CN108418715A - Resource discovery method in wireless network virtualized environment - Google Patents
Resource discovery method in wireless network virtualized environment Download PDFInfo
- Publication number
- CN108418715A CN108418715A CN201810165808.3A CN201810165808A CN108418715A CN 108418715 A CN108418715 A CN 108418715A CN 201810165808 A CN201810165808 A CN 201810165808A CN 108418715 A CN108418715 A CN 108418715A
- Authority
- CN
- China
- Prior art keywords
- resource
- attribute
- virtual network
- network resource
- cluster
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
Abstract
The present invention relates to mobile communication technology field, more particularly to resource discovery method in a kind of virtualized environment to wireless network, including:The virtual network resource that bottom physical network resource is virtualized, will be in virtual network resource storage to the asset repository of resource discovering;Virtual network resource is clustered using the categorical attribute hierarchy clustering method weighted based on comentropy, generates cluster virtual network resource, virtual network provider finds the virtual network resource that user needs from cluster virtual network resource;The present invention is converted into quantitative analysis to the qualitative analysis of virtual network resource characteristic, can effectively reduce resource discovering time delay, improves virtual network configuration efficiency.
Description
Technical field
The present invention relates to mobile communication technology field, more particularly to resource discovering in a kind of virtualized environment to wireless network
Method.
Background technology
After decades of development, wireless communication technique and network interconnection technology are increasingly mature, and diversified Information Mobile Service is big
Amount is emerged in large numbers is made that huge contribution to people's work, life everyway.Wireless network is increasingly becoming Future Internet network
A kind of important access form, but existing network architecture model is fixed design, only by Internet Service Provider one
A role's composition, is faced with highlighting for expansibility, mobility, safety, service quality etc. a series of problems, it is difficult to
Meet the high quality to emerge one after another instantly, high service and emerging application.Academia is this that current internet network is faced with
Row problem referred to as " rigid ".In order to overcome the problems, such as " rigid " of current Internet, wireless network virtualization technology is as one
Emerging and effective technical solution is planted to be suggested.
It is a kind of Resource Sharing Technology that wireless network, which virtualizes essence, it can be taken out physical network by virtualization technology
As for logical network, and then so that complicated and diversified network control function is decoupled from hardware and come out, is drawn into upper layer and does unified association
It reconciles and manages, reduce network management and maintenance cost, improve the network-control efficiency of management.It is many in network virtualization environment
Virtual logical is network coexisted in the same physical network, and it is mutually isolated, do not interfere with each other independently, possess complete and unique network
Service function.The maximum difference of network virtualization and current Internet is the role in business prototype.Current
Internet is only by single role -- and Internet Service Provider (Internet service provider, ISP) forms, net
Business prototype role such as infrastructure provider (Infrastructure provider, InP), clothes in network virtualized environment
Business provides (Service Providers, SP) and virtual network provider (Virtual network provider, VNP), no
Different functions in same role playing.The separation of infrastructure and Internet service provider industry role in network virtualization environment
Design mechanism can make the virtual network of a variety of isomeries enjoy the shared physical network resource of bottom jointly, substantially reduce network base
The maintenance and management cost of Infrastructure.
Virtual network configuration process in wireless network virtualization includes resource discovering, matching, mapping and distribution, resource
It is the discovery that its primary indispensable step, its main purpose is that so that VNP is found in bottom physical infrastructure available
Internet resources and decision virtual network requests (Virtual network request, VNR) select most suitable InP.Resource is sent out
Include now two important processes:Resource description and resource cluster;In wireless network virtualized environment, virtual resource need with
The form of attribute and function is described.Resource cluster is that the Internet resources being described are divided and are grouped, and is used
It is the clustering technique in Data Mining.
Hierarchical clustering can obtain the internal feature of data, the network generated by hierarchical clustering result in different levels
The structure of resource dendrogram and every layer of feature description can be clear and intuitive search the desired resources of VNP.In hierarchical clustering side
There is also certain method (such as bibliography in method:Guha,S,Rastogi,R,Kyuseok Shim.ROCK:a robust
clustering algorithm for categorical attributes[J].Information Systems,2000,
25(5):345-366.) can Cluster Classification data, but there is also notable disadvantage, calculation amount is bigger, time complexity
Height, each cluster operation will calculate the distance between all objects in each cluster, and a large amount of time all consumes and comparing it
The operation of size is above.
Invention content
In view of the above-mentioned problems, resource discovery method in a kind of wireless network virtualized environment of present invention proposition, including:
The virtual network resource that bottom physical network resource is virtualized sends out virtual network resource storage to resource
In existing asset repository;
Virtual network resource is clustered using the categorical attribute hierarchy clustering method weighted based on comentropy, is generated poly-
Class virtual network resource, virtual network provider find the virtual network resource that user needs from cluster virtual network resource.
Preferably, the virtual network resource includes n object, and each object includes the attribute value of m groups attribute and attribute.
Preferably, attribute includes node type, operating system, virtual environment, source node, destination node, intermediate node, chain
Road agreement, Linktype, interface type.
Preferably, the categorical attribute hierarchy clustering method based on comentropy weighting, such as Fig. 3, including:
S1, input virtual network resource, establish dendrogram as root node using all objects in virtual network resource, enable
I=1;
S2, the similarity measurement for calculating each attribute, are ranked up similarity measurement from high to low, select similitude amount
Spend i-th layer of highest attribute and its attribute value as dendrogram;
S3, judge whether the object of virtual network resource constitutes alone the similitude amount of a cluster or the object in cluster
The attribute value for spending highest attribute is consistent, if it is completes cluster, otherwise output cluster virtual network resource enables i=i+1,
Return to S2.
Preferably, similarity measurement formula includes:
Wherein, SjIndicate attribute AjSimilarity measurement, wjIndicate attribute AjThe weights of comentropy, rjIndicate attribute AjVirtual
The number occurred in all objects of Internet resources, pjkIndicate attribute AjAttribute value ajkProportion, rjkIndicate attribute value ajk
The number occurred in all objects of virtual network resource, cjIndicate attribute AjPossess cjA attribute value.
Preferably, the weight w of comentropyjIt is expressed as:
Wherein, HjIndicate attribute AjComentropy, m indicate virtual network resource in attribute quantity.
Preferably, virtual network resource AjComentropy HjIt is expressed as:
Preferably, attribute AjAttribute value ajkProportion pjkIt is expressed as:
Wherein, n indicates the quantity of virtual network resource.
Preferably, virtual network provider finds the virtual network resource packet that user needs from cluster virtual network resource
It includes:
S11, user initiate resource request;
S12, the attribute and attribute value for judging whether to have in repository user to need, terminate to inquire if not, otherwise into
Row S13;
S13, it is judged whether or not meeting the object of the virtual resource type of user demand, meet user demand if having
The object of virtual network resource type then receives the resource request of user, completes inquiry;
If S14, all branches for having traversed multi-level attribute tree, all do not find the object for meeting the resource of user, then tie
Beam is inquired.
The present invention is converted into quantitative analysis to the qualitative analysis of virtual network resource characteristic, can effectively reduce resource discovering
Time delay improves virtual network configuration efficiency.
Description of the drawings
Fig. 1 is the Organization Chart of resource discovery method in wireless network virtualized environment of the present invention;
Fig. 2 is the conceptual scheme of the virtual network resource description of the present invention;
Fig. 3 is the categorical attribute hierarchy clustering method flow chart based on comentropy weighting of the present invention;
Fig. 4 is the time delay comparison diagram of the resource discovery method and existing spider web (cobweb) method of the present invention;
Fig. 5 is that the present invention is based on the instance graphs of the categorical attribute hierarchy clustering method at many levels based on comentropy weighting.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes.
Resource discovery method in a kind of wireless network virtualized environment of present invention proposition, including:
The virtual network resource that bottom physical network resource is virtualized sends out virtual network resource storage to resource
In existing asset repository;
Virtual network resource is clustered using the categorical attribute hierarchy clustering method weighted based on comentropy, is generated poly-
Class virtual network resource, virtual network provider find the virtual network resource that user needs from cluster virtual network resource.
Virtual network resource operational management flow, such as Fig. 1, infrastructure provider disclose virtual network resource, register
Be registered in resource discovery module, i.e., the virtual resource of virtual network is described in file storage to asset repository, virtually
Network provider is found and is matched to resource discovery module, and the desired virtual network resource of resource request is found.
In resource discovery module, virtual network resource, infrastructure provider quilt are managed using distributed storage mode
It is divided into different management domains, the virtual network resource after each management domain will be abstracted virtual network resource description scheme carries out
Standardization, the description to standardize ultimately form a virtual resource and describe document, and these are described document and deposits in resource hair
In existing mould external storage library in the block, and then the registration publication of resource is completed, is finally supplied to user in the form of services.
In wireless network virtualized environment, various Internet resources are responsible for and are provided to infrastructure provider, it
Basic element be that node, link, interface and path use the non-directed graph G=of Weighted Coefficients according to the correlation theory of graph theory
(N, L) indicates that a network, wherein N indicate the set of node, be expressed as N=(n1,n2,...,ni,...);L indicates link
Set, is expressed as L=(l1,l2,...,lj,...);These Internet resources are divided into functional and non-functional according to attribute classification
Resource, progress resource description for above scheme is the virtual network resource with functional attributes.With functional attributes
Virtual network resource is a kind of typical concept --- the relationship of attribute, and as described in Fig. 2 is the network of virtual network resource
Relationship between element, attribute and attribute and attribute, such as virtual network resource include the nets such as node, path, link and interface
Network element, wherein network element node include the attributes such as node type, operating system and virtual environment.
The present invention is directed to wireless networked environment, and cluster design one kind to virtual network resource therein is added based on comentropy
Weigh the hierarchical clustering algorithm of grouped data, including resource processing module and cluster operation module;Wherein resource processing module includes
Resource analysis and entropy weight, resource analysis include mainly:To virtual network resource according to object classification, then according to the attribute of object
Classification;Entropy weight investigates the importance of attribute mainly from virtual resource characteristic, and attribute is weighed with the weighting of comentropy
Weight;Cluster operation module is mainly that the virtual network resource of resume module is handled for resource, and design one kind is with similarity measurement
The clustering criteria of structure carries out cluster operation.
In wireless network virtualized environment, virtual network resource is made of a series of basic network elements, network element
Including node, link, path and interface, these basic network elements include a variety of attributes and attribute value again, it is preferred that attribute packet
Include node type, operating system, virtual environment, source node, destination node, intermediate node, link protocol, Linktype, interface
Type;Assuming that virtual network resource, possesses n object and m attribute, each attribute includes cjA attribute value, each object can
With with multiple attributes in the attribute value and multiple attributes in multiple attributes and multiple attribute values, such as an attribute
It is worth, the attribute and attribute value in the virtual network resource have weight;Virtual network resource is indicated with O, if virtual network resource
Including n object, n-th of object is expressed as On, can be virtual network resource network element in any, this implementation
Example is using node as object, the c of m attribute and corresponding attributejA attribute value representation is as follows:
O={ O1,O2,...,On,
A={ A1,A2,...,Am,
O indicates the set of object, OiFor i-th of object in virtual network resource, and i={ 1,2,3 ..., n };
A indicates the set of attribute, AjFor j-th of attribute in virtual network resource, and j={ 1,2,3 ..., m };
Dom(Aj) indicate j-th of attribute AjShared cjA attribute value, wherein attribute AjK-th of attribute value table be shown as ajk,
And set k=1,2,3 ..., cj, then have:
Attribute AjProportion be expressed as:
Attribute AjIn k-th of attribute value ajkProportion be expressed as:
rjIndicate attribute AjThe number occurred in all objects of virtual network resource, rjkIndicate attribute value ajkVirtual
The number occurred in all objects of Internet resources, attribute AjProportion be also denoted as:
In wireless network virtualization, the importance size of each attribute of each virtual network resource is had nothing in common with each other,
The present invention considers the importance of each attribute, and importance is bigger, and comentropy is smaller, illustrates that these objects in data are more concentrated,
It is so more possible to be clustered in same cluster.
It can be by the attribute A of virtual network resourcejComentropy be expressed as:
Important attribute should be endowed larger weight, and unessential attribute should be endowed smaller weight;According to this
Principle, this patent have used a kind of method of weighting --- entropy assessment.
During cluster data, the comentropy that entropy assessment can be according to each object is weighted its attribute,
Relative to the subjective method of weighting, it can more objective, the accurate each index of reflection weights, attribute AjComentropy weight computing
It is as follows:
Cluster is the process of a unsupervised learning (unsupervised learning), need not carry out sample data
Training, after designing suitable method for measuring similarity, you can clustered to target data set;The present invention proposes a kind of new
The method for measuring similarity different with previous hierarchical clustering of type, similarity measurement formula are:
By the weight w of comentropyj, pjkAnd rjkFormula substitute into above-mentioned formula, can obtain:
It is known that S from above-mentioned formulajOnly with n, m, cj、rjAnd rjkIt is related, illustrate that the module clustered is straight
The property by the virtual network resource itself is connect, that is, the attribute value of the attribute and attribute of the object, object that cluster determines;SjFor
Similarity measure values come by comparing its size to pair in virtual network resource based on this Design hierarchy clustering method
As being clustered.
It is cluster standard by similarity measurement, a kind of completely new, base is designed using decision tree thought in supervised learning
In the categorical attribute hierarchy clustering method of comentropy weighting, this method specific steps are described as follows:
S1, input virtual network resource, establish dendrogram as root node using all objects in virtual network resource, enable
I=1;
S2, the similarity measurement for calculating each attribute, are ranked up similarity measurement from high to low, select similitude amount
Spend i-th layer of highest attribute and its attribute value as dendrogram;
S3, judge whether the object of virtual network resource constitutes alone the similitude amount of a cluster or the object in cluster
The attribute value for spending highest attribute is consistent, if it is completes cluster, otherwise output cluster virtual network resource enables i=i+1,
Return to S2.
The above-mentioned categorical attribute hierarchy clustering method based on comentropy weighting, is categorized into virtual network resource multiple
Cluster, structure type are expressed as dendrogram, and every layer indicates that virtual network resource is divided into several clusters, and the number of plies gets over multilist and shows resource quilt
What is divided is thinner, and the quantity number of cluster is more;Next layer of cluster is nested in the cluster of current layer, i.e., the cluster of current layer carries out sub-clustering again
Form next layer of cluster, for example { { x1, x2 }, { x3 }, { x4, x5 } contain another cluster to some cluster R1=in a cluster
R2={ { x1, x2, x3 }, { x4, x5 } }, here it is R2 to be nested in R1 for that, or perhaps the nested R2 of R1.
Herein using the purity (Purity) in external method come the accuracy rate of metric algorithm, purity, which is one kind, simply to be had
The evaluation method of effect, external method is compared by it on the basis of data sample with cluster, and to assess cluster, value calculates
It is each cluster for clustering and being formed for data object, contains the object number in benchmark divided by the number of objects in total sample in cluster
The calculating of mesh, purity can be expressed as:
Wherein, Λ indicates that cluster result obtains the set of each cluster, is expressed as Λ={ κ1,κ2,...,κq... }, κqTable
Show that q-th of cluster, q are the quantity of cluster;C indicates the set of attribute value quantity, is expressed as C={ c1,c2,...,cj, such as cjIt indicates
Attribute AjThere is cjA attribute value.
Virtual network resource is clustered, virtual network resource cluster process includes two parts, as shown in Figure 4:Basis is set
Apply providers the virtualization of bottom physical network resource that they are administered and descriptions and disclosures, register, be registered to resource hair
In the resource repository of existing module;Cluster operation is carried out to virtual network resource using clustering method proposed by the present invention, it is whole
A cluster operation carries out in resource discovery module, and the cluster virtual network resource ultimately produced is saved in resource repository
In.Resource discovering is a continuous and lasting process in network virtualization environment, and virtual network resource passes through resource first
Secondly description is divided and is grouped using clustering algorithm, the Internet resources that last VNP is asked according to user are existed based on first two steps
It is searched in the resource repository of resource discovery module.
Since the method that the present invention uses virtual network resource cluster belongs to Schizoid hierarchical clustering, so what is generated is poly-
Virtual network resource in class result such as Fig. 5 is presented with the dendrogram form of expression with different levels, from top to bottom, empty in Fig. 5
The number of objects of quasi- Internet resources is 7, respectively Node1, Node2, Node3, Node4, Node5, Node6 and Node7, to belong to
Property for node type this level in, object is divided by three class clusters according to the attribute value of attribute, i.e., by (Node1, Node2)
The attribute value of composition be interchanger class cluster, by the attribute value that (Node3, Node4, Node5) is constituted be routing class cluster, by
The attribute value that (Node6, Node7) is constituted is the class cluster of base station, for the class cluster being made of (Node3, Node4, Node5), also
It can be classified according to virtual environment, operating system and procotol, such as Fig. 5 can obtain the class cluster being made of (Node3)
With the class cluster being made of (Node4, Node5).
If an object is classified as a classification, need to divide 7 clusters, at the 0th layer, only there are one clusters, for all void
The object of quasi- Internet resources, the 1st layer of virtual network resource are clustered into 3 clusters according to node type, and the 2nd layer in the 1st layer of base
Continue cluster according to other attributes on plinth and forms 5 clusters, it is 7 clusters that last 3rd layer is continued cluster on the basis of the 2nd layer,
I.e. each object is a cluster, completes cluster.
Tree searching method used in corresponding lookup is inquiry from top to down, and process is as follows:
S11, user initiate resource request;
S12, the attribute and attribute value for judging whether to have in repository user to need, terminate to inquire if not, otherwise into
Row S13;
S13, it is judged whether or not meeting the object of the virtual resource type of user demand, meet user demand if having
The object of virtual network resource type then receives the resource request of user, completes inquiry;
If S14, all branches for having traversed multi-level attribute tree, all do not find the object for meeting the resource of user, then tie
Beam is inquired.
In order to verify a kind of Cyber Virtual Experiment hierarchy clustering method weighted based on comentropy proposed by the present invention in nothing
The validity of resource discovery procedure in gauze network virtualized environment, and virtual network resource is looked into using similarity matching methods
It looks for, object is searched using network node as virtual network resource, resource discovery procedure effect is weighed with time length is searched
Quality, the Cobweb methods for finally D.Fisher et al. being used to propose are compared;Such as Fig. 4, it is shown that side proposed by the present invention
Method and Cobweb methods are applied to the time delays comparison that VNP in resource discovery procedure finds target resource, can from figure
Go out after having used clustering proposed by the present invention, the time of resource discovering will be less than Cobweb, can with the method for the present invention
To efficiently reduce the query time of virtual network resource, to improve the efficiency of resource discovering.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include:ROM, RAM, disk or CD etc..
Embodiment provided above has carried out further detailed description, institute to the object, technical solutions and advantages of the present invention
It should be understood that embodiment provided above is only the preferred embodiment of the present invention, be not intended to limit the invention, it is all
Any modification, equivalent substitution, improvement and etc. made for the present invention, should be included in the present invention within the spirit and principles in the present invention
Protection domain within.
Claims (9)
1. resource discovery method in wireless network virtualized environment, which is characterized in that including:
It virtualizes bottom physical network resource to obtain virtual network resource, by virtual network resource storage to asset repository
In;Virtual network resource is clustered using the categorical attribute hierarchy clustering method weighted based on comentropy, it is empty to generate cluster
Quasi- Internet resources;Virtual network provider finds the virtual network resource that user needs from cluster virtual network resource.
2. resource discovery method in wireless network virtualized environment according to claim 1, it is characterised in that:It is described virtual
Internet resources include n object, and each object includes the attribute value of m groups attribute and attribute.
3. resource discovery method in wireless network virtualized environment according to claim 2, it is characterised in that:Attribute includes
Node type, operating system, virtual environment, source node, destination node, intermediate node, link protocol, Linktype, interface class
Type.
4. resource discovery method in wireless network virtualized environment according to claim 3, which is characterized in that using being based on
The categorical attribute hierarchy clustering method of comentropy weighting carries out cluster to virtual network resource:
S1, input virtual network resource, establish dendrogram as root node using all objects in virtual network resource, enable i=
1;
S2, the similarity measurement for calculating each attribute, are ranked up similarity measurement from high to low, select similarity measurement most
I-th layer as dendrogram of high attribute and its attribute value;
S3, judge whether the object of virtual network resource constitutes the similarity measurement of a cluster or the object in cluster most alone
The attribute value of high attribute is consistent, if it is completes cluster, otherwise output cluster virtual network resource enables i=i+1, returns
S2。
5. resource discovery method in wireless network virtualized environment according to claim 3, which is characterized in that similitude amount
Angle value calculation formula is as follows:
Wherein, SjIndicate attribute AjSimilarity measurement, wjIndicate the weights of comentropy, rjIndicate attribute AjIn virtual network resource
The number occurred in all objects, pjkIndicate attribute AjAttribute value ajkProportion, rjkIndicate attribute value ajkIt is provided in virtual network
The number occurred in all objects in source, cjIndicate attribute AjPossess cjA attribute value.
6. resource discovery method in wireless network virtualized environment according to claim 4, which is characterized in that described information
The weight w of entropyjIt is expressed as:
Wherein, HjIndicate attribute AjComentropy, m indicate virtual network resource in attribute quantity.
7. resource discovery method in wireless network virtualized environment according to claim 4, which is characterized in that described virtual
Internet resources AjComentropy HjIt is expressed as:
8. resource discovery method in wireless network virtualized environment according to claim 4, which is characterized in that attribute Aj's
Attribute value ajkProportion pjkIt is expressed as:
Wherein, n indicates the quantity of virtual network resource.
9. resource discovery method in wireless network virtualized environment according to claim 3, which is characterized in that virtual network
Provider finds the virtual network resource that user needs from cluster virtual network resource:
S11, user initiate resource request;
S12, judge the attribute and attribute value that whether there is user to need in repository, terminate to inquire if not, otherwise carry out
S13;
S13, it is judged whether or not meeting the object of the virtual resource type of user demand, meet the virtual of user demand if having
The object of network resource type then receives the resource request of user, completes inquiry;
If S14, all branches for having traversed multi-level attribute tree, all do not find the object for meeting the resource of user, then terminate to look into
It askes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810165808.3A CN108418715B (en) | 2018-02-28 | 2018-02-28 | Resource discovery method in wireless network virtualization environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810165808.3A CN108418715B (en) | 2018-02-28 | 2018-02-28 | Resource discovery method in wireless network virtualization environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108418715A true CN108418715A (en) | 2018-08-17 |
CN108418715B CN108418715B (en) | 2020-12-18 |
Family
ID=63129164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810165808.3A Active CN108418715B (en) | 2018-02-28 | 2018-02-28 | Resource discovery method in wireless network virtualization environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108418715B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109104725A (en) * | 2018-08-27 | 2018-12-28 | 重庆邮电大学 | The method for preventing joint network from attacking in Tactical Mobile ad hoc network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150229651A1 (en) * | 2005-12-21 | 2015-08-13 | Fiberlink Communications Corporation | Methods and systems for controlling access to computing resources based on known security vulnerabilities |
CN105337834A (en) * | 2015-12-04 | 2016-02-17 | 重庆邮电大学 | Mapping algorithm adopted in wireless network virtualization environment |
CN105630573A (en) * | 2015-10-20 | 2016-06-01 | 浙江大学 | Non-intrusive virtual machine cluster discovery method |
US20170279690A1 (en) * | 2010-05-03 | 2017-09-28 | Pluribus Networks, Inc. | Methods, Systems, and Fabrics Implementing a Distributed Network Operating System |
-
2018
- 2018-02-28 CN CN201810165808.3A patent/CN108418715B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150229651A1 (en) * | 2005-12-21 | 2015-08-13 | Fiberlink Communications Corporation | Methods and systems for controlling access to computing resources based on known security vulnerabilities |
US20170279690A1 (en) * | 2010-05-03 | 2017-09-28 | Pluribus Networks, Inc. | Methods, Systems, and Fabrics Implementing a Distributed Network Operating System |
CN105630573A (en) * | 2015-10-20 | 2016-06-01 | 浙江大学 | Non-intrusive virtual machine cluster discovery method |
CN105337834A (en) * | 2015-12-04 | 2016-02-17 | 重庆邮电大学 | Mapping algorithm adopted in wireless network virtualization environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109104725A (en) * | 2018-08-27 | 2018-12-28 | 重庆邮电大学 | The method for preventing joint network from attacking in Tactical Mobile ad hoc network |
CN109104725B (en) * | 2018-08-27 | 2021-04-20 | 重庆邮电大学 | Method for preventing united network attack in tactical mobile ad hoc network |
Also Published As
Publication number | Publication date |
---|---|
CN108418715B (en) | 2020-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abbas et al. | Streaming graph partitioning: an experimental study | |
Yu et al. | A Web service QoS prediction approach based on time-and location-aware collaborative filtering | |
Yang et al. | Community mining from signed social networks | |
CN101888341B (en) | Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains | |
CN104995870B (en) | Multiple target server arrangement determines method and apparatus | |
Yao et al. | RDAM: A reinforcement learning based dynamic attribute matrix representation for virtual network embedding | |
US10956454B2 (en) | Probabilistically generated identity database system and method | |
CN109688056B (en) | Intelligent network control system and method | |
CN106097107A (en) | For social graph data analysis to determine the internuncial system and method in community | |
Rezvani et al. | Identifying top-k structural hole spanners in large-scale social networks | |
Mo et al. | Event recommendation in social networks based on reverse random walk and participant scale control | |
US10904107B2 (en) | Service resource management system and method thereof | |
CN100534059C (en) | Method for overcastting network router by optimized tree topology | |
Vu et al. | Distributed adaptive model rules for mining big data streams | |
Tong et al. | Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks | |
CN113778683A (en) | Handle identification system analysis load balancing method based on neural network | |
CN109347657A (en) | The virtual data domain construction method of scientific and technological business is supported under SDN mode | |
CN106933954A (en) | Search engine optimization technology is realized based on Decision Tree Algorithm | |
Jia et al. | A privacy-sensitive service selection method based on artificial fish swarm algorithm in the internet of things | |
Zhang | Storage optimization algorithm design of cloud computing edge node based on artificial intelligence technology | |
Xiao et al. | ORHRC: Optimized recommendations of heterogeneous resource configurations in cloud-fog orchestrated computing environments | |
CN108418715A (en) | Resource discovery method in wireless network virtualized environment | |
Liu et al. | A hierarchical blockchain-enabled security-threat assessment architecture for iov | |
CN110113215A (en) | One kind being based on time-weighted overlapping community detection algorithm | |
Amalarethinam et al. | A study on performance evaluation of peer-to-peer distributed databases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |