高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

异构备份式的虚拟网映射方法研究

季新生 赵硕 艾健健 程国振 齐超

季新生, 赵硕, 艾健健, 程国振, 齐超. 异构备份式的虚拟网映射方法研究[J]. 电子与信息学报, 2018, 40(5): 1087-1093. doi: 10.11999/JEIT170730
引用本文: 季新生, 赵硕, 艾健健, 程国振, 齐超. 异构备份式的虚拟网映射方法研究[J]. 电子与信息学报, 2018, 40(5): 1087-1093. doi: 10.11999/JEIT170730
JI Xinsheng, ZHAO Shuo, AI Jianjian, CHENG Guozhen, QI Chao. Research on Heterogeneous-backup Virtual Network Embedding[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1087-1093. doi: 10.11999/JEIT170730
Citation: JI Xinsheng, ZHAO Shuo, AI Jianjian, CHENG Guozhen, QI Chao. Research on Heterogeneous-backup Virtual Network Embedding[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1087-1093. doi: 10.11999/JEIT170730

异构备份式的虚拟网映射方法研究

doi: 10.11999/JEIT170730
基金项目: 

国家自然科学基金创新研究群体项目(61521003),信息工程大学新兴方向培育基金(2016610708),国家重点研发计划项目(2016YFB0800100, 2016YFB0800101),河南省科技攻关计划项目(172102210615),国家自然科学基金(61602509)

Research on Heterogeneous-backup Virtual Network Embedding

Funds: 

The Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003), The Emerging Direction Nurturing Foundation in Information Engineering University (2016610708), The National Key RD Program of China (2016YFB0800100, 2016YFB0800101), The Science and Technology Research Project of Henan Province (172102210615), The National Natural Science Foundation of China (61602509)

  • 摘要: 在云计算和数据中心环境中,底层单个物理服务器的失效将对上层虚拟网络的服务性能造成很大的影响,现有利用冗余备份的方法能够在一定程度上降低底层物理设备失效带来的影响,但未考虑到物理服务器的同构性所带来的问题,为此,该文提出一种异构备份式的虚拟网映射方法。首先,只对关键的虚拟机进行冗余备份,降低备份资源的开销;然后,确保提供备份虚拟机的物理服务器与原物理服务器的系统类型的异构性,提高虚拟网的弹性能力;最后,以最小化链路资源开销作为虚拟网的映射目标,进一步降低备份资源的开销。实验表明,该方法在保证虚拟网络映射性能的前提下,能够大大提高虚拟网络的弹性能力。
  • JAIN R and PAUL S. Network virtualization and software defined networking for cloud computing: a survey[J]. IEEE Communications Magazine, 2013, 51(11): 24-31. doi: 10.1109 /MCOM.2013.6658648.
    ZHANG Q, CHENG L, and BOUTABA R. Cloud computing: state-of-the-art and research challenges[J]. Journal of Internet Services and Applications, 2010, 1(1): 7-18. doi: 10.1007/s13174-010-0007-6.
    CHOWDHURY N M M K and BOUTABA R. Network virtualization: state of the art and research challenges[J]. IEEE Communications Magazine, 2009, 47(7): 20-26. doi: 10.1109/MCOM.2009.5183468.
    CHOWDHURY N M M K and BOUTABA R. A survey of network virtualization[J]. Computer Networks, 2010, 54(5): 862-876. doi: 10.1016/j.comnet.2009.10.017.
    LI Z, LIANG M, O'BRIEN L, et al. The cloud,s cloudy moment: A systematic survey of public cloud service outage [J]. International Journal of Cloud Computing and Services Science, 2013, 2(5): 20-31. doi: 10.11591/closer.v2i5.5125.
    GILL P, JAIN N, and NAGAPPAN N. Understanding network failures in data centers: Measurement, analysis, and implications[C]. ACM SIGCOMM Computer Communication Review, New York, USA, 2011: 350-361.
    HERKER S, KHAN A, and AN X. Survey on survivable virtual network embedding problem and solutions[C]. International Conference on Networking and Services (ICNS), Lisbon, Portugal, 2013: 99-104.
    SHAHRIAR N, AHMED R, KHAN A, et al. ReNoVatE: recovery from node failure in virtual network embedding[C]. Network and Service Management (CNSM), Montreal, Canada, 2016: 19-27.
    SHAHRIAR N, AHMED R, CHOWDHURY S R, et al. Generalized recovery from node failure in virtual network embedding[J]. IEEE Transactions on Network and Service Management, 2017, 14(2): 261-274. doi: 10.1109/TNSM.2017.2693404.
    YU H, ANAND V, QIAO C, et al. Migration based protection for virtual infrastructure survivability for link failure[C]. Optical Fiber Communication Conference and Exposition (OFC/NFOEC), Los Angeles, USA, 2011: 1-3.
    CHOWDHURY S R, AHMED R, KHAN M M A, et al. Protecting virtual networks with drone[C]. Network Operations and Management Symposium (NOMS), Istanbul, Turkey, 2016: 78-86.
    CHOWDHURY S R, AHMED R, KHAN M M A, et al. Dedicated protection for survivable virtual network embedding[J]. IEEE Transactions on Network and Service Management, 2016, 13(4): 913-926. doi: 10.1109/TNSM.2016. 2574239.
    KHAN M M A, SHAHRIAR N, AHMED R, et al. Simple: survivability in multi-path link embedding[C]. Network and Service Management (CNSM), Barcelona, Spain, 2015: 210-218.
    XU J, TANG J, KWAITK, et al. Survivable virtual infrastructure mapping in virtualized data centers[C]. Cloud Computing (CLOUD), Honolulu, USA, 2012: 196-203.
    ZHANG Q, ZHANI M F, JABRI M, et al. Venice: reliable virtual data center embedding in clouds[C]. International Conference on Computer Communications, Toronto, Canada, 2014: 289-297.
    SEXTON J, STORLIE C, and NEIL J. Attack chain detection[J]. Statistical Analysis and Data Mining: The ASA Data Science Journal, 2015, 8(5/6): 353-363. doi: 10.1002/ sam.11296.
  • 加载中
计量
  • 文章访问数:  1111
  • HTML全文浏览量:  156
  • PDF下载量:  162
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-07-19
  • 修回日期:  2018-01-15
  • 刊出日期:  2018-05-19

目录

    /

    返回文章
    返回