Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1592648.1592662acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

A virtual network mapping algorithm based on subgraph isomorphism detection

Published: 17 August 2009 Publication History

Abstract

Assigning the resources of a virtual network to the components of a physical network, called Virtual Network Mapping, plays a central role in network virtualization. Existing approaches use classical heuristics like simulated annealing or attempt a two stage solution by solving the node mapping in a first stage and doing the link mapping in a second stage.
The contribution of this paper is a Virtual Network Mapping (VNM) algorithm based on subgraph isomorphism detection: it maps nodes and links during the same stage. Our experimental evaluations show that this method results in better mappings and is faster than the two stage approach, especially for large virtual networks with high resource consumption which are hard to map.

References

[1]
A. Bavier, N. Feamster, M. H., L. Peterson, and J. Rexford. In VINI Veritas: Realistic and Controlled Network Experimentation. In Proc. of SIGCOMM, pages 3--14, 2006.
[2]
L. P. Cordella, P. Foggia, C. Sansone, and M. Vento. An Improved Algorithm for Matching Large Graphs. 3rd IAPR-TC15 Workshop on Graph-based Representations in Pattern Recognition, pages 149--159, 2001.
[3]
L.P. Cordella, P. Foggia, C. Sansone, and M. Vento. Performance Evaluation of the VF Graph Matching Algorithm. Image Analysis and Processing, International Conference on, 0:1172, 1999.
[4]
Emulab - Network Emulation Testbed. http://www.emulab.net/.
[5]
J. Fan and M. H. Ammar. Dynamic Topology Configuration in Service Overlay Networks: A Study of Reconfiguration Policies. In Proc. of IEEE INFOCOMaAZ06, 2006.
[6]
N. Feamster, L. Gao, and J. Rexford. How to Lease the Internet in Your Spare Time. SIGCOMM Comput. Commun. Rev., 37(1):61--64, 2007.
[7]
M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979.
[8]
GENI. http://www.geni.net.
[9]
J. Lu and J. Turner. Efficient Mapping of Virtual Networks onto a Shared Substrate. Technical report, Washington University in St. Louis, 2006.
[10]
Planetlab. https://www.planet-lab.org.
[11]
R. Ricci, C. Alfeld, and J. Lepreau. A Solver for the Network Testbed Mapping Problem. Computer Communications Review, 33(2), April 2003.
[12]
Virtual Network Embedding Simulator. http://www.cs.princeton.edu/ minlanyu/embed.tar.gz.
[13]
W. Szeto, Y. Iraqi, and R. Boutaba. A Multi-Commodity Flow Based Approach to Virtual Network Resource Allocation. In: Proc. IEEE Global Telecommunications Conference (GLOBECOM'03). San Francisco, CA (USA)., 2003.
[14]
J. Turner and D. Taylor. Diversifying the Internet. In Proc. of the Global Telecommunications Conference, pages 755--760, 2004.
[15]
M. Yu, Y. Yi, J. Rexford, and M. Chiang. Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration. SIGCOMM Comput. Commun. Rev., 38(2):17--29, 2008.
[16]
E. W. Zegura, K. L. Calvert, and S. Bhattacharjee. How to Model an Internetwork. In INFOCOM (2), pages 594--602, 1996.
[17]
Y. Zhu and M. Ammar. Algorithms for Assigning Substrate Network Resources to Virtual Network Components. In Proc. of IEEE INFOCOMM06, 2006.

Cited By

View all
  • (2024)MADDPG-Based Deployment Algorithm for 5G Network SlicingElectronics10.3390/electronics1316318913:16(3189)Online publication date: 12-Aug-2024
  • (2024)A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networksJournal of Network and Computer Applications10.1016/j.jnca.2024.103829224(103829)Online publication date: Apr-2024
  • (2023)Security Resource Scheduling Algorithm for Intelligent UAV Communication Network Based on Optimized Subgraph Isomorphism and Link PartitionElectronics10.3390/electronics1209209612:9(2096)Online publication date: 4-May-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
VISA '09: Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
August 2009
112 pages
ISBN:9781605585956
DOI:10.1145/1592648
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. network embedding
  2. resource allocation
  3. subgraph isomorphism
  4. virtual network mapping
  5. virtualization

Qualifiers

  • Research-article

Conference

SIGCOMM '09
Sponsor:
SIGCOMM '09: ACM SIGCOMM 2009 Conference
August 17, 2009
Barcelona, Spain

Acceptance Rates

VISA '09 Paper Acceptance Rate 12 of 36 submissions, 33%;
Overall Acceptance Rate 12 of 36 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)129
  • Downloads (Last 6 weeks)17
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)MADDPG-Based Deployment Algorithm for 5G Network SlicingElectronics10.3390/electronics1316318913:16(3189)Online publication date: 12-Aug-2024
  • (2024)A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networksJournal of Network and Computer Applications10.1016/j.jnca.2024.103829224(103829)Online publication date: Apr-2024
  • (2023)Security Resource Scheduling Algorithm for Intelligent UAV Communication Network Based on Optimized Subgraph Isomorphism and Link PartitionElectronics10.3390/electronics1209209612:9(2096)Online publication date: 4-May-2023
  • (2023)GAL-VNE: Solving the VNE Problem with Global Reinforcement Learning and Local One-Shot Neural PredictionProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599358(531-543)Online publication date: 6-Aug-2023
  • (2023)Towards Efficient Large-Scale Network Slicing: An LP Dynamic Rounding-and-Refinement ApproachIEEE Transactions on Signal Processing10.1109/TSP.2023.324467171(615-630)Online publication date: 2023
  • (2023)Energy-Aware Service Function Chaining Embedding in NFV NetworksIEEE Transactions on Services Computing10.1109/TSC.2022.316232816:2(1158-1171)Online publication date: 1-Mar-2023
  • (2023)Graph Convolutional Network Aided Virtual Network Embedding for Internet of ThingIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.320720510:1(265-274)Online publication date: 1-Jan-2023
  • (2023)AgNeSA: Agility-driven Non-Terrestrial Networks using Small Airborne Swarm2023 IEEE Future Networks World Forum (FNWF)10.1109/FNWF58287.2023.10520493(1-6)Online publication date: 13-Nov-2023
  • (2023)Minimum-cost embedding of virtual networks: An iterative decomposition approachComputer Networks10.1016/j.comnet.2023.109907234(109907)Online publication date: Oct-2023
  • (2023)Locality-aware deployment of application microservices for multi-domain fog computingComputer Communications10.1016/j.comcom.2023.02.012203(180-191)Online publication date: Apr-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media