Skip to main content

RSCM: A Reliability-Aware Service Chain Mapping

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11633))

Abstract

As the development of Network Function Virtualization (NFV) technology, service is placed on a set of virtual network functions (VNFs), namely service chain. Operators provide differentiated services for users by managing and mapping placement and routing of VNFs. However, the existing mapping schemes lack comprehensive considerations of service reliability and QoS parameters such as latency, transmission rate. Besides, resource utilization efficiency also needs to be further improved. So, a reliability-aware service chain mapping (RSCM) algorithm is proposed. RSCM firstly gets reachable paths by improved breadth-first search (IBFS) algorithm and extends them in a cost-efficient manner to get routing scheme. Secondly, a P*Q replication method is proposed to guarantee reliability of services, where P VNFs are supported by Q replicas to improve resource utilization. The simulation result shows that our algorithm takes less time to generate service chain mapping scheme, which can reduce cost.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kaloxylos, A.: A survey and an analysis of network slicing in 5G networks. IEEE Commun. Stand. Mag. 2(1), 60–65 (2018)

    Article  Google Scholar 

  2. Zhang, J., Xie, N., Zhang, X., Yue, K., Li, W., Kumar, D.: Machine learning based resource allocation of cloud computing in auction. CMC Comput. Mater. Contin. 56(1), 123–135 (2018)

    Google Scholar 

  3. Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC Comput. Mater. Contin. 56(2), 273–283 (2018)

    Google Scholar 

  4. Ordonez-Lucena, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J.J., Lorca, J., Folgueira, J.: Network slicing for 5G with SDN/NFV: concepts, architectures, and challenges. IEEE Commun. Mag. 55(5), 80–87 (2017)

    Article  Google Scholar 

  5. Fafoutis, X., Elsts, A., Piechocki, R., Craddock, I.: Experiences and lessons learned from making IoT sensing platforms for large-scale deployments. IEEE Access 6, 3140–3148 (2018)

    Article  Google Scholar 

  6. Qu, L., Assi, C., Shaban, K., Khabbaz, M.J.: A reliability-aware network service chain provisioning with latency guarantees in NFV-enabled enterprise datacenter networks. IEEE Trans. Netw. Serv. Manag. 14(3), 554–568 (2017)

    Article  Google Scholar 

  7. Vizarreta, P., Condoluci, M., Machuca, C.M., Mahmoodi, T., Kellerer, W.: QoS-driven function placement reducing expenditures in NFV deployments. In: 2017 IEEE International Conference on Communications (ICC), Paris, pp. 1–7 (2017)

    Google Scholar 

  8. Guerzoni, R., Despotovic, Z., Trivisonno, R., Vaishnavi, I.: Modeling reliability requirements in coordinated node and link mapping. In: 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, Nara, pp. 321–330 (2014)

    Google Scholar 

  9. Fan, J. et al.: GREP: guaranteeing reliability with enhanced protection in NFV. In: Proceedings of the ACM SIGCOMM Workshop HotMiddleBox, London, U.K., pp. 13–18, August 2015

    Google Scholar 

  10. de la Bastidaand, D., Lin, F.J.: Extending IoT/M2M system scalability by network slicing. In: NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, pp. 1–8 (2018)

    Google Scholar 

  11. Rahman, M.R., Boutaba, R.: SVNE: survivable virtual network embedding algorithms for network virtualization. IEEE Trans. Netw. Serv. Manag. 10(2), 105–118 (2013)

    Article  Google Scholar 

  12. Liu, S., Cai, Z., Xu, H., Xu, M.: Security-aware virtual network embedding. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 834–840 (2014)

    Google Scholar 

Download references

Acknowledgment

This paper is supported by SGCC Science and Technology Foundation “Core Technology and Development of Key Equipment for Power System Stable Control based on Multi Source Real Time Data Transfer Scheduling Mode” (Project NO: SGTYHT/15-JS-191).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guanjun Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, G., Chen, Y., Xu, S., Chen, Q., He, W. (2019). RSCM: A Reliability-Aware Service Chain Mapping. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24265-7_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24264-0

  • Online ISBN: 978-3-030-24265-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics