Core Link Aware Survivable Virtual Network Link Protection Method

被引:0
|
作者
Su Y. [1 ]
Meng X. [2 ]
Kang Q. [2 ]
Han X. [1 ]
机构
[1] Graduate College, Air Force Engineering University, Xi'an
[2] Information and Navigation College, Air Force Engineering University, Xi'an
基金
中国国家自然科学基金;
关键词
Core link aware; Link protection; Network coding; P-cycle; Survivable virtual network;
D O I
10.11999/JEITdzyxxxb-41-7-1587
中图分类号
学科分类号
摘要
In order to solve the problems of all virtual links take without discrimination, high backup resource consumption and long network recovery delay after failures in existing survivable virtual network link protection methods, a Core Link Aware Survivable Virtual Network Link Protection (CLA-SVNLP) method is proposed. At first, the core degree metric model of virtual link is constructed by considering virtual link dynamic and static factors. According to virtual network survivable needs, virtual links with high core degrees are protected by backup resources. Then the p-cycle is introduced into survivable virtual network link protection and the p-cycle is constructed based on the characteristics of virtual network to provide 1:N protection for core virtual links. That means each core virtual link consumes 1/N backup link bandwidth resources and the backup link resource consumption is reduced. It also transforms the single physical link protection into single virtual link protection in multiple p-cycles. At last, the network coding and p-cycle are both used to transform the 1:N protection into 1+N protection for core virtual links which avoids fault location, detection and data retransmission after failures. Simulation results show that the proposed method can improve the utilization of backup resource and shorten the network recovery delay after failures. © 2019, Science Press. All right reserved.
引用
收藏
页码:1587 / 1593
页数:6
相关论文
共 16 条
  • [1] Li D., Hong P., Xue K., Et al., Virtual network function placement considering resource optimization and SFC requests in cloud datacenter, IEEE Transactions on Parallel and Distributed Systems, 29, 7, pp. 1664-1677, (2018)
  • [2] Mijumbi R., Serrat J., Gorricho J.L., Et al., Network function virtualization: State-of-the-art and research challenges, IEEE Communications Surveys & Tutorials, 18, 1, pp. 236-262, (2016)
  • [3] Zhao Z., Meng X., Su Y., Et al., Virtual network mapping algorithm based on node adjacent-awareness and path comprehensive evaluation, Journal of Electronics & Information Technology, 39, 8, pp. 1979-1985, (2017)
  • [4] Jiang Y., Ma H., Bu Y., Et al., Inter-domain virtual network embedding policy for revenue maximization, Advanced Engineering Sciences, 50, 2, pp. 118-125, (2018)
  • [5] Markopoulou A., Iannaccone G., Bhattacharyya S., Et al., Characterization of failures in an operational IP backbone network, IEEE/ACM Transactions on Networking, 16, 4, pp. 749-762, (2008)
  • [6] Shahriar N., Chowdhury S.R., Ahmed R., Et al., Virtual network survivability through joint spare capacity allocation and embedding, IEEE Journal on Selected Areas in Communications, 36, 3, pp. 502-518, (2018)
  • [7] Kamal A.E., Al-Kofahi O., Efficient and agile 1+N protection, IEEE Transactions on Communications, 59, 1, pp. 169-180, (2011)
  • [8] Rahman M.R., Boutaba R., SVNE: Survivable virtual network embedding algorithms for network virtualization, IEEE Transactions on Network and Service Management, 10, 2, pp. 105-118, (2013)
  • [9] Guo T., Wang N., Moessner K., Et al., Shared backup network provision for virtual network embedding, Proceedings of 2011 IEEE International Conference on Communications, pp. 1-5, (2011)
  • [10] Li B., Lu C., Qi B., Et al., P-cycle based protection scheme with cycle multiplexing and capacity balance for multicast service in substation communication network, International Journal of Electrical Power & Energy Systems, 102, pp. 340-348, (2018)