Citation: | Huanlin LIU, Zhenyu LIN, Xin WANG, Yong CHEN, Min XIANG, Yue MA. A Diverse Virtual Optical Network Mapping Strategy Based on Security Awareness in Elastic Optical Networks[J]. Journal of Electronics & Information Technology, 2019, 41(2): 424-432. doi: 10.11999/JEIT180335 |
Due to the probabilistic failure of the optical fiber of the underlying network in the virtual environment, traditional full protection configures one protection path at least which leads to high resource redundancy and low acceptance rate of the virtual network. In this paper, a Security Awareness-based Diverse Virtual Network Mapping (SA-DVNM) strategy is proposed to provide security guarantee in the event of failures. In SA-DVNM, the physical node weight formula is designed by considering the hops between nodes and the bandwidth of adjacent links, besides, a path-balanced link mapping mechanism is proposed to minimize the overloaded link. For improving the acceptability of virtual network, SA-DVNM strategy designs a resource allocation mechanism that allows path cut when a single path is unavailable for low security. Considering the difference of time delay to ensure the security of delay-sensitive services, a multipath routing spectrum allocation method based on delay difference is designed to optimize the routing and spectrum allocation for SA-DVNM strategy. The simulation results show that the proposed SA-DVNM strategy can improve the spectrum utilization and virtual optical network acceptance rate in the probabilistic fault environment, and reduce the bandwidth blocking probability.
熊余, 刘川菠, 孙鹏. 考虑业务服务质量的光线路终端节能算法[J]. 重庆邮电大学学报(自然科学版), 2017, 29(2): 208–215. doi: 10.3979/j.issn.1673-825X.2017.02.011
XIONG Yu, LIU Chuanbo, and SUN Peng. Energy saving algorithm for optical line terminal considering quality of service[J]. Journal of Chongqing University of Posts and Telecommunications, 2017, 29(2): 208–215. doi: 10.3979/j.issn.1673-825X.2017.02.011
|
ANOH N G, BABRI M, KORA A D, et al. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks[J]. Digital Communication Networks, 2016, 3(1): 11–18. doi: 10.1016/j.dcan.2016.05.001
|
刘焕淋, 张明佳, 陈勇, 等. 频谱可用性和保护带宽共享度感知的弹性光网络生存性多路径策略[J]. 电子与信息学报, 2017, 39(10): 2472–2478. doi: 10.11999/JEIT161374
LIU Huanlin, ZHANG Mingjia, CHEN Yong, et al. Survivable multipath strategy based on spectrum availability and protection bandwidth sharing degree-aware for elastic optical networks[J]. Journal of Electronics &Information Technology, 2017, 39(10): 2472–2478. doi: 10.11999/JEIT161374
|
HADI M and PAKRAVAN M R. Spectrum-convertible BVWXC placement in OFDM-based elastic optical networks[J]. IEEE Photonics Journal, 2017, 9(1): 1–12. doi: 10.1109/JPHOT.2017.2657738
|
CASTRO A, GIORGETTI A, CUGINI F, et al. Superfilter technique in SDN—Controlled elastic optical networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2015, 7(2): A285–A292. doi: 10.1364/JOCN.7.00A285
|
HAMMAD A, NEJABATI R, and SIMEONIDOU D. Cross-layer optimization of network resource virtualization in IP over O-OFDM networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2016, 8(10): 765–776. doi: 10.1364/JOCN.8.000765
|
YIN Yawei, ZHANG Huan, ZHANG Mingyang, et al. Spectral and spatial 2D fragmentation-aware routing and spectrum assignment algorithms in elastic optical networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2013, 5(10): A100–A106. doi: 10.1364/JOCN.5.00A100
|
YE Z, ZHU Y, JI P N, et al. Virtual infrastructure mapping in software-defined elastic optical networks[J]. Photonic Network Communications, 2016, 34(1): 1–11. doi: 10.1007/s11107-016-0678-4
|
鲍宁海, 刘翔, 张治中, 等. WDM节能光网络中的抗毁保护算法研究[J]. 重庆邮电大学学报(自然科学版), 2012, 24(3): 278–282. doi: 10.3979/j.issn.1673-825X.2012.03.002
BAO Ninghai, LIU Xiang, ZHANG Zhizhong, et al. Survival protection algorithm in WDM energy-efficient optical network[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)
|
XIAO Xiancui and ZHENG Xiangwei. A proposal of survivable virtual network embedding algorithm[J]. Journal of High Speed Networks, 2016(22): 241–251. doi: 10.3233/JHS-160546
|
RAHMAN M R and BOUTABA R. SVNE: Survivable virtual network embedding algorithms for network virtualization[J]. IEEE Transactions on Network & Service Management, 2013, 10(2): 105–118. doi: 10.1109/TNSM.2013.013013.110202
|
SOUALAH O, FAJJARI I, AITSAADI N, et al. A reliable virtual network embedding algorithm based on game theory within cloud’s backbone[C]. IEEE International Conference on Communications, Sydney, Australia, 2014: 2975–2981.
|
CHOWDHURY S R, AHMED R, KHAN M A, et al. Dedicated protection for survivable virtual network embedding[J]. IEEE Transactions on Network & Service Management, 2016, 13(4): 913–926. doi: 10.1109/TNSM.2016.2574239
|
WANG Yuyu, LI Xin, GUO Bingli, et al. Survivable virtual optical network mapping in elastic optical networks with shared backup path protection[C]. Wireless and Optical Communication Conference, Chengdu, China, 2016: 1–4.
|
YANG Hui, ZHU Xiaoxu, BAI Wei, et al. Survivable VON mapping with ambiguity similitude for differentiable maximum shared capacity in elastic optical networks[J]. Optical Fiber Technology, 2016(31): 138–146. doi: 10.1016/j.yofte.2016.07.002
|
JIANG Huihui, WANG Yixiang, GONG Long, et al. Availability-aware survivable virtual network embedding in optical data center networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2015, 7(12): 1160–1171. doi: 10.1364/JOCN.7.001160
|
CHEN Bowen. Cost-effective survivable virtual optical network mapping in flesxible bandwidth optical networks[J]. Journal of Lightwave Technology, 2016, 34(10): 2398–2412. doi: 10.1109/JLT.2016.2530846
|
YANG Hui and CHENG Lei. Survivable virtual optical network embedding with probabilistic network-element failures in elastic optical networks[J]. Optical Fiber Technology, 2015(23): 90–94. doi: 10.1016/j.yofte.2015.02.006
|
WANG Hongxiang. Opaque virtual network mapping algorithms based on available spectrum adjacency for elastic optical networks[J]. Science China Information Sciences, 2016, 59(4): 1–11. doi: 10.1007/s11432-016-5525-9
|