Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5258010, 12 pages
https://doi.org/10.1155/2017/5258010
Research Article

A Multidomain Survivable Virtual Network Mapping Algorithm

1School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China
2Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China

Correspondence should be addressed to Xiangwei Zheng; moc.361@ncgnehzwx

Received 18 August 2017; Accepted 11 October 2017; Published 13 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Xiancui Xiao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Carapinha and J. Jiménez, “Network virtualization,” in Proceedings of the the 1st ACM workshop, p. 73, Barcelona, Spain, August 2009. View at Publisher · View at Google Scholar
  2. N. Feamster, L. Gao, and J. Rexford, “How to lease the internet in your spare time,” pp. 61–64. View at Publisher · View at Google Scholar · View at Scopus
  3. X.-W. Zheng, B. Hu, D.-J. Lu, Z.-H. Chen, and H. Liu, “Energy-efficient virtual network embedding in networks for cloud computing,” International Journal of Web and Grid Services, vol. 13, no. 1, pp. 75–93, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Cheng, Z. Zhang, S. Suet et al., “Review of Virtual Network Mapping Problem,” Journal of Communications, vol. 32, no. 10, pp. 143–151, 2011. View at Google Scholar
  5. X. Cheng, S. Su, and Z. Zhang, “Virtual network embedding through topology-aware node ranking,” SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 38–47, 2011. View at Google Scholar
  6. N. M. M. K. Chowdhury and R. Boutaba, “A survey of network virtualization,” Computer Networks, vol. 54, no. 5, pp. 862–876, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Chowdhury, M. R. Rahman, and R. Boutaba, “ViNEYard: virtual network embedding algorithms with coordinated node and link mapping,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 206–219, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Mijumbi, J. Serrat, and J.-L. Gorricho, “Self-managed resources in network virtualisation environments,” in Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, pp. 1099–1106, can, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Papagianni, A. Leivadeas, and S. Papavassiliou, “A cloud-oriented content delivery network paradigm: modeling and assessment,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 5, pp. 287–300, 2013. View at Publisher · View at Google Scholar
  10. X.-C. Xiao and X.-W. Zheng, “A proposal of survivable virtual network embedding algorithm,” Journal of High Speed Networks, vol. 22, no. 3, pp. 241–251, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. G.-P. Gao, B. Hu, and J.-S. Zhang, “Design of a miniaturization printed circular-slot UWB antenna by the half-cutting method,” IEEE Antennas and Wireless Propagation Letters, vol. 12, pp. 567–570, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Yu, H. Wang, X. Zheng, and Y. Wang, “Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 23, no. 3-4, pp. 137–151, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Xu, J. Tang, K. Kwiat, W. Zhang, and G. Xue, “Survivable virtual infrastructure mapping in virtualized data centers,” in Proceedings of the 2012 IEEE 5th International Conference on Cloud Computing (CLOUD '12), pp. 196–203, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Hu, Y. Wang, and X. Cao, “Location-constrained survivable network virtualization,” in Proceedings of the 35th IEEE Sarnoff Symposium (SARNOFF '12), May 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. M. R. Rahman, I. Aib, and R. Boutaba, “Survivable virtual network embedding,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6091, pp. 40–52, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. T. Guo, N. Wang, K. Moessner, R. Tafazolli et al., “Shared backup network provision for virtual network embedding,” in Proceedings of the 2011 IEEE International Conference on Communications (ICC '11), pp. 1–5, June 2011.
  17. H. Yu, V. Anand, C. Qiao, G. Sun et al., “Cost efficient design of survivable virtual infrastructure to recover from facility node failures,” in Proceedings of the 2011 IEEE International Conference on Communications (ICC '11), pp. 1–6, June 2011.
  18. C. Qiao, B. Guo, S. Huang, J. Wang, T. Wang, and W. Gu, “A novel two-step approach to surviving facility failures,” in Proceedings of the 2011 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC '11), pp. 1–3, March 2011.
  19. W.-L. Yeow, C. Westphal, and U. C. Kozat, “Designing and embedding reliable virtual infrastructures,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 57–64, 2011. View at Google Scholar
  20. W. Li, Y. Jiang, and J. Wen, “Risk Assessment of Industrial Space Network in Earthquake Disaster Scenarios-Taking Toyota Motor in Japan as an Example,” Acta Geographica Sinica, vol. 71, no. 8, pp. 1384–1399, 2016. View at Google Scholar
  21. B. Cao, J. Li, and Q. Sun, “Power grid suffered earthquake damage response measures and optimization design , For electricity,” vol. 33, no. 3, pp. 76–82, 2016. View at Google Scholar
  22. Z. Li and C. Jiang, “Study on Emergency Logistics Network Model for Facility Arming Considering Interruption Scenario,” Periodical Issues, vol. 30, 2016. View at Google Scholar