CN108200202B - A kind of service function chain security deployment method calculating network applied to cloud and mist - Google Patents

A kind of service function chain security deployment method calculating network applied to cloud and mist Download PDF

Info

Publication number
CN108200202B
CN108200202B CN201810118870.7A CN201810118870A CN108200202B CN 108200202 B CN108200202 B CN 108200202B CN 201810118870 A CN201810118870 A CN 201810118870A CN 108200202 B CN108200202 B CN 108200202B
Authority
CN
China
Prior art keywords
sfc
deployment
physical
indicate
tcost
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810118870.7A
Other languages
Chinese (zh)
Other versions
CN108200202A (en
Inventor
孙罡
赵东成
廖丹
虞红芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810118870.7A priority Critical patent/CN108200202B/en
Publication of CN108200202A publication Critical patent/CN108200202A/en
Application granted granted Critical
Publication of CN108200202B publication Critical patent/CN108200202B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

The invention discloses a kind of service function chain security deployment methods that network is calculated applied to cloud and mist, the combination bottom-layer network calculated in known cloud computing and mist and the online service function chain with security requirement dispose request, under the position of user and the position precondition of service terminal, a kind of method for finding out effective deployment services function chain request, in the request of deployment services function chain, consider each virtual network function in each service function chain request, link connection situation and meet under the relevant constraints such as demand for security, to consume least server resource and bandwidth resources, and reducing the blocking rate of service function chain request is target, the request of service function chain is disposed.The present invention has many advantages, such as that applied widely, lower deployment cost is low, mapping blocking rate is small.

Description

A kind of service function chain security deployment method calculating network applied to cloud and mist
Technical field
The invention belongs to network function technical field of virtualization, and in particular to a kind of service that network is calculated applied to cloud and mist The design of function chain security deployment method.
Background technique
Virtualization technology is a kind of cutting edge technology that network flexibility can be improved, with the development of virtualization technology, net Network virtualization of function (Network Function Virtualization, NFV) technology has been suggested traditional network Function is transferred to virtual network function (Virtual Network Function, VNF), to improve the flexibility of network.It is more A virtual network function forms service function chain (Service Function Chain, SFC) in a specific sequence to guarantee to use The service strategy at family, is then deployed in cloud network and provides service for user.
With increasing for cloud network user, centralized cloud computing is faced with some challenges, as network congestion and network are prolonged Become increasingly severe late, the safety of service is also challenged.In order to solve these challenges, distributed mist calculating is mentioned Cloud computing is extended and supplemented out.Based on the wireless access network that mist calculates, i.e. mist wireless access network, it has also become wireless access network One new research direction.In mist wireless access network, there are some nodes with mist computing capability, the node phase with cloud computing Seemingly, these mist nodes can provide service for user, but the Service Source capacity of mist node is usually less than the service money of cloud node Source capacity.Similar to cloud node, these mist nodes can be virtualized, to improve the flexibility of wireless access network.Joint Network congestion and network delay can be reduced using cloud computing and mist calculating, and safer service is provided for mobile subscriber.
The hot spot that service function chain is current research is disposed in cloud computing, there are many researchs.For example, there is research Person has studied the deployment issue of traffic aware and energy efficient service function chain, proposes a kind of heuritic approach to dispose clothes Business function chain reduces total lower deployment cost to cloud computing environment.This algorithm can reduce total lower deployment cost, but author does not have There is research mist to calculate.Cloud computing and mist calculating, which is used in combination, can reduce network congestion and network delay, and mention for mobile subscriber For safer service.There is researcher to carry out the SDN/NFV deployment experiment for calculating 5G service based on cloud and mist, the portion Lai Youhua VNF It affixes one's name to while meeting constraint (such as delay).
With the increase that service function chain is requested, how to guarantee that the safety of service becomes a huge challenge.In order to The safety for guaranteeing service when servicing under attack has had research of the part about NFV safety, such as SAMA algorithm, master Wanting thought is that the deployment of service function chain is carried out based on traffic aware and energy efficient method, to minimize total be deployed to This, while meeting the size constraint of network node.Although this method can be realized the deployment of virtual network function, it does not have The safety issue for considering service function chain does not account for characteristic and related constraint that mist calculates network yet, cannot utilize mist meter The advantage of calculation.
For the deployment issue of virtual network function, related researcher also proposed PATH-EXTENSION, main Thought considers shared and reuses existing virtual network function, to reduce the consumption of Internet resources.Although this method can It realizes the placement of virtual network function, and considers shared and reuse existing virtual network function, but it is also without examining Consider characteristic and related constraint that mist calculates network, the advantage that cannot be calculated using mist, and do not account for entire service function chain Safety issue.
Summary of the invention
The purpose of the invention is to the link companies of each virtual network function in considering entire service function chain request It connects situation and meets under the relevant constraints such as demand for security, cloud and mist is calculated to the node resource and bandwidth resources point of bottom-layer network The each service function chain request of dispensing, so that in the resource benefit for being deployed to power and bottom-layer network for improving the request of service function chain Total mapping cost is minimum while with rate, proposes a kind of service function chain Ministry of State Security management side that network is calculated applied to cloud and mist Method.
The technical solution of the present invention is as follows: a kind of service function chain security deployment method for calculating network applied to cloud and mist, packet Include following steps:
S1, the initial SFC of building dispose request queue ArrivalSFC, and expired SFC is arrived in wherein expired SFC request storage In request set FinishedSFC, and initial total lower deployment cost TCost=0 is set, is initially blocked SFC deployment request set SFCbloFor sky.
S2, judge whether ArrivalSFC is sky, if then entering step S9, otherwise enter step S3.
S3, the resource that expired SFC request occupies is discharged according to set FinishedSFC.
S4, first in ArrivalSFC is disposed using MSSFCD algorithm, MCSGSFCD algorithm or MCSGFCDFA algorithm SFC deployment request SFC1, and obtain SFC1Deployment scheme set DS lower deployment cost TCost (DS).
S5, judge whether set DS is sky, if then entering step S7, otherwise enter step S6.
S6, total lower deployment cost TCost and physical network are updated according to TCost (DS), enters step S8.
S7, by SFC1It is added to SFCblo
S8, by SFC1It is removed from ArrivalSFC, return step S2.
S9, output TCost and SFCblo
The beneficial effects of the present invention are:
(1) applied widely: traditional virtual network function or service function chain Deployment Algorithm is for virtual net mostly What network and data center network proposed, or do not account for calculating the deployment services function chain in network in cloud and mist.Energy of the present invention The service function chain request network is calculated suitable for cloud and mist, therefore compared with traditional Deployment Algorithm, applicable model of the invention It encloses wider.
(2) lower deployment cost is low: due to the invention proposes MSSFCD algorithm/MCSGSFCD algorithm/MCSGFCDFA algorithm, It is requested using the advantage deployment services function chain of cloud and mist calculations incorporated, the cost of the deployment scheme found in this way is also just lower.
(3) mapping blocking rate is small: the safety due to considering deployment scheme in the present invention is meeting service function chain Under the constraint of demand for security, the consumption of Internet resources can be effectively reduced, so a possibility that mapping successfully is also bigger, resistance Plug rate is also just smaller.
Detailed description of the invention
Fig. 1 show a kind of service function chain security deployment that network is calculated applied to cloud and mist provided in an embodiment of the present invention Method flow diagram.
Fig. 2 show MSSFCD algorithm flow chart provided in an embodiment of the present invention.
Fig. 3 show MCSGSFCD algorithm flow chart provided in an embodiment of the present invention.
Fig. 4 show MCSGFCDFA algorithm flow chart provided in an embodiment of the present invention.
Specific embodiment
Carry out detailed description of the present invention illustrative embodiments with reference to the drawings.It should be appreciated that shown in attached drawing and The embodiment of description is only exemplary, it is intended that is illustrated the principle and spirit of the invention, and is not limited model of the invention It encloses.
The embodiment of the invention provides a kind of service function chain security deployment methods that network is calculated applied to cloud and mist, such as scheme Shown in 1, include the following steps S1-S9:
S1, the initial SFC of building dispose request queue ArrivalSFC, and expired SFC is arrived in wherein expired SFC request storage In request set FinishedSFC, and initial total lower deployment cost TCost=0 is set, is initially blocked SFC deployment request set SFCbloFor sky.
S2, judge whether ArrivalSFC is sky, if then entering step S9, otherwise enter step S3.
S3, the resource that expired SFC request occupies is discharged according to set FinishedSFC.
S4, first in ArrivalSFC is disposed using MSSFCD algorithm, MCSGSFCD algorithm or MCSGFCDFA algorithm SFC deployment request SFC1, and obtain SFC1Deployment scheme set DS lower deployment cost TCost (DS).
S5, judge whether set DS is sky, if then entering step S7, otherwise enter step S6.
S6, total lower deployment cost TCost and physical network are updated according to TCost (DS), enters step S8.
Wherein, the formula of total lower deployment cost TCost is updated are as follows:
TCost=TCostb+TCost(DS) (16)
Wherein TCost indicates updated total lower deployment cost, TCostbIndicate total lower deployment cost before updating.
S7, by SFC1It is added to SFCblo
S8, by SFC1It is removed from ArrivalSFC, return step S2.
S9, output TCost and SFCblo
In the embodiment of the present invention, MSSFCD algorithm is the maximized Deployment Algorithm of safety, is used to mention to the maximum extent The safety of high service function chain deployment scheme.In MSSFCD algorithm, virtual network is disposed using maximizing safety strategy Function finds safest path to safest physical node, to improve service function chain deployment scheme to greatest extent Safety, finally obtain safest deployment scheme.As each virtual network function vf of deploymentiTo physical node nj, and find Safest path pemWhen, it can find from current physical node njTo the safest path p of useri+1(nj,LU), Optimization Dept. The solution of administration, blocking rate and safety so as to improve final deployment scheme.If the service function that MSSFCD algorithm solves The safety of energy chain deployment scheme is not able to satisfy the demand for security of service function chain deployment request, the deployment request of this service function chain It will be rejected.
As shown in Fig. 2, MSSFCD algorithm the following steps are included:
S4-1-1, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFIt disposes and requests for SFC Virtual network function set, | NF | be NFThe quantity of middle virtual network function.
S4-1-2, judge NFIn virtual network function whether be traversed, if then entering step S4-1-17, otherwise Enter step S4-1-3.
Each physical node n in S4-1-3, traversal physical networkj∈NP, NPFor the physical node collection in physical network It closes;J=1,2 ..., | NP |, | NP | for the quantity of physical node in physical network.
S4-1-4, judge whether the physical node in physical network has been traversed, it is no if then entering step S4-1-10 Then enter step S4-1-5.
S4-1-5, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-1-6, otherwise return step S4-1-3.
S4-1-6, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme safety VNFSecurity (vfi→nj) and lower deployment cost VNFCost (vfi→nj)。
VNFSecurity(vfi→nj) calculation formula are as follows:
VNFSecurity(vfi→nj)=s (nj) (1)
Wherein s (nj) indicate physical node njSafety coefficient.
VNFCost(vfi→nj) calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource Demand.
S4-1-7, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost peace Complete trails pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links.
S4-1-8, path p is calculatedemSafety PathSecurity (pem), path pemLower deployment cost PathCost (pem) and path pi+1(nj,LU) safety PathSecurity (pi+1(nj,LU))。
PathSecurity(pem) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physics in physical network The quantity of link.
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand.
PathSecurity(pi+1(nj,LU)) calculation formula are as follows:
S4-1-9, according to VNFSecurity (vfi→nj)、VNFCost(vfi→nj)、PathSecurity(pem)、 PathCost(pem) and PathSecurity (pi+1(nj,LU)) calculate virtual network function vfiIt is deployed to physical node nj's Overall security TSecurity (vfi→nj) and lower deployment cost TCost (vfi→nj), return step S4-1-3.
TSecurity(vfi→nj) calculation formula are as follows:
TCost(vfi→nj) calculation formula are as follows:
S4-1-10, judge whether that overall security TSecurity (vf can be foundi→nj) maximum deployment scheme, if It is to enter step S4-1-12, otherwise enters step S4-1-11.
S4-1-11, SFC is emptied1Deployment scheme set DS, enter step S4-1-16.
S4-1-12, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set In DS, S4-1-13 is entered step.
S4-1-13, the overall security TSecurity (DS) ' for calculating DS, calculation formula are as follows:
Wherein VNFSecurity (DS (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS (vfa) Safety, a=1,2 ..., i;PathSecurity(DS(em)) indicate trustship SFC link emPhysical link DS (em) peace Quan Xing, s (DS (vfa)) indicate physical node DS (vfa) safety coefficient.
S4-1-14, judge whether otherwise meet TSecurity (DS) ' < SR returns if then entering step S4-1-15 Step S4-1-1.
S4-1-15, SFC is emptied1Deployment scheme set DS, enter step S4-1-16.
S4-1-16, output DS are sky, and enable TCost (DS)=0, enter step S5.
S4-1-17, SFC link e is calculated according to formula (3)|ES|All mapping paths safety, from all mapping roads The highest path p of safety is searched in diametere|ES|, it is stored in DS, and calculate lower deployment cost TCost (DS), calculation formula Are as follows:
Wherein VNFCost (DS (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS (vfi) portion Affix one's name to cost, PathCost (DS (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS (vfi)) Indicate physical node DS (vfi) unit cost.
S4-1-18, output DS and TCost (DS), enter step S5.
Since higher security deployment scheme will lead to higher total lower deployment cost, in order to meet the deployment of service function chain Total lower deployment cost is reduced while the security requirement of request, the embodiment of the present invention also proposed cost minimization and safety is protected The Deployment Algorithm MCSGSFCD of barrier.In MCSGSFCD algorithm, use cost minimization and security strategies as boot policy Deployment while meeting the demand for security of deployment scheme of service function chain deployment request, subtracts to dispose virtual network function Total lower deployment cost of the deployment scheme of few service function chain deployment request.In MCSGSFCD algorithm, it is similar to MSSFCD algorithm, It will find from current physical node njTo the safest path p of useri+1(nj,LU) reduce total lower deployment cost.
As shown in figure 3, MCSGSFCD algorithm the following steps are included:
S4-2-1, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFIt disposes and requests for SFC Virtual network function set, | NF | be NFThe quantity of middle virtual network function.
S4-2-2, judge NFIn virtual network function whether be traversed, if then entering step S4-2-14, otherwise Enter step S4-2-3.
Each physical node n in S4-2-3, traversal physical networkj∈NP, NPFor the physical node collection in physical network It closes;J=1,2 ..., | NP |, | NP | for the quantity of physical node in physical network.
S4-2-4, judge whether the physical node in physical network has been traversed, it is no if then entering step S4-2-10 Then enter step S4-2-5.
S4-2-5, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-2-6, otherwise return step S4-2-3.
S4-2-6, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme lower deployment cost VNFCost (vfi→nj)。
VNFCost(vfi→nj) calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource Demand;
S4-2-7, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost peace Complete trails pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links.
S4-2-8, path p is calculatedemSafety PathSecurity (pem), path pemLower deployment cost PathCost (pem), path pi+1(nj,LU) safety PathSecurity (pi+1(nj,LU)), path pi+1(nj,LU) lower deployment cost PathCost(pi+1(nj,LU)) and remaining virtual network function pre- deployment scheme maximum security MaxSecurity (pi +1(nj,LU))。
PathSecurity(pem) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physics in physical network The quantity of link.
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand.
PathSecurity(pi+1(nj,LU)) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physics in physical network The quantity of link.
PathCost(pi+1(nj,LU)) calculation formula are as follows:
Wherein ε (em+1) indicate SFC link em+1Bandwidth resources demand.
MaxSecurity(pi+1(nj,LU)) calculation formula are as follows:
Wherein s (nt) indicate physical node ntSafety coefficient, ntIndicate path pi+1(nj,LU) in physical node.
S4-2-9, according to VNFCost (vfi→nj)、PathCost(pem)、PathSecurity(pi+1(nj,LU))、 PathCost(pi+1(nj,LU)) and MaxSecurity (pi+1(nj,LU)) calculate deployment scheme set DS overall security TSecurity (DS) " and by virtual network function vfiIt is deployed to physical node njLower deployment cost TCost (vfi→nj) ", it returns Return step S4-2-3.
The calculation formula of TSecurity (DS) " are as follows:
Wherein VNFSecurity (DS (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS (vfa) Safety, a=1,2 ..., i;PathSecurity(DS(em)) indicate trustship SFC link emPhysical link DS (em) peace Quan Xing, s (DS (vfa)) indicate physical node DS (vfa) safety coefficient.
TCost(vfi→nj) " calculation formula are as follows:
S4-2-10, judge whether that lower deployment cost TCost (vf can be foundi→nj) " minimum, and overall security Otherwise the deployment scheme of TSecurity (DS) " >=SR enters step S4-2-12 if then entering step S4-2-11;SR is indicated The overall safety demand index of SFC deployment request.
S4-2-11, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set In DS, return step S4-2-1.
S4-2-12, SFC is emptied1Deployment scheme set DS, enter step S4-2-13.
S4-2-13, output DS are sky, and enable TCost (DS)=0, enter step S5.
S4-2-14, SFC link e is calculated according to formula (3)|ES|All mapping paths safety, from all mapping roads The highest path p of safety is searched in diametere|ES|, it is stored in DS, and calculate lower deployment cost TCost (DS), calculation formula Are as follows:
Wherein VNFCost (DS (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS (vfi) portion Affix one's name to cost, PathCost (DS (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS (vfi)) Indicate physical node DS (vfi) unit cost.
S4-2-15, output DS and TCost (DS).
MCSGSFCD algorithm use cost minimizes and security strategies are as the guidance plan for disposing virtual network function Slightly minimize total lower deployment cost.Although this MCSGSFCD algorithm can reduce total lower deployment cost, use cost is minimum Change the increase that will lead to blocking rate as boot policy with security strategies.Therefore, it is proposed in the embodiment of the present invention MCSGFCDFA algorithm reduces blocking rate.In MCSGFCDFA algorithm, a safety is obtained using MSSFCD algorithm first Then maximized initial deployment scheme attempts the deployment scheme for finding a total lower deployment cost of minimum.If finding such one A new deployment scheme, and the safety of this new deployment scheme meets the demand for security of service function chain request, and Total lower deployment cost of this new deployment scheme is more at low cost than the always deployment of initial deployment scheme, then is taken using new deployment scheme For initial deployment scheme.Feedback adjustment process in this way, can reduce total lower deployment cost and blocking rate.
As shown in figure 4, MCSGFCDFA algorithm the following steps are included:
S4-3-1, SFC is obtained using MSSFCD algorithm1Deployment scheme set DS and its lower deployment cost TCost (DS).
S4-3-2, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFIt disposes and requests for SFC Virtual network function set, | NF | be NFThe quantity of middle virtual network function.
S4-3-3, judge NFIn virtual network function whether be traversed, if then entering step S4-3-17, otherwise Enter step S4-3-4.
Each physical node n in S4-3-4, traversal physical networkj∈NP, NPFor the physical node collection in physical network It closes;J=1,2 ..., | NP |, | NP | for the quantity of physical node in physical network.
S4-3-5, judge whether the physical node in physical network has been traversed, it is no if then entering step S4-3-11 Then enter step S4-3-6.
S4-3-6, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-3-7, otherwise return step S4-3-4.
S4-3-7, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme lower deployment cost VNFCost (vfi→nj), calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource Demand.
S4-3-8, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost peace Complete trails pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links.
S4-3-9, path p is calculatedemLower deployment cost PathCost (pem) and path pi+1(nj,LU) lower deployment cost PathCost(pi+1(nj,LU))。
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand.
PathCost(pi+1(nj,LU)) calculation formula are as follows:
Wherein ε (em+1) indicate SFC link em+1Bandwidth resources demand.
S4-3-10, according to VNFCost (vfi→nj)、PathCost(pem) and PathCost (pi+1(nj,LU)) calculate and incite somebody to action Virtual network function vfiIt is deployed to physical node njLower deployment cost TCost (vfi→nj) ", return step S4-3-4.
TCost(vfi→nj) " calculation formula are as follows:
S4-3-11, judge whether that lower deployment cost TCost (vf can be foundi→nj) " the smallest deployment scheme, if then into Enter step S4-3-13, otherwise enters step S4-3-12.
S4-3-12, SFC is emptied1Deployment scheme set DS ', enter step S4-3-20.
S4-3-13, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set In DS ', S4-3-14 is entered step.
S4-3-14, the overall security TSecurity (DS ') for calculating DS ', calculation formula are as follows:
Wherein VNFSecurity (DS ' (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS ' (vfa) safety, a=1,2 ..., i;PathSecurity(DS'(em)) indicate trustship SFC link emPhysical link DS ' (em) safety, s (DS ' (vfa)) indicate physical node DS ' (vfa) safety coefficient.
S4-3-15, judge whether otherwise meet TSecurity (DS ') < SR returns if then entering step S4-3-16 Step S4-3-2;SR indicates the overall safety demand index of SFC deployment request.
S4-3-16, SFC is emptied1Deployment scheme set DS ', enter step S4-3-20.
S4-3-17, SFC link e is calculated according to formula (4)|ES|All mapping paths lower deployment cost, from all mappings The smallest path p of lower deployment cost is searched in pathe|ES|, be stored in DS ', and calculate lower deployment cost TCost (DS ') with it is whole Body safety TSecurity (DS ').
The calculation formula of TCost (DS ') are as follows:
Wherein VNFCost (DS ' (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS ' (vfi) Lower deployment cost, PathCost (DS ' (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS ' (vfi)) indicate physical node DS ' (vfi) unit cost.
S4-3-18, judge whether that meeting DS ' not is sky, and TSecurity (DS ')>=SR, and TCost (DS ')<TCost (DS), if then entering step S4-3-19, S4-3-20 is otherwise entered step.
S4-3-19, DS=DS ', TCost (DS)=TCost (DS ') are enabled.
S4-3-20, output DS and TCost (DS), enter step S5.
The embodiment of the present invention can be deployed in the cloud and mist based on SDN and calculate in network, to realize the deployment of service function chain. Network --- for traditional network architecture, SDN is a kind of revolutionary change for cloud and mist calculating based on SDN.It will control Function processed is separated from the network switching equipment, moves it into the control environment being logically independent --- network control system it In, and SDN network is based on OpenFlow agreement transmitting message.The system can be run on general server, any user Can at any time, directly carry out control function programming.Therefore, control function is both no longer limited in router, is also no longer limited to only Having the production firm of equipment can program and define.The essence of SDN is the programmable of Logical central control layer.
SDN helps to realize the virtualization of network, to realize the calculating of network and the integration of storage resource, finally makes As long as obtaining through some simple software tools combinations, the control and management to whole network can be achieved with.This is based on SDN Cloud and mist calculates one of numerous advantages of network, and determines to realize calculating in the middle part of network in cloud and mist for service function chain with it The key factor of administration.
What network operator can be proposed the embodiment of the present invention calculates network deployment services function in the cloud and mist based on SDN The method of energy chain is deployed on the control layer in the control router of SDN, and SDN control router can dispatch the control itself having Management function processed collects the whole network information, obtains all node resource situations and the resource of link in network, the information such as time delay. The topological and corresponding resource information of the whole network can be obtained by the control mode of this centralization router.
When there is the request of service function chain to arrive, SDN controls router and can be adjusted according to the whole network information that oneself is grasped The dispositions method based on service function chain being deployed on its control layer is spent, the key parameters such as lower deployment cost, reject rate are calculated, And feed back to operator.
Those of ordinary skill in the art will understand that the embodiments described herein, which is to help reader, understands this hair Bright principle, it should be understood that protection scope of the present invention is not limited to such specific embodiments and embodiments.This field Those of ordinary skill disclosed the technical disclosures can make according to the present invention and various not depart from the other each of essence of the invention The specific variations and combinations of kind, these variations and combinations are still within the scope of the present invention.

Claims (5)

1. a kind of service function chain security deployment method for calculating network applied to cloud and mist, which comprises the following steps:
S1, the initial SFC of building dispose request queue ArrivalSFC, and wherein expired SFC request storage is requested to expired SFC In set FinishedSFC, and initial total lower deployment cost TCost=0 is set, is initially blocked SFC deployment request set SFCblo For sky;
S2, judge whether ArrivalSFC is sky, if then entering step S9, otherwise enter step S3;
S3, the resource that expired SFC request occupies is discharged according to set FinishedSFC;
S4, using Deployment Algorithm or the cost minimization of the maximized Deployment Algorithm of safety, cost minimization and safety guarantee With first SFC deployment request SFC in the low-resistance plug rate Deployment Algorithm deployment ArrivalSFC of safety guarantee1, and obtain SFC1 Deployment scheme set DS lower deployment cost TCost (DS);
S5, judge whether set DS is sky, if then entering step S7, otherwise enter step S6;
S6, total lower deployment cost TCost and physical network are updated according to TCost (DS), enters step S8;
S7, by SFC1It is added to SFCblo
S8, by SFC1It is removed from ArrivalSFC, return step S2;
S9, output TCost and SFCblo
2. service function chain security deployment method according to claim 1, which is characterized in that the safety is maximized Deployment Algorithm the following steps are included:
S4-1-1, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFFor the void of SFC deployment request Quasi- network function set, | NF | it is NFThe quantity of middle virtual network function;
S4-1-2, judge NFIn virtual network function whether be traversed, if then entering step S4-1-17, otherwise enter step Rapid S4-1-3;
Each physical node n in S4-1-3, traversal physical networkj∈NP, NPFor the physical node set in physical network;J= 1,2 ..., | NP |, | NP | for the quantity of physical node in physical network;
S4-1-4, judge whether the physical node in physical network has been traversed, if then entering step S4-1-10, otherwise into Enter step S4-1-5;
S4-1-5, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-1- 6, otherwise return step S4-1-3;
S4-1-6, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme safety VNFSecurity (vfi→ nj) and lower deployment cost VNFCost (vfi→nj);
VNFSecurity(vfi→nj) calculation formula are as follows:
VNFSecurity(vfi→nj)=s (nj) (1)
Wherein s (nj) indicate physical node njSafety coefficient;
VNFCost(vfi→nj) calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource demand;
S4-1-7, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost safe road Diameter pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links;
S4-1-8, path p is calculatedemSafety PathSecurity (pem), path pemLower deployment cost PathCost (pem) with And path pi+1(nj,LU) safety PathSecurity (pi+1(nj,LU));
PathSecurity(pem) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physical link in physical network Quantity;
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand;
PathSecurity(pi+1(nj,LU)) calculation formula are as follows:
S4-1-9, according to VNFSecurity (vfi→nj)、VNFCost(vfi→nj)、PathSecurity(pem)、PathCost (pem) and PathSecurity (pi+1(nj,LU)) calculate virtual network function vfiIt is deployed to physical node njGeneral safety Property TSecurity (vfi→nj) and lower deployment cost TCost (vfi→nj), return step S4-1-3;
TSecurity(vfi→nj) calculation formula are as follows:
TCost(vfi→nj) calculation formula are as follows:
S4-1-10, judge whether that overall security TSecurity (vf can be foundi→nj) maximum deployment scheme, if then S4-1-12 is entered step, S4-1-11 is otherwise entered step;
S4-1-11, SFC is emptied1Deployment scheme set DS, enter step S4-1-16;
S4-1-12, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set DS In, enter step S4-1-13;
S4-1-13, the overall security TSecurity (DS) ' for calculating DS, calculation formula are as follows:
Wherein VNFSecurity (DS (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS (vfa) peace Quan Xing, a=1,2 ..., i;PathSecurity(DS(em)) indicate trustship SFC link emPhysical link DS (em) safety Property, s (DS (vfa)) indicate physical node DS (vfa) safety coefficient;
S4-1-14, judge whether to meet TSecurity (DS) ' < SR, if then entering step S4-1-15, otherwise return step S4-1-1;
S4-1-15, SFC is emptied1Deployment scheme set DS, enter step S4-1-16;
S4-1-16, output DS are sky, and enable TCost (DS)=0, enter step S5;
S4-1-17, SFC link e is calculated according to formula (3)|ES|All mapping paths safety, from all mapping paths Search the highest path p of safetye|ES|, it is stored in DS, and calculate lower deployment cost TCost (DS), calculation formula are as follows:
Wherein VNFCost (DS (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS (vfi) be deployed to This, PathCost (DS (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS (vfi)) indicate Physical node DS (vfi) unit cost;
S4-1-18, output DS and TCost (DS), enter step S5.
3. service function chain security deployment method according to claim 1, which is characterized in that the cost minimization and peace All risk insurance barrier Deployment Algorithm the following steps are included:
S4-2-1, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFFor the void of SFC deployment request Quasi- network function set, | NF | it is NFThe quantity of middle virtual network function;
S4-2-2, judge NFIn virtual network function whether be traversed, if then entering step S4-2-14, otherwise enter step Rapid S4-2-3;
Each physical node n in S4-2-3, traversal physical networkj∈NP, NPFor the physical node set in physical network;J= 1,2 ..., | NP |, | NP | for the quantity of physical node in physical network;
S4-2-4, judge whether the physical node in physical network has been traversed, if then entering step S4-2-10, otherwise into Enter step S4-2-5;
S4-2-5, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-2- 6, otherwise return step S4-2-3;
S4-2-6, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme lower deployment cost VNFCost (vfi→ nj);
VNFCost(vfi→nj) calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource demand;
S4-2-7, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost safe road Diameter pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links;
S4-2-8, path p is calculatedemSafety PathSecurity (pem), path pemLower deployment cost PathCost (pem), Path pi+1(nj,LU) safety PathSecurity (pi+1(nj,LU)), path pi+1(nj,LU) lower deployment cost PathCost (pi+1(nj,LU)) and remaining virtual network function pre- deployment scheme maximum security MaxSecurity (pi+1(nj, LU));
PathSecurity(pem) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physical link in physical network Quantity;
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand;
PathSecurity(pi+1(nj,LU)) calculation formula are as follows:
Wherein s (lk) indicate physical link lkSafety coefficient;K=1,2 ..., | EP |, | EP | for physical link in physical network Quantity;
PathCost(pi+1(nj,LU)) calculation formula are as follows:
Wherein ε (em+1) indicate SFC link em+1Bandwidth resources demand;
MaxSecurity(pi+1(nj,LU)) calculation formula are as follows:
Wherein s (nt) indicate physical node ntSafety coefficient, ntIndicate path pi+1(nj,LU) in physical node;
S4-2-9, according to VNFCost (vfi→nj)、PathCost(pem)、PathSecurity(pi+1(nj,LU))、PathCost (pi+1(nj,LU)) and MaxSecurity (pi+1(nj,LU)) calculate deployment scheme set DS overall security TSecurity (DS) " and by virtual network function vfiIt is deployed to physical node njLower deployment cost TCost (vfi→nj) ", return step S4- 2-3;
The calculation formula of TSecurity (DS) " are as follows:
Wherein VNFSecurity (DS (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS (vfa) peace Quan Xing, a=1,2 ..., i;PathSecurity(DS(em)) indicate trustship SFC link emPhysical link DS (em) safety Property, s (DS (vfa)) indicate physical node DS (vfa) safety coefficient;
TCost(vfi→nj) " calculation formula are as follows:
S4-2-10, judge whether that lower deployment cost TCost (vf can be foundi→nj) " minimum, and overall security TSecurity (DS) " otherwise >=SR deployment scheme enters step S4-2-12 if then entering step S4-2-11;SR indicates that SFC deployment is asked The overall safety demand index asked;
S4-2-11, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set DS In, return step S4-2-1;
S4-2-12, SFC is emptied1Deployment scheme set DS, enter step S4-2-13;
S4-2-13, output DS are sky, and enable TCost (DS)=0, enter step S5;
S4-2-14, SFC link e is calculated according to formula (3)|ES|All mapping paths safety, from all mapping paths Search the highest path p of safetye|ES|, it is stored in DS, and calculate lower deployment cost TCost (DS), calculation formula are as follows:
Wherein VNFCost (DS (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS (vfi) be deployed to This, PathCost (DS (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS (vfi)) indicate Physical node DS (vfi) unit cost;
S4-2-15, output DS and TCost (DS).
4. service function chain security deployment method according to claim 2, which is characterized in that the cost minimization and peace All risk insurance barrier low-resistance plug rate Deployment Algorithm the following steps are included:
S4-3-1, SFC is obtained using the maximized Deployment Algorithm of safety1Deployment scheme set DS and its lower deployment cost TCost (DS);
S4-3-2, traversal NFEach of virtual network function vfi, i=1,2 ..., | NF |;NFFor the void of SFC deployment request Quasi- network function set, | NF | it is NFThe quantity of middle virtual network function;
S4-3-3, judge NFIn virtual network function whether be traversed, if then entering step S4-3-17, otherwise enter step Rapid S4-3-4;
Each physical node n in S4-3-4, traversal physical networkj∈NP, NPFor the physical node set in physical network;J= 1,2 ..., | NP |, | NP | for the quantity of physical node in physical network;
S4-3-5, judge whether the physical node in physical network has been traversed, if then entering step S4-3-11, otherwise into Enter step S4-3-6;
S4-3-6, judge physical node njWhether virtual network function vf is metiPosition constraint, if then entering step S4-3- 7, otherwise return step S4-3-4;
S4-3-7, by vfiIt is deployed to physical node njOn, and calculate vfiDeployment scheme lower deployment cost VNFCost (vfi→ nj), calculation formula are as follows:
VNFCost(vfi→nj)=p (nj)ε(vfi) (2)
Wherein p (nj) indicate physical node njUnit cost, ε (vfi) indicate virtual network function vfiNode resource demand;
S4-3-8, SFC link e is searchedmWater channel principium pemAnd from njL is constrained to user's deployed positionUMost safe road Diameter pi+1(nj,LU);M=1,2 ..., | EF |, | EF | it is SFC number of links;
S4-3-9, path p is calculatedemLower deployment cost PathCost (pem) and path pi+1(nj,LU) lower deployment cost PathCost(pi+1(nj,LU));
PathCost(pem) calculation formula are as follows:
Wherein p (lk) indicate physical link lkUnit cost, ε (em) indicate SFC link emBandwidth resources demand;
PathCost(pi+1(nj,LU)) calculation formula are as follows:
Wherein ε (em+1) indicate SFC link em+1Bandwidth resources demand;
S4-3-10, according to VNFCost (vfi→nj)、PathCost(pem) and PathCost (pi+1(nj,LU)) calculate will be virtual Network function vfiIt is deployed to physical node njLower deployment cost TCost (vfi→nj) ", return step S4-3-4;
TCost(vfi→nj) " calculation formula are as follows:
S4-3-11, judge whether that lower deployment cost TCost (vf can be foundi→nj) " the smallest deployment scheme, if then entering step Rapid S4-3-13, otherwise enters step S4-3-12;
S4-3-12, SFC is emptied1Deployment scheme set DS ', enter step S4-3-20;
S4-3-13, by virtual network function vfiWith SFC link emDeployment scheme be stored into SFC1Deployment scheme set DS ' In, enter step S4-3-14;
S4-3-14, the overall security TSecurity (DS ') for calculating DS ', calculation formula are as follows:
Wherein VNFSecurity (DS ' (vfa)) indicate a-th of virtual network function vf of trustshipaPhysical node DS ' (vfa) Safety, a=1,2 ..., i;PathSecurity(DS′(em)) indicate trustship SFC link emPhysical link DS ' (em) peace Quan Xing, s (DS ' (vfa)) indicate physical node DS ' (vfa) safety coefficient;
S4-3-15, judge whether to meet TSecurity (DS ') < SR, if then entering step S4-3-16, otherwise return step S4-3-2;SR indicates the overall safety demand index of SFC deployment request;
S4-3-16, SFC is emptied1Deployment scheme set DS ', enter step S4-3-20;
S4-3-17, SFC link e is calculated according to formula (4)|ES|All mapping paths lower deployment cost, from all mapping paths The middle the smallest path p of lookup lower deployment coste|ES|, it is stored in DS ', and calculate lower deployment cost TCost (DS ') and whole peace Full property TSecurity (DS ');
The calculation formula of TCost (DS ') are as follows:
Wherein VNFCost (DS ' (vfi)) indicate i-th of virtual network function vf of trustshipiPhysical node DS ' (vfi) deployment Cost, PathCost (DS ' (em)) indicate trustship SFC link emPhysical link DS (em) lower deployment cost, p (DS ' (vfi)) Indicate physical node DS ' (vfi) unit cost;
S4-3-18, judge whether that meeting DS ' not is sky, and TSecurity (DS ')>=SR, and TCost (DS ')<TCost (DS), if then entering step S4-3-19, S4-3-20 is otherwise entered step;
S4-3-19, DS=DS ', TCost (DS)=TCost (DS ') are enabled;
S4-3-20, output DS and TCost (DS), enter step S5.
5. service function chain security deployment method according to claim 1, which is characterized in that updated in the step S6 total The formula of lower deployment cost TCost are as follows:
TCost=TCostb+TCost(DS) (16)
Wherein TCost indicates updated total lower deployment cost, TCostbIndicate total lower deployment cost before updating.
CN201810118870.7A 2018-02-06 2018-02-06 A kind of service function chain security deployment method calculating network applied to cloud and mist Active CN108200202B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810118870.7A CN108200202B (en) 2018-02-06 2018-02-06 A kind of service function chain security deployment method calculating network applied to cloud and mist

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810118870.7A CN108200202B (en) 2018-02-06 2018-02-06 A kind of service function chain security deployment method calculating network applied to cloud and mist

Publications (2)

Publication Number Publication Date
CN108200202A CN108200202A (en) 2018-06-22
CN108200202B true CN108200202B (en) 2019-11-12

Family

ID=62593038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810118870.7A Active CN108200202B (en) 2018-02-06 2018-02-06 A kind of service function chain security deployment method calculating network applied to cloud and mist

Country Status (1)

Country Link
CN (1) CN108200202B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120416B (en) * 2018-08-20 2020-03-10 电子科技大学 Self-adaptive delay shutdown method of server based on cloud network
CN109379230B (en) * 2018-11-08 2020-05-22 电子科技大学 Service function chain deployment method based on breadth-first search
CN109412963B (en) * 2018-11-16 2021-08-17 电子科技大学 Service function chain deployment method based on stream splitting
CN113055234B (en) * 2021-03-18 2022-06-14 湘潭大学 Service function chain deployment method based on edge calculation
CN116938683B (en) * 2023-09-15 2023-12-01 金盾检测技术股份有限公司 Network path analysis system and method based on network security anomaly detection

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141617A (en) * 2015-09-14 2015-12-09 上海华为技术有限公司 Deploying and adjusting method for service functions among data centers and deploying and adjusting device for service functions among data centers
CN105406992A (en) * 2015-10-28 2016-03-16 浙江工商大学 Business requirement transformation and deployment method for SDN (Software Defined Network)
CN107094099A (en) * 2017-05-19 2017-08-25 西安交通大学苏州研究院 A kind of high reliability business function chain and its construction method
CN107332913A (en) * 2017-07-04 2017-11-07 电子科技大学 A kind of Optimization deployment method of service function chain in 5G mobile networks
CN107395501A (en) * 2017-08-29 2017-11-24 电子科技大学 A kind of cross-domain dispositions method of network service function chain
CN107395506A (en) * 2017-09-07 2017-11-24 电子科技大学 A kind of service function chain dispositions method of propagation delay time optimization
CN107483286A (en) * 2017-08-14 2017-12-15 电子科技大学 Merge the method with deployment services functional chain under a kind of environment based on cloud and mist
US10187209B2 (en) * 2015-04-27 2019-01-22 Cisco Technology, Inc. Cumulative schemes for network path proof of transit

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9917745B2 (en) * 2013-09-27 2018-03-13 Futurewei Technologies, Inc. Validation of chained network services
US9825856B2 (en) * 2014-01-06 2017-11-21 Futurewei Technologies, Inc. Service function chaining in a packet network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10187209B2 (en) * 2015-04-27 2019-01-22 Cisco Technology, Inc. Cumulative schemes for network path proof of transit
CN105141617A (en) * 2015-09-14 2015-12-09 上海华为技术有限公司 Deploying and adjusting method for service functions among data centers and deploying and adjusting device for service functions among data centers
CN105406992A (en) * 2015-10-28 2016-03-16 浙江工商大学 Business requirement transformation and deployment method for SDN (Software Defined Network)
CN107094099A (en) * 2017-05-19 2017-08-25 西安交通大学苏州研究院 A kind of high reliability business function chain and its construction method
CN107332913A (en) * 2017-07-04 2017-11-07 电子科技大学 A kind of Optimization deployment method of service function chain in 5G mobile networks
CN107483286A (en) * 2017-08-14 2017-12-15 电子科技大学 Merge the method with deployment services functional chain under a kind of environment based on cloud and mist
CN107395501A (en) * 2017-08-29 2017-11-24 电子科技大学 A kind of cross-domain dispositions method of network service function chain
CN107395506A (en) * 2017-09-07 2017-11-24 电子科技大学 A kind of service function chain dispositions method of propagation delay time optimization

Also Published As

Publication number Publication date
CN108200202A (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN108200202B (en) A kind of service function chain security deployment method calculating network applied to cloud and mist
CN103346922B (en) The controller of determination network state based on SDN and determine method
CN107819662B (en) A kind of service function chain real-time migration method calculating network applied to cloud and mist
CN102497362B (en) The network attack trace back method and device of Abnormal network traffic
CN104853384B (en) A kind of content buffering method based on popularity in 5th Generation Mobile Communication System
CN103746911B (en) A kind of SDN structure and its communication means
CN104158755B (en) The methods, devices and systems of transmitting message
CN104092756B (en) A kind of resource dynamic distributing method of the cloud storage system based on DHT mechanism
EP2520048B1 (en) Non-blocking adminission control
CN104660507B (en) The control method and device of forwarding data flow routing
CN109792409A (en) For abandoning method, system and the computer-readable medium of message during congestion events
CN108174397A (en) A kind of multiple gateway Synergistic method of task-driven
CN107483286A (en) Merge the method with deployment services functional chain under a kind of environment based on cloud and mist
WO2005018254A3 (en) Provision of services by reserving resources in a communications network having resource management according to policy rules
Shukla et al. A 3-tier architecture for network latency reduction in healthcare internet-of-things using fog computing and machine learning
Yan et al. A survey of low-latency transmission strategies in software defined networking
CN110278118A (en) End-to-end quality of service safeguards system
CN107786460A (en) A kind of management of electricity transaction system request and current-limiting method based on token bucket algorithm
CN105681438A (en) Centralized caching decision strategy in content-centric networking
Wang et al. Software defined autonomic QoS model for future Internet
CN107959593B (en) A kind of software defined network mapping method of virtual network
Jin et al. Utility max–min fair resource allocation for communication networks with multipath routing
WO2021017968A1 (en) Method, apparatus and system for processing access request in content delivery system
CN101686170B (en) Grading transmission quality assurance system based on multi-exit user routing
CN101902405A (en) Emergency service-oriented temporary bandwidth allocation method and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant