Virtual Network Mapping based on Subgraph Isomorphism Detection. Jens Lischka, Holger Karl Paderborn University

Size: px
Start display at page:

Download "Virtual Network Mapping based on Subgraph Isomorphism Detection. Jens Lischka, Holger Karl Paderborn University"

Transcription

1 Virtual Network Mapping based on Subgraph Isomorphism Detection Jens Lischka, Holger Karl Paderborn University Jens Lischka 1

2 VNM Problem 2 VNR 1(t 0, 10) PN 6 2 G B C 1 0 α γ 0 0 αa D γe αf 2 VNR 2(t,) VNR (t 6,) 1 α α Jens Lischka 2

3 Overview 2stage VNM algorithm Subgraph Isomorphism Detection based VNM Experimental results Jens Lischka

4 2stage Algorithm 1. First stage: find suitable mapping nodes 2. Second stage: find a link mapping (k shortest paths, multi commodity flow). No paths for virtual links >γ!. Problem: first stage does not take connectivity of VNs into account 6 VN 6 G PN 0 Bγ 0 C 1 10 α γ 0 0 Aα D E 1 0 F Jens Lischka

5 2stage vs. vnmflib 2stage vnmflib Map nodes Map single node n No Map ninks No Map links connected to n valid Done! Yes complete Yes Done! Yes valid No Track back to last valid mapping Jens Lischka

6 Example: vnmflib 1. Compute set of candidates C. 2. Compute a set of mapping candidates M.. Add α to the subgraph and map it onto A.. Map all links connecting α with the subgraph onto the PN. Check validity. Subgraph Mapping C={α,γ,} 6 M={A} 6 G B C 1 γ F α Aα D E Jens Lischka 6

7 Example: vnmflib 1. Compute C and M. 2. Add γ to the subgraph and map it onto B.. Map all links connecting γ with the subgraph onto the PN.. Check validity. Subgraph Mapping C={γ,} 6 M={B,E,F} 6 0 G γb C 1 α γ 0 Aα 2 D E F Jens Lischka

8 Example: vnmflib 1. Compute C and M. 2. Add to the subgraph and map it onto G.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={} M={G,E,F} G γb C 1 cγ 2 2 F aα 0 Aα D E Jens Lischka

9 Example: vnmflib 1. Choose next node E of M. 2. Map onto E.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={b} M={G,E,F} G γb C 1 cγ 2 0 F aα 0 Aα D E Jens Lischka 9

10 Example: vnmflib 1. Track back to the last valid mapping solution. 2. Choose next node E.. Map γ onto E.. Map all links connecting γ with the subgraph onto the PN.. Check validity. Subgraph Mapping C={γ,} M={B,E} 6 6 G B C 1 cγ F aα 0 Aα D Eγ Jens Lischka 10

11 Example: vnmflib 1. Compute C and M. 2. Add to the subgraph and map it onto B.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={} M={B,F,G} G B C 1 cγ 0 0 F aα 0 Aα D Eγ Jens Lischka 11

12 Path Splitting Split up path into multiple paths α VNR 6 G B C 1 A D E αf Jens Lischka 12

13 Experimental Results Network setup similar to previous work[1] with GT ITM tool: PN: 100 nodes and 00 links CPU at the nodes, Bandwidth at the links follow uniform distribution from units VNs: 20 0 nodes, each pair of nodes connected with probability 0. CPU and Bandwidth follow a uniform distribution from 0 to beta units. Compared our algorithm with the two stage VN Mapper of [1]. [1]Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration. SIGCOMM Comput. Commun. Rev., (2):1 29, 200. Source code available: Jens Lischka 1

14 Experimental results Jens Lischka 1

15 Experimental Results Jens Lischka 1

16 Summary Introduced new VNM method based on SID SID based VNM performs better than the 2stage approach Especially for higher beta values and bigger networks Currently we are implementing the mapper on the PlanetLabTestbed infrastructure as part of the OneLab2 project Jens Lischka 16

17 Thank You Questions? Jens Lischka 1

18 VNM Algorithms 2stage: Rethinking Virtual Network Embedding: Support for Path Splitting and Migration. SIGCOMM, 200. Algorithms for Assigning Substrate Network Resources to Virtual Network Components, INFOCOMM, A Multi Commodity Flow Based Approach to Virtual Network Resource Allocation. GLOBECOMM, 200. Simulated Annealing: A Solver for the Network Testbed Mapping Problem. Computer Communications Review (2), 200. Mixed Integer Quadratic Program Efficient Mapping of Virtual Networks onto a shared Substrate. Technical Report, Washington University Jens Lischka 1

19 VNM Algorithms Virtual Network Embedding with Coordinated Node and Link Mapping. In Proceedings of the 2 th Conference on Computer Communications (IEEE INFOCOMM), April Jens Lischka 19

20 SID based VNM Idea: Map Nodes and Links alternately based on vflibsubgraph Isomorphism Detection algorithm. Build a subgraph S of VN by successively adding nodes of VN to S and map S onto PN until S fully covers VN. Difference to vflib: Allow mapping of virtual links onto paths Check capacity constraints Jens Lischka 20

Minimizing bottleneck nodes of a substrate in virtual network embedding

Minimizing bottleneck nodes of a substrate in virtual network embedding Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@

More information

Virtual Network Embedding with Substrate Support for Parallelization

Virtual Network Embedding with Substrate Support for Parallelization Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya

More information

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University

More information

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica

More information

A Distributed, Parallel, and Generic Virtual Network Embedding Framework

A Distributed, Parallel, and Generic Virtual Network Embedding Framework A Distributed, Parallel, and Generic Virtual Network Embedding Framework Michael Till Beck, Andreas Fischer, Hermann de Meer University of Passau, Passau, Germany {michael.beck,andreas.fischer,demeer}@uni-passau.de

More information

Resource Allocation in the Network Operator's Cloud: A Virtualization Approach

Resource Allocation in the Network Operator's Cloud: A Virtualization Approach Resource Allocation in the Network Operator's Cloud: A Virtualization Approach J. Soares,2, J. Carapinha, M. Melo,2 Portugal Telecom Inovação Aveiro, Portugal {joao-m-soares, jorgec, marcio-mmelo}@ptinovacao.pt

More information

Opportunistic Bandwidth Sharing for Virtual Network Mapping

Opportunistic Bandwidth Sharing for Virtual Network Mapping Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department

More information

Modeling Service Applications for Optimal Parallel Embedding

Modeling Service Applications for Optimal Parallel Embedding Modeling Service Applications for Optimal Parallel Embedding Changcheng Huang Department of Systems and Computer Engineering Carleton University Ottawa, Canada huang@sce.carleton.ca Jiafeng Zhu Huawei

More information

Efficient Mapping of Virtual Networks onto a Shared Substrate

Efficient Mapping of Virtual Networks onto a Shared Substrate Efficient Mapping of Virtual Networks onto a Shared Substrate Jing Lu and Jonathan Turner Department of Computer Science and Engineering Washington University in St. Louis St. Louis, MO 63130 Email: {jl1,

More information

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

Algebras. A General Survey. Riley Chien. May 4, University of Puget Sound. Algebras

Algebras. A General Survey. Riley Chien. May 4, University of Puget Sound. Algebras A General Survey May 4, 2015 What is an Algebra? Definition: An Algebra, A, is a set, S, under a set of operations. Definition: An n-ary operation on a set,s, f, takes n elements of S, (a 1, a 2,..., a

More information

VNE-Sim: A Virtual Network Embedding Simulator

VNE-Sim: A Virtual Network Embedding Simulator VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,

More information

Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations

Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations Lingnan Gao a, George N. Rouskas a,b a Department of Computer Science, North Carolina State University, Raleigh, NC,

More information

Survivable Virtual Network Embedding

Survivable Virtual Network Embedding Survivable Virtual Network Embedding Muntasir Raihan Rahman 1, Issam Aib 1, and Raouf Boutaba 1,2 1 David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1

More information

Math 778S Spectral Graph Theory Handout #2: Basic graph theory

Math 778S Spectral Graph Theory Handout #2: Basic graph theory Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible

More information

the projective completion of the affine plane with four points

the projective completion of the affine plane with four points Math 3181 Dr. Franz Rothe November 23, 20 1 Test Name: 50 Problem 1.1. Here are once more: a highly symmetric illustration for the Fano plane based on an equilateral triangle the projective completion

More information

Reliability Support in Virtual Infrastructures

Reliability Support in Virtual Infrastructures Reliability Support in Virtual Infrastructures 2 nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, 2010 RESO Guilherme Koslovski (INRIA University of Lyon) Wai-Leong

More information

Modeling and Optimization of Resource Allocation in Cloud

Modeling and Optimization of Resource Allocation in Cloud PhD Thesis Progress First Report Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering January 8, 2015 Outline 1 Introduction 2 Studies Time Plan

More information

Survivable Virtual Infrastructure Mapping in Virtualized Data Centers

Survivable Virtual Infrastructure Mapping in Virtualized Data Centers Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 6-212 Survivable Virtual Infrastructure Mapping in Virtualized Data Centers Jielong Xu

More information

New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants

New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants Haiying Shen and Zhuozhao Li Dept. of Electrical and Computer Engineering Clemson University, SC,

More information

NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm

NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm Andreas Blenk*

More information

Rethinking Virtual Network Embedding in Reconfigurable Networks

Rethinking Virtual Network Embedding in Reconfigurable Networks Rethinking Virtual Network Embedding in Reconfigurable Networks Max Curran, Md. Shaifur Rahman, Himanshu Gupta and Vyas Sekar Department of Computer Science, Stony Brook University, NY, USA. Department

More information

NETWORK virtualization enables multiple virtual instances

NETWORK virtualization enables multiple virtual instances TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. XX, NO. XX, APRIL 2015 1 VINEA: An Architecture for Virtual Network Embedding Policy Programmability Flavio Esposito, Member, IEEE, Ibrahim Matta,

More information

Boost Online Virtual Network Embedding: Using Neural Networks for Admission Control

Boost Online Virtual Network Embedding: Using Neural Networks for Admission Control Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Boost Online Virtual Network Embedding: Using Neural Networks for Admission Control Andreas

More information

A Path Generation Approach to Embedding of Virtual Networks

A Path Generation Approach to Embedding of Virtual Networks This is the author s version of an article that has been published in IEEE Transactions on Network and Service Management. Changes were made to this version by the publisher prior to publication. The final

More information

Clustering-based energy-aware virtual network embedding

Clustering-based energy-aware virtual network embedding Research Article Clustering-based energy-aware virtual network embedding International Journal of Distributed Sensor Networks 2017, Vol. 13(8) Ó The Author(s) 2017 DOI: 10.1177/1550147717726714 journals.sagepub.com/home/ijdsn

More information

Resource analysis of network virtualization through user and network

Resource analysis of network virtualization through user and network Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information

More information

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017 SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe

More information

Interactive Realtime Multimedia Applications on SOIs

Interactive Realtime Multimedia Applications on SOIs Interactive Realtime Multimedia Applications on SOIs Advance Reservations for Distributed Real-Time Workflows with Probabilistic Service Guarantees Tommaso Cucinotta Real-Time Systems Laboratory Scuola

More information

A Prediction-based Dynamic Resource Management Approach for Network Virtualization

A Prediction-based Dynamic Resource Management Approach for Network Virtualization A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology

More information

Dynamic Virtual Network Traffic Engineering with Energy Efficiency in Multi-Location Data Center Networks

Dynamic Virtual Network Traffic Engineering with Energy Efficiency in Multi-Location Data Center Networks Dynamic Virtual Network Traffic Engineering with Energy Efficiency in Multi-Location Data Center Networks Mirza Mohd Shahriar Maswood 1, Chris Develder 2, Edmundo Madeira 3, Deep Medhi 1 1 University of

More information

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec. Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming

More information

Connectivity-aware Virtual Network Embedding

Connectivity-aware Virtual Network Embedding Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding

More information

Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks

Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks Nashid Shahriar, Shihabur R. Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

CLOUD computing provides on-demand IT services via

CLOUD computing provides on-demand IT services via 402 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, AUGUST 207 Optimized Provisioning of SDN-enabled Virtual Networks in Geo-distributed Cloud Computing Datacenters Khaled Alhazmi, Abdallah Shami,

More information

Scalable Constraint-based Virtual Data Center Allocation

Scalable Constraint-based Virtual Data Center Allocation Scalable Constraint-based Virtual Data Center Allocation Sam Bayless Nodir Kodirov Ivan Beschastnikh Holger H. Hoos Alan J. Hu Computer Science University of British Columbia Data centers, data centers,

More information

A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note December 2002

A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note December 2002 A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note 22-5 December 22 Revised version to appear in ACM SIGCOMM Computer Communications Review (CCR), issue dated

More information

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract

More information

Arithmetic in Quaternion Algebras

Arithmetic in Quaternion Algebras Arithmetic in Quaternion Algebras 31st Automorphic Forms Workshop Jordan Wiebe University of Oklahoma March 6, 2017 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras March 6, 2017

More information

Symbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management

Symbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management Hashing Symbol Table Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management In general, the following operations are performed on

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Competitive and Deterministic Embeddings of Virtual Networks

Competitive and Deterministic Embeddings of Virtual Networks Competitive and Deterministic Embeddings of Virtual Networks Guy Even (Tel Aviv Uni) Moti Medina (Tel Aviv Uni) Gregor Schaffrath (T-Labs Berlin) Stefan Schmid (T-Labs Berlin) The Virtual Network Embedding

More information

On the Migration of the Scientific Code Dyana from SMPs to Clusters of PCs and on to the Grid

On the Migration of the Scientific Code Dyana from SMPs to Clusters of PCs and on to the Grid On the Migration of the Scientific Code Dyana from SMPs to Clusters of PCs and on to the Grid Michela Taufer Gérard Roos Thomas Stricker Peter Güntert Institute for Computer Systems Institute for Molecular

More information

This is a repository copy of Cloud Virtual Network Embedding: Profit, Power and Acceptance.

This is a repository copy of Cloud Virtual Network Embedding: Profit, Power and Acceptance. This is a repository copy of Cloud Virtual Network Embedding: Profit, Power and Acceptance. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/8899/ Version: Accepted Version

More information

Capturing Topology in Graph Pattern Matching

Capturing Topology in Graph Pattern Matching Capturing Topology in Graph Pattern Matching Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tianyu Wo University of Edinburgh Graphs are everywhere, and quite a few are huge graphs! File systems Databases

More information

Survivable Virtual Network Embedding

Survivable Virtual Network Embedding Survivable Virtual Network Embedding Muntasir Raihan Rahman, Issam Aib, Raouf Boutaba To cite this version: Muntasir Raihan Rahman, Issam Aib, Raouf Boutaba. Survivable Virtual Network Embedding. Mark

More information

Novel Decentralized Node Failure Recovery Scheme in Virtualized Networks

Novel Decentralized Node Failure Recovery Scheme in Virtualized Networks Novel Decentralized Node Failure Recovery Scheme in Virtualized Networks by Habib Abid Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For

More information

Lecture 17. Edited from slides for Operating System Concepts by Silberschatz, Galvin, Gagne

Lecture 17. Edited from slides for Operating System Concepts by Silberschatz, Galvin, Gagne Lecture 17 Edited from slides for Operating System Concepts by Silberschatz, Galvin, Gagne Page Replacement Algorithms Last Lecture: FIFO Optimal Page Replacement LRU LRU Approximation Additional-Reference-Bits

More information

ENTERPRISES nowadays are embracing a new computing

ENTERPRISES nowadays are embracing a new computing This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TCC.26.253525,

More information

Predicting Lattice reduction

Predicting Lattice reduction Predicting Lattice reduction Nicolas Gama, Phong Nguyen Ecole Normale Supérieure,CNRS,INRIA, France. April 14, 2008 Nicolas Gama, Phong Nguyen (Ecole Normale Supérieure,CNRS,INRIA, Predicting Lattice reduction

More information

Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University

Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University D u k e S y s t e m s Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University Motivation We address challenges for controlling elastic applications, specifically storage.

More information

Slice Embedding Solutions for Distributed Service Architectures

Slice Embedding Solutions for Distributed Service Architectures 1 Slice Embedding Solutions for Distributed Service Architectures Flavio Esposito Ibrahim Matta Vatche Ishakian flavio@cs.bu.edu matta@cs.bu.edu visahak@cs.bu.edu Computer Science Department Boston University

More information

Topology-aware Virtual Network Embedding Using Multiple Characteristics

Topology-aware Virtual Network Embedding Using Multiple Characteristics KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 1, Jan. 2014 145 Topology-aware Virtual Network Embedding Using Multiple Characteristics Jianxin Liao 1*, Min Feng 1, Tonghong Li 2, Jingyu

More information

Context-free grammars

Context-free grammars Context-free grammars Section 4.2 Formal way of specifying rules about the structure/syntax of a program terminals - tokens non-terminals - represent higher-level structures of a program start symbol,

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and

More information

Counting Triangles & The Curse of the Last Reducer. Siddharth Suri Sergei Vassilvitskii Yahoo! Research

Counting Triangles & The Curse of the Last Reducer. Siddharth Suri Sergei Vassilvitskii Yahoo! Research Counting Triangles & The Curse of the Last Reducer Siddharth Suri Yahoo! Research Why Count Triangles? 2 Why Count Triangles? Clustering Coefficient: Given an undirected graph G =(V,E) cc(v) = fraction

More information

Compiler Construction: Parsing

Compiler Construction: Parsing Compiler Construction: Parsing Mandar Mitra Indian Statistical Institute M. Mitra (ISI) Parsing 1 / 33 Context-free grammars. Reference: Section 4.2 Formal way of specifying rules about the structure/syntax

More information

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster 1 Network Virtualization Network virtualization enables many virtual networks to share the same physical network

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

HaLoop Efficient Iterative Data Processing on Large Clusters

HaLoop Efficient Iterative Data Processing on Large Clusters HaLoop Efficient Iterative Data Processing on Large Clusters Yingyi Bu, Bill Howe, Magdalena Balazinska, and Michael D. Ernst University of Washington Department of Computer Science & Engineering Presented

More information

Topology Hmwk 3 All problems are from Allen Hatcher Algebraic Topology (online) ch 1

Topology Hmwk 3 All problems are from Allen Hatcher Algebraic Topology (online) ch 1 Topology Hmwk 3 All problems are from Allen Hatcher Algebraic Topology (online) ch Andrew Ma December 23, 203 This assignment has been corrected post - grading...6 (a) Proof. Assume for a contradiction

More information

SEA: Stable Resource Allocation in Geographically Distributed Clouds

SEA: Stable Resource Allocation in Geographically Distributed Clouds SEA: Stable Resource Allocation in Geographically Distributed Clouds Sheng Zhang, Zhuzhong Qian, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department

More information

Notes on Using the Beta VMware Importer Tool on Your Mac VMware Importer 1 Beta 2

Notes on Using the Beta VMware Importer Tool on Your Mac VMware Importer 1 Beta 2 Notes on Using the Beta VMware Importer Tool on Your Mac VMware Importer 1 Beta 2 The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your

More information

Supporting Distributed Shared Memory. Axel Jantsch Xiaowen Chen, Zhonghai Lu Royal Institute of Technology, Sweden September 16, 2009

Supporting Distributed Shared Memory. Axel Jantsch Xiaowen Chen, Zhonghai Lu Royal Institute of Technology, Sweden September 16, 2009 Supporting Distributed Shared Memory Axel Jantsch Xiaowen Chen, Zhonghai Lu Royal Institute of Technology, Sweden September 16, 2009 Memory content in today s SoCs 3 Elements in SoC Processing: Well understood;

More information

Lecture 7: Data Center Networks

Lecture 7: Data Center Networks Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE

More information

NETWORK VIRTUALIZATION: PRESENT AND FUTURE

NETWORK VIRTUALIZATION: PRESENT AND FUTURE 1 NETWORK VIRTUALIZATION: PRESENT AND FUTURE Wednesday, May 21, 2008 Mosharaf Chowdhury Member, envy Project What is Network Virtualization? 2 Network virtualization is a networking environment that allows

More information

A novel approach to include limited equipment connectivity in State-Task Network models

A novel approach to include limited equipment connectivity in State-Task Network models OSE SEMINAR 2011 A novel approach to include limited equipment connectivity in State- Network models Mikael Nyberg CENTER OF EXCELLENCE IN OPTIMIZATION AND SYSTEMS ENGINEERING AT ÅBO AKADEMI UNIVERSITY

More information

Cloud Networking: An Overview of Virtual Network Embedding Strategies

Cloud Networking: An Overview of Virtual Network Embedding Strategies Cloud Networking: An Overview of Virtual Network Embedding Strategies Ilhem Fajjari, Nadjib Aitsaadi and Guy Pujolle VIRTUOR: 4 Residence de Galande, 92320 Chatillon, France LiSSi - University of Paris

More information

1. Research in Networking at University of Canterbury 2. Experimental Networking Facilities in Japan

1. Research in Networking at University of Canterbury 2. Experimental Networking Facilities in Japan 1. Research in Networking at University of Canterbury 2. Experimental Networking Facilities in Japan Harsha Sirisena Krys Pawlikowski University of Canterbury Evaluation of search algorithms in structured

More information

Enhancing Survivability in Virtualized Data Centers: A Service-aware Approach

Enhancing Survivability in Virtualized Data Centers: A Service-aware Approach Enhancing Survivability in Virtualized Data Centers: A Service-aware Approach Jielong Xu, Jian Tang Member, IEEE, Kevin Kwiat, Weiyi Zhang, Member, IEEE, and Guoliang Xue, Fellow, IEEE Abstract In this

More information

Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing

Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Nesime Tatbul Uğur Çetintemel Stan Zdonik Talk Outline Problem Introduction Approach Overview Advance Planning with an

More information

Sensor Tasking and Control

Sensor Tasking and Control Sensor Tasking and Control Outline Task-Driven Sensing Roles of Sensor Nodes and Utilities Information-Based Sensor Tasking Joint Routing and Information Aggregation Summary Introduction To efficiently

More information

On the Design of Reliable Virtual Networks

On the Design of Reliable Virtual Networks On the Design of Reliable Virtual Networks Raouf Boutaba David R. Cheriton School of Computer Science University of Waterloo Outline Network Virtualization Virtual Networks Virtual Network Embedding Reliability

More information

Arithmetic in Quaternion Algebras

Arithmetic in Quaternion Algebras Arithmetic in Quaternion Algebras Graduate Algebra Symposium Jordan Wiebe University of Oklahoma November 5, 2016 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras November 5, 2016

More information

Alex Schaefer. April 9, 2017

Alex Schaefer. April 9, 2017 Department of Mathematics Binghamton University April 9, 2017 Outline 1 Introduction 2 Cycle Vector Space 3 Permutability 4 A Characterization Introduction Outline 1 Introduction 2 Cycle Vector Space 3

More information

Mining Summaries for Knowledge Graph Search

Mining Summaries for Knowledge Graph Search Mining Summaries for Knowledge Graph Search Qi Song 1 Yinghui Wu 1 Xin Luna Dong 2 1 2 Sponsored by: Searching real world graph data Knowledge Graph G: used to represent knowledge bases Graph query Q:

More information

Hardware Evolution in Data Centers

Hardware Evolution in Data Centers Hardware Evolution in Data Centers 2004 2008 2011 2000 2013 2014 Trend towards customization Increase work done per dollar (CapEx + OpEx) Paolo Costa Rethinking the Network Stack for Rack-scale Computers

More information

New Optimal Load Allocation for Scheduling Divisible Data Grid Applications

New Optimal Load Allocation for Scheduling Divisible Data Grid Applications New Optimal Load Allocation for Scheduling Divisible Data Grid Applications M. Othman, M. Abdullah, H. Ibrahim, and S. Subramaniam Department of Communication Technology and Network, University Putra Malaysia,

More information

Automatic Drawing for Tokyo Metro Map

Automatic Drawing for Tokyo Metro Map Automatic Drawing for Tokyo Metro Map Masahiro Onda 1, Masaki Moriguchi 2, and Keiko Imai 3 1 Graduate School of Science and Engineering, Chuo University monda@imai-lab.ise.chuo-u.ac.jp 2 Meiji Institute

More information

Proactive admission control and dynamic resource management in SDN-based. virtualized networks

Proactive admission control and dynamic resource management in SDN-based. virtualized networks Loughborough University Institutional Repository Proactive admission control and dynamic resource management in SDN-based virtualized networks This item was submitted to Loughborough University's Institutional

More information

Star Forests, Dominating Sets and Ramsey-type Problems

Star Forests, Dominating Sets and Ramsey-type Problems Star Forests, Dominating Sets and Ramsey-type Problems Sheila Ferneyhough a, Ruth Haas b,denis Hanson c,1 and Gary MacGillivray a,1 a Department of Mathematics and Statistics, University of Victoria, P.O.

More information

Optimal ILP and Register Tiling: Analytical Model and Optimization Framework

Optimal ILP and Register Tiling: Analytical Model and Optimization Framework Optimal ILP and Register Tiling: Analytical Model and Optimization Framework Lakshminarayanan. Renganarayana, Upadrasta Ramakrishna, Sanjay Rajopadhye Computer Science Department Colorado State University

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

IEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1

IEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1 IEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1 Towards a Cost Optimal Design for a G Mobile Core Network based on SDN and NFV Arsany Basta,

More information

Towards Min- Cost Virtual Infrastructure Embedding

Towards Min- Cost Virtual Infrastructure Embedding IEEE GLOBECOM 20, San Diego, CA Arizona State University Yu, ue and Zhang ({ruozhouy, xue, xzhan229}@asu.edu) are all with Arizona State University, Tempe, AZ 828. All correspondences should be addressed

More information

LRU. Pseudo LRU A B C D E F G H A B C D E F G H H H C. Copyright 2012, Elsevier Inc. All rights reserved.

LRU. Pseudo LRU A B C D E F G H A B C D E F G H H H C. Copyright 2012, Elsevier Inc. All rights reserved. LRU A list to keep track of the order of access to every block in the set. The least recently used block is replaced (if needed). How many bits we need for that? 27 Pseudo LRU A B C D E F G H A B C D E

More information

Multiple sequence alignment accuracy estimation and its role in creating an automated bioinformatician

Multiple sequence alignment accuracy estimation and its role in creating an automated bioinformatician Multiple sequence alignment accuracy estimation and its role in creating an automated bioinformatician Dan DeBlasio dandeblasio.com danfdeblasio StringBio 2018 Tunable parameters!2 Tunable parameters Quant

More information

On the Utility of Inference Mechanisms

On the Utility of Inference Mechanisms On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference

More information

Utilizing Datacenter Networks: Centralized or Distributed Solutions?

Utilizing Datacenter Networks: Centralized or Distributed Solutions? Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such

More information

Prototyping and Evaluation of Mobility First Architecture

Prototyping and Evaluation of Mobility First Architecture Prototyping and Evaluation of Mobility First Architecture Kiran Nagaraja, Ivan Seskar Rutgers, The State University of New Jersey Contact: nkiran (at) winlab (dot) rutgers (dot) edu NSF FIA MobilityFirst

More information

MATLAB Based Optimization Techniques and Parallel Computing

MATLAB Based Optimization Techniques and Parallel Computing MATLAB Based Optimization Techniques and Parallel Computing Bratislava June 4, 2009 2009 The MathWorks, Inc. Jörg-M. Sautter Application Engineer The MathWorks Agenda Introduction Local and Smooth Optimization

More information

vs. state-space search Algorithm A Algorithm B Illustration 1 Introduction 2 SAT planning 3 Algorithm S 4 Experimentation 5 Algorithms 6 Experiments

vs. state-space search Algorithm A Algorithm B Illustration 1 Introduction 2 SAT planning 3 Algorithm S 4 Experimentation 5 Algorithms 6 Experiments 1 2 vs. state-space search 3 4 5 Algorithm A Algorithm B Illustration 6 7 Evaluation Strategies for Planning as Satisfiability Jussi Rintanen Albert-Ludwigs-Universität Freiburg, Germany August 26, ECAI

More information

Virtual Networks: Host Perspective

Virtual Networks: Host Perspective Networks: Host Perspective IETF-77 Anaheim, CA Network Research Group March 23rd, 2010 Sunay Tripathi Sunay.Tripathi@Oracle.Com 1 Evolving ization Landscape Physical OS Hypervisor Server Server Server

More information

Active contour: a parallel genetic algorithm approach

Active contour: a parallel genetic algorithm approach id-1 Active contour: a parallel genetic algorithm approach Florence Kussener 1 1 MathWorks, 2 rue de Paris 92196 Meudon Cedex, France Florence.Kussener@mathworks.fr Abstract This paper presents an algorithm

More information

Network-Aware Resource Allocation in Distributed Clouds

Network-Aware Resource Allocation in Distributed Clouds Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

Outline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator

Outline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator Scalable Architecture for Service Function Chain Orchestration Sahel Sahhaf, Wouter Tavernier, Janos Czentye, Balazs Sonkoly Pontus Skoldstrom, David Jocha, Jokin Garay 30/09/2015- EWSDN 2015 3/10/2015

More information

Modeling with Uncertainty Interval Computations Using Fuzzy Sets

Modeling with Uncertainty Interval Computations Using Fuzzy Sets Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method

More information