Cloud Networking: An Overview of Virtual Network Embedding Strategies

Size: px
Start display at page:

Download "Cloud Networking: An Overview of Virtual Network Embedding Strategies"

Transcription

1 Cloud Networking: An Overview of Virtual Network Embedding Strategies Ilhem Fajjari, Nadjib Aitsaadi and Guy Pujolle VIRTUOR: 4 Residence de Galande, Chatillon, France LiSSi - University of Paris EST Creteil (UPEC): 122, rue Paul Armangot, Vitry Sur Seine, France LIP6 UPMC, Sorbonne Universities: 4, Place Jussieu, Paris, France ilhem.fajjari@virtuor.fr, nadjib.aitsaadi@u-pec.fr, guy.pujolle@lip6.fr Abstract This paper is an overview of virtual network embedding strategies within cloud infrastructure backbone networks. We will first of all summarise and define the main principles of cloud computing and its different supplied services. Then, we will describe the cloud infrastructure architecture, named the Totally Virtualized Cloud Infrastructure (TVCI), which makes use of virtualization in all the cloud s equipment (i.e., backbone and data centers). Afterwards, we will describe, analyse, and compare the main virtual network mapping algorithms for cloud infrastructure networks found in existing literature. We will evaluate the above strategies in terms of: i) virtual network request reject rate, ii) embedding cost of virtual network request, iii) embedding revenue of virtual network request and iv) average usage rate of physical resources. Index Terms Cloud networking, IaaS, Network virtualization, Embedding problem. where an application is installed in the provider s infrastructure (i.e., data centers). The second group, Platform as a Service (PaaS), supplies the developers with a software platform (e.g., programming-language-level, APIs, etc.). Finally, the third group, Infrastructure as a Service (IaaS), provides computational physical resources to cloud users, such as processing capacity, storage and routers. In this respect, customers are free to install and manage their own software stack (operating system, application, routing protocol, etc.) as super-users. It is worth noting that IaaS can be supplied thanks to virtualization technologies (OS virtualization, para-virtualization and hardware-assisted virtualization), which guarantee isolation between virtual instances sharing the same physical resources. I. INTRODUCTION Cloud computing is new paradigm that provides an enduser with utility computing via the Internet using a Web browser. In existing literature, we have found more than twenty definitions of cloud computing [1]. We believe that the definition proposed by the National Institute of Standards and Technology (NIST) in [2] is the most pertinent: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing consists of combination of three concepts: i) cluster computing, ii) grid computing and iii) virtualization. Cluster computing is defined in [3] as: a type of parallel and distributed system, which consists of a collection of interconnected stand-alone computers working together as a single integrated computing resource. Moreover, grid computing is defined in [4] as: a type of parallel and distributed system that enables the sharing, selection, and aggregation of geographically distributed autonomous resources dynamically at runtime depending on their availability, capability, performance, cost, and users quality of service requirements. Cloud computing looks like a grid computing in which each geographical node is a data center (i.e., home computer system) [5]. All the geographically distributed data centers are interconnected via the provider s substrate backbone network [6]. It is worth noting that virtualization is available within data centers and the backbone network. Therefore, thanks to virtualization, many simultaneous and independent services can be delivered. In fact, all the resources (physical and software) can be virtualized. As described in [7], a cloud can deliver many services that can be classified in three main groups. The first group, Software as a Service (SaaS), is a model of software deployment /13/$ IEEE In this paper, we will describe the cloud infrastructure architecture called the Totally Virtualized Cloud Infrastructure (TVCI) [8]. It is based on a VICTOR architecture [9] that does not use a virtualization technology in the backbone network. Then, we will give an overview of the related virtual network embedding strategies within a cloud offering IaaS. In fact, the customer formulates a virtual network backbone request which interconnects all its geographically distributed data centers. Moreover, the customer also determines the quality of service of a virtual network in terms of i) the routers processing power, ii) the routers memory and iii) the links bandwidth. In this regard, the cloud provider s main objective is to lease the maximum number of virtual networks while ensuring QoS, in order to maximise revenue. Note that an embedding strategy has to map i) each virtual router in a substrate router and ii) each virtual link between two virtual routers in a substrate path between the substrate nodes hosting the virtual link s extremity nodes. The problem we are investigating is NP-hard and, to the best of our knowledge, few mapping strategies have been proposed in existing literature [10] [14]. In this research paper, we will describe and compare the virtual network strategies already found in literature. To do so, we implemented the strategies and used extensive simulations to gauge and evaluate each one s performance in terms of request reject rate, request revenue and request cost. This paper is organised as follows. In the next Section we will explain the architecture, TVCI. In Section III, we will formulate the virtual network embedding problem within a cloud supplying IaaS. Then, in Section IV, we will describe the main related mapping strategies. In Section V, we will analyse the performance of related mapping algorithms based on extensive simulations. Finally, in Section VI, we will conclude the paper and outline the main challenges for future research.

2 Fig. 1. Totally Virtualized Cloud Infrastructure (TVCI) Architecture II. TOTALLY VIRTUALIZED CLOUD INFRASTRUCTURE (TVCI) ARCHITECTURE As illustrated in Fig. 1, the TVCI [8] consists of a set of geographically distributed data centers interconnected with a Substrate backbone Network SN. The latter is formed by a set of geographically distributed routers, interconnected with wired connections (e.g., fibre optic). In fact, the SN contains two types of routers: i) access and ii) core. It is worth noting that each data center is attached to only one access router, through which it can communicate with core routers. Thanks to virtualization technology, many independent applications can be hosted in data centers (i.e., SaaS). Moreover, an application can be deployed in many geographical sites and makes use of a Virtual Network VN, mapped in the SN, to link all the geographical sites (i.e., IaaS). In this respect, an end-user can install any routing protocol within the allocated VN and be responsible for network administration. In other words, since virtualization technology offers isolation, an end-user can only manage their VN (i.e., instance) and cannot deteriorate the rest of the VNs hosted in the SN. The TVCI contains one or more Centralised Controllers (CC), as depicted in Fig. 1, in the aim of managing the cloud by i) monitoring the cloud infrastructure, ii) embedding applications in data centers, iii) mapping a virtual network in the substrate backbone network, etc. The architecture, TVCI, is an improved version of the VICTOR architecture proposed in [9]. Indeed, in VICTOR, the backbone network consists of a set of Forwarding Elements (FE). Their role is limited to the simple forwarding of data according to the forwarding tables established and downloaded from Centralised Controllers (CC). It is worth noting that FEs do not implement any control plane or routing functions. VICTOR is confronted with a scalability problem since centralised controllers manage all the flows in the backbone network. In addition, VICTOR does not take advantage of virtualization technology within the Substrate Network. For this reason, and in order to get around the VICTOR s disadvantages, we proposed TVCI. As it uses virtualization, many independent VN instances can be deployed at the same time in the SN. III. FORMULATION OF THE VIRTUAL NETWORK EMBEDDING PROBLEM In this section, we will formulate the Virtual Network (VN) embedding problem within the cloud s Substrate backbone Network (SN). Indeed, the SN is modelled as an undirected graph denoted by G s (N s, E s ),wheren s and E s are the sets of physical nodes and their connected links respectively. Each physical router, n s i N s, is characterised by its i) residual processing power, ii) residual memory, iii) type: access or core, and iv) geographic location. Likewise, each physical link, e s x E s, is typified by its available residual bandwidth. Similarly, the VN request is modelled as an undirected graph, denoted by G v (N v, E v ), where N v and E v are the sets of virtual nodes and their virtual links respectively. Within the VN request, each virtual node, n v i N v, is associated with the required processing power, memory, type, and geographic location if it is an access router. Moreover, each virtual link, e v x E v, requests a quota of bandwidth. It is worth noting that all the physical resources (i.e., bandwidth, processing power, memory) in G s are limited. In fact, G s is not able to host an infinite number of VN requests.

3 Consequently, an intelligent and judicious mapping of the VN in G s is necessary in order to maximise the acceptance rate and the substrate provider s profits. Node mapping is constrained so that for each VN request, G v, two virtual nodes cannot be assigned to the same substrate node. In addition, each virtual node must be assigned to only one physical node. The virtual node, n v i, can be mapped in the substrate node, n s j, if the available residual resources (i.e., power processing and memory) are at least equal to those required. Besides, if n v i is an access router then it can only be embedded in substrate access routers located within a predefined geographic area. Each virtual link, e v x between nv i and n v j, is assigned to an unsplittable substrate path, denoted by P e v x, between n s i and n s j. Note that P e v is a set of substrate links. Moreover, the x available residual bandwidth of all the physical links in P e v x must be at least equal to the request bandwidth. In fact, SNs mainly make use of shortest-path-based routing protocols such as Open Shortest Path First (OSPF). Indeed, to employ sophisticated splittable routing algorithms, IP routers that are already deployed must be upgraded. However, this would significantly increase capital expenditure. The objective is to generate, for each VN request, the best possible mapping while also minimising the embedding cost in terms of allocated resources in the SN. Note that for a specific VN request, no matter what the mapping, the resources allocated by the virtual nodes are identical. However, assigned resources for the virtual links depend on the substrate path length. As described above, the embedding problem can be formulated as a binary combinatorial optimisation problem. It has been proved to be NP-hard [15], [16].In the next section, we will outline the related VN embedding algorithms found in existing literature. IV. RELATED VIRTUAL NETWORK EMBEDDING STRATEGIES Few research papers have studied the VN embedding problem. It is worth noting that the problem studied in this paper is partially similar to resources provisioning problem in overlay networks [17] and MPLS [18]. However, the latter networks do not consider the mapping of nodes (i.e., sources and destinations are fixed). Indeed, only bandwidth allocation problem is tackled. In the following, we will outline the main proposals found in existing literature of VN embedding problem. In [10], the authors propose three virtual network assignment algorithms:, and. The notion of stress is defined to evaluate the load of substrate resources. The stress of substrate node quantifies the number of virtual nodes mapped upon it and similarly the stress of substrate link quantifies the number of virtual links whose substrate path passes through the substrate link. The first method,, treats virtual routers and links mapping separately. Thus, substrate and virtual routers are sorted respectively according to their stress and degree of connectivity. Then, assigns the virtual router with the highest degree of connectivity to the least stressed substrate router recursively until all the virtual routers are embedded. Thereafter, makes use of the shortest distance algorithm to connect the mapped virtual routers. On the other hand, and algorithms take into account the substrate link load when selecting substrate routers. To do so, the authors associate a new metric NR,for each substrate router, capturing both its stress and the ones of its directly connected links. Afterwards, the substrate and virtual routers are respectively sorted according to the new defined metric and the connectivity degree. Besides, a new path distance is defined based on the substrate link stress. consists in three steps: i) cluster center localisation, ii) substrate node selection, and iii) substrate path selection. During the first step, the algorithm selects, based on NR, the center of the cluster. Afterward, substrate nodes of the cluster are selected according to their potential which quantifies both their distance to the center and their load. Finally, selected substrate nodes are connected based on the predefined path metric. The final proposal,, splits the virtual network request into star topologies so as not to deal with the request as one whole unit. Next, the stars are mapped sequentially using. Unfortunately, the authors assume that physical resources are unlimited in the substrate network which is not realistic. Thus, the virtual network request reject rate is not evaluated. In [11], the authors proposed virtual network embedding algorithm. To do so, first the substrate and virtual routers are sorted according to the available and requested resources respectively. Then, the virtual router with the highest resource request is assigned to the substrate router containing the largest available resource metric value recursively until all the virtual routers are mapped. Next, the routers are connected using the K-shortest paths algorithm. s main limitation is the approach to embedding virtual links. Indeed, the shortest path algorithm does not consider the congested SN links, which implies an increase of hot-spots in the SN and an increase in request reject rate. Moreover, the mapping of virtual routers and links is not coordinated. The authors of [12] model the VN as a directed graph with two types of routers: edge and core. The required VN resources are defined in terms of the expected traffic, which is expressed as an upper limit on allowed traffic between all edge router pairs. The authors objective is to calculate the minimum request bandwidth for the VN according to the edge routers upper limit of traffic. Nonetheless, the weakness in the proposal lies in the lack of consideration of SN capacities (i.e., unlimited) and the use of static routing tables in the network. In addition, the proposal requires the star VN topology, which is strongly binding. In [13], [19], the authors propound two VN embedding algorithms, named Deterministic-ViNE and Randomized-ViNE. In this approach the substrate graph is augmented with meta-routers and meta-edges to form a meta-graph. Each meta-router corresponds to one virtual router and each metaedge corresponds to a link between a meta-router and the substrate routers located in its required geographic area. Note that each virtual router is associated with a specified region where it could be hosted. Nevertheless, it is not realistic to expect end-users to specify the locations of all virtual routers. In fact, only the locations of edge routers can be fixed. The main limitations here is the routers location constraints of core routers and the convergence time needed. Indeed, when the locations are not defined, D-ViNE and R-ViNE connect each meta-node to all physical routers within the substrate network. Hence, the runtime would increase exponentially with respect to the size of the substrate network. Note that D-ViNE and R-ViNE need to solve linear programming problems for each VN request with a standard solver. In [1], the authors propose a backtracking embedding algo-

4 rithm based on sub-graph isomorphism detection, where virtual routers and links are mapped during the same stage. This algorithm uses backtracking in order to optimise resources utilisation. When a bad mapping decision is detected it can be revised by simply backtracking to the last valid mapping. Indeed, the idea behind the proposal is to reduce the NPcomplete subgraph isomorphism detection problem to virtual network embedding problem by assigning a single delay constraints to 1 for each physical and virtual link. Note that in graph theory, two graphs G and H are isomorphic when two nodes u and v of G are adjacent if and only if f(u) and f(v) are adjacent in H. Having two graphs G and H as input, subgraph isomorphism detection problem determines whether G contains a subgraph that is isomorphic to H. The main limit of the proposal is the mapping delay (i.e., convergence time) as also detailed in [4]. Indeed, in large scale mapping the proposal needs a large duration to embed the virtual network. This deeply deteriorates the response time for end-users. In [20], the authors propose a distributed algorithm for VN mapping and SN load balancing. This algorithm relies on the multi-agent approach. A communication protocol is proposed to enable communication between agent-based substrate routers. Obtained results show some limitations in terms of scalability due to the high number of exchanged messages. In [21], [22], the authors establish Mixed Integer Problem and Integer Linear Programming formulations for unsplittable and splittable path problems. Then, an approach based on particle swarm optimisation (PSO) has been proposed to solve the virtual network embedding problem. It is worth noting that PSO is a population-based stochastic global optimiser that can generate better optimal solution in lesser computing time with stable convergence. The main idea of the algorithm is to define potential virtual networks embedding solutions as particles. Then, the position of each particle is improved thanks to a predefined fitness metric. Finally, the optimal virtual network embedding solution is obtained by iterating the evolution process of particles. Unfortunately, we notice that the proposal does not coordinate the mapping of virtual routers and virtual links. In [23], VN embedding problem is extended to the multiple domains case. The problem is formulated and solved as a mixedinteger programming techniques. Moreover, exact and heuristic algorithms are proposed to expand VN embedding problem to multiple cloud provider. In [4], a new Virtual Data Center (VDC) embedding strategy is proposed. The authors develop a centralised allocation algorithm for bandwidth guaranteed virtual to physical mapping. The services offered are divided to three types according to the bandwidth allocation constraints. The proposed Virtual Data Center strategy is based on i) min-cost flow for virtual server embedding and ii) shortest path algorithm for virtual link allocation. Unfortunately, the server mapping phase does not perform optimisation during resource (i.e., cpu, memory and disk) allocation. That means, the placement of servers do not judiciously select the physical servers with respect to the residual resources. In doing so, load equilibrium in the substrate network is not achieved. Moreover, server and link mapping stages are not coordinated. Hence, the mapping of servers may imply the worst embedding of links. Finally, we notice that the efficiency of the algorithm in terms of acceptance rate is not evaluated. In [24], a topology-awarness algorithm is proposed to improve the acceptance ratio of virtual network requests and to reduce resource bottleneck in substrate network. To do so, three metrics are proposed to characterise each substrate resource. A Critical Index (CI) is put forward to quantify the likelihood of a resource of becoming a bottleneck. Moreover, a Popularity Index (PI) is proposed to evaluate the saturation of substrate resource (i.e., the number of virtual instances mapped upon the physical network). Finally, a weighted linear combination of CI and PI is proposed as a Scaling Factor (SF). Then, the objective function of the embedding problem is scaled by SF so that the obtained results will be improved in terms of acceptance rate and load balancing. It is worth noting that the authors address the reconfiguration problem of virtual network in aim to minimise the congestion within the substrate network. In [14], the authors proposed a new VN embedding algorithm based on the ant colony metaheuristic, named, which operates as follows. First, the VN request is divided into a set of solution components that are sorted and then solved sequentially. Note that solving a solution component is only equivalent to building a small part of the overall solution. Next, a set of parallel artificial ants are launched to iteratively explore the search space until a predetermined number of iterations is reached. During each iteration, each ant incrementally constructs the solution by moving from one solution component to another. To do so, the ant localises potential candidates in the SN for each solution component in the search space then selects just one by applying a stochastic local decision. It is worth noting that the decision is based on heuristic information and artificial pheromone trails, which respectively quantify the desirability of the transition aprioriand a posteriori. Once each ant builds its full solution, the best one (i.e., the one that most enhances the objective function) among all solutions generated by all ants is selected. Furthermore, the artificial pheromone is slightly evaporated into the surrounding environment. This helps the ants to discover new trajectories in the environment and not to be trapped in local optimums. Nevertheless, the artificial pheromone trail of each solution component is reinforced at visited points in the environment in relation to the best trajectory travelled by ants to build the whole solution. This helps the ants to improve and continually refine the best solution obtained. The process is repeated until the upper bound of iterations is reached. The overall best solution generated by all ants is considered to be the output solution. Unlike to [10] and [12], the available substrate resources (processing power, memory and bandwidth) are considered during the mapping process with [14],. On the other hand, contrary to [11] and [12], coordinates the virtual node and virtual link assignment in order to enhance the mapping efficiency. We notice that [11] [25] [26] [19] address the batch virtual network embedding problem. We implemented some related approaches. In the next section, we will evaluate the performance obtained. V. COMPARISON OF VIRTUAL NETWORK EMBEDDING STRATEGIES In this section, we will study the efficiency of some related embedding strategies described in the previous section: i) [10], ii) [10], iii) [10], iv) [11], v) [14], vi) D-ViNE and vii) R-ViNE [13] [19]. To achieve this, we will first of all describe our discrete event VN embedding simulator. Then, we will define several metrics aimed at evaluating the performance of the prominent existing

5 schemes mentioned above. Finally, building on the outputs of the above simulations, we will assess and comment the results obtained. Note that we cannot compare the above methods with [12] since they assume a constrained hypothesis, which cannot be considered in the above strategies. Indeed, in [12], mapping is based on the upper bounds of network flows. A. Simulation environment We implemented a discrete event VN embedding simulator, using the GT-ITM tool to generate random SN and VN topologies. Note that we modelled the arrival of VN requests by a Poisson Process, with rate λ A. We also modelled VN lifetime by an exponential distribution with a mean μ L. As stated in [11], we set the SN size to 100. In this case, the ratio of access and core nodes was fixed at 20% and 80% respectively. Furthermore, we set the VN size according to a discrete uniform distribution, using the values given in [2, 10]. Since virtual access nodes are defined by customers, we assumed that each virtual node could be access or core with a probability of 0.5. In both cases (VN and SN), each pair of nodes is randomly connected with a probability of 0.5. The arrival rate, λ A, and the average lifetime, μ L, of VNs are fixed to 4 requests per 100 time units and 1000 time units respectively. We calibrated the capacity of substrate nodes and links (i.e., processing power, memory and bandwidth) according to a continuous uniform distribution, taking the values in [50, 100]. We also set the required virtual resources according to a continuous uniform distribution, using the values given in [10, 20]. In our simulator, we then implemented the following strategies: i), ii), iii), vi), v), vi)d-vine and vii) R-ViNE. We set the number of VN requests to 2000.Allsimulation results of pseudo-random strategies were calculated with a confidence level equal to 99.70%. Note that tiny confidence intervals are not shown in the following figures. B. Performance metrics In this section, we will define the performance metrics used to assess the above related strategies. 1) Q(t): is the reject rate of VN requests during the time period [0,t]. 2) C(t): is the average provisional cost of accepted VN requests in the SN during the time period [0,t]. Note that C(t) quantifies the mapping cost in terms of resources (bandwidth, cpu, memory) as defined in [14]. 3) R(t): measures the average revenue of accepted VN requests in the SN during the time period [0,t]. Note that when R(t) is high, the embedding strategy maps requests generating a larger revenue as defined in [10] [11] [13]. 4) U(t): measures average usage rate of substrate links at time t. In the following section, we will present the results of our simulations and summarise the key observations. C. Evaluation results Table I compares the reject rate and total revenue of the whole (i.e., 2000) VN requests. It shows that, significantly outperforms the related strategies. We can see that denies only 5.1 ± 0.4% of requests. It is worth noting that,, and decline the most requests (69%, 73.90%, and67.45% respectively). This is mainly because the latter strategies do not Q(t) (logarithmic scale) TABLE I PERFORMANCE OF VN REQUESTS Strategy Reject rate (%) Provider s revenue ( 10 4 ) 5.1 ± ± D-ViNE R-ViNE Time unit (logarithmic scale) Fig. 2. Reject rate - Q consider the residual resources in the SN. In addition, performs at least twice as well as (5.1%± %). Furthermore, we can see that maximises the substrate provider s revenue. Note that the revenue of requests is proportional to the amount of allocated resources. This can be explained due to the fact that a larger number of accepted requests leads to the increase in allocated resources. We notice that D-ViNE and R-ViNE outperforms. However, both methods are based on multi-commodity flow. Hence, each virtual link is mapped among a set of substrate paths which is not the case for. In fact, the latter embeds each virtual link with an unsplittable physical path. Moreover we notice that the complexity of the both methods strongly depends on the size of the substrate network, which is not the case for. We recall that for each virtual router, D-ViNE and R-ViNE create a meta-node. Besides, each meta-node is connected with all the substrate routers in which the number depends on the physical network size. Indeed, we need to connect the metanode with all the physical routers in the network because we do not assume any geographical constrains for routers. In doing so, the time convergence and complexity increase in large-scale physical network. Finally, we remark that the revenue obtained by D-ViNE and R-ViNE is less than the related strategies. The main reason that the comparison is not faire. The revenue of memory is not considered. Fig. 2 illustrates the reject rate of requests Q(t) during the simulation. It shows that notably minimises the reject rate compared with the related strategies, and that it does so throughout all simulations. This can be explained by the fact that the algorithm aims to maximise the residual

6 U(t) C(t) (logarithmic scale) Time unit Time unit Fig. 3. Average usage rate of links - U Fig. 4. Comparison of average provisional cost of request - C resources in the SN. Thus, it avoids more critical resources and consequently prevents congestion in the SN. As illustrated in Fig. 2, it is worth noting that the request reject process starts late with (at 1420 time unit) compared with the related strategies in which the best onestarts at 703 time unit. Moreover, the reject rate peak is the lowest in Fig. 2 and then decreases during the simulation. This proves that the resources are allocated efficiently. In fact, unlike other algorithms, is based on pseudo-randomised node selection. As proved in algorithm design randomisation, this approach leads to effective performance in computationally intractable problems. As shown in Fig. 3, thanks to s path-distance metric, the algorithm succeeds in making a trade-off between minimising the length of substrate paths and maximising residual bandwidth in the SN. We can see that allocates approximately the same bandwidth in the SN but that it assigns more requests. Note that and consume lower levels of resources than. This can be explained by the fact that is based on the shortest path algorithm and that favours the mapping of small VN requests in terms of required resources (as illustrated in Fig. 5), which rationally decreases the provisional cost. However, both strategies have the highest reject rates since they do not take into account the bottleneck effect in the SN. Moreover, the figure shows that consumes high level of resources due to its path metric that does not take into account bandwidth usage. It is clear in Fig. 4 that produces the best average provisional cost thanks to its path metric and the large number of accepted requests. We can also see that the average provisional cost of requests obtained by is constant throughout the simulations, even though more VN requests are embedded in the SN. It is worth noting that leads to an expensive mapping cost caused by the long substrate paths allocated to virtual links. Fig. 5 shows that performs better than the other approaches tested since it provides a higher overall revenue to the SN provider. We can see that the average revenue of is roughly constant, in spite of incoming requests. The rest of strategies provide lower revenue due to their higher level of rejects which degrade their efficiency. We can conclude that R(t) Fig. 5. Time unit Comparison of average revenue - R coordinated virtual node and virtual link mapping stages lead to efficient mapping and thus generate a higher income. The last step is to compare the final reject rate of VN requests, Q, with respect to the embedding strategy and the arrival rate of requests, λ. As depicted in Figure 6, we can see that,,andvne-dividing reject the most of requests (i.e., Q 73%). On the other hand, and achieve the least reject rates for different λ values. Indeed,, outperforms when λ is equal to 4 and 8. Besides, both strategies (i.e., and ) have the same performance with heavy loads of requests (i.e., λ 16). In fact, makes use of the k-shortest algorithm, which favours the embedding strategy to find paths in the SN for virtual links. The computation complexity of is high and an arrival rate greater than or equal to 16 VN requests per time unit is an upperboud of realistic scenarios. In addition, we can see that for both and strategies, the reject rate increase is logarithmic when λ grows exponentially. As mentioned above, whatever the arrival rate of requests, optimises the

7 Q TABLE II IMPACT OF λ ON THE REJECT RATE OF, D-VINE, AND R-VINE Strategy λ =4 λ =8 λ =16 λ =64 - Q D-ViNE - Q R-Vine - Q resource usage of the SN and consequently maximises the revenue of the cloud provider Fig. 6. VNE-Basic λ Impact of λ on the reject rate of related VN embedding strategies In Table II, we observe that D-ViNE and R-ViNE outperform thanks to the multi-commodity flow approach. However, we notice that when the arrival rate λ increases, reaches the performance of both methods. VI. CONCLUSIONS Cloud computing is new paradigm that is built on three basic principles: i) grid computing, ii) cluster computing and iii) virtualization. In this paper, we addressed the challenging and complex virtual network embedding problem within a cloud infrastructure network. Indeed, we briefly outlined the definitions of cloud computing and its supplied services and the cloud computing architecture called the Totally Virtualized Cloud Infrastructure (TVCI). We saw that virtual network embedding strategies for cloud infrastructure networks have already been proposed in existing literature, namely: i), ii), iii), iv), v), vi)d-vine and vii) R-ViNE. We compared these approaches using extensive simulations measuring i) virtual network request reject rate, ii) embedding cost of the virtual network request, iii) embedding revenue of the virtual network request and iv) average usage rate of physical resources. As the virtual network embedding issue is a recent problem, we believe that other methods will be proposed in the near future as the research community increasingly focuses on issues relating to cloud computing. In addition, the migration of virtual routers in a substrate network, made possible thanks to virtualization technology, is an interesting solution for tackling bottlenecking problems. We believe that migration can be used a complementary solution in minimising the reject rate of virtual network requests in order to maximise the provider s revenue. REFERENCES [1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in the clouds: towards a cloud definition, ACM SIGCOMM Computer Communication Review, vol. 39, pp , [2] NIST, Definition of cloud computing v15, csrc.nist.gov/groups/sns/cloud-computing/cloud-def-v15.doc. [3] R. Buyya, High performance cluster computing: Architectures and systems, vol. 1, Prentice Hall, Upper Saddle River, USA, [4] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems journal, vol. 25, pp , [5] C. Guo, G. Lu, H. Wang, S. Yang, C. Kong, P. Sun, W. Wu, and Y. Zhang, Secondnet: A data center network virtualization architecture with bandwidth guarantees, ACM CONEXT, [6] Z. Zhang, M. Zhang, A. Greenberg, Y. C. Hu, R. Mahajan, and B. Christian, Optimizing cost and performance in online service provider networks, Proceedings of the 7th USENIX conference on Networked systems design and implementation, [7] L. Youseff, M. Butrico, and D. Da-Silva, Toward a unified ontology of cloud computing, Grid Computing Environments Workshop, pp. 1 10, [8] I. Fajjari, N. Aitsaadi, G. Pujolle, and H. Zimmermann, An optimised dynamic resource allocation algorithm for cloud s backbone network, IEEE LCN, [9] F. Hao, T. V. Lakshman, S. Mukherjee, and H. Song, Enhancing dynamic cloud-based services using network virtualization, SIGCOMM Comput. Commun. Rev., vol. 40, pp , [10] Y. Zhu and M. Ammar, Algorithms for assigning substrate network resources to virtual network components, IEEE INFOCOM, pp. 1 12, [11] M. Yu, Y. Yi, J. Rexford, and M. Chiang, Rethinking virtual network embedding: substrate support for path splitting and migration, SIGCOMM Comput. Commun. Rev., vol. 38, pp , [12] J. Lu and J. Turner, Efficient mapping of virtual networks onto a shared substrate, Washington University in St. Louis, Tech. Rep., [Online]. Available: jl1/research/tech report 2006.pdf [13] N. Chowdhury, M. Rahman, and R. Boutaba, Virtual network embedding with coordinated node and link mapping, IEEE INFOCOM, pp , [14] I. Fajjari, N. Aitsaadi, G. Pujolle, and H. Zimmermann, : Virtual Network Embedding Algorithm based on Ant Colony Metaheuristic, IEEE ICC, [15] D. G. Andersen, Theoretical approaches to node assignment, 2002, [16] J. Kleinberg, Approximation algorithms for disjoint paths problems, PhD thesis - MIT, [17] C. Tran and Z. Dziong, Service overlay network capacity adaptation for profit maximization, IEEE Transactions on Network and Service Management, pp , [18] M. Brunner, G. Nunzi, T. Dietz, and I. Kazuhiko, Customer-oriented gmpls service management and resilience differentiation, IEEE Transactions on Network and Service Management, pp , [19] M. Chowdhury, M. Rahman, and R. Boutaba, ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping, IEEE/ACM Transactions on Networking, pp , [20] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, Technical Report Identifier: EECS , [21] Z. Zhang, X. Cheng, S. Su, Y. Wang, K. Shuang, and Y. Luo, A unified enhanced particle swarm optimization-based virtual network embedding algorithm, International Journal of Communication Systems, pp. 1 20, [22] X. Cheng, S. Su, Z. Zhang, K. Shuang, F. Yang, Y. Luo, and J. Wang, Virtual network embedding through topology awareness and optimization, Computer Networks, vol. 56, no. 6, pp , [23] I. Houidi, W. Louati, W. B. Ameur, and D. Zeghlache, Virtual network provisioning across multiple substrate networks, Comput. Netw., pp , [24] N. F. Butt, M. Chowdhury, and R. Boutaba, Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding, IFIP NET- WORKING Conference, pp , [25] G. Even, M. Medina, G. Schaffrath, and S. Schmid, Competitive and deterministic embeddings of virtual networks, Proceedings of the 13th international conference on Distributed Computing and Networking, pp , [26] N. Bansal, K.-W. Lee, V. Nagarajan, and M. Zafer, Minimum congestion mapping in a cloud, Proceedings of the 30th annual ACM SIGACT- SIGOPS symposium on Principles of distributed computing, pp , 2011.

Minimizing bottleneck nodes of a substrate in virtual network embedding

Minimizing bottleneck nodes of a substrate in virtual network embedding Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@

More information

VNE-Sim: A Virtual Network Embedding Simulator

VNE-Sim: A Virtual Network Embedding Simulator VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,

More information

A Prediction-based Dynamic Resource Management Approach for Network Virtualization

A Prediction-based Dynamic Resource Management Approach for Network Virtualization A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology

More information

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract

More information

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Mohamed Faten Zhani, Raouf Boutaba Institute of

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

Virtual Network Embedding with Substrate Support for Parallelization

Virtual Network Embedding with Substrate Support for Parallelization Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya

More information

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks IEEE International Conference on Ad hoc and Sensor Systems 19-22 October 2015, Dallas, USA GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks Boutheina Dab Ilhem Fajjari,

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica

More information

Modeling Service Applications for Optimal Parallel Embedding

Modeling Service Applications for Optimal Parallel Embedding Modeling Service Applications for Optimal Parallel Embedding Changcheng Huang Department of Systems and Computer Engineering Carleton University Ottawa, Canada huang@sce.carleton.ca Jiafeng Zhu Huawei

More information

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m

More information

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS Yuao Cheng, Houfeng Huang, Gang Wu, Qing Ling Department of Automation, University of Science and Technology of China, Hefei, China ABSTRACT

More information

Connectivity-aware Virtual Network Embedding

Connectivity-aware Virtual Network Embedding Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding

More information

Resource analysis of network virtualization through user and network

Resource analysis of network virtualization through user and network Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information

More information

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University

More information

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization Víctor M. Aragón, Ignacio de Miguel, Ramón J. Durán, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández,

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

Energy Efficient in Cloud Computing

Energy Efficient in Cloud Computing Energy Efficient in Cloud Computing Christoph Aschberger Franziska Halbrainer May 24, 2013 1 of 25 Introduction Energy consumption by Google 2011: 2,675,898 MWh. We found that we use roughly as much electricity

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks J. Elias 1, F. Martignon 2, and A. Capone 3 1 University of Paris 6, LIP6 Laboratory, 8 rue du Capitaine Scott, 75015,

More information

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017 SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

CQNCR: Optimal VM Migration Planning in Cloud Data Centers

CQNCR: Optimal VM Migration Planning in Cloud Data Centers CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,

More information

Flexible Bandwidth-Based Virtual Network Embedding

Flexible Bandwidth-Based Virtual Network Embedding Flexible Bandwidth-Based Virtual Networ Embedding Cihangir Beşitaş 1,DidemGözüpe 1, Aydın Ulaş 2, Erhan Loman 2, Özcan Özyurt 2, Kazım Ulusoy 2 1 Department of Computer Engineering, Gebze Technical University,

More information

A Path Generation Approach to Embedding of Virtual Networks

A Path Generation Approach to Embedding of Virtual Networks This is the author s version of an article that has been published in IEEE Transactions on Network and Service Management. Changes were made to this version by the publisher prior to publication. The final

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Ruilong Deng 1,4, Rongxing Lu 1, Chengzhe Lai 2, Tom H. Luan 3, and Hao Liang 4 1: Nanyang Technological University,

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

A Distributed, Parallel, and Generic Virtual Network Embedding Framework

A Distributed, Parallel, and Generic Virtual Network Embedding Framework A Distributed, Parallel, and Generic Virtual Network Embedding Framework Michael Till Beck, Andreas Fischer, Hermann de Meer University of Passau, Passau, Germany {michael.beck,andreas.fischer,demeer}@uni-passau.de

More information

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade

More information

Temporal Bandwidth-Intensive Virtual Network Allocation Optimization in a Data Center Network

Temporal Bandwidth-Intensive Virtual Network Allocation Optimization in a Data Center Network Temporal Bandwidth-Intensive Virtual Network Allocation Optimization in a Data Center Network Matthew A. Owens, Deep Medhi Networking Research Lab, University of Missouri Kansas City, USA {maog38, dmedhi}@umkc.edu

More information

Coordinated carrier aggregation for campus of home base stations

Coordinated carrier aggregation for campus of home base stations 2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Capacity of Grid-Oriented Wireless Mesh Networks

Capacity of Grid-Oriented Wireless Mesh Networks Capacity of Grid-Oriented Wireless Mesh Networks Nadeem Akhtar and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford, GU2 7H, UK Email: n.akhtar@surrey.ac.uk, k.moessner@surrey.ac.uk

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Distributed Load-Sensitive Routing for Computationally-Constrained Flows

Distributed Load-Sensitive Routing for Computationally-Constrained Flows Distributed Load-Sensitive Routing for Computationally-Constrained Flows An-Cheng Huang and Peter Steenkiste Carnegie Mellon University Abstract A network that provides not only connectivity but also computational

More information

Routing and Traffic Engineering in Hybrid RF/FSO Networks*

Routing and Traffic Engineering in Hybrid RF/FSO Networks* Routing and Traffic Engineering in Hybrid RF/FSO Networks* Abhishek Kashyap and Mark Shayman Department of Electrical and Computer Engineering, University of Maryland, College Park MD 20742 Email: {kashyap,

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

Opportunistic Bandwidth Sharing for Virtual Network Mapping

Opportunistic Bandwidth Sharing for Virtual Network Mapping Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department

More information

Characterizing Traffic Demand Aware Overlay Routing Network Topologies

Characterizing Traffic Demand Aware Overlay Routing Network Topologies Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

Performance of Cloud Computing Centers with Multiple Priority Classes

Performance of Cloud Computing Centers with Multiple Priority Classes Performance of Cloud Computing Centers with Multiple Priority Classes Wendy Ellens, Miroslav Živković, Jacob Akkerboom, Remco Litjens, Hans van den Berg Performance of Networks and Systems TNO Delft, the

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France

More information

Low complexity bandwidth guaranteed routing algorithms using path holding time

Low complexity bandwidth guaranteed routing algorithms using path holding time Low complexity bandwidth guaranteed routing algorithms using path holding time Cao Thai Phuong Thanh Saigon University Ho Chi Minh City, Vietnam Email: ctpthanh@sgu.edu.vn Ha Hai Nam, Tran Cong Hung Post

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

DYNAMIC LOAD BALANCING FOR CLOUD PARTITION IN PUBLIC CLOUD MODEL USING VISTA SCHEDULER ALGORITHM

DYNAMIC LOAD BALANCING FOR CLOUD PARTITION IN PUBLIC CLOUD MODEL USING VISTA SCHEDULER ALGORITHM DYNAMIC LOAD BALANCING FOR CLOUD PARTITION IN PUBLIC CLOUD MODEL USING VISTA SCHEDULER ALGORITHM 1 MANISHANKAR S, 2 SANDHYA R, 3 BHAGYASHREE S 1 Assistant Professor, Department of Computer Science, Amrita

More information

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016)

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016) Survey on Ant Colony Optimization Shweta Teckchandani, Prof. Kailash Patidar, Prof. Gajendra Singh Sri Satya Sai Institute of Science & Technology, Sehore Madhya Pradesh, India Abstract Although ant is

More information

Department of Information Technology Sri Venkateshwara College of Engineering, Chennai, India. 1 2

Department of Information Technology Sri Venkateshwara College of Engineering, Chennai, India. 1 2 Energy-Aware Scheduling Using Workload Consolidation Techniques in Cloud Environment 1 Sridharshini V, 2 V.M.Sivagami 1 PG Scholar, 2 Associate Professor Department of Information Technology Sri Venkateshwara

More information

ACO and other (meta)heuristics for CO

ACO and other (meta)heuristics for CO ACO and other (meta)heuristics for CO 32 33 Outline Notes on combinatorial optimization and algorithmic complexity Construction and modification metaheuristics: two complementary ways of searching a solution

More information

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

A QoS Load Balancing Scheduling Algorithm in Cloud Environment A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in

More information

Available online at ScienceDirect. Procedia Computer Science 93 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 93 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 93 (2016 ) 269 275 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016,

More information

Topology-aware Virtual Network Embedding Using Multiple Characteristics

Topology-aware Virtual Network Embedding Using Multiple Characteristics KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 1, Jan. 2014 145 Topology-aware Virtual Network Embedding Using Multiple Characteristics Jianxin Liao 1*, Min Feng 1, Tonghong Li 2, Jingyu

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks

Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks 1648 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 5, OCTOBER 2015 Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks Dan Li, Member, IEEE, Jing Zhu, Jianping Wu, Fellow,

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

Multilevel Fault-tolerance for Designing Dependable Wireless Networks

Multilevel Fault-tolerance for Designing Dependable Wireless Networks Multilevel Fault-tolerance for Designing Dependable Wireless Networks Upkar Varshney Department of Computer Information Systems Georgia State University Atlanta, Georgia 30302-4015 E-mail: uvarshney@gsu.edu

More information

An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers

An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 8 Issue 01 Ver. II Jan 2019 PP 38-45 An Optimized Virtual Machine Migration Algorithm

More information

Bipartite Graph Partitioning and Content-based Image Clustering

Bipartite Graph Partitioning and Content-based Image Clustering Bipartite Graph Partitioning and Content-based Image Clustering Guoping Qiu School of Computer Science The University of Nottingham qiu @ cs.nott.ac.uk Abstract This paper presents a method to model the

More information

Rethinking Virtual Network Embedding in Reconfigurable Networks

Rethinking Virtual Network Embedding in Reconfigurable Networks Rethinking Virtual Network Embedding in Reconfigurable Networks Max Curran, Md. Shaifur Rahman, Himanshu Gupta and Vyas Sekar Department of Computer Science, Stony Brook University, NY, USA. Department

More information

ENTERPRISES nowadays are embracing a new computing

ENTERPRISES nowadays are embracing a new computing This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TCC.26.253525,

More information

Establishing a Service Model of Private Elastic VPN for cloud computing

Establishing a Service Model of Private Elastic VPN for cloud computing Volume 1, Issue 4, August 2012 www.ijcsn.org ISSN 2277-5420 Establishing a Service Model of Private Elastic VPN for cloud computing 1 Priyanka Gupta, 2 Ashok Verma Page 22 1 Computer Science, RGPV, GGITS

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,

More information

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer

More information

PROFILING BASED REDUCE MEMORY PROVISIONING FOR IMPROVING THE PERFORMANCE IN HADOOP

PROFILING BASED REDUCE MEMORY PROVISIONING FOR IMPROVING THE PERFORMANCE IN HADOOP ISSN: 0976-2876 (Print) ISSN: 2250-0138 (Online) PROFILING BASED REDUCE MEMORY PROVISIONING FOR IMPROVING THE PERFORMANCE IN HADOOP T. S. NISHA a1 AND K. SATYANARAYAN REDDY b a Department of CSE, Cambridge

More information

Two-Level Cooperation in Autonomic Cloud Resource Management

Two-Level Cooperation in Autonomic Cloud Resource Management Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran a, Alain Tchana b, Laurent Broto a, Daniel Hagimont a a ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran,

More information

Optimising OSPF Routing for Link Failure Scenarios

Optimising OSPF Routing for Link Failure Scenarios Optimising OSPF Routing for Link Failure Scenarios Sadiq M. Sait, Mohammed H. Sqalli, Syed Asadullah Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran 31261, Saudi Arabia

More information

Implementation of Boundary Cutting Algorithm Using Packet Classification

Implementation of Boundary Cutting Algorithm Using Packet Classification Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Design and Analysis of Schedules for Virtual Network Migration

Design and Analysis of Schedules for Virtual Network Migration Networking 2013 1569702959 Design and Analysis of Schedules for Virtual Network Migration Samantha Lo, Mostafa Ammar, and Ellen Zegura School of Computer Science, Georgia Institute of Technology Email:

More information

Resource Allocation in the Network Operator's Cloud: A Virtualization Approach

Resource Allocation in the Network Operator's Cloud: A Virtualization Approach Resource Allocation in the Network Operator's Cloud: A Virtualization Approach J. Soares,2, J. Carapinha, M. Melo,2 Portugal Telecom Inovação Aveiro, Portugal {joao-m-soares, jorgec, marcio-mmelo}@ptinovacao.pt

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Competitive and Deterministic Embeddings of Virtual Networks

Competitive and Deterministic Embeddings of Virtual Networks Competitive and Deterministic Embeddings of Virtual Networks Guy Even (Tel Aviv Uni) Moti Medina (Tel Aviv Uni) Gregor Schaffrath (T-Labs Berlin) Stefan Schmid (T-Labs Berlin) The Virtual Network Embedding

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information