et al. Cloud-Network Disaster Recovery Against Cascading Failures, Globecom 2015 9. Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, 2011. 10. Mahsa Pourvali, Kaile Liang, Feng Gu, Hao Bai, Khaled Shaban, Samee Khan, Nasir Ghani, Progressive Recovery For Network Virtualization After Large-Scale Disasters, ICNC 2016 (reviewed) Post-Disaster Technologies in Network Virtualization, Chen Ma Page 3

Background In recently years, the concept of network virtualization has attracted significant attention in both industry and academia [1]. Network virtualization is defined by decoupling the roles of the traditional Internet service providers (ISPs) into two independent entities: infrastructure providers (InPs), who manage the physical infrastructure, and service providers (SPs), who create virtual networks (VNs) by aggregating resources from multiple InPs and offer end-to-end services [1]. In the USA, Crown Castle and American Tower Corporation are the largest infrastructure providers for telecommunication. AT&T sold 9,700 wireless towers to Crown Castle in 2013, which means AT&T focus on providing service to end users [2]. In China, China Tower Corporation was established in 2014. And China Mobile, China Union, China Telecom separate their towers and basic infrastructures to China Tower [3]. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 4

Business Model Infrastructure provider (InP): InPs deploy and actually manage the underlying physical network resources. They offer their resources through programmable interfaces to different SPs. Service provider (SP): SPs lease resources from multiple InPs to create and deploy VNs by programming allocated network resources to offer end-to-end services to end users. An SP can also provide network services to other SPs. End user: End users in the network virtualization are similar to those of the existing Internet. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 5

Survivability of Network Virtualization Virtual Node Virtual Link Virtual Network Capacity of computing, storing, transportation, et.al. It may be out of work after the disaster. Transportation capacity. It may be disconnected after the disaster. It is composed of virtual links and nodes. And it may be disconnected after the disaster. End to end connection Affect to a connection path. Node cannot be replaced Virtual networks 1. Affect to virtual links/nodes. 2. Affect to virtual networks. Virtual node can be replaced. Such as virtual node migration. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 6

Post-Disaster Technologies Protection [7] Reprovisioning [5,6,8] Emergence Communication [9] Repair [10] ms, preconfigured before disaster Temporary Traffic Engenerring minutes~hours, after disaster Temporary Traffic Engineering hours~days, after disaster Temporary Network Engineering Change the physical topology. hours~weeks, after disaster Permanent Network Engineering Post-Disaster Technologies in Network Virtualization, Chen Ma Page 7

Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 8

Problem Statement Post-Disaster Technologies in Network Virtualization, Chen Ma Page 9

Recovery without Reprovisioning Number of FVL r 1 r 2 r 3 8 7 6 5 4 3 2 1 0 b 1 b 2 f 14 f 7 f 2 f 1 f 10 b 3 f 11 f 8 f 5 f 4 f 15 D FVL =5.76*8+7.29*6 f 2 -i 2 k 3 -l 3 t 3 t 4 t 7 t 10 t 11 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17(h) Repair Time f 6 6.16 f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 i 2 -k 2 t 12 t 13 t 14 f 3 q 3 -o 3 h 1 -m 1 h 4 -n 4 +7.17*4+1.63*2 =122.13 Post-Disaster Technologies in Network Virtualization, Chen Ma Page 10

Recovery with Reprovisioning Post-Disaster Technologies in Network Virtualization, Chen Ma Page 11

Recovery with Reprovisioning Number of FVL r 1 r 2 r 3 8 7 6 5 4 3 2 1 0 b 1 b 2 b 3 f 14 f 7 f 2 f 11 h 1 -m 1 k 2 -m 2 m 2 -q 2 k 3 -m 3 m 3 -q 3 f 1 f 10 f 8 f 5 f 4 t 3 t 4 t 7 t 10 t 11 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17(h) Repair Time f 6 6.16 f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 h 4 -n 4 t 12 t 13 t 14 f 15 f 3 D FVL =4.32*8+8.73*3 =60.75 Post-Disaster Technologies in Network Virtualization, Chen Ma Page 12

Two Problems of MTRPR How to find a repair schedule? How to figure out the damage of a schedule? Post-Disaster Technologies in Network Virtualization, Chen Ma Page 13

How to figure out the damage of a schedule. Given: A repair schedule. Output: Damage caused by the FVL and DVN in the schedule. Recovery with Reprovisioning Begin Recovery without Reprovisioning Begin All FPLs are repaired? End Yes No Reprovisioning Repair All FPLs are repaired? End Yes No Repair Post-Disaster Technologies in Network Virtualization, Chen Ma Page 14

How to find a repair schedule. Genetic Algorithm Repair Schedule Multiple Chromosomes Post-Disaster Technologies in Network Virtualization, Chen Ma Page 15

Genetic Operators Internal-route operator External-route operator Internal-route inversion Internal-route transposition External-route transposition Post-Disaster Technologies in Network Virtualization, Chen Ma Page 16

Process of GA Operate to a new new with C new Begin If new is accepted Yes new Initialize set of schedule S=null No If continuous K new are not accepted No Initialize schedule with damage C Yes Find the with minimum damage C in S End Post-Disaster Technologies in Network Virtualization, Chen Ma Page 17

Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 18

Virtual Network Degradation (VND) After a disaster occurs, which virtual network should be degraded? what we can do to degrade the virtual networks? which is different with the degradation in end to end connection? May be the answer: In the schedule, network operators can select minimum the number of degraded virtual networks as the objective. (1) Degrade the capacity of virtual links. (2) Delete several virtual links of a degraded virtual network. Network operators should consider the connectivity of virtual networks. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 19

Thanks! Biswanath Mukherjee Charles U Martel Massimo Tornatore Everyone! 谢 谢! Post-Disaster Technologies in Network Virtualization, Chen Ma Page 20