Efficient algorithm for traffic engineering in Cloud-of-Things and edge computing

Abstract We propose a scheme for Cloud-of-Things and Edge Computing (CoTEC) traffic management in multi-domain networks. To direct the traffic flow through the service nodes, we assign a critical egress point for each traffic flow in the CoTEC network using multiple egress routers to optimize the traffic flow; this is known as Egress-Topology (ET). Therefore, the proposed ET incorporates traditional multi-topology routing in the CoTEC network to address the inconsistencies between service overlay routing and the border gateway protocol policies. Furthermore, the proposed ET introduces a number of programmable nodes that can be configured to ease the ongoing traffic on the network and re-align services among the other nodes in multi-domain networks. The results show that our algorithm has a lower execution time and better quality of service than that obtained without using our algorithm, thus allowing us to satisfy the flexibility and efficiency demands of multi-domain networks.

[1]  Bo Yang,et al.  A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks , 2016, IEEE Transactions on Mobile Computing.

[2]  Mikkel Thorup,et al.  Internet traffic engineering by optimizing OSPF weights , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[3]  Reuven Cohen,et al.  A Traffic Engineering Approach for Placement and Selection of Network Services , 2007, IEEE/ACM Transactions on Networking.

[4]  Kimberly C. Claffy,et al.  Their Share: Diversity and Disparity in IP Traffic , 2004, PAM.

[5]  Gang Sun,et al.  A new technique for efficient live migration of multiple virtual machines , 2016, Future Gener. Comput. Syst..

[6]  Sheng Wang,et al.  Multi-topology routing based egress selection approach to achieve hybrid intra-AS and inter-AS traffic engineering , 2015, Int. J. Commun. Syst..

[7]  Piotr Gawlowicz,et al.  Loop Resolution Mechanism for Flow-Aware Multi-Topology Adaptive Routing , 2015, IEEE Communications Letters.

[8]  Victor I. Chang,et al.  User-defined privacy location-sharing system in mobile online social networks , 2017, J. Netw. Comput. Appl..

[9]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[10]  Antonio Capone,et al.  Routing and resource optimization in service overlay networks , 2009, Comput. Networks.

[11]  Victor I. Chang,et al.  The efficient framework and algorithm for provisioning evolving VDC in federated data centers , 2017, Future Gener. Comput. Syst..

[12]  Deep Medhi,et al.  Routing, flow, and capacity design in communication and computer networks , 2004 .

[13]  Lemin Li,et al.  Optimal provisioning for virtual network request in cloud-based data centers , 2012, Photonic Network Communications.

[14]  Xiaoning Zhang,et al.  Power-Efficient Provisioning for Online Virtual Network Requests in Cloud-Based Data Centers , 2015, IEEE Systems Journal.

[15]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[16]  Renata Teixeira,et al.  Impact of hot-potato routing changes in IP networks , 2008, TNET.

[17]  Liviu Iftode,et al.  Balanced traffic routing: Design, implementation, and evaluation , 2016, Ad Hoc Networks.

[18]  Lili Qiu,et al.  Overlay Node Placement: Analysis, Algorithms and Impact on Applications , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[19]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[20]  Raouf Boutaba,et al.  Service Engineering for Inter-Domain Overlay Networks , 2009, 2009 IEEE International Conference on Communications.

[21]  Lemin Li,et al.  A cost efficient framework and algorithm for embedding dynamic virtual network requests , 2013, Future Gener. Comput. Syst..

[22]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..