2015
DOI: 10.1109/tc.2013.2295612
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Efficient Mapping for Fault-Tolerant Virtual Networks

Abstract: Network virtualization provides more flexibility in network provisioning as it offers physical infrastructure providers (PIP) the possibility of smoothly rolling out many separate networks on top of an existing infrastructure. A major challenge is the embedding problem of mapping virtual networks (VNs) onto PIP infrastructure. In the literature, a good deal of research has focused on providing heuristic approaches to this NP-hard problem, usually with the assumption that the PIP infrastructure is operational a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…Sun et al [13] focus on reconfiguring an existing VN with dynamic resource demands. Jarray et al [14] propose two VN protection approaches against any single physical failure in the SN. Di et al [15] investigate the reliable VN embedding problem for obtaining efficient resource sharing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sun et al [13] focus on reconfiguring an existing VN with dynamic resource demands. Jarray et al [14] propose two VN protection approaches against any single physical failure in the SN. Di et al [15] investigate the reliable VN embedding problem for obtaining efficient resource sharing.…”
Section: Related Workmentioning
confidence: 99%
“…By performing the VN embedding in a security-aware way, the risks suffered by the VNs can be minimized, and the additional mechanisms adopted to enhance the security of the VNs can be reduced, resulting in guaranteed security for the VNs and low security overheads. Unfortunately, existing VN embedding algorithms [6][7][8][9][10][11][12][13][14][15][16][17] largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful.…”
Section: Introductionmentioning
confidence: 99%
“…But network virtualizations are not guaranteed to protect the networks from new anomaly users. 3 This paper addresses the identification of new intruders and protects the network from malicious users.…”
Section: Introductionmentioning
confidence: 99%
“…Sensitive information can be sent only to the virtual network group nodes rather than sending it to all the physical network nodes. But network virtualizations are not guaranteed to protect the networks from new anomaly users 3 . This paper addresses the identification of new intruders and protects the network from malicious users.…”
Section: Introductionmentioning
confidence: 99%
“…These issues are commonly referred to as the Virtual Network Embedding (VNE) problem, which has been a major research topic in network virtualization [2]. In the VNE problem, researchers have proposed to improve the availability, survivability, and resiliency of VNs by minimizing the network disconnections and capacity loss due to physical link failures [3], [4] and by minimizing the sum of all working and backup resources of physical nodes and links [5]- [7]. Similar to VNEs, a number of proposals have been made on reliabilityaware resource allocation and redundancy provisioning in data center networks.…”
Section: Introductionmentioning
confidence: 99%