دورية أكاديمية

A proposal of survivable virtual network embedding algorithm.

التفاصيل البيبلوغرافية
العنوان: A proposal of survivable virtual network embedding algorithm.
المؤلفون: Xian-cui Xiao1,2, Xiang-wei Zheng1,2 xwzhengcn@163.com
المصدر: Journal of High Speed Networks. 2016, Vol. 22 Issue 3, p241-251. 11p.
مصطلحات موضوعية: *COMPUTER algorithms, *INTERNET privacy, *QUALITY of service, VIRTUAL networks, INTERNET security
مستخلص: People heavily depend on Internet in their daily lives and propose diversified requirements, such as security and privacy. Network virtualization is considered a promising approach to overcome the disadvantages of the current networks. Therefore, how to reduce the node or link failures resulting from network outages and achieve high-quality network services should be the goal for Internet service providers to improve network security and quality of service. For network survivability, a failure protection mechanism that reserves secondary resources before any failure occurs is presented in this paper. In this study, network link resources are divided into primary and secondary flow resources. Primary flow resources are used under normal network operation, whereas secondary flow resources are used as backup resources when the network fails. When a VN request arrives, a survivable VN embedding algorithm based on a group search optimizer (GSVNE) is employed to search for optimal embedding solutions. The resource allocation proportions of the primary and secondary flow resources can be dynamically adjusted. Simulation results show that GSVNE outperforms the conventional greedy algorithm, which reflects desirable results in authoritative papers, in terms of cost and acceptance rate. [ABSTRACT FROM AUTHOR]
Copyright of Journal of High Speed Networks is the property of IOS Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Business Source Index
الوصف
تدمد:09266801
DOI:10.3233/JHS-160546