[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Reliable Resource Scheduling for Network Function Virtualization

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

Network function virtualization (NFV) is designed to reduce high cost of the hardware deployment and maintenance, which will be of great importance in the future resource management. NFV makes it possible for general servers to realize fast deployment of network functions, namely virtual network function (VNF), to achieve on-demand requests. The service request is generally composed of a sequence of VNFs, which is defined as a service chain. Although one node (server) only run one VNF at a time, the VNF could be shared with several VNF chains. How to deploy VNF and share VNF to achieve high usage of both computing and bandwidth resource is a challenge. In this paper, we present the VNF request model and the formal definition of the VNF deployment problem. Then, we investigate the VNF reuse and deployment problem, and propose a greedy strategy to deploy VNFs, so that the system could effectively offer a reliable VNF service. Simulations show that this VNF deployment schema could effectively improve the resource usage compared with other classic algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cankaya, H.C., Kim, I., Jue, J., Kong, J., Zhang, Q., Hong, S., Ikeuchi, T., Xie, W., Wang, X.: Availability-guaranteed virtual optical network mapping with selective path protection. In: Optical Fiber Communication Conference, p. W1B.4 (2016)

    Google Scholar 

  2. Cohen, R., Lewin-Eytan, L., Naor, J.S., Raz, D.: Near optimal placement of virtual network functions. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 1346–1354. IEEE (2015)

    Google Scholar 

  3. Eramo, V., Miucci, E., Ammar, M., Lavacca, F.G.: An approach for service function chain routing and virtual function network instance migration in network function virtualization architectures. IEEE/ACM Trans. Netw. 25, 2008–2025 (2017)

    Article  Google Scholar 

  4. Fan, J., Ye, Z., Guan, C., Gao, X., Ren, K., Qiao, C.: Grep: guaranteeing reliability with enhanced protection in NFV. In: Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, pp. 13–18. ACM (2015)

    Google Scholar 

  5. Andreas, F., Botero, J.F., Beck, M.T., De Meer, H., Hesselbach, X.: Virtual network embedding: a survey. IEEE Commun. Surv. Tutor. 15(4), 1888–1906 (2013)

    Article  Google Scholar 

  6. Hmaity, A., Savi, M., Musumeci, F., Tornatore, M., Pattavina, A.: Virtual network function placement for resilient service chain provisioning. In: 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), pp. 245–252. IEEE (2016)

    Google Scholar 

  7. Khan, M.M.A., Shahriar, N., Ahmed, R., Boutaba, R.: Simple: survivability in multi-path link embedding. In: International Conference on Network and Service Management, pp. 210–218 (2016)

    Google Scholar 

  8. Kuo, T.W., Liou, B.H., Lin, K.C.J., Tsai, M.J.: Deploying chains of virtual network functions: on the relation between link and server usage. In: The 35th Annual IEEE International Conference on Computer Communications. IEEE INFOCOM 2016, pp. 1–9. IEEE (2016)

    Google Scholar 

  9. Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18(1), 236–262 (2015)

    Article  Google Scholar 

  10. Shahriar, N., Ahmed, R., Chowdhury, S., Khan, A., Boutaba, R., Mitra, J.: Generalized recovery from node failure in virtual network embedding. IEEE Trans. Netw. Serv. Manag. PP(99), 1 (2017)

    Google Scholar 

  11. Wang, F., Ling, R., Zhu, J., Li, D.: Bandwidth guaranteed virtual network function placement and scaling in datacenter networks. In: 2015 IEEE 34th International Performance on Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2015)

    Google Scholar 

  12. Ye, Z., Cao, X., Wang, J., Hongfang, Y., Qiao, C.: Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization. IEEE Netw. 30(3), 81–87 (2016)

    Article  Google Scholar 

  13. Zhang, B., Hwang, J., Wood, T.: Toward online virtual network function placement in software defined networks. In: 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), pp. 1–6. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, D., Li, Y., Yin, M., Li, X., Li, H., Qian, Z. (2017). A Reliable Resource Scheduling for Network Function Virtualization. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics