虚拟网络映射模型及其优化算法
作者:
基金项目:

国家自然科学基金(61070198, 60903040, 61170288); 国家重点基础研究发展计划(973)(2007CB310901)


Virtual Network Mapping Model and Optimization Algorithms
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [37]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    网络虚拟化被视为构建新一代互联网体系架构的重要技术,它使得能在一个共享的底层物理网络上同时运行多个网络架构或网络应用,从而能为用户提供多样化的端到端定制服务.虚拟网络映射是实现网络虚拟化的关键环节,其目的是在满足虚拟网络资源需求的前提下,将虚拟网络植入到合适的底层物理节点和链路.虚拟网络映射需要解决资源约束、准入控制、在线请求和拓扑多样性等多方面的问题.根据应用场景、优化目标、映射方式和约束条件的不同,可以得到不同类型的虚拟网络映射优化问题.这些优化问题通常是NP 难的.通过形式化建立了虚拟网络映射模型,归纳了虚拟网络映射的方法和算法.总结了解决虚拟网络映射模型优化问题的几条技术途径,指出了该领域中需要进一步研究的热点问题.

    Abstract:

    Network virtualization can serve as the important technology for constructing the next-generation Internet architecture. It has been proposed as a powerful vehicle for running multiple architectures or experiments simultaneously on a shared infrastructure. It allows multiple service providers to offer customized end-to-end services over a common physical infrastructure. Virtual network embedding is a critical step for network virtualization that deals with the efficient mapping of virtual nodes and virtual links onto the substrate network resources. The virtual network-mapping problem is extremely challenging for four main practical reasons: Node and link constraints, admission control, online request, and diverse topologies. Due to different application scenarios, optimization objectives, mapping approaches, and constraints, there are many virtual network-mapping models. Unfortunately, the optimization problems of these models are generally NP-hard. The model of virtual network mapping is presented. The virtual network mapping methods and algorithms are concluded. The technological approaches to solve the optimization problems of the virtual network mapping are summarized. Finally, some open issues are presented to be further studied in the virtual network-mapping field.

    参考文献
    [1] Chowdhury NMMK, Boutaba R. A survey of network virtualization. Computer Networks, 2010,54(5):862?876. [doi: 10.1016/ j.comnet.2009.10.017]
    [2] Chowdhury NMMK, Boutaba R. Network virtualization: State of the art and research challenges. IEEE Communications Magazine, 2009,47(7):20?26. [doi: 10.1109/MCOM.2009.5183468]
    [3] Keller E, Szefer J, Rexford J, Lee RB. NoHype: Virtualized cloud infrastructure without the virtualization. In: Proc. of the ISCA 2010. New York: ACM, 2010. 350?361. [doi: 10.1145/1815961.1816010]
    [4] Carapinha J, Jim?nez J. Network virtualization——A view from the bottom. In: Proc. of the SIGCOMM 2009 Workshop: VISA. New York: ACM, 2009. 73?80. [doi: 10.1145/1592648.1592660]
    [5] Anderson T, Peterson L, Shenker S, Turner J. Overcoming the Internet impasse through virtualization. IEEE Computer Magazine, 2005,38(4):34?41. [doi: 10.1109/MC.2005.136]
    [6] Yu ML, Yi Y, Rexford J, Chiang M. Rethinking virtual network embedding: Substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review, 2008,38(2):17?29. [doi: 10.1145/1355734.1355737]
    [7] Lu J, Turner J. Efficient mapping of virtual networks onto a shared substrate. Technical Report, WUCSE-2006-35, Washington University, 2006.
    [8] Zhu Y, Ammar M. Algorithms for assigning substrate network resources to virtual network components. In: Proc. of the IEEE INFOCOM. 2006. 1?12. [doi: 10.1109/INFOCOM.2006.322]
    [9] Andersen DG. Theoretical approaches to node assignment. Technical Report, Carnegie Mellon University, 2002. http://www.cs. cmu.edu/~dga/papers/andersen-assign.ps
    [10] Szeto W, Iraqi Y, Boutaba R. A multi-commodity flow based approach to virtual network resource allocation. In: Proc. of the IEEE GLOBECOM, Vol.6. 2003. 3004?3008. [doi: 10.1109/GLOCOM.2003.1258787]
    [11] Lischka J, Karl H. A virtual network mapping algorithm based on subgraph isomorphism detection. In: Proc. of the SIGCOMM 2009 Workshop: VISA. New York: ACM, 2009. 81?88. [doi: 10.1145/1592648.1592662]
    [12] Chowdhury NMMK, Rahman MR, Boutaba R. Virtual network embedding with coordinated node and link mapping. In: Proc. of the IEEE INFOCOM 2009. 2009. 783?791. [doi: 10.1109/INFCOM.2009.5061987]
    [13] Houidi I, Louati W, Zeghlache D. A distributed virtual network mapping algorithm. In: Proc. of the IEEE ICC 2008. 2008. 5634?5640. [doi: 10.1109/ICC.2008.1056]
    [14] Cai ZP, Liu F, Xiao N, Liu Q, Wang ZY. Virtual network embedding for evolving networks. In: Proc. of the IEEE GLOBECOM 2010. 2010. 1?5. [doi: 10.1109/GLOCOM.2010.5683160]
    [15] Butt NF, Chowdhury NMMK, Boutaba R. Topology-Awareness and reoptimization mechanism for virtual network embedding. In: Proc. of the IFIP Networking 2010. LNCS 6091, Springer-Verlag, 2010. 27?39. http://dblp.uni-trier.de/db/conf/networking/ networking2010.html#ButtCB10
    [16] He JY, Rui ZS, Li Y, Lee CY, Rexford J, Chiang M. DaVinci: Dynamically adaptive virtual networks for a customized Internet. In: Proc. of the ACM CoNext 2008. New York: ACM, 2008. 15:1?15:12. [doi: 10.1145/1544012.1544027]
    [17] Rahman MR, Aib I, Boutaba R. Survivable virtual network embedding. In: Proc. of the IFIP Networking 2010. LNCS 6091, Berlin, Heidelberg: Springer-Verlag, 2010. 40?52. http://dx.doi.org/10.1007/978-3-642-12963-6_4
    [18] Wang Y, Keller E, Biskeborn B, van der Merwe J, Rexford J. Virtual routers on the move: Live router migration as a networkmanagement primitive. In: Proc. of the SIGCOMM 2008. New York: ACM, 2008. 231?242. [doi: 10.1145/1402958.1402985]
    [19] Yu HF, Qiao CM, Anand V, Liu X, Di H, Sun G. Survivable virtual infrastructure mapping in a federated computing and networking system under single regional failures. In: Proc. of the GLOBECOM 2010. 2010. 1?6. [doi: 10.1109/GLOCOM. 2010.5683951]
    [20] Yeow WL, Westphal C, Kozat U. Designing and embedding reliable virtual infrastructures. In: Proc. of the 2nd ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architecture (VISA). New York: ACM, 2010. 33?40. [doi: 10.1145/1851399. 1851406]
    [21] Paul S, Seshan S. Technical document on wireless virtualization. Technical Report, GDD-06-17, The GENI Project Office, 2006.
    [22] Smith G, Chaturvedi A, Mishra A, Banerjee S. Wireless virtualization on commodity 802.11 hardware. In: Proc. of the ACM WiNTECH. New York: ACM, 2007. 75?82. [doi: 10.1145/1287767.1287782]
    [23] Mishra A, Agrawal D, Shrivastava V, Banerjee S, Ganguly S. Distributed channel management in uncoordinated wireless environments. In: Proc. of the ACM MOBICOM 2006. New York: ACM, 2006. 170?181. [doi: 10.1145/1161089.1161109]
    [24] Orbit. http://www.orbit-lab.org/
    [25] Kokku R, Mahindra R, Zhang HH, Rangarajan S. NVS: A virtualization substrate for WiMAX networks. In: Proc. of the ACM MOBICOM 2010. New York: ACM, 2010. 233?244. [doi: 10.1145/1859995.1860023]
    [26] Corin RD, Riggio R, Miorandi D, Salvadori E. AiroLAB: Leveraging on virtualization to introduce controlled experimentation in operational multi-hop wireless networks. In: Proc. of the Tridentcom 2010. Springer-Verlag, 2010. 331?344. [doi: 10.1007/978-3- 642-17851-1_27]
    [27] Cidon I, Kutten S, Soffer R. Optimal allocation of electronic content. In: Proc. of the IEEE INFOCOM, Vol.3. 2001. 1773?1780.[doi: 10.1109/INFCOM.2001.916675]
    [28] Li B, Golin MJ, Italiano GF, Deng X, Sohraby K. On the optimal placement of Web proxies in the Internet. In: Proc. of the IEEE INFOCOM, Vol.3. 1999. 1282?1290. [doi: 10.1109/INFCOM.1999.752146]
    [29] Qiu L, Padmanabhan VN, Voelker GM. On the placement of Web server replicas. In: Proc. of the IEEE INFOCOM, Vol.3. 2001. 1587?1596. [doi: 10.1109/INFCOM.2001.916655]
    [30] Krishnan P, Raz D, Shavitt Y. The cache location problem. IEEE/ACM Trans. on Networking, 2000,8(5):568?582. [doi: 10.1109/90.879344]
    [31] Suh K, Guo Y, Kurose J, Towsley D. Locating network monitors: Complexity, heuristics, and coverage. In: Proc. of the IEEE INFOCOM 2005, Vol.1. IEEE Communication Society, 2005. 351?361. [doi: 10.1109/INFCOM.2005.1497905]
    [32] VISA 2010: SIGCOMM Workshop. 2010. http://conferences.sigcomm.org/sigcomm/2010/VISA.php
    [33] Chen WL, Xu MW, Yang Y, Li Q, Ma DC. Virtual network with high performance: VegaNet. Chinese Journal of Computers, 2010,33(1):63?73 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2010.00063]
    [34] Xie WB, Li J, Xian M, Chen YG. Distributed virtue backbone network algorithm based on topology characteristic. Journal of Software, 2010,21(6):1416?1425 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3572.htm [doi: 10.3724/SP.J. 1001.2010.03572]
    [35] Houidi I, Louati W, Zeghlache D. A distributed and autonomic virtual network mapping framework. In: Proc. of the ICAS 2008. 2008. 241?247. [doi: 10.1109/ICAS.2008.40]
    [36] Chowdhury NMMK, Samuel F, Boutaba R. PolyViNE: Policy-Based virtual network embedding across multiple domains. In: Proc. of the 2nd ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architecture (VISA). New York: ACM, 2010. 49?56. [doi: 10.1145/1851399.1851408]
    [37] Fajjari I, Aitsaadi N, Pujolle G, Zimmermann H. VNE-AC: Virtual network embedding algorithm based on ant colony metaheuristic. In: Proc. of the ICC 2011. 2011. 1?6. [doi: 10.1109/icc.2011.5963442]
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

蔡志平,刘强,吕品,肖侬,王志英.虚拟网络映射模型及其优化算法.软件学报,2012,23(4):864-877

复制
分享
文章指标
  • 点击次数:8368
  • 下载次数: 12801
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2011-04-03
  • 最后修改日期:2011-05-18
  • 在线发布日期: 2012-03-28
文章二维码
您是第19893850位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号