DOI QR코드

DOI QR Code

Priority-Based Resource Allocation Algorithm for Virtual Network

가상 네트워크를 위한 우선순위 기반 자원 할당 알고리즘

  • Kim, Hak-Suh (Technology Commercialization Division, ETRI) ;
  • Lee, Sang-Ho (Dept. of Software, Chungbuk National University)
  • 김학서 (한국전자통신연구원 RnD사업화실) ;
  • 이상호 (충북대학교 소프트웨어학과)
  • Received : 2016.08.31
  • Accepted : 2016.10.20
  • Published : 2016.10.28

Abstract

Due to the ossification of the Internet, it is difficult to accommodate variety services. One of the efficient solution to this problem is network virtualization. It allows multiple parallel virtual networks to run on the shared physical infrastructure. It needs new resource allocation mechanism to share efficient physical resources. In this paper, we present efficient bandwidth allocation algorithm for virtual network request with high service priority. Our proposed algorithm can withdraw allocated bandwidth from low-level priority virtual network and maintain low-level virtual network service. We evaluated the performance of our proposed algorithm using simulation and found the improvement of approximately 8% acceptance rate.

인터넷의 경직성으로 인하여 다양한 서비스를 제공하기 어려운 문제를 해결하기 위한 가장 효과적인 방법이 네트워크 가상화 방안이다. 공통의 물리 네트워크 자원을 공유하는 가상 네트워크를 효율적으로 생성하기 위해서는 자원을 효율적으로 사용할 수 있는 방안이 필요하다. 이러한 한정된 물리 자원을 효율적으로 사용하기 위하여 본 논문에서는 사용중인 자원이라도 더 높은 서비스 우선순위를 갖는 가상 네트워크에 할당하는 방법을 제안한다. 높은 우선순위의 네트워크 생성 요청을 위하여 운용중인 낮은 우선순위의 가상 네트워크에서 효율적으로 대역폭을 회수하는 알고리즘을 제안한다. 제안하는 대역폭 할당 알고리즘은 낮은 우선순위를 갖는 가상 네트워크에서 서비스 지속성을 유지하면서 할당된 대역폭을 회수할 수 있다. 제안한 알고리즘의 실험을 통하여 약 8%정도의 가상 네트워크 생성 수락률의 향상을 확인하였다.

Keywords

References

  1. N. Chowdhury and R. Boutaba, "A survey of network virtualization," Computer Networks (Elsevier), Vol. 54, No. 5, pp.862-876, 2010. https://doi.org/10.1016/j.comnet.2009.10.017
  2. N. M. Mosharaf Kabir Chowdhury and R. Boutaba, "Network virtualization: State of the art and research challenges," IEEE Comm. Magazine, Vol. 47, No. 7, pp. 20-26, 2009.
  3. M. M. Alam Khan, N. Shahriar, R. Ahmed and R. Boutaba, "Multi-Path Link Embedding for Survivability in Virtual Networks," IIEEE Trans. on Network and Service Management, Vol. 13, No. 2, pp.253-266, 2016. https://doi.org/10.1109/TNSM.2016.2558598
  4. A. Blenk, A. Basta, M. Reisslein, W. Kellerer, "Survey on Network Virtualization Hypervisors for Software Defined Networking," IEEE Comm. Surveys & Tutorials, Vol. 18, No. 1, pp.655-685, 2016. https://doi.org/10.1109/COMST.2015.2489183
  5. Jung-Yul Choi, "A Study on Networking Technology for Cloud Data Centers," Journal of Digital Convergence, Vol. 14, No. 2, pp.235-243, 2016. https://doi.org/10.14400/JDC.2016.14.2.235
  6. Jeong-Kyung Moon, Han Jin Cho, Jin-Mook Kim, "A secure authentication system on wired wireless integrated network using OpenFlow," Journal of Digital Convergence, Vol. 12, No. 4, pp.285-291, 2014. https://doi.org/10.14400/JDC.2014.12.4.285
  7. Cheul-Woo Ro, "Modeling of Virtual Switch in Cloud System," Journal of Digital Convergence, Vol. 11, No. 12, pp.479-485, 2013. https://doi.org/10.14400/JDPM.2013.11.12.479
  8. Y. Zhu and M. Ammar, "Algorithms for Assigning Substrate Network Resources to Virtual Network Components," IEEE INFOCOM 2006, pp.1-12, 2006.
  9. Andreas Fischer, Juan Felipe Botero, Michael Till Beck, Hermann de Meer, Xavier Hesselbach, "Virtual Network Embedding: A Survey," IEEE Comm. Surveys & Tutorials, Vol. 15, No. 4, pp.1888-1906, 2013. https://doi.org/10.1109/SURV.2013.013013.00155
  10. Seung-Joon Seok, Hyeonuk Jeong, "A Study on OpenFlow based Virtual Network Platform for KREONET," Journal of Digital Convergence, Vol. 12, No. 8, pp.309-319, 2014. https://doi.org/10.14400/JDC.2014.12.8.309
  11. Jin-Woo Jung, Jungduk Kim, Myeong-Gyun Song, Chul-Gu Jin, "A study on Development of Certification Schemes for Cloud Security," Journal of Digital Convergence, Vol. 13, No. 8, pp.43-49, 2015. https://doi.org/10.14400/JDC.2015.13.8.43
  12. Bo-Kyung Lee, "A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services", Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 93-99, 2014. https://doi.org/10.15207/JKCS.2014.5.4.093
  13. Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 49-55, 2010.
  14. Yongho Kang, Changbok Jang, Wanjik Lee, Seokyeol Heo, Jooman Kim, "Efficient Method to Support Mobile Virtualization-based Cloud Resource Management," Journal of Digital Convergence, Vol. 12, No. 2, pp.277-283, 2014. https://doi.org/10.14400/JDC.2014.12.2.277
  15. I. Houidi, W. Louati, D. Zeghlache, and S. Baucke, "Virtual Resource Description and Clustering for Virtual Network Discovery," in Proc. IEEE ICC'09 Workshops, Dresden, Germany, pp.1-6, 2009.
  16. A. Belbekkouche, Md. M. Hasan and A. Karmouch, "Resource Discovery and Allocation in Network Virtualization," IEEE Comm. Surveys & Tutorials, Vol. 14, No. 4, pp.1114-1128, 2012. https://doi.org/10.1109/SURV.2011.122811.00060
  17. I. Houidi, W. Louati, and D. Zeghlache, "A distributed virtual network mapping algorithm," 2008 IEEE ICC, Beijing, China, pp.5634-5640, 2008.
  18. A. Haider, R. Potter and A. Nakao, "Challenges in Resource Allocation in Network Virtualization," 20th ITC Specialist Seminar, Vol. 20, pp.22-30, 2009.
  19. Minlan Yu, Yung Yi, Jennifer Rexford and Mung Chiang, "Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration," ACM SIGCOMM CCR, Vol. 38, Issue 2, pp.17-29, 2008.
  20. Yu Yang, Shan-zhi Chen, Xin Li and Yan Wang, "RMap: An Algorithm of Virtual Network Resilience Mapping," WiCOM2011, pp.1-4, 2011.
  21. Xiaohui Wei, Shoufeng Hu, Hongliang Li, Fan Yang and Yue Jin, "A Survey on Virtual Network Embedding in Cloud Computing Centers," The Open Automation and Control Systems Journal, Vol. 6, No. 1, pp.414-425, 2014. https://doi.org/10.2174/1874444301406010414
  22. Haotong Cao, Longxiang Yang, Zeyuan Liu, Mengting Wu, "Exact solutions of VNE: A survey," China Communications, Vol. 13, No. 6, pp.48-62, 2016. https://doi.org/10.1109/CC.2016.7513202
  23. Hwi-Min Choi, Chang-Bok Jang, Joo-Man Kim, "Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM," Journal of Digital Convergence, Vol. 12, No. 10, pp.299-308, 2014.