Toward Full Virtualization of the Network Topology

With the emergence of new enabling technologies including software-defined networking and network function virtualization, network virtualization has been reemphasized in recent years, such as network slicing in 5G networks. As an important aspect of network virtualization, network topology virtualization is studied in this work—from traditional network embedding toward full network topology virtualization. By full virtualization, the tenant virtual network can specify whatever network topology without knowing the underlying physical network and get the same experience as building a physical network by his own. Based on the switches with a late-binding key extractor, not only one-to-one and many-to-one mapping, but also one-to-many mappings are enabled in full virtualization of network topologies. In this paper, we propose a restricted differential evolution topology virtualization algorithm to achieve efficient mapping from a virtual network to a physical network in full virtualization. Furthermore, migration approaches are carried out to tackle the mapping failure of the virtual network topology. The extensive evaluation results show that the proposed algorithms can accept 30% more virtual network requests and gain more than 25% profit for physical network operators compared with baseline mechanisms.

[1]  Ellen W. Zegura,et al.  How to model an internetwork , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[2]  Jens Egeblad,et al.  Heuristic approaches for the two- and three-dimensional knapsack packing problem , 2009, Comput. Oper. Res..

[3]  Shuai Ma,et al.  Virtual Network Mapping: A Graph Pattern Matching Approach , 2015, BICOD.

[4]  P. N. Suganthan,et al.  Differential Evolution: A Survey of the State-of-the-Art , 2011, IEEE Transactions on Evolutionary Computation.

[5]  Xiang Cheng,et al.  Energy-Aware Virtual Network Embedding , 2014, IEEE/ACM Transactions on Networking.

[6]  Symeon Papavassiliou,et al.  Socio-aware virtual network embedding , 2012, IEEE Network.

[7]  Susana Sargento,et al.  Optimal virtual network embedding: Energy aware formulation , 2015, Comput. Networks.

[8]  George Varghese,et al.  P4: programming protocol-independent packet processors , 2013, CCRV.

[9]  Raouf Boutaba,et al.  Virtual Network Embedding with Coordinated Node and Link Mapping , 2009, IEEE INFOCOM 2009.

[10]  Raouf Boutaba,et al.  ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping , 2012, IEEE/ACM Transactions on Networking.

[11]  Nerea Toledo,et al.  Toward an SDN-enabled NFV architecture , 2015, IEEE Communications Magazine.

[12]  David K. Smith Network Flows: Theory, Algorithms, and Applications , 1994 .

[13]  Clifford Stein,et al.  Improved approximation algorithms for unsplittable flow problems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[14]  T. V. Lakshman,et al.  Gigabit rate packet pattern-matching using TCAM , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[15]  Mahesh K. Marina,et al.  Network Slicing in 5G: Survey and Challenges , 2017, IEEE Communications Magazine.

[16]  Albert G. Greenberg,et al.  The cost of a cloud: research problems in data center networks , 2008, CCRV.

[17]  Minlan Yu,et al.  Rethinking virtual network embedding: substrate support for path splitting and migration , 2008, CCRV.

[18]  Dan Li,et al.  SVirt: A Substrate-agnostic SDN Virtualization Architecture for Multi-tenant Cloud , 2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP).