skip to main content
research-article

Slice embedding solutions for distributed service architectures

Published:11 July 2013Publication History
Skip Abstract Section

Abstract

Network virtualization provides a novel approach to running multiple concurrent virtual networks over a common physical network infrastructure. From a research perspective, this enables the networking community to concurrently experiment with new Internet architectures and protocols. From a market perspective, on the other hand, this paradigm is appealing as it enables infrastructure service providers to experiment with new business models that range from leasing virtual slices of their infrastructure to hosting multiple concurrent network services.

In this article, we present the slice embedding problem and recent developments in the area. A slice is a set of virtual instances spanning a set of physical resources. The embedding problem consists of three main tasks: (1) resource discovery, which involves monitoring the state of the physical resources, (2) virtual network mapping, which involves matching users' requests with the available resources, and (3) allocation, which involves assigning the resources that match the users' requests.

We also outline how these three tasks are tightly coupled, and how there exists a wide spectrum of solutions that either solve a particular task or jointly solve multiple tasks along with the interactions among them. To dissect the space of solutions, we introduce three main classification criteria, namely: (1) the type of constraints imposed by the user, (2) the type of dynamics considered in the embedding process, and (3) the allocation strategy adopted. Finally, we conclude with a few interesting research directions.

References

  1. Albrecht, J., Oppenheimer, D., Vahdat, A., and Patterson, D. A. 2008. Design and implementation trade-offs for wide-area resource discovery. ACM Trans. Internet Technol. 8, 4, 1--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alicherry, M. and Lakshman, T. 2012. Network aware resource allocation in distributed clouds. In Proceedings of the 31st Annual IEEE Conference on Computer Communications (IEEE/INFOCOM'12). 963--971.Google ScholarGoogle Scholar
  3. Andersen, D. G. 2002. Theoretical approaches to node assignment. Unpublished manuscript. http://repository.cmu.edu/cgi/viewcontent.cgi?article=1079&context=compsci.Google ScholarGoogle Scholar
  4. Anderson, T., Peterson, L., Shenker, S., and Turner, J. 2005. Overcoming the internet impasse through virtualization. Comput. 38, 4, 34--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. AuYoung, A., Buonadonna, P., Chun, B. N., Ng, C., Parkes, D. C., Shneidman, J., Snoeren, A. C., and Vahdat, A. 2009. Two auction-based resource allocation environments: Design and experience. In Market Oriented Grid and Utility Computing, R. Buyya and K. Bubendorfer, Eds., Chapter 23, Wiley.Google ScholarGoogle Scholar
  6. AuYoung, A., Chun, B. N., Snoeren, A. C., and Vahdat, A. 2004. Resource allocation in federated distributed computing infrastructures. In Proceedings of the 1st Workshop on Operating System and Architectural Support for the Ondemand IT InfraStructure.Google ScholarGoogle Scholar
  7. Baldine, I., Xin, Y., Mandal, A., Heermann, C., Chase, J., Marupadi, V., Yumerefendi, A., and Irwin, D. 2010. Autonomic cloud network orchestration: A geni perspective. In Proceedings of the 2nd International Workshop on Management of Emerging Networks and Services (IEEE/MENS'10), held in conjunction with GLOBECOM Workshops (GcWkshps'10). 573--578.Google ScholarGoogle Scholar
  8. Banerjee, S., Lee, S., Bhattacharjee, B., and Srinivasan, A. 2003. Resilient multicast using overlays. SIGMETRICS Perform. Eval. Rev. 31, 1, 102--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bavier, A., Feamster, N., Huang, M., Peterson, L., and Rexford, J. 2006. In vini veritas: Realistic and controlled network experimentation. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'06). 3--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bertsimas, D. and Tsitsiklis, J. 1997. Introduction to Linear Optimization. Athena Scientific. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Boyd, S. and Vandenberghe, L. 2004. Convex optimization. http://www.stanford.edu/people/boyd/cvxbook.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Byers, J. W., Considine, J., Mitzenmacher, M., and Rost, S. 2002. Informed content delivery across adaptive overlay networks. IEEE/ACM Trans. Netw. 12, 5, 767--780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Carapinha, J. and Jimenez, J. 2009. Network virtualization—A view from the bottom. In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures (VISA'09). 73--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chakrabarti, A., Chekuri, C., Gupta, A., and Kumar, A. 2002. Approximation algorithms for the unsplittable flow problem. In Proceedings of the 5th International Workshop on Approximation Algorithms for Combinatorial Optimization. 51--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chard, K., Bubendorfer, K., and Komisarczuk, P. 2010. High occupancy resource allocation for grid and cloud systems, a study with drive. In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing (HPDC'10). ACM Press, New York, 73--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Chen, H. and Roughgarden, T. 2009. Network design with weighted players. Theory Comput. Syst. 45, 2, 302--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Cheng, X., Su, S., Zhang, Z., Wang, H., Yang, F., Luo, Y., and Wang, J. 2011. Virtual network embedding through topology-aware node ranking. SIGCOMM Comput. Comm. Rev. 41, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Chiang, M., Low, S. H., Calderbank, A. R., and Doyle, J. C. 2007. Layering as optimization decomposition: A mathematical theory of network architectures. Proc. IEEE 95, 1, 255--312.Google ScholarGoogle ScholarCross RefCross Ref
  19. Chowdhury, M., Samuel, F., and Boutaba, R. 2010. PolyViNE: Policy-based virtual network embedding across multiple domains. In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architecture (VISA'10). ACM Press, New York, 49--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Chowdhury, N. M. M. K. and Boutaba, R. 2010. A survey of network virtualization. Comput. Netw. 54, 862--876. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chowdhury, N. M. M. K., Rahman, M. R., and Boutaba, R. 2009. Virtual network embedding with coordinated node and link mapping. In Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM'09). 783--791.Google ScholarGoogle Scholar
  22. Chun, B. N. and Vahdat, A. 2003. Workload and failure characterization on a large-scale federated testbed. Tech. rep., IRB-TR-03-040, Intel Research, Berkeley, CA.Google ScholarGoogle Scholar
  23. Chun, B. N., Ng, C., Albrecht, J., Parkes, D. C., and Vahdat, A. 2004. Computational resource exchanges for distributed resource allocation. (Unpublished) http://citeseerx.ist.psu.edu/viewdoc/summary.Google ScholarGoogle Scholar
  24. Chun, B. N., Buonadonna, P., Auyoung, A., Ng, C., Parkes, D. C., Shneidman, J., Snoeren, A. C., and Vahdat, A. 2005. Mirage: A microeconomic resource allocation system for sensornet testbeds. In Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Considine, J., Byers, J. W., and Meyer-Patel, K. 2004. A constraint satisfaction approach to testbed embedding services. SIGCOMM Comput. Comm. Rev. 34, 1, 137--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Cordella, L. P., Foggia, C. S., and Vento, M. 2001. An improved algorithm for matching large graphs. In Proceedings of the 3rd IAPR-TC15 Workshop on Graph-Based Representations in Pattern Recognition. 149--159.Google ScholarGoogle Scholar
  27. Courcoubetis, C. and Weber, R. R. 2009. Economic issues in shared infrastructures. In Proceedings of the 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures (VISA'09). 89--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Day, J., Matta, I., and Mattar, K. 2008. Networking is ipc: A guiding principle to a better internet. In Proceedings of the ACM CoNEXT Conference (CoNEXT'08). ACM Press, New York, 67:1--67:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. de Vries, S. and Vohra, R. V. 2003. Combinatorial Auctions: A survey. INFORMS J. Comput. 3, 284--309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Duan, Q. and Lu, E. 2007. Network service description and discovery for the next generation internet. In Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS'07). ACTA Press, Anaheim, CA, 509--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Duffield, N. G., Goyal, P., Greenberg, A., Mishra, P., Ramakrishnan, K. K., and van der Merwe, J. E. 2002. Resource management with hoses: Point-to-cloud services for virtual private networks. IEEE/ACM Trans. Netw. 10, 5, 679--692. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Eppstein, D. 1999. Finding the k shortest paths. SIAM J. Comput. 28, 2, 652--673. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Esposito, F., Di Paola, D., and Matta, I. 2012. A general distributed approach to slice embedding with guarantees. Tech. rep. TR 2012-014, Boston University.Google ScholarGoogle Scholar
  34. Esposito, F. and Matta, I. 2009. PreDA: Predicate routing for dtn architectures over manet. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'09). 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Fan, J. and Ammar, M. H. 2006. Dynamic topology configuration in service overlay networks: A study of reconfiguration policies. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06).Google ScholarGoogle Scholar
  36. Farooq Butt, N., Chowdhury, M., and Boutaba, R. 2010. Topology-awareness and reoptimization mechanism for virtual network embedding. In Proceedings of the 9th IFIP TC 6 International Conference on Networking (NETWORKING'10). Springer, 27--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Feamster, N., Gao, L., and Rexford, J. 2007. How to lease the internet in your spare time. SIGCOMM Comput. Comm. Rev. 37, 1, 61--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. For Network Innovations, G. E. 2013. http://www.geni.net.Google ScholarGoogle Scholar
  39. Foster, I. and Kesselman, C. 2003. The Grid 2. Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Fu, Y., Chase, J., Chun, B., Schwab, S., and Vahdat, A. 2003. SHARP: An architecture for secure resource peering. SIGOPS Oper. Syst. Rev. 37, 5, 133--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Geni. 2009. End-user opt-in working group. http://groups.geni.net/geni/wiki/GeniOptIn.Google ScholarGoogle Scholar
  42. Greenberg, A., Hamilton, J. R., Jain, N., Kandula, S., Kim, C., Lahiri, P., Maltz, D. A., Patel, P., and Sengupta, S. 2009. VL2: A scalable and flexible data center network. In Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM'09). ACM Press, New York, 51--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Guerin, R. A. and Orda, A. 1999. QoS routing in networks with inaccurate information: Theory and algorithms. IEEE/ACM Trans. Netw. 7, 3, 350--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Hayes, B. 2008. Cloud computing. Comm. ACM 51, 7, 9--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. He, J., Zhang-Shen, R., Li, Y., Yen Lee, C., Rexford, J., and Chiang, M. 2008. DaVinci: Dynamically adaptive virtual networks for a customized internet. In Proceedings of the ACM CoNEXT Conference (CoNEXT'08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Hibler, M., Ricci, R., Stoller, L., Duerig, J., Guruprasad, S., Stack, T., Webb, K., and Lepreau, J. 2008. Large-scale virtualization in the emulab network testbed. In Proceedings of the USENIX Annual Technical Conference on Annual Technical Conference (ATC'08). 113--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Hoelzle, U. and Barroso, L. A. 2009. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. Morgan and Claypool Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Houidi, I., Louati, W., Ben Ameur, W., and Zeghlache, D. 2011. Virtual network provisioning across multiple substrate networks. Comput. Netw. 55, 4, 1011--1023. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Houidi, I., Louati, W., and Zeghlache, D. 2008. A distributed virtual network mapping algorithm. In Proceedings of the IEEE International Conference on Communications (ICC'08). 5634--5640.Google ScholarGoogle Scholar
  50. Huang, A.-C. and Steenkiste, P. 2003. Network-sensitive service discovery. In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS'03). 18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Ishakian, V., Sweha, R., Bestavros, A., and Appavoo, J. 2012. CloudPack: Exploiting workload flexibility through rational pricing. In Proceedings of the ACM/IFIP/USENIX Middleware Conference. 374--393. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Ishakian, V., Sweha, R., Londono, J., and Bestavros, A. 2010. Colocation as a service: Strategic and operational services for cloud colocation. In Proceedings of the 9th IEEE International Symposium on Networking Computing and Applications (NCA'10). 76--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Kolliopoulos, S. G. and Stein, C. 1997. Improved approximation algorithms for unsplittable flow problems. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science. 426--435. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Kurose, J. F. and Ross, K. W. 2009. Computer Networking: A Top-Down Approach. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Lai, K., Rasmusson, L., Adar, E., Zhang, L., and Huberman, B. A. 2005. Tycoon: An implementation of a distributed, market-based resource allocation system. Multiagent Grid Syst. 1, 3, 169--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Lim, H. C., Babu, S., Chase, J. S., and Parekh, S. S. 2009. Automated control in cloud computing: Challenges and opportunities. In Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds (ACDC'09). ACM Press, New York, 13--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Lischka, J. and Karl, H. 2009. A virtual network mapping algorithm based on subgraph isomorphism detection. In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures (VISA'09). 81--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Litzkow, M., Livny, M., and Mutka, M. 1988. Condor - A hunter of idle workstations. In Proceedings of the 8th International Conference of Distributed Computing Systems.Google ScholarGoogle Scholar
  59. Londono, J. and Bestavros, A. 2008. NETEMBED: A network resource mapping service for distributed applications. In Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS'08). 1--8.Google ScholarGoogle Scholar
  60. Londono, J., Bestavros, A., and Teng, S. 2009. Collocation games and their application to distributed resource management. In Proceedings of the USENIX Workshop on Hot Topics in Cloud Computing (HotCloud'09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Lu, J. and Turner, J. 2006. Efficient mapping of virtual networks onto a shared substrate. Tech. rep., Washington University in St. Louis. http://www.arl.wustl.edu/Publications/2005-09/wucse2006-35.pdf.Google ScholarGoogle Scholar
  62. Madhyastha, H. V., Katz-Bassett, E., Anderson, T., Krishnamurthy, A., and Venkataramani, A. 2009. iPlane nano: Path prediction for peer-to-peer applications. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09). 137--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Massie, M. L., Chun, B. N., and Culler, D. E. 2003. The ganglia distributed monitoring system: Design, implementation and experience. Parallel Comput. 30, 2004.Google ScholarGoogle Scholar
  64. Matta, I. and Bestavros, A. 1998. A load profiling approach to routing guaranteed bandwidth flows. In Proceedings of the 17th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'98). Vol. 3, 1014--1021.Google ScholarGoogle Scholar
  65. Meshkova, E., Riihijarvi, J., Petrova, M., and Mahonen, P. 2008. A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. Comput. Netw. 52, 11, 2097--2128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Nogueira, J., Melo, M., Carapinha, J., and Sargento, S. 2011. Virtual network mapping into heterogeneous substrate networks. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC'11). 438--444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Oppenheimer, D., Albretch, J., Patterson, D., and Vahdat, A. 2005. Design and implementation tradeoffs for wide-area resource discovery. In Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing (HPDC'05). 113--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Organization for the Advancement of Structured Information Standards (OASIS). 2006. Universal description, discovery and integration. Version 3.0.2. https://www.oasis-open.org/standards.Google ScholarGoogle Scholar
  69. Page, L., Brin, S., Motwani, R., and Winograd, T. 1999. The pagerank citation ranking: Bringing order to the web. Tech. rep. 1999-66, Stanford InfoLab.Google ScholarGoogle Scholar
  70. Palomar, D. and Chiang, M. 2006. tutorial on decomposition methods for network utility maximization. IEEE J. Selected Areas Comm. 24, 8, 1439--1451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Peterson, L., Anderson, T., Culler, D., and Roscoe, T. 2003. A blueprint for introducing disruptive technology into the internet. SIGCOMM Comput. Comm. Rev. 33, 1, 59--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Rahman, M. R., Aib, I., and Boutaba, R. 2010. Survivable virtual network embedding. In Proceedings of the 9th IFIP TC 6 International Conference on Networking (NETWORKING'10). Springer, 40--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Rfc2547. 2013. http://tools.ietf.org/html/rfc2547.Google ScholarGoogle Scholar
  74. Ricci, R., Alfeld, C., and Lepreau, J. 2003. A solver for the network testbed mapping problem. SIGCOMM Comput. Comm. Rev. 33, 2, 65--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Ricci, R., Oppenheimer, D., Lepreau, J., and Vahdat, A. 2006. Lessons from resource allocators for large-scale multiuser testbeds. ACM SIGOPS Oper. Syst. Rev. 40, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09). ACM Press, New York, 199--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. RSP. 2013. http://www.protogeni.net/trac/protogeni/wiki/RSpec.Google ScholarGoogle Scholar
  78. Shneidman, J., Ng, C., Parkes, D. C., Auyoung, A., Snoeren, A. C., Vahdat, A., and Chun, B. 2005. Why markets would (but don't currently) solve resource allocation problems in systems. In Proceedings of the 10th Conference on Hot Topics in Operating Systems (USENIX'05). Vol. 10. USENIX Association, Berkeley, CA, 7--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Skiena., S. S. 1997. Set Packing. The Algorithm Design Manual. http://sist.sysu.edu.cn/∼isslxm/DSA/textbook/Skiena.-.TheAlgorithmDesignManual.pdf.Google ScholarGoogle Scholar
  80. Spence, D. and Harris, T. 2003. XenoSearch: Distributed resource discovery in the xenoserver open platform. In Proceedings of the International Symposium on High-Performance Distributed Computing (HPDC'03). 216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Srinivasan, S., Lee, J. W., Liu, E., Kester, M., Schulzrinne, H., Hilt, V., Seetharaman, S., and Khan, A. 2009. NetServ: Dynamically deploying in-network services. http://www.cs.columbia.edu/∼jae/papers/netserv-rearch-paper-v1.3-camera.pdf.Google ScholarGoogle Scholar
  82. Sword. 2005. Source code http://sword.cs.williams.edu/.Google ScholarGoogle Scholar
  83. Turner, J. and Taylor, D. 2005. Diversifying the internet. In IEEE Global Communication Conference (GLOBECOM'05).Google ScholarGoogle Scholar
  84. van der Ham, J., Grosso, P., van der Pol, R., Toonk, A., and de Laat, C. 2007. Using the network description language in optical networks. In Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'07). 199--205.Google ScholarGoogle ScholarCross RefCross Ref
  85. White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., and Joglekar, A. 2002. An integrated experimental environment for distributed systems and networks. SIGOPS Oper. Syst. Rev. 36, SI, 255--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Whiteaker, J., Schneider, F., and Teixeira, R. 2011. Explaining packet delays under virtualization. ACM SIGCOMM Comput. Comm. Rev. 41, 1, 38--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. World Wide Web Consortium (W3C). 2006. Web service description language version 2. http://www.w3.org/TR/2006/WD-wsdl20-rdf-20060518/.Google ScholarGoogle Scholar
  88. Xin, Y., Baldine, I., Mandal, A., Heermann, C., Chase, J., and Yumerefendi, A. 2011. Embedding virtual topologies in networked clouds. In Proceedings of the ACM 6th International Conference on Future Internet Technologies CFI'11). 26--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Yu, M., Yi, Y., Rexford, J., and Chiang, M. 2008. Rethinking virtual network embedding: Substrate support for path splitting and migration. SIGCOMM Comput. Comm. Rev. 38, 2, 17--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Yu, T. and Lin, K.-J. 2005. A broker-based framework for qos-aware web service composition. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05). 22--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Zaheer, F., Xiao, J., and Boutaba, R. 2010. Multi-provider service negotiation and contracting in network virtualization. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS'10). 471--478.Google ScholarGoogle Scholar
  92. Zhu, Y. and Ammar, M. 2006. Algorithms for assigning substrate network resources to virtual network components. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06). 1--12.Google ScholarGoogle Scholar
  93. Zhu, Q. and Agrawal, G. 2010. Resource provisioning with budget constraints for adaptive applications in cloud environments. In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing (HPDC'10). ACM Press, New York, 304--307. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Zhu, Y., Zhang-Shen, R., Rangarajan, S., and Rexford, J. 2008. Cabernet: Connectivity architecture for better network services. In Proceedings of the ACM CoNEXT Conference (CoNEXT'08). ACM Press, New York, 64:1--64:6. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Slice embedding solutions for distributed service architectures

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 46, Issue 1
            October 2013
            551 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/2522968
            Issue’s Table of Contents

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 July 2013
            • Revised: 1 November 2012
            • Accepted: 1 November 2012
            • Received: 1 December 2011
            Published in csur Volume 46, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader