Efficient Virtual Network Embedding With Node Ranking and Intelligent Link Mapping
Efficient Virtual Network Embedding With Node Ranking and Intelligent Link Mapping
while liv = (svi , dvi ) ∈ Lvi , E s (AL (liv )) denotes a set of all available where, S and h are a feasible solution and hop-count of the link
physical paths from the source AN (svi ) to destination node AL (dvi ). mapping solution of liv respectively. wα and wβ are weight parameters
AL (svi , dvi ) ⊆ E s (AN (svi ), AN (dvi )) (5) equivalent to bandwidth and hop-count factors.
D-ViNE
0.600
0.65
R/C ratio
0.575
0.60 0.550
0.525
0.55
0.500
0.50
0.475
40 50 60 70 80 40 45 50 55 60 65 70 75 80
Traffic load (Erlang) Traffic load (Erlang)
(a) (b)
Fig. 2: (a) VNR Acceptance Ratio (b) Average revenue to cost ratio
0.600
NTANRC-GA
0.575 IDPA 250
NTANRC
G-SP
0.550
Average remaining bandwidth
R-ViNE
Average execution time (ms)
200
D-ViNE
0.525
150
0.500
0.475 100
0.450
50
0.425
0.400 0
40 45 50 55 60 65 70 75 80 NTANRC-GA IDPA NTANRC G-SP RViNE DViNE
Traffic load (Erlang)
(a) (b)
Fig. 3: (a) Average remaining bandwidth (b) Average CPU execution time
topology attributes and global network resources for virtual node [7] Long Gong, Yonggang Wen, Zuqing Zhu, and T. Lee, “Revenue-driven
mapping stage and the intelligent parallel GA-based algorithm for virtual network embedding based on global resource information,” in
link mapping stage to solve online VNE problem. Our proposed 2013 IEEE Global Communications Conference (GLOBECOM), 2013,
NTANRC-GA algorithm outperforms state-of-the-art algorithms in all pp. 2294–2299.
matrices towards performance and operation time. We can conclude [8] L. Gong, H. Jiang, Y. Wang, and Z. Zhu, “Novel location-constrained
virtual network embedding lc-vne algorithms towards integrated node
that NTANRC and intelligent GA-based algorithms are reverse and link mapping,” IEEE/ACM Transactions on Networking, vol. 24,
compliments of each other to achieve an efficient VNE solution. no. 6, pp. 3648–3661, 2016.
In future work, we will investigate simultaneously embedding nodes [9] H. Cao, L. Yang, and H. Zhu, “Novel node-ranking approach and multiple
and links in one-stage mapping utilizing Genetic Algorithm. topology attributes-based embedding algorithm for single-domain virtual
R EFERENCES network embedding,” IEEE Internet of Things Journal, vol. 5, no. 1, pp.
108–120, Feb 2018.
[1] A. Hakiri and P. Berthou, “Leveraging SDN for the 5g networks: Trends, [10] H. Yao, S. Ma, J. Wang, P. Zhang, C. Jiang, and S. Guo, “A continuous-
prospects and challenges,” CoRR, vol. abs/1506.02876, 2015. [Online]. decision virtual network embedding scheme relying on reinforcement
Available: http://arxiv.org/abs/1506.02876 learning,” IEEE Transactions on Network and Service Management,
[2] I. Ishaq, J. Hoebeke, I. Moerman, and P. Demeester, “Internet of things vol. 17, no. 2, pp. 864–875, 2020.
virtual networks: Bringing network virtualization to resource-constrained [11] Z. Yan, J. Ge, Y. Wu, L. Li, and T. Li, “Automatic virtual network
devices,” in 2012 IEEE International Conference on Green Computing embedding: A deep reinforcement learning approach with graph convo-
and Communications, Nov 2012, pp. 293–300. lutional networks,” IEEE Journal on Selected Areas in Communications,
[3] M. Chowdhury, M. R. Rahman, and R. Boutaba, “Vineyard: Virtual vol. 38, no. 6, pp. 1040–1057, 2020.
network embedding algorithms with coordinated node and link mapping,” [12] K. T. D. Nguyen and C. Huang, “An intelligent parallel algorithm for
IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 206–219, online virtual network embedding,” in 2019 International Conference
Feb 2012. on Computer, Information and Telecommunication Systems (CITS), Aug
[4] X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, and J. Wang, 2019, pp. 1–5.
“Virtual network embedding through topology-aware node ranking,” [13] E. W. Zegura, K. L. Calvert, and S. Bhattacharjee, “How to model an
SIGCOMM Comput. Commun. Rev., vol. 41, no. 2, p. 38–47, Apr. 2011. internetwork,” in Proceedings of IEEE INFOCOM ’96. Conference on
[Online]. Available: https://doi.org/10.1145/1971162.1971168 Computer Communications, vol. 2, March 1996, pp. 594–602 vol.2.
[5] M. Feng, J. Liao, J. Wang, S. Qing, and Q. Qi, “Topology-aware virtual [14] N. M. K. Chowdhury and R. Boutaba, “A survey of network
network embedding based on multiple characteristics,” in 2014 IEEE virtualization,” Computer Networks, vol. 54, no. 5, pp. 862 – 876,
International Conference on Communications (ICC), 2014, pp. 2956– 2010. [Online]. Available: http://www.sciencedirect.com/science/article/
2962. pii/S1389128609003387
[6] P. Zhang, H. Yao, and Y. Liu, “Virtual network embedding based on the [15] C. Huang and J. Zhu, “Modeling service applications for optimal parallel
degree and clustering coefficient information,” IEEE Access, vol. 4, pp. embedding,” IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp.
8572–8580, 2016. 1067–1079, Oct 2018.