CN105871606B - Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy - Google Patents
Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy Download PDFInfo
- Publication number
- CN105871606B CN105871606B CN201610188764.7A CN201610188764A CN105871606B CN 105871606 B CN105871606 B CN 105871606B CN 201610188764 A CN201610188764 A CN 201610188764A CN 105871606 B CN105871606 B CN 105871606B
- Authority
- CN
- China
- Prior art keywords
- node
- network
- resources
- sub
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0663—Performing the actions predefined by failover planning, e.g. switching to standby network elements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy is generally divided into a physical network initialization stage, an initial mapping stage and a remapping stage, and the specific process comprises the following steps: (1) constructing a sub-network based on a logic sub-network division method of a heuristic algorithm; (2) dividing node resources based on a node candidate resource pool generation method of a divide-and-conquer strategy; (3) dividing link resources based on a generation method of a link candidate resource pool of a divide-and-conquer strategy; (4) the virtual network initial mapping method based on the restorability reduces the failure probability of the virtual network; (5) calculating the similarity between node resources based on the similarity measurement of the fault nodes of the similarity function; (6) and optimizing the virtual network remapping by using the mixed integer programming model of the virtual network remapping. The method effectively solves the problem of poor survivability of the traditional virtual network, provides a stable and efficient survivability guarantee for the virtual network, and has important practical significance and good application prospect.
Description
Technical Field
The invention particularly relates to a mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy, and belongs to the technical field of network virtualization virtual network mapping.
Background
With the rapid development of wireless communication technology and the increasing demand for diversified mobile services, a wireless network will exhibit deployment density, traffic diversity and network heterogeneity in the future, and new technologies and new applications that are continuously emerging also place higher and more strict requirements on the network, such as microservice providers, personal networks, resource customization services, etc., however, the current network architecture cannot bear these new network features, which will seriously hinder the network architecture and technical innovation, and will also delay the growth of emerging networks.
The network virtualization is regarded as the most potential technology for solving the current network rigidity problem and decoupling the future network architecture, the complex network management and control function can be separated from hardware, and the upper layer is extracted to perform unified coordination management and diversified configuration, so that the network management cost is reduced, the network management and control efficiency is improved, the abstraction, the unified representation, the resource sharing and the efficient multiplexing of network resources are realized, and a feasible scheme is provided for the coexistence and the fusion of heterogeneous wireless networks. Network virtualization has gained increasing attention and research depth as a core paradigm for future networks, such as the X-Bone project and the GENI project. The X-Bone constructs a virtual network through an encapsulation technology, and supports the functions of discovery, deployment and monitoring of dynamic resources; the GENI is a worldwide network virtualization project initiated by the National Science Foundation (NSF), which partitions resources from the time and space aspects to realize virtualization based on the original network virtualization technical achievements, and further constructs a network test platform characterized by openness and large scale to provide conditions and basis for exploring the next generation of internet.
Virtual network mapping is an important branch of network virtualization and is responsible for effectively mapping virtual network resources onto physical network resources. However, most of the current virtual network mapping mechanisms are based on the assumption that the network normally operates, and in an actual network environment, a physical network can encounter severe scenes such as natural disasters, artificial attacks and the like at different degrees, so that the network presents more complex burstiness and dynamics. In order to make the virtual network have higher reliability, the virtual network must have a stronger survivability and robustness mechanism, and further, the normal operation of the virtual network is still ensured when the physical network fails, which is also a key problem to be solved by the present invention.
Disclosure of Invention
The technical problem is as follows: the invention aims to provide a mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy, mainly solves the problem of poor survivability of the virtual network caused by instability of a physical network, and provides survivability guarantee for normal operation of the virtual network.
The technical scheme is as follows: the invention provides a mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy, which comprises the following steps: (1) a logical sub-network partitioning method based on heuristic algorithm, which is used for logically partitioning a physical network; (2) the node candidate resource pool generation method based on the divide-and-conquer strategy is used for dividing the node resources of each sub-network into working resources and backup resources so as to provide candidate nodes for fault nodes; (3) the method for generating the link candidate resource pool based on the divide-and-conquer strategy is used for dividing the link resources of each sub-network into working resources and backup resources so as to provide candidate links for a fault link and an affected link; (4) the virtual network initial mapping method based on the recoverability is used for mapping important virtual resources to physical resources with high recoverability preferentially in an initial mapping stage; (5) the similarity measurement of the fault nodes based on the similarity function is used for describing and calculating the similarity of the fault nodes and the candidate nodes so as to improve the success rate of remapping; (6) the mixed integer programming model of the virtual network remapping is used for optimizing the virtual network remapping so as to improve the efficiency of the remapping mechanism.
(1) Logical subnetwork division method based on heuristic algorithm for given physical network GsAnd a number of zones K, defining an evaluation function f (i, n) ≦ g (i, n) + h (i, n) (1 ≦ i ≦ K), wherein i represents the ith sub-network, g (i, n) represents the actual cost from the initial node to the current node n, i.e., the actual step size (node hop count) from the initial node to the current node, and h (i, n) represents the estimated cost of the best path from the current node n to the destination node, i.e., the pre-generation sub-networkThe maximum step length from the initial node is used for providing heuristic information required by the search process. And selecting a path which most possibly reaches the destination node from the state space according to the valuation function, thereby logically partitioning the physical network. In the process of heuristic search, once the searched node is the node which is marked, the node is indicated to be positioned on the boundary of the sub-network, so the heuristic search needs to be repeated when the heuristic search is finishedStarting a search until all nodes connected with the initial node in the current sub-network are marked as visited, and then judging whether the current sub-network is in a visited stateThe division is successful. i denotes an index of the ith sub-network,representing the ith pre-generated subnetwork.
(2) Node candidate resource pool generation method based on divide-and-conquer strategy, aiming at each pre-generated sub-network generated by the process (1)According to its node backup proportionAnd pre-generation of sub-networksNode resource collection ofNumber of computing node resource backupsAnd dividing the node resources of the sub-network into working resources and backup resources, and further constructing a node candidate pool of the sub-network so as to provide candidate nodes for the failed node. In order to solve the problems of insufficient node backup resources and node backup resource redundancy as much as possible, the generation method of the node candidate resource pool adopts historical fault dataThe resource backup proportion is updated, so that the candidate resource pool is more coordinated with the current network condition, and the problems are solved,representing ith sub-network with N physical network nodes in T periodThe total number of failed nodes in the group.
(3) Method for generating a pool of link candidates based on a divide-and-conquer strategy, for each pre-generated sub-network G generated by said process (1)iAccording to its link backup ratioAnd pre-generation of sub-networksCalculating the number of link resource backupsAnd dividing the link resources of the sub-network into working resources and backup resources, and further constructing a link candidate pool of the sub-network so as to provide candidate paths for the failed link and the affected link.
(4) The method comprises calculating the node resource influence degree of the physical network to the virtual networkAnd the degree of link resource impactSecondly, the restorability of the physical node resource is obtainedAnd degree of recoverability of physical link resourcesSince the recoverability of the resource is inversely related to the influence degree of the resource, the important virtual resource is preferentially mapped to the physical resource with high recovery degree in the initial mapping stage, so that the resource recovery method can be applied to the resource recovery systemProviding a certain degree of survivability for the virtual network during initial mapping; with NSAnd ESRespectively representing a set of node resources and a set of link resources of the physical network, nsRepresenting a node, i.e.esIndicating a link, i.e.
(5) The similarity measurement of the fault nodes based on the similarity function is used for measuring the similarity of the fault nodes based on the processes (2) and (3) by using ciDenotes CPU processing capability of node i, miIndicating the storage capability of node i,/iRepresenting the geographical location of node i, the process first utilizes attributes of the physical node resources, such as CPU processing capacity ciStorage capacity miGeographic location liEtc. constructing a node attribute column vectorFor any node n of backup resource pooljConstructed column vectorFor a failed node nfConstructed column vectorFurther describing and calculating the similarity of the fault node resource and the candidate node resourceAnd screening candidate node resources with the most similar physical characteristics to the fault node to improve the success rate of remapping. Aiming at the problems of different requirements of different network environments and application scenes on network performance, different weights c 'are given to different attributes of resources during specific remapping'f=αcf,m'f=βmf,l'f=λlfIn order to represent the need for different features,the flexibility of survivability mapping is increased.
(6) A mixed integer programming model OF virtual network remapping is characterized in that a resource capacity constraint equation, a node mapping constraint equation, a flow conservation constraint equation and a variable value constraint equation are established on the basis OF a virtual node set FN (n, x) which is influenced by a fault node x and needs to be migrated and a virtual link set FL (l, x) which is influenced by the fault node x and needs to be migrated, the candidate resource capacity is respectively guaranteed to be not less than the total virtual resource requirement, the uniqueness OF virtual resource mapping to be remapped, the network flow conservation and the legal value OF an integer variable are respectively guaranteed, and an objective function OF is established on the basis OF the process (5) and used for optimizing virtual network remapping so as to improve the efficiency OF a remapping mechanism.
Advantageous effects
The method effectively solves the problem of poor survivability of the virtual network in the traditional virtual network mapping, provides a stable and efficient survivability method for the virtual network, and has important practical significance and good application prospect.
Drawings
FIG. 1 is an overall system flow diagram of an embodiment of the present invention;
FIG. 2 is a schematic diagram of logical partitioning of a physical network according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a node resource similarity measurement according to an embodiment of the present invention.
Detailed Description
The mapping method for enhancing the survivability of the virtual network based on the divide-and-conquer strategy according to the present invention will be described in detail with reference to the accompanying drawings and the detailed description.
As shown in fig. 1, a mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy mainly includes the following processes:
(1) a logical sub-network partitioning method based on heuristic algorithm, which is used for logically partitioning a physical network;
(2) the node candidate resource pool generation method based on the divide-and-conquer strategy is used for dividing the node resources of each sub-network into working resources and backup resources so as to provide candidate nodes for fault nodes;
(3) the method for generating the link candidate resource pool based on the divide-and-conquer strategy is used for dividing the link resources of each sub-network into working resources and backup resources so as to provide candidate links for a fault link and an affected link;
(4) the virtual network initial mapping method based on the recoverability is used for mapping important virtual resources to physical resources with high recoverability preferentially in an initial mapping stage;
(5) the similarity measurement of the fault nodes based on the similarity function is used for describing and calculating the similarity of the fault nodes and the candidate nodes so as to improve the success rate of remapping;
(6) the mixed integer programming model of the virtual network remapping is used for optimizing the virtual network remapping so as to improve the efficiency of the remapping mechanism.
The system operation flow of the present invention is described with reference to fig. 1:
1. process (1) logical sub-network partitioning method based on heuristic algorithm, for a given physical network GsAnd a number of zones K, defining an evaluation function f (i, n) ≦ g (i, n) + h (i, n) (1 ≦ i ≦ K), wherein i represents the ith sub-network, g (i, n) represents the actual cost from the initial node to the current node n, i.e., the actual step size (node hop count) from the initial node to the current node, and h (i, n) represents the estimated cost of the best path from the current node n to the destination node, i.e., the pre-generation sub-networkThe maximum step length from the initial node is used for providing heuristic information required by the search process. And selecting a path which most possibly reaches the destination node from the state space according to the valuation function, thereby logically partitioning the physical network. In the process of heuristic search, once the searched node is the marked node, the node is indicated to be positioned on the boundary of the sub-network, therefore, after the heuristic search is finished, the search needs to be started again until the nodes connected with the initial node in the current sub-network are all marked to be in the visited state, and the current sub-network is in the visited stateThe division is successful. Now, taking the generation of the ith logical sub-network as an example, a heuristic algorithm for constructing the logical sub-networks is described.
(1) With an initial node niStructuring sub-networksAnd a set of OPEN, the OPEN being,OPEN←{nilet CLOSE be an empty set, let niMarked as accessed.
(2) The loop is opened and if OPEN is the empty set, the algorithm ends with a failure.
(3) Take node n with the minimum f (i, n) from OPEN and let OPEN ← OPEN- { n }, CLOSE ← CLOSE ∪ { n }.
(4) If n has been marked by another subnet, the search process ends and a heuristic search is restarted, beginning at step ①.
(6) For each node M ∈ M:
② if m ∈ OPEN or m ∈ CLOSE, adjust its backtracking pointer to the path that gives the minimum g (i, m) value.
③ if m's trace back pointer is adjusted and m ∈ CLOSE, then OPEN ← { m }, again.
(7) And returning to the circulation state.
Through the above steps of constructing logical sub-networks, the physical networkIs divided into K regions, where NSAnd ESRespectively representing a set of node resources and a set of link resources of the physical network,representing a collection of physical network node attributes, i.e. nodesFor the attribute ofThe representation of the set is represented by a set,representing a set of physical network link attributes, i.e. node isAndlink e (i) betweens,js)∈ESFor the attribute ofAnd (4) representing a set. Is provided withFor i sub-network (meaning of each variable is similar to G)S) It is obvious thatIs GSThe constraint is as follows:
referring specifically to FIG. 2, a physical network G is shownSIs logically divided into 4 sub-networks of G1-G4 and the like. (note: for the sake of convenience of presentation,equivalent to GiThe same below)
2. Process (2) node candidate resource pool generation method based on divide-and-conquer strategy, for each sub-network generated by the process (1)According to its node backup proportionNumber of computing node resource backupsThe node resources of the sub-network are divided into working resources and backup resources. Definition ofRepresenting the degree of resources of node n in network G, where C1、C2The balance factors, CPU (n) and mem (n), respectively, greater than zero represent the CPU capacity and memory capacity of the physical node n, respectively, and this function characterizes the amount of resource capacity that the node n possesses in the network G. Is provided withIs according to D (G) by the node in the ith sub-networkiN) front in descending orderThe node set formed by each element is the node backup set of the ith sub-networkThereby building a candidate pool of nodes for the sub-network to provide candidate nodes for the failed node. Referring specifically to fig. 2, 4 subnetworks are each assigned a candidate resource pool.
In order to solve the problems of insufficient node backup resources and node backup resource redundancy as much as possible, the node candidate resource pool is generatedThe method adopts historical fault data to update the resource backup proportion, so that the candidate resource pool is more coordinated with the current network condition. The specific implementation scheme is as follows: definition ofIndicating the ith sub-network within T periods of timeOf failed nodes, where nfailIndicating a failed node. Since network node failures occur randomly, it is not necessary to determine whether a network node failure occurred randomlyIs a random variable, then the random variable is first mapped to before the next VN mappingCalculating a statistical averageAccording to the formulaUpdating sub-networksNode backup ratio ofεNRepresenting a node limiting factor for ensuring that the new node backup ratio is not greater than 1 when a large network fault occurs,representing sub-networksThe backup ratio of old nodes.
3. Process (3) generation method of link candidate resource pool based on divide and conquer strategy, and its programFor each sub-network generated by the process (1)According to its link backup ratioCalculating the number of link resource backupsThe link resources of the sub-network are divided into working resources and backup resources. Modeling in the same process (2) to construct the ith sub-networkIs a link backup set ofA candidate pool of links for the sub-network is generated to provide candidate paths for the failed link and the affected links.
4. The method comprises (4) calculating the node resource influence degree of the physical network to the virtual networkAnd the degree of link resource impactThe specific calculation is as follows:
node resource influence degree:wherein S represents the mapping in the sub-networkThe total number of virtual resources in (c); at a physical node nsIn the case of a cut point, P represents the number of clusters into which the current subnetwork is to be divided when it fails, sjRepresenting the total number of virtual resources in the jth cluster network;at a physical node nsIn the case of non-secant points, Mig (n)s) Represents the total number of virtual resources, Mig, that need to be migrated in the event of its failureN(ns) Represents the total number of virtual node resources, Mig, that need to be migrated in the event of its failureE(ns) Representing the total number of virtual link resources that need to be migrated when it fails.
The link resource influence degree:wherein S represents the mapping in the sub-networkThe total number of virtual resources in (c); on physical link esUnder the condition of edge cutting, if the edge is broken, the current sub-network is divided into two clusters; on physical link esIn the case of non-cutting edges, Mig (e)s) Representing a physical link esTotal number of virtual resources, Mig, to be migrated in case of failureE(es) Representing a physical link esThe number of virtual link resources that need to be migrated in the event of a failure. The recoverability of the physical node resource and the physical link resource are respectivelyAndsince the recoverability of the resource is negatively correlated with the influence degree of the resource, important virtual resources are preferentially mapped to physical resources with high recoverability in the initial mapping stage, so that a certain degree of survivability can be provided for the virtual network in the initial mapping stage.
5. Process (5) is based on the fault node similarity measure of the similarity function, which on the basis of processes (2) and (3) first utilizes the attributes of the physical node resources: CPU processing capacity ciStorage capacity miGeographic location liEtc. constructing a node attribute column vectorFor any node n of backup resource pooljConstructed column vectorThen it communicates with the failed node nfConstructed column vectorSimilarity between themDefined as (to ensure that the similarity is not negative, take the absolute value of the similarity function):wherein the content of the first and second substances,
by passingAnd screening candidate nodes with the most similar physical characteristics with the fault node to improve the success rate of remapping. Referring specifically to fig. 3, A, B, C, D are all candidate nodes, and if n1 node fails, then candidate node A, B becomes a candidate node for n1, and SIM (n1, a)>SIM (n1, B). From the foregoing analysis, it can be seen that A should be taken as the actual substitute node for n1, since B is more similar to n2 than n1High, so it would be more reasonable to have B as a substitute node for n2 (in the event of a failure of n 2). Similarly, if n3 fails, D should be taken as its replacement node instead of the C node. Aiming at the problems of different requirements of different network environments and application scenes on network performance, different weights c 'are given to different attributes of resources during specific remapping'f=αcf,m'f=βmf,l'f=λlfThe method has the advantages that the requirements for different characteristics are shown, the flexibility of the survivability mapping is increased, wherein α is larger than or equal to 1, the requirement of higher CPU processing capacity and storage capacity is shown, and the lambda is generally equal to 1, and the geographic position is better as the geographic position is closer to the geographic position of the fault node.
6. And (6) establishing a resource capacity constraint equation, a node mapping constraint equation, a flow conservation constraint equation and a variable value constraint equation on the basis of the virtual node set FN (n, x) which is influenced by the fault node x and needs to be migrated and the virtual link set FL (l, x) which is influenced by the fault node x and needs to be migrated.
① resource capability constraints
Wherein the content of the first and second substances,representing a virtual node n in the kth subnetworki(niWhether e.g. FN (n, x)) remaps to physical node nyIf so, thenOtherwise Indicating that all links affected by failed node x are remapped at a physical linkThe total flow rate of the upper part of the tank,representing remapped virtual links in a kth subnetworkIn a physical linkThe upper occupied flow rate;representing node n in a candidate pool of nodesyThe remaining resource capacity of;representing links in a link candidate poolThe remaining bandwidth of (c).
② node mapping constraints
Wherein the content of the first and second substances,representation of VNiThe nodes in the remapping phase map the results.
③ flow conservation constraint
A (x) represents a set of nodes adjacent to the physical node x. The first type shows that the link adjacent to the fault node does not participate in remapping and also shows the flow conservation; the second formula is represented byAs a bearer virtual linkIs the end point of the physical linkWhen the inflow of the node is equal toOtherwiseWhen the inflow flow of the node is equal to the outflow flow so as to keep the flow conservation; the third expression represents if the virtual node niRemapping to a physical node nyThen n will beyAs a bearer virtual linkAt the start of the physical link, node nyIs equal toOtherwise node nyThe outflow rate of (a) is equal to the inflow rate to maintain flow conservation.
④ variable value constraint
And respectively ensuring that the candidate resource capacity is not less than the total virtual resource demand, the mapping uniqueness of the virtual resource to be remapped, the network flow conservation and the integer variable value validity.
Establishing an objective function on the basis of the above analysis and said process (5)For optimizing virtual network remapping. The similarity function in the first item not only ensures that the fault resource and the candidate resource have the maximum physical characteristics, but also optimizes the connectivity of the residual candidate resource pool, and the second item represents the network flow occupied by the minimized virtual link remapping; σ, τ are weighting factors that balance the first and second terms, respectively.
Claims (3)
1. A mapping method for enhancing the survivability of a virtual network based on a divide-and-conquer strategy is characterized in that: dividing a logic sub-network based on a heuristic algorithm, constructing a candidate resource pool based on a divide-and-conquer strategy, perfecting initial mapping of a virtual network based on recoverability and remapping the virtual network based on a similar function, and the specific process comprises the following steps:
(1) a logical sub-network partitioning method based on heuristic algorithm, which is used for logically partitioning a physical network;
(2) the node candidate resource pool generation method based on the divide-and-conquer strategy is used for dividing the node resources of each sub-network into working resources and backup resources so as to provide candidate nodes for fault nodes;
(3) the method for generating the link candidate resource pool based on the divide-and-conquer strategy is used for dividing the link resources of each sub-network into working resources and backup resources so as to provide candidate links for a fault link and an affected link;
(4) the virtual network initial mapping method based on the recoverability is used for mapping important virtual resources to physical resources with high recoverability preferentially in an initial mapping stage;
(5) the similarity measurement of the fault nodes based on the similarity function is used for describing and calculating the similarity of the fault nodes and the candidate nodes so as to improve the success rate of remapping;
(6) the mixed integer programming model of the virtual network remapping is used for optimizing the virtual network remapping so as to improve the efficiency of the remapping mechanism;
said process (1) is based on a heuristic method of logical sub-network partitioning for a given physical network GsAnd a number of zones K, defining an evaluation function f (i, n) ≦ g (i, n) + h (i, n) (1 ≦ i ≦ K), wherein i represents an index of the ith sub-network, g (i, n) represents an actual cost from the initial node to the current node n, i.e., an actual step size from the initial node to the current node, i.e., a node hop count, and h (i, n) represents an estimated cost of the best path from the current node n to the destination node, i.e., a pre-generated sub-networkThe maximum step length from the initial node is used for providing heuristic information required by the search process; selecting a path which is most likely to reach a destination node from the state space according to the valuation function, and carrying out logic partitioning on the physical network; in the process of heuristic search, once the searched node is the marked node, the node is indicated to be positioned on the boundary of the sub-network, therefore, after the heuristic search is finished, the search needs to be started again until the nodes connected with the initial node in the current sub-network are all marked to be in the accessed state, and the sub-network is pre-generated currentlySuccessfully dividing;representing the ith pre-generation subnetwork;
the process (2) is a node candidate resource pool generation method based on a divide-and-conquer strategy, and each sub-network generated by the process (1)According to its node backup proportionAnd pre-generation of sub-networksNode resource collection ofNumber of computing node resource backupsDividing the node resources of the sub-network into working resources and backup resources, further constructing a node candidate pool of the sub-network so as to provide candidate nodes for the fault node, and simultaneously adopting historical fault dataThe resource backup proportion is updated, the problems of insufficient node backup resources and node backup resource redundancy are solved,representing ith sub-network with N physical network nodes in T periodThe total number of failed nodes in the set;
the process (3) is a divide-and-conquer policy-based link candidate resource pool generation method, and each pre-generation generated by the process (1) isAdult networkAccording to its link backup ratioAnd pre-generation of sub-networksLink resource set ofCalculating the number of link resource backupsDividing the link resources of the sub-network into working resources and backup resources, and further constructing a link candidate pool of the sub-network so as to provide candidate paths for the failed link and the affected link;
the process (4) is a virtual network initial mapping method based on the restorability degree, and firstly, the node resource influence degree of the physical network to the virtual network is calculatedAnd the degree of link resource impactSecondly, the restorability of the physical node resource is obtainedAnd degree of recoverability of physical link resourcesThe important virtual resources are mapped to the physical resources with high recovery degree preferentially in the initial mapping stage; with NSAnd ESSet of node resources and set of link resources representing a physical network, respectivelyN is a radical ofsRepresenting a node, i.e.esIndicating a link, i.e.
2. The divide-and-conquer strategy-based mapping method for enhancing survivability of a virtual network according to claim 1, wherein: the process (5) is based on the fault node similarity measurement of the similarity function, and is based on the processes (2) and (3) by using ciDenotes CPU processing capability of node i, miIndicating the storage capability of node i,/iRepresenting the geographical location of a node i, the process first constructs a node attribute column vector V using attributes of the physical node resourcesi N=(ci,mi,li)TFor any node n of the backup resource pooljConstructed column vectorFor a failed node nfConstructed column vectorFurther describing and calculating the similarity of the fault node resource and the candidate node resourceScreening candidate node resources with the most similar physical characteristics to the fault node resources to improve the success rate of remapping; aiming at the problems of different requirements of different network environments and application scenes on network performance, different weights c 'are given to different attributes of resources during specific remapping'f=αcf,m'f=βmf,l'f=λlfTo represent the need for different features and to increase the flexibility of survivability mapping.
3. The divide-and-conquer strategy-based mapping method for enhancing survivability of a virtual network according to claim 1, wherein: the mixed integer programming model OF virtual network remapping in the process (6) is based on a virtual node set FN (n, x) which is influenced by a fault node x and needs to be migrated and a virtual link set FL (l, x) which is influenced by the fault node x and needs to be migrated, a resource capacity constraint equation, a node mapping constraint equation, a flow conservation constraint equation and a variable value constraint equation are established, candidate resource capacity is respectively guaranteed to be not less than total virtual resource demand, mapping uniqueness OF virtual resources to be remapped, network flow conservation and integer variable value validity are respectively guaranteed, and an objective function OF is established on the basis OF the process (5) and used for optimizing virtual network remapping so as to improve the efficiency OF a remapping mechanism.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610188764.7A CN105871606B (en) | 2016-03-29 | 2016-03-29 | Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610188764.7A CN105871606B (en) | 2016-03-29 | 2016-03-29 | Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105871606A CN105871606A (en) | 2016-08-17 |
CN105871606B true CN105871606B (en) | 2020-04-10 |
Family
ID=56626684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610188764.7A Active CN105871606B (en) | 2016-03-29 | 2016-03-29 | Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871606B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495300B (en) * | 2018-11-07 | 2020-05-26 | 西安交通大学 | Reliable SDN virtual network mapping method |
CN110191382B (en) * | 2019-06-27 | 2020-03-27 | 北京邮电大学 | Virtual link priority mapping method based on path sorting |
JP6982601B2 (en) * | 2019-07-24 | 2021-12-17 | Kddi株式会社 | Coordinated virtual network allocation method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710488A (en) * | 2012-06-07 | 2012-10-03 | 北京邮电大学 | Method for realizing virtual network mapping |
CN103179052A (en) * | 2011-12-20 | 2013-06-26 | 中国科学院声学研究所 | Virtual resource allocation method and system based on proximity centrality |
CN103475504A (en) * | 2013-08-23 | 2013-12-25 | 北京邮电大学 | Virtual network remapping method based on topology awareness |
CN103856385A (en) * | 2013-12-11 | 2014-06-11 | 北京邮电大学 | Virtual network mapping method based on link priority |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9350632B2 (en) * | 2013-09-23 | 2016-05-24 | Intel Corporation | Detection and handling of virtual network appliance failures |
-
2016
- 2016-03-29 CN CN201610188764.7A patent/CN105871606B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179052A (en) * | 2011-12-20 | 2013-06-26 | 中国科学院声学研究所 | Virtual resource allocation method and system based on proximity centrality |
CN102710488A (en) * | 2012-06-07 | 2012-10-03 | 北京邮电大学 | Method for realizing virtual network mapping |
CN103475504A (en) * | 2013-08-23 | 2013-12-25 | 北京邮电大学 | Virtual network remapping method based on topology awareness |
CN103856385A (en) * | 2013-12-11 | 2014-06-11 | 北京邮电大学 | Virtual network mapping method based on link priority |
Non-Patent Citations (2)
Title |
---|
基于Stackelberg博弈的网络虚拟化资源分配方法;赵夙等;《光通信研究》;20150928;63-66 * |
基于网络中心性分析的虚拟网络映射算法*;王文钊等;《计算机应用研究》;20150215;第32卷(第2期);565-568 * |
Also Published As
Publication number | Publication date |
---|---|
CN105871606A (en) | 2016-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111147307B (en) | Service function chain reliable deployment method based on deep reinforcement learning | |
CN103699606B (en) | A kind of large-scale graphical partition method assembled with community based on summit cutting | |
CN112738820A (en) | Dynamic deployment method and device of service function chain and computer equipment | |
CN105871606B (en) | Mapping method for enhancing survivability of virtual network based on divide-and-conquer strategy | |
Zhu et al. | Exploring the road to 6G: ABC—foundation for intelligent mobile networks | |
EP2348678B1 (en) | Network topology method, device and system | |
CN109743215B (en) | Ant colony optimization virtual network mapping method based on disaster prediction under multi-region fault | |
CN109446385B (en) | Method for establishing network resource equipment map and using method of equipment map | |
CN103259744A (en) | Method for mapping mobile virtual network based on clustering | |
CN108600101A (en) | A kind of network for the optimization of end-to-end time delay performance services cross-domain method of combination | |
US8738559B2 (en) | Graph partitioning with natural cuts | |
CN101321134A (en) | Service quality routing selection method under dynamic network condition | |
CN105681153A (en) | Virtual network mapping method and device | |
Ghosh et al. | A cognitive routing framework for reliable communication in IoT for industry 5.0 | |
Ren et al. | Adaptive recovery mechanism for SDN controllers in Edge-Cloud supported FinTech applications | |
CN109995580A (en) | VN mapping method based on GA_PSO hybrid algorithm in 5G network slice | |
Li et al. | Dynamic SDN controller association mechanism based on flow characteristics | |
Zhang | Storage optimization algorithm design of cloud computing edge node based on artificial intelligence technology | |
WO2024022185A1 (en) | Route generation method and apparatus and storage medium | |
Zhang | Reliable virtual network mapping algorithm with network characteristics and associations | |
Feng et al. | COVE: Co-operative virtual network embedding for network virtualization | |
Csorba et al. | Cost-efficient deployment of collaborating components | |
CN113392280B (en) | Cross-region-oriented multi-master-model distributed graph calculation method | |
Fang et al. | A multi-controller deployment method of SDN network based on FPGA | |
CN104038400B (en) | A kind of mapping method of virtual network across data center |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |