Towards Efficient Dynamic Virtual Network Embedding Strategy for Cloud IoT Networks
نویسندگان
چکیده
Network Virtualization is one of the most promising technologies for future networking and considered as a critical IT resource that connects distributed, virtualized Cloud Computing services and different components such as storage, servers and application. Network Virtualization allows multiple virtual networks to coexist on same shared physical infrastructure simultaneously. One of the crucial keys in Network Virtualization is Virtual Network Embedding, which provides a method to allocate physical substrate resources to virtual network requests. In this paper, we investigate Virtual Network Embedding strategies and related issues for resource allocation of an Internet Provider(InP) to efficiently embed virtual networks that are requested by Virtual Network Operators(VNOs) who share the same infrastructure provided by the InP. In order to achieve that goal, we design a heuristic Virtual Network Embedding algorithm that simultaneously embeds virtual nodes and virtual links of each virtual network request onto physic infrastructure. Through extensive simulations, we demonstrate that our proposed scheme improves significantly the performance of Virtual Network Embedding by enhancing the long-term average revenue as well as acceptance ratio and resource utilization of virtual network requests compared to prior algorithms.
منابع مشابه
An energy-aware service composition algorithm for multiple cloud-based IoT applications
There has been a shift in research towards the convergence of the Internet-of-Things (IoT) and cloud computing paradigms motivated by the need for IoT applications to leverage the unique characteristics of the cloud. IoT acts as an enabler to interconnect intelligent and self-configurable nodes “things” to establish an efficient and dynamic platform for communication and collaboration. IoT is b...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSurvivable Virtual Network Redesign and Embedding in Cloud Data Center Networks
Survivable Virtual Network Redesign and Embedding in Cloud Data Center Networks Yiheng Chen Today, the cloud computing paradigm enables multiple virtualized services to co-exist on the same physical machine and share the same physical resources, hardware, as well as energy consumption expenses. To allow cloud customers migrate their services on to the cloud side, the Infrastructure Provider (In...
متن کاملVirtual Resources & Blockchain for Configuration Management in IoT
Until now, most systems for Internet of Things (IoT) management, have been designed in a Cloud-centric manner, getting benefits from the unified platform that the Cloud offers. However, a Cloud-centric infrastructure mainly achieves static sensor and data streaming systems, which do not support the direct configuration management of IoT components. To address this issue, a virtualization of IoT...
متن کاملA Survey Paper on Security Protocols of Wireless Sensor Networks
Wireless Sensor Network stands as one of the most emerging technologies combining together sensing, computational capability and communication into minute devices proceeding towards whole new world of simplicity. In this modern era we find intellectuals all over the world discussing on two major growing trends “Internet of things (IoT)” and “Cloud computing”. Now emergence of them may directly ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.09978 شماره
صفحات -
تاریخ انتشار 2018