Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2015, Article ID 316801, 8 pages
http://dx.doi.org/10.1155/2015/316801
Research Article

A Hybrid Reliable Heuristic Mapping Method Based on Survivable Virtual Networks for Network Virtualization

1College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
2Faculty of Information Engineering, Jiangxi University of Science and Technology, Ganzhou 341000, China

Received 19 October 2014; Revised 8 December 2014; Accepted 16 December 2014

Academic Editor: Muhammad Naveed Iqbal

Copyright © 2015 Qiang Zhu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Feamster, L. Gao, and J. Rexford, “How to lease the internet in your spare time,” ACM SIGCOMM Computer Communication Review, vol. 37, no. 1, pp. 61–64, 2007. View at Google Scholar
  2. N. M. M. K. Chowdhury and R. Boutaba, “A survey of network virtualization,” Computer Networks, vol. 54, no. 5, pp. 862–876, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. J. S. Turner and D. E. Taylor, “Diversifying the internet,” in Proceedings of the IEEE Global Telecommunications Conference, pp. 755–760, IEEE, December 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. N. M. M. K. Chowdhury and R. Boutaba, “Network virtualization: state of the art and research challenges,” IEEE Communications Magazine, vol. 47, no. 7, pp. 20–26, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, “In VINI veritas: realistic and controlled network experimentation,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '06), pp. 3–14, Association for Computing Machinery, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. D. G. Andersen, “Theoretical approaches to node assignment,” 2002, http://www.cs.cmu.edu/~dga/papers/index.html.
  7. M. Chowdhury, M. R. Rahman, and R. Boutaba, “ViNEYard: virtual network embedding algorithms with coordinated node and link mapping,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 206–219, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Cheng, S. Su, Z. B. Zhang et al., “Virtual network embedding through topology-aware node ranking,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 39–47, 2011. View at Publisher · View at Google Scholar
  9. G. Sun, H. Yu, V. Anand, and L. Li, “A cost efficient framework and algorithm for embedding dynamic virtual network requests,” Future Generation Computer Systems, vol. 29, no. 5, pp. 1265–1277, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. I. Houidi, W. Louati, and D. Zeghlache, “A distributed virtual network mapping algorithm,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 5634–5640, Beijing, China, May 2008. View at Publisher · View at Google Scholar
  11. J. Lischka and H. Karl, “A virtual network mapping algorithm based on subgraph isomorphism detection,” in Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA '09), pp. 81–88, ACM, New York, NY, USA, 2009. View at Publisher · View at Google Scholar
  12. M. Yu, Y. Yi, J. Rexford et al., “Rethinking virtual network embedding: substrate support for path splitting and migration,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 17–29, 2008. View at Publisher · View at Google Scholar
  13. I. Fajjari, N. A. Saadi, G. Pujolle, and H. Zimmermann, “VNE-AC: virtual network embedding algorithm based on ant colony metaheuristic,” in Proceedings of the IEEE International Conference on Communications (ICC '11), pp. 1–6, IEEE, Kyoto, Japan, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Cheng, Z.-B. Zhang, S. Su, and F.-C. Yang, “Virtual network embedding based on particle swarm optimization,” Acta Electronica Sinica, vol. 39, no. 10, pp. 2240–2244, 2011. View at Google Scholar · View at Scopus
  15. Q. Zhu, H.-Q. Wang, H.-W. Lv, and Z.-D. Wang, “VNE-AFS: virtual network embedding based on artificial fish swarm,” Journal on Communications, vol. 33, no. 1, pp. 170–177, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Herker, A. Khan, and X. An, “Survey on survivable virtual network embedding problem and solutions,” in Proceedings of the 9th International Conference on Networking and Services, pp. 99–104, 2013.
  17. M. R. Rahman and R. Boutaba, “SVNE: survivable virtual network embedding algorithms for network virtualization,” IEEE Transactions on Network and Service Management, vol. 10, no. 2, pp. 105–118, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. H. F. Yu, C. M. Qiao, V. Anand, X. Liu, H. Di, and G. Sun, “Survivable virtual infrastructure mapping in a federated computing and networking system under single regional failures,” in Proceedings of IEEE Global Telecommunications Conference, pp. 1–6, Miami, Fla, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. W. L. Yeow, C. Westpha, and U. C. Kozatl, “Designing and embedding reliable virtual infrastructures,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 57–64, 2011. View at Google Scholar
  20. N. F. Butt, M. Chowdhury, and R. Boutaba, “Topology-awareness and reoptimization mechanism for virtual network embedding,” in Networking 2010: Proceedings of the 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, Lecture Notes in Computer Science, pp. 27–39, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  21. Z. Cai, F. Liu, N. Xiao, Q. Liu, and Z. Wang, “Virtual network embedding for evolving networks,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), pp. 1–5, Miami, Fla, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Todimala and B. Ramamurthy, “A scalable approach for survivable virtual topology routing in optical WDM networks,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 63–69, 2007. View at Publisher · View at Google Scholar
  23. D. Zhou and S. Subramaniam, “Survivability in optical networks,” IEEE Network, vol. 14, no. 6, pp. 16–23, 2000. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Ramamurthy, L. Sahasrabuddhe, and B. Mukherjee, “Survivable WDM mesh networks,” Journal of Lightwave Technology, vol. 21, no. 4, pp. 870–883, 2003. View at Publisher · View at Google Scholar · View at Scopus
  25. S.-D. Qing, J.-X. Liao, X.-M. Zhu, J.-Y. Wang, and Q. Qi, “Virtual network embedding algorithms in the network virtualization environment,” Journal of Software, vol. 23, no. 11, pp. 3045–3058, 2012. View at Google Scholar · View at Scopus
  26. A. Schrijver, Theory of Linear and Integer Programming, John Wiley & Sons, Chichester, UK, 1998.
  27. M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: optimization by a colony of cooperating agents,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 26, no. 1, pp. 29–41, 1996. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Tsukiyama, I. Shirakawa, H. Ozaki, and H. Ariyoshi, “An algorithm to enumerate all cutsets of a graph in linear time per cutset,” Journal of the Association for Computing Machinery, vol. 27, no. 4, pp. 619–632, 1980. View at Publisher · View at Google Scholar · View at MathSciNet
  29. M. Dorigo and C. Blum, “Ant colony optimization theory: a survey,” Theoretical Computer Science, vol. 344, no. 2-3, pp. 243–278, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. Y. Xin, I. Baldine, A. Mandal, C. Heermann, J. Chase, and A. Yumerefendi, “Embedding virtual topologies in networked clouds,” in Proceedings of the 6th International Conference on Future Internet Technologies (CFI '11), pp. 26–29, ACM, June 2011. View at Publisher · View at Google Scholar · View at Scopus