期刊文献+
共找到117篇文章
< 1 2 6 >
每页显示 20 50 100
Edge computing oriented virtual optical network mapping scheme based on fragmentation prediction
1
作者 何烁 BAI Huifeng +1 位作者 HUO Chao ZHANG Ganghong 《High Technology Letters》 EI CAS 2024年第2期158-163,共6页
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model... As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved. 展开更多
关键词 elastic optical networks virtual optical network fragmentation self-awareness edge computing
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
2
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 virtual network technology computer network security Application research
下载PDF
A Topology-Cognitive Algorithm Framework for Virtual Network Embedding Problem 被引量:7
3
作者 HUANG Tao LIU Jiang +1 位作者 CHEN Jianya LIU Yunjie 《China Communications》 SCIE CSCD 2014年第4期73-84,共12页
The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SD... The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SDN flows,onto a shared substrate network automatically and efficiently.Previous researches mainly focus on developing heuristic algorithms for general topology virtual network.In practice however,the virtual network is usually generated with specific topology for specific purpose.Thus,it is a challenge to optimize the heuristic algorithms with these topology information.In order to deal with this problem,we propose a topology-cognitive algorithm framework,which is composed of a guiding principle for topology algorithm developing and a compound algorithm.The compound algorithm is composed of several subalgorithms,which are optimized for specific topologies.We develop star,tree,and ring topology algorithms as examples,other subalgorithms can be easily achieved following the same framework.The simulation results show that the topology-cognitive algorithm framework is effective in developing new topology algorithms,and the developed compound algorithm greatly enhances the performance of the Revenue/Cost(R/C) ratio and the Runtime than traditional heuristic algorithms for multi-topology virtual network embedding problem. 展开更多
关键词 network virtualization software- defined networking virtual network embedding topology-cognitive
下载PDF
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
4
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources... As a key technology to realize smart services of Internet of Things(IoT), network virtualization technology can support the network diversification and ubiquity, and improve the utilization rate of network resources. This paper studies the service-ori- ented network virtualization architecture for loT services. Firstly the semantic description method for loT services is proposed, then the resource representation model and resource management model in the environment of network virtualization are presented. Based on the above models, the service-oriented virtual network architecture for loT is established. Finally, a smart campus system is designed and deployed based on the service-oriented virtual network architecture. Moreover, the proposed architecture and models are verified in experiments. 展开更多
关键词 Internet of Things network virtualization virtual network resource management virtual network embedding
下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
5
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
下载PDF
A Survey of Embedding Algorithm for Virtual Network Embedding 被引量:6
6
作者 Haotong Cao Shengchen Wu +2 位作者 Yue Hu Yun Liu Longxiang Yang 《China Communications》 SCIE CSCD 2019年第12期1-33,共33页
Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Intern... Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded. 展开更多
关键词 network virtualization virtual network embedding embedding algorithms key future research aspects
下载PDF
Node Ranking Strategy in Virtual Network Embedding: An Overview 被引量:4
7
作者 Shengchen Wu Hao Yin +2 位作者 Haotong Cao Longxiang Yang Hongbo Zhu 《China Communications》 SCIE CSCD 2021年第6期114-136,共23页
Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been w... Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been widely considered as a crucial issue,which is aimed to embed Virtual Networks(VNs)onto the shared substrate networks(SNs)efficiently.Recently,some VNE approaches have developed Node Ranking strategies to drive and enhance the embedding efficiency.Node Ranking Strategy rank/sort the nodes according to the attributes of the node,including both residual local attributes(CPU,Bandwidth,storage,Etc.)and the global topology attributes(Number of neighborhood Nodes,Delay to other nodes,Etc.).This paper presents an overview of Node Ranking Strategies in Virtual Network Embedding,and possible directions of VNE Node Ranking Strategy. 展开更多
关键词 network virtualization virtual network embedding global topology attribute node ranking
下载PDF
Heuristic Solutions of Virtual Network Embedding: A Survey 被引量:15
8
作者 Haotong Cao Han Hu +1 位作者 Zhicheng Qu Longxiang Yang 《China Communications》 SCIE CSCD 2018年第3期186-219,共34页
Network virtualization(NV) is considered as an enabling tool to remove the gradual ossification of current Internet. In the network virtualization environment, a set of heterogeneous virtual networks(VNs), isolated fr... Network virtualization(NV) is considered as an enabling tool to remove the gradual ossification of current Internet. In the network virtualization environment, a set of heterogeneous virtual networks(VNs), isolated from each other, share the underlying resources of one or multiple substrate networks(SNs) according to the resource allocation strategy. This kind of resource allocation strategy is commonly known as so called Virtual Network Embedding(VNE) algorithm in network virtualization. Owing to the common sense that VNE problem is NP-hard in nature, most of VNE algorithms proposed in the literature are heuristic. This paper surveys and analyzes a number of representative heuristic solutions in the literature. Apart from the analysis of representative heuristic solutions, a taxonomy of the heuristic solutions is also presented in the form of table. Future research directions of VNE, especially for the heuristics, are emphasized and highlighted at the end of this survey. 展开更多
关键词 network virtualization virtual net-work embedding NP-HARD heuristic solution
下载PDF
An Exact Virtual Network Embedding Algorithm Based on Integer Linear Programming for Virtual Network Request with Location Constraint 被引量:3
9
作者 Zeheng Yang Yongan Guo 《China Communications》 SCIE CSCD 2016年第8期177-183,共7页
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net... Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%. 展开更多
关键词 network virtualization virtual network embedding exact VNE algorithm integer linear Programming location constraint VNR acceptance ratio
下载PDF
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
10
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
下载PDF
Topology Based Reliable Virtual Network Embedding from a QoE Perspective 被引量:2
11
作者 Peiying Zhang Sheng Wu +2 位作者 Miao Wang Haipeng Yao Yunjie Liu 《China Communications》 SCIE CSCD 2018年第10期38-50,共13页
In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual ne... In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual network embedding problem. Prior studies on this issue only emphasize on maximizing the revenue or minimizing the energy consumption while ignoring the reliability requirements of end-users. In our work, we incorporate the reliability probability into the virtual network embedding process with an aim to improve the Qo S/Qo E of end users from a new perspective. We devised two novel reliable virtual network embedding algorithms called RRW-Max Match and RDCC-VNE based on RW-Max Match and DCC-VNE, respectively. Extensive simulations demonstrated that the efficiency of our proposed algorithms is better than those of two primitive algorithms in terms of the reliability demands, the acceptance ratio of virtual networks and the long-term average revenue. 展开更多
关键词 virtual network embedding reliability probability node mapping procedure link mapping procedure node ranking metric
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:3
12
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security virtual wireless networks Jamming and eavesdropping
下载PDF
Robust Virtual Network Embedding Based on Component Connectivity in Large-Scale Network 被引量:4
13
作者 Xiaojuan Wang Mei Song +1 位作者 Deyu Yuan Xiangru Liu 《China Communications》 SCIE CSCD 2017年第10期164-179,共16页
Virtual network embedding problem which is NP-hard is a key issue for implementing software-defined network which is brought about by network virtualization. Compared with other studies which focus on designing heuris... Virtual network embedding problem which is NP-hard is a key issue for implementing software-defined network which is brought about by network virtualization. Compared with other studies which focus on designing heuristic algorithms to reduce the hardness of the NP-hard problem we propose a robust VNE algorithm based on component connectivity in large-scale network. We distinguish the different components and embed VN requests onto them respectively. And k-core is applied to identify different VN topologies so that the VN request can be embedded onto its corresponding component. On the other hand, load balancing is also considered in this paper. It could avoid blocked or bottlenecked area of substrate network. Simulation experiments show that compared with other algorithms in large-scale network, acceptance ratio, average revenue and robustness can be obviously improved by our algorithm and average cost can be reduced. It also shows the relationship between the component connectivity including giant component and small components and the performance metrics. 展开更多
关键词 large-scale network component connectivity virtual network embedding SDN
下载PDF
Network Virtualization Based Seamless Networking Scheme for Fiber-Wireless (FiWi) Networks 被引量:3
14
作者 DAI Qinglong ZOU Jianfeng SHOU Guochu HU Yihong GUO Zhigang 《China Communications》 SCIE CSCD 2014年第5期1-16,共16页
In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a... In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance. 展开更多
关键词 fiber-wireless networks network virtualization service future network
下载PDF
Diagnosis of Leukemia Disease Based on Enhanced Virtual Neural Network 被引量:1
15
作者 K.Muthumayil S.Manikandan +3 位作者 S.Srinivasan JoséEscorcia-Gutierrez Margarita Gamarra Romany F.Mansour 《Computers, Materials & Continua》 SCIE EI 2021年第11期2031-2044,共14页
White Blood Cell(WBC)cancer or leukemia is one of the serious cancers that threaten the existence of human beings.In spite of its prevalence and serious consequences,it is mostly diagnosed through manual practices.The... White Blood Cell(WBC)cancer or leukemia is one of the serious cancers that threaten the existence of human beings.In spite of its prevalence and serious consequences,it is mostly diagnosed through manual practices.The risks of inappropriate,sub-standard and wrong or biased diagnosis are high in manual methods.So,there is a need exists for automatic diagnosis and classification method that can replace the manual process.Leukemia is mainly classified into acute and chronic types.The current research work proposed a computer-based application to classify the disease.In the feature extraction stage,we use excellent physical properties to improve the diagnostic system’s accuracy,based on Enhanced Color Co-Occurrence Matrix.The study is aimed at identification and classification of chronic lymphocytic leukemia using microscopic images of WBCs based on Enhanced Virtual Neural Network(EVNN)classification.The proposed method achieved optimum accuracy in detection and classification of leukemia from WBC images.Thus,the study results establish the superiority of the proposed method in automated diagnosis of leukemia.The values achieved by the proposed method in terms of sensitivity,specificity,accuracy,and error rate were 97.8%,89.9%,76.6%,and 2.2%,respectively.Furthermore,the system could predict the disease in prior through images,and the probabilities of disease detection are also highly optimistic. 展开更多
关键词 White blood cells enhanced virtual neural networking SEGMENTATION feature extraction chronic lymphocytic leukemia
下载PDF
Efficient Virtual Network Embedding Algorithm Based on Restrictive Selection and Optimization Theory Approach 被引量:2
16
作者 Haotong Cao Zhicheng Qu +1 位作者 Yishi Xue Longxiang Yang 《China Communications》 SCIE CSCD 2017年第10期39-60,共22页
Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One ... Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One main challenge in NV is virtual network embedding(VNE). VNE is a NPhard problem. Previous VNE algorithms in the literature are mostly heuristic, while the remaining algorithms are exact. Heuristic algorithms aim to find a feasible embedding of each VN, not optimal or sub-optimal, in polynomial time. Though presenting the optimal or sub-optimal embedding per VN, exact algorithms are too time-consuming in smallscaled networks, not to mention moderately sized networks. To make a trade-off between the heuristic and the exact, this paper presents an effective algorithm, labeled as VNE-RSOT(Restrictive Selection and Optimization Theory), to solve the VNE problem. The VNERSOT can embed virtual nodes and links per VN simultaneously. The restrictive selection contributes to selecting candidate substrate nodes and paths and largely cuts down on the number of integer variables, used in the following optimization theory approach. The VNE-RSOT fights to minimize substrate resource consumption and accommodates more VNs. To highlight the efficiency of VNERSOT, a simulation against typical and stateof-art heuristic algorithms and a pure exact algorithm is made. Numerical results reveal that virtual network request(VNR) acceptance ratio of VNE-RSOT is, at least, 10% higher than the best-behaved heuristic. Other metrics, such as the execution time, are also plotted to emphasize and highlight the efficiency of VNE-RSOT. 展开更多
关键词 network virtualization virtual network embedding NP-hard heuristic exact restrictive selection optimization theory
下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
17
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol Security virtual Private network Video Conferencing Voice over Internet Protocol JITTER End to End Delay
下载PDF
Virtualized Wireless SDNs:Modelling Delay Through the Use of Stochastic Network Calculus 被引量:1
18
作者 Lianming Zhang Jia Liu Kun Yang 《ZTE Communications》 2014年第2期50-56,共7页
Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. ... Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations. 展开更多
关键词 wireless software defined networks (SDN) wireless network virtualization QoS modelling upper bound delay stochastic networkcalculus
下载PDF
Virtualizing Network and Service Functions: Impact on ICT Transformation and Standardization 被引量:1
19
作者 Bhumip Khasnabish Jie Hu Ghazanfar Ali 《ZTE Communications》 2013年第4期40-46,共7页
Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The s... Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The same concept has recently resurfaced under the guise of cloud computing and virtualized computing.Although cloud computing was originally used in IT for server virtualization,the ICT industry is taking a new look at virtualization.This paradigm shift is shaking up the computing,storage,networking,and ser vice industries.The hope is that virtualizing and automating configuration and service management/orchestration will save both capes and opex for network transformation.A complimentary trend is the separation(over an open interface)of control and transmission.This is commonly referred to as software defined networking(SDN).This paper reviews trends in network/service functions,efforts to standardize these functions,and required management and orchestration. 展开更多
关键词 network function virtualization(NFV) and chaining service function virtualization(SFV) and chaining network virtualization overlay(NVO) software defined networking(SDN) networking economics
下载PDF
A New Reliable System For Managing Virtual Cloud Network
20
作者 Samah Alshathri Fatma M.Talaat Aida A.Nasr 《Computers, Materials & Continua》 SCIE EI 2022年第12期5863-5885,共23页
Virtual cloud network(VCN)usage is popular today among large and small organizations due to its safety and money-saving.Moreover,it makes all resources in the company work as one unit.VCN also facilitates sharing of f... Virtual cloud network(VCN)usage is popular today among large and small organizations due to its safety and money-saving.Moreover,it makes all resources in the company work as one unit.VCN also facilitates sharing of files and applications without effort.However,cloud providers face many issues in managing the VCN on cloud computing including these issues:Power consumption,network failures,and data availability.These issues often occur due to overloaded and unbalanced load tasks.In this paper,we propose a new automatic system to manage VCN for executing the workflow.The new system calledMulti-User Hybrid Scheduling(MUSH)can solve running issues and save power during workflow execution.It consists of three phases:Initialization,virtual machine allocation,and task scheduling algorithms.The MUSH system focuses on the execution of the workflow with deadline constraints.Moreover,it considers the utilization of virtual machines.The new system can save makespan and increase the throughput of the execution operation. 展开更多
关键词 virtual network scheduling reliability VM allocation cloud computing
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部