2013 IEEE International Conference on Communications Workshops (ICC) 2013
DOI: 10.1109/iccw.2013.6649236
|View full text |Cite
|
Sign up to set email alerts
|

Shared protection in virtual networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…We apply this concept to network virtualization, where we allow the sharing of the redundant virtual link and DC resources among different services. An architecture proposal for redundant virtual resource sharing has been made in [11]. The authors in [12] focus on PIPlayer shared protection and assume the VNet topology to be given.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We apply this concept to network virtualization, where we allow the sharing of the redundant virtual link and DC resources among different services. An architecture proposal for redundant virtual resource sharing has been made in [11]. The authors in [12] focus on PIPlayer shared protection and assume the VNet topology to be given.…”
Section: Related Workmentioning
confidence: 99%
“…The objective function of VNO-Resilience, (11), minimizes the VNet setup cost. The VNet cost consists of the link cost, network node cost and VM cost, where each of them has again two parts, namely the fixed setup cost for having a new element in the VNet and the capacity dependent cost depending on the requested capacity on that element.…”
Section: A Vno-resiliencementioning
confidence: 99%
“…al. next examine resilience in VNs using redundant back-up links (refereed to as shared protection) [12], similar to the approach employed in [71] for physical networks. They use redundant resources shared amongst multiple VNs, accomplished through appropriate information exchange between the PN operator and VN operator.…”
Section: Bui Et Al Investigate Two Methods For Ensuring Resilience In...mentioning
confidence: 99%
“…The latter research forms part of the focus of our research, where the intention is to shed light on some promising trends in cloud computing resilience with completely alternative architectures. This is further discussed in the next section Reactive error ranking and appropriate technique [11] Reactive introspection [12] Proactive high diversity for replica storage [13] Proactive memory stored backups Service Composition Graph based, interdepdency [15] Service Composition Agent-based [16] Low Level Diversity data-centre [17] Quality Adjustment brownout [18] Diversity Replicas Diversity Structure height Organisation VM Scheduling for resilience [20] Disaster Recovery Storage [21] Reactive reset upon fault Hypervisor [22] Proactive Diversity Hypervisor [23] QoR Evaluation Proactive service provisioning Diversity Geo-distribution [25] VM to PHY Mapping Design [26] VM to PHY Mapping Backup links [27] Redundancy VNet backup links III. ALTERNATIVE ARCHITECTURES FOR CLOUD COMPUTING RESILIENCE Some work will choose to encourage a conventionally different cloud architecture in order to provide increased resilience (Fig.…”
Section: State-of-the-art In Cloud Resiliencementioning
confidence: 99%