Skip to main content
Log in

Dependable virtual network mapping

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Virtualized networks are a promising approach to deal with the current ossification problem of Internet. A major challenge is related to virtual network (VN) mapping, as it is a NP-hard problem. Thus, several heuristics have been proposed aiming to achieve efficient allocation, but they do not consider dependability issues, which directly impact quality of service. This paper proposes a Greedy Randomized Adaptive Search Procedure (GRASP) based algorithm for dependable virtual network mapping, considering availability as the adopted metric. Redundancy policies are also adopted in order to meet VN requests with high availability constraints. Experiments demonstrate the impacts whenever dependability is taken into accountsss in the allocation as well as the trade-off between VN’s availability and cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Schaffrath G et al (2009) Network virtualization architecture: proposal and initial prototype. In: Proceedings of the 1st ACM workshop on virtualized infrastructure systems and architectures (VISA09)

  2. Clark DD et al (2002) Tussle in cyberspace: defining tomorrows internet. In: Proceedings of SIGCOMM 02, ACM, p 347–356

  3. Fernandes S et al (2012) Dependability assessment of virtualized networks. In: Proceedings of the IEEE ICC 2012 next-generation networking symposium (ICC 12 NGN) in conjunction with IEEE international conference on communications ICC 2012, Ottawa, Canada

  4. Maciel PRM et al (2010) Performance and dependability in service computing: concepts, techniques and research directions. IGI Global, Hershey

  5. Szeto W, Iraqi Y, Boutaba R (2003) A multi-commodity flow based approach to virtual network resource allocation. In: Proceedings of the IEEE global telecommunications conference (GLOBECOM 03), pp 3004–3008

  6. Koslovski G et al (2010) Reliability support in virtual infrastructures. In: Proceedings of IEEE 2nd international conference on cloud computing technology and science, pp 49–58

  7. Sun D et al (2010) A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: 1st Pervasive international conference on computing signal processing and applications (PCSPA)

  8. Saripalli P, Walters B (2010) QUIRC: a quantitative impact and risk assessment framework for cloud security, Cloud Computing (CLOUD), 2010 IEEE

  9. Hu X, Liu S, Ma L (2010) Research on dependability of virtual computing system based on stochastic Petri nets. In: Computer application and system modeling (ICCASM)

  10. Chowdhury N, Rahman M, Boutaba R (2009) Virtual network embedding with coordinated node and link mapping. In: Proceedings of IEEE INFOCOM

  11. Silva B et al (2012) ASTRO: an integrated environment for dependability and sustainability evaluation. Sustain Comput Inf Syst 2:1–31

    Google Scholar 

  12. Resende Mauricio GC, Ribeiro Celso C (2001) Greedy randomized adaptive search procedures. In: Glover F, Kochenberger G (eds) State-of-the-art handbook in metaheuristics. Kluwer Academic Publisher, Boston, Netherlands

  13. Zegura E, Calvert K, Bhattacharjee S (1996) How to model an Internetwork. In: Proceedings of IEEE INFOCOM, pp 594–602

  14. Balbo G (2001) Introduction to stochastic petri nets. In: Lectures on formal methods and performance analysis

  15. Trivedi K (2002) Probability and statistics with reliability, queueing, and computer science applications, 2nd edn. Wiley Interscience Publication, New Jersey, New York

    Google Scholar 

  16. Rahman MR, Aib I, Boutaba R (2010) Survivable virtual network embedding. In: Proceedings of 9th IFIP NETWORKING conference, Chennai, India

  17. Kuo W, Zuo M (2003) Optimal reliability modeling: principles and applications. Wiley, New Jersey, New York

    Google Scholar 

  18. Zhu Y, Ammar M (2006) Algorithms for assigning substrate network resources to virtual network components. In: Proceedings of IEEE INFOCOM

  19. News Briefs (2011) IEEE Computer Magazine, June 2011, pp 18–20. doi:http://dx.doi.org/10.1109/MC.2011.185

  20. Turner J, Taylor DE (2005) Diversifying the internet. In: IEEE Globecom

  21. Araujo C et al (2009) Performance modeling for evaluation and planning of electronic funds transfer systems with bursty arrival traffic. In: First international conference on intensive applications and services

  22. Schrijver A (1986) Theory of linear and integer programming. John Wiley & Sons Inc, NewYork

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eduardo Tavares.

Additional information

This work has been supported by CNPq grant 471019/2013-5.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lira, V., Tavares, E., Fernandes, S. et al. Dependable virtual network mapping. Computing 97, 459–481 (2015). https://doi.org/10.1007/s00607-014-0431-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-014-0431-8

Keywords

Mathematics Subject Classification

Navigation