Next Article in Journal
Morphological Computation: Nothing but Physical Computation
Previous Article in Journal
Associating an Entropy with Power-Law Frequency of Events
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Virtual Network Embedding Based on Topology Potential

Information and Navigation college, Air Force Engineering University, Xi’an 710077, Shaanxi, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(12), 941; https://doi.org/10.3390/e20120941
Submission received: 29 October 2018 / Revised: 30 November 2018 / Accepted: 6 December 2018 / Published: 7 December 2018

Abstract

:
To improve the low acceptance ratio and revenue to cost ratio caused by the poor match between the virtual nodes and the physical nodes in the existing virtual network embedding (VNE) algorithms, we established a multi-objective optimization integer linear programming model for the VNE problem, and proposed a novel two-stage virtual network embedding algorithm based on topology potential (VNE-TP). In the node embedding stage, the field theory once used for data clustering was introduced and a node embedding function designed to find the optimal physical node. In the link embedding stage, both the available bandwidth and hops of the candidate paths were considered, and a path embedding function designed to find the optimal path. Extensive simulation results show that the proposed algorithm outperforms other existing algorithms in terms of acceptance ratio and revenue to cost ratio.

1. Introduction

In recent years, network virtualization technology has mainly been of academic interest. It is not only a key technology to solve the ossification problem of the Internet [1,2,3], but also a core technology in cloud computing [4,5,6]. In the future Internet, through network virtualization, the current Internet service providers will be decoupled into two independent entities: infrastructure providers and service providers. Infrastructure providers are responsible for deploying and managing the physical network, while service providers are responsible for assembling, installing, and managing virtual networks and offering services through them. Such an Internet paradigm makes it possible to introduce new network architectures, protocols, and services without changing the existing network, effectively supporting the innovation of network technologies and overcoming the Internet ossification problem [7]. In the cloud computing environment, through network virtualization, users can be provided with flexible, scalable, and self-service resource leasing services, which can effectively promote the development of cloud computing.
As a resource allocation problem in the process of network virtualization, virtual network embedding (VNE) is one of the major challenges in network virtualization [8]. Because VNE is limited by node resource constraints, link resource constraints, access control conditions, and random arriving of virtual network requests (VNRs), the solution to the VNE problem is extremely complex. It has been proved that the VNE problem is NP-hard [9]. Although the VNE problem can be solved by exact solutions [10,11], when the instances of the problem are large, it is difficult to solve it in a limited time.
In order to make a tradeoff between the solution quality and the execution time, most scholars decompose the VNE problem into two stages: node embedding and link embedding, and use heuristic-based algorithms to solve it. In these two-stage VNE algorithms, different kinds of heuristic approaches are usually used in the node embedding stage, which are also the main contributions of these algorithms; and the shortest path, k-shortest path or multiple commodity flow algorithm is usually adopted in the link embedding stage.
In the node embedding stage, most of the early scholars [12,13,14] only adopted simple greedy strategies to embed virtual nodes onto the physical nodes with the highest local resource. Since these algorithms only consider the resources of the nodes themselves, the topology attributes of adjacent nodes are neglected, which results in poor coordination of node embedding and link embedding, thus decreasing the performances of the VNE algorithms.
In order to better solve the VNE problem, some scholars have recently proposed several coordinated two-stage VNE algorithms, which consider link embedding when solving node embedding. Zhao et al. [15] take the neighborhood relationship between nodes into consideration in the node embedding stage, which can shorten the link embedding distance and improve the acceptance ratio and revenue to cost ratio. Ding et al. [16] borrow the betweenness centrality in graph theory to rank the nodes in virtual networks, and sort the nodes of the physical network according to the correlation properties between the former selected and unselected nodes. In this way, node embedding and link embedding are well coordinated. Similar to literature of ref. [16], Zhang et al. [17] propose a novel node importance evaluating method with the purpose of choosing the most important physical node so as to facilitate the subsequent link embedding. The main contributions of their work are the definitions of the node degree and clustering coefficient information. Inspired by the successful PageRank algorithm used by Google’s search engine, the Markov Random Walk Model [18] and the Markov Reward Model [19] are introduced to measure the importance of nodes in a network. In their algorithms, each node is ranked based not only on its local resources but also on the resources of the nodes from which it can reach. In this way, the information about the links, necessary for the link embedding stage, is also considered during the node embedding stage. In recent years, multi-criteria decision analysis methods such as TOPSIS [20] and ELECTRE [21] have been introduced into VNE algorithms. In these algorithms, first, the authors define several attributes of nodes from both local and global perspectives, and then use a multi-criteria decision analysis method to rank the nodes in the network. In this way, the most appropriate physical nodes will be selected to host the virtual nodes, which will facilitate subsequent link embedding. Though, in all of the above methods, the network topology structure is used to evaluate the resource capabilities of nodes, which makes the results of node ranking more reasonable and improves the embedding performance of VNRs, in our opinion, some special topological attributes of nodes can be further explored and utilized to improve the embedding performance of VNRs.
Different from the above research, in this paper, we consider the topological importance of nodes in the network from a new perspective. In physics, the field represents the distribution of a physical quantity in space, which can be used to describe the interaction between non-contact objects. Gan et al. [22] introduced field theory into abstract data space. In their paper, the importance of data objects can be clarified by describing the virtual interactions among data objects. Inspired by the above theory, we introduced the field theory into the VNE process and used the topology potential to measure the topology importance of nodes.
The main innovations and contributions of this paper can be summarized as follows:
(1)
To describe the topology importance of a node in a network from a global perspective, a new topological attribute named “node topology potential” is defined, which can be utilized to further improve the embedding performance of VNRs.
(2)
A novel virtual network embedding algorithm based on topology potential (VNE-TP) is proposed. The VNE-TP algorithm considers the importance of the nodes in terms of topology and resources in the node embedding stage, and considers the available bandwidth and path length in the link embedding stage.
(3)
The simulation results are provided to validate the performance of the VNE-TP algorithm. It can be demonstrated that the VNE-TP algorithm outperforms the existing algorithms in terms of acceptance ratio and revenue to cost ratio.
The rest of this paper is organized as follows. In Section 2, we present the network model and the evaluation indicators of VNE. In Section 3, we give a multi-objective optimization integer linear programming formulation for the VNE problem. In Section 4, we analyze the topology importance of each node in a network, and define the topology potential of a node and the topology potential entropy of the network. In Section 5, we propose our novel algorithm. In Section 6, we perform a broad simulation of the algorithms and discuss the simulation results. Finally, in Section 7, we conclude this paper.

2. Network Model and Evaluation Indicators

2.1. Physical Network

The physical network can be modeled as a weighted undirected graph G p = ( N p , E p , A n p , A e p ) , where N p is the set of physical nodes, E p is the set of physical links, A n p is the set of the attributes of physical nodes, and A e p is the set of the attributes of physical links. For a given physical node n p N p , its attributes include the available CPU (Central Processing Unit) resource and location information, denoted as c p u ( n p ) and l o c ( n p ) , respectively. Similarly, for a given physical link e p E p , its attribute is the available bandwidth, denoted as b ( e p ) .

2.2. Virtual Network Request

Similar to the physical network, the virtual network can also be modeled as a weighted undirected graph G v = ( N v , E v , C n v , C e v ) , where N v represents the set of virtual nodes, E v represents the set of virtual links, C n v represents the set of the constraint attributes of virtual nodes, and C e v represents the set of the constraint attributes of virtual links. For a given virtual node n v N v , its attributes include the required CPU resource and location information, denoted as c p u ( n v ) and l o c ( n v ) , respectively. For a given virtual link e v E v , its attribute is the required bandwidth, denoted as b ( e v ) . Based on the virtual network model above, the k-th arrived VNR can be considered as V N R k = ( G v , t a , t e ) , where G v represents the virtual network topology, t a represents the arrive time of the VNR, and t e represents the end time of the VNR.

2.3. Evaluation Indicators

The optimization goal of VNE is to efficiently and reasonably utilize the physical network resources in the entire VNE process. In this paper, we use acceptance ratio and revenue to cost ratio as the evaluation indicators for the VNE algorithm.
The VNE acceptance ratio is the ratio of the number of successfully embedded VNRs to the number of total arrived VNRs in a period of time, which can be defined as Formula (1).
η ( T ) = t = 0 T | V N R s u c c | t = 0 T | V N R a r r i |
where V N R s u c c represents the set of VNRs which have been successfully embedded during the time from 0 to T , and V N R a r r i represents the set of VNRs which have arrived during the time from 0 to T. We can see that the higher the acceptance ratio, the more are VNRs embedded successfully in a certain period of time.
The revenue of accepting V N R k = ( G v , t a , t e ) at time t refers to the total resource it demands, which can be defined as Formula (2).
R ( G v , t ) = n s N v c p u ( n s ) + e s t E v b ( e s t )
The cost of accepting V N R k = ( G v , t a , t e ) at time t is the total physical resource allocated to it, which can be defined as Formula (3).
C ( G v , t ) = n s N v n i N p x i s c p u ( n s ) + e s t E v e i j E p y i j s t b ( e s t )
where x i s is a binary variable denoting the embedding relation between the virtual node n s and the physical node n i , and y i j s t is a binary variable denoting the embedding relation between the virtual link e s t and the physical link e i j . The definitions of x i s and y i j s t are shown in Formulas (4) and (5).
x i s = { 1 ,  if virtual node  n s  is embedded onto physical node  n i 0 ,  otherwise
y i j s t = { 1 ,  if virtual link  e s t  is routed through physical link  e i j 0 ,  otherwise
The revenue to cost ratio is defined as the ratio of the embedding revenue to the embedding cost in a certain period of time, as shown in the Formula (6).
φ ( T ) = t = 0 T G v V N R s u c c R ( G v , t ) t = 0 T G v V N R s u c c C ( G v , t )
where we can see that φ ( T ) reflects the resource utilization efficiency of the physical network. The larger φ ( T ) , the higher is the utilization efficiency of the physical resource.

3. Problem Formulation

3.1. Objective Functions

For the online VNE problem, the arrival time, resource requirements, and time of life of the VNRs are unknown. When a VNR arrives, if the embedding objective is only to reduce the embedding cost, more bottleneck links may be generated in the physical network, which will reduce the ability of the physical network to accept subsequent VNRs; if the embedding objective is only to reduce the number of bottleneck links in the physical network, a physical path with more hops may be required to host each embedded virtual link, which will increase the embedding cost of the VNR. Therefore, in this paper, the VNE problem is modeled as a multi-objective integer linear programming model, whose objective functions are to minimize the embedding cost of the VNR as well as the number of bottleneck links in the physical network, such as Formula (7) and Formula (8).
min n s N v n i N p x i s c p u ( n s ) + e s t E v e i j E p y i j s t b ( e s t )
min e p E p b l ( e p )
In Formula (8), b l ( e p ) is a binary variable denoting whether e p is a bottleneck link. b l ( e p ) is 1 if the physical link e p is a bottleneck link, and 0 otherwise. In this paper, when the utilization of a physical link is more than 80%, we consider it to be a bottleneck link.

3.2. Node Constraints

First, the remaining available CPU resource of a physical node n i should not be less than the CPU resource requirement of the virtual node n s which is embedded onto n i , such as Formula (9). Second, the Euclidean distance between the physical node and its hosted virtual node should meet the requirements of the virtual node for distance, such as Formula (10). Third, each physical node can only host at the most one virtual node in the same VNR, such as Formula (11). Fourth, each virtual node can only be embedded onto one physical node, such as Formula (12). Finally, the value of x i s , which is used to represent the node embedding relationship, should be 0 or 1, such as Formula (13).
n s N v , n i N p , x i s c p u ( n s ) c p u ( n i )
n s N v , n i N p , x i s d i s ( l o c ( n s ) , l o c ( n i ) ) D ( n s )
n i N p , n s N v x i s 1
n s N v , n i N p x i s = 1
n s N v , n i N p , x i s { 0 , 1 }

3.3. Link Constraints

First, the available bandwidth of a physical link e i j should not be less than the bandwidth requirement of the virtual links which are embedded onto e i j , such as Formula (14). Second, it is necessary to consider the connectivity constraints of the link to ensure that every virtual link is embedded onto a valid physical path, such as Formula (15). Finally, the value of y i j s t , which is used to represent the link embedding relationship, should be 0 or 1, such as Formula (16).
e i j E p , e s t E v y i j s t b ( e s t ) b ( e i j )
n i N p , e s t E v , n j N p y i j s t n j N p y j i s t = x i s x i t
e s t E v , e i j E p , y i j s t { 0 , 1 }

4. Node Topology Potential and Network Topology Potential Entropy

At present, there are many typical indicators to evaluate the topology importance of nodes in a network, such as betweenness centrality, degree centrality, and closeness centrality [16,20] etc. However, these indicators either have strong one-sidedness, or emphasize the role of a single node. In physics, the concept of field is used to describe the interaction between two non-contact objects, such as the gravity field and the electromagnetic field. Inspired by the idea above, the field theory was introduced into the abstract data field [22], and the topology potential proposed to assess the importance of the nodes in complex networks [23].
Based on the existing researches, in order to assess the topology importance of each node in a network, we assume that every node in the network creates a virtual field around itself, overlapping with fields of other nodes, so that each node has a different topology potential. Considering that the topology importance of each node is more affected by the performance of its neighboring nodes, we use the Gaussian function that is able to represent the short-range field well to describe the topology potential for each node in the space around it. The topology potential of node n m in a network can be formalized as Formula (17).
T P ( n m ) = k = 1 | N | c ( n k ) exp [ ( d i s ( n m , n k ) σ ) 2 ]
where | N | represents the number of nodes in the network; c( n k ) represents the topology weight of node nk; d i s ( n m , n k ) represents the shortest distance between node n m and n k ; parameter σ is used to control the influence region of each node, called distance factor. Considering that the bandwidth of the outgoing links of a node is larger, its influence on the surrounding nodes is stronger, so the node’s topology weight is defined as Formula (18).
c ( n k ) = e E ( n k ) b ( e )
where E ( n k ) represents the adjacent link set of node n k .
According to the property of the Gaussian function, when the value of σ is large, the influence range of every node in the network is larger; when the value of σ is small, the influence range of every node in the network is smaller. In order to select an appropriate value of σ , the topology potential entropy of the network is defined as Formula (19), and the value of σ is obtained by setting the topology potential entropy to be minimum.
H T P = m = 1 | N | T P ( n m ) k = 1 | N | T P ( n k ) ln ( T P ( n m ) k = 1 | N | T P ( n k ) )

5. VNE-TP Algorithm Design

According to the literature [24,25], the multi-objective integer linear programming model constructed in Section 3 belongs to the NP-hard problem. When the problem size is small, tools such as GLPK and CPLEX [10,11] can be used for an exact solution. When the problem size is large, it is difficult to find the optimal solution within a limited time. To solve this problem, a novel two-stage heuristic algorithm named VNE-TP was designed as in this section.

5.1. Node Embedding Algorithm

In the node embedding stage, firstly, the embedding sequence of virtual nodes is constructed according to the topology potential and resource requirement of virtual nodes, and then the virtual nodes are embedded sequentially onto the physical nodes with the best comprehensive ability. The specific steps of the node embedding algorithm are as follows.
Step 1: Calculate the embedding weight of the virtual nodes. Considering that the virtual node with higher topology potential and more resource requirement should be priority embedded because of the limited resource of the physical nodes, the embedding weight of a virtual node is defined as Formula (20).
E W ( n v ) = T P ( n v ) R ( n v )
where R ( n v ) represents the resource requirement of virtual node n v . The definition of R ( n v ) is shown in Formula (21).
R ( n v ) = c p u ( n v ) e v E ( n v ) b ( e v )
where E ( n v ) represents the adjacent link set of virtual node n v .
Step 2: Construct the embedding sequence of virtual nodes. In order to make the virtual nodes near each other in the virtual network remain close to each other after embedding onto the physical nodes, which reduces the embedding cost in the link embedding stage, we construct the virtual node embedding sequence as follows. First, we select the virtual node with maximum embedding weight value as the root node and run the breadth-first search algorithm. Second, we sort the remaining virtual nodes by the distances from themselves to the root node in ascending order. Finally, if there are two virtual nodes with equal distance to the root node, then we sort them by the embedding weight in descending order.
Step 3: Calculate the set of candidate physical nodes for the virtual node to be embedded. For the i-th virtual node n i v in the embedding sequence, according to the node constraints of Formulas ((9)–(13)), select its set of candidate physical nodes, that is Ω ( n i v ) .
Step 4: Complete the embedding of the i-th virtual node n i v . For n p Ω ( n i v ) , considering the topology attribute, resource ability attribute, and adjacency relationship, we introduce the node embedding function (NEF) in this paper and embed the virtual node n i v to the physical node whose NEF value is maximum. The definition of NEF is as Formula (22).
N E F ( n p ) = T P ( n p ) R ( n p ) D S ( n p ) + ε
where R ( n p ) represents the resource capability of the physical node n p , D S ( n p ) represents the hops from n p to the physical nodes which have hosted the neighbors of n i v , and ε = 1 0 4 is a parameter to prevent the dividend being zero. The definition of R ( n p ) is shown in Formula (23).
R ( n p ) = c p u ( n p ) e p E ( n p ) b ( e p )
where E ( n p ) represents the adjacent link set of the physical node n p .
The reasons why NEF is selected as the physical node selection metric are mainly due to the following points. First, a physical node with larger T P ( n p ) value indicates that its topology potential is higher, and selecting it for embedding the virtual node will facilitate the subsequent virtual link embedding. Second, a physical node with larger R ( n p ) value indicates that the node’s available resource is higher, and embedding the virtual node onto it will balance the node stress of the physical network. Finally, a physical node with smaller D S ( n p ) value indicates that there are fewer hops between it and the physical nodes that have hosted virtual nodes, and the embedding virtual node onto it will reduce the embedding cost of the subsequent virtual link embedding.
Step 5: Skip to step 3 and continue if the embedding of all virtual nodes is not completed.
The detail pseudo-code of the node embedding algorithm is given by Algorithm 1.
Algorithm 1 Node Embedding Algorithm of VNE-TP
Input: Physical network G p , virtual network G v
Output: Node_Embedding_List
  • for every virtual node n v N v do
  •  Calculate E W ( n v )
  • end for
  • Construct the embedding sequence of virtual nodes by running the breadth-first search algorithm, and record the result into VirtualNodeList
  • for i = 1 : | N v | do
  •   Calculate Ω ( n i v ) for the i - t h virtual node in the VirtualNodeList
  •   if Ω ( n i v ) then
  •    return NODE_EMBEDDING_FAILED
  •   else
  •    for j = 1 : | Ω ( n i v ) | do
  •     Calculate N E F ( n j p ) for the j - t h physical node in Ω ( n i v )
  •    end for
  •    Embed n i v to n p with the largest NEF value, and record the result into Node_Embedding_List
  •   end if
  • end for
  • returnNode_Embedding_List

5.2. Link Embedding Algorithm

In the link embedding stage, the embedding sequence of the virtual links is constructed according to the bandwidth requirement of the virtual links first in descending order, and then the virtual link is embedded onto the physical path with the best comprehensive capability. The specific steps of the link embedding algorithm are as follows.
Step 1: Construct the embedding sequence of the virtual links. According to the bandwidth requirements, the virtual links are arranged in descending order. Thus, it is possible to preferentially embed the virtual links which are difficult to be embedded.
Step 2: Calculate the set of candidate physical paths for the virtual link to be embedded. For the i - t h virtual link e i s t in the embedding sequence, first delete physical links that do not satisfy bandwidth constraint in the physical network, then select its set of candidate physical paths Ω ( e i s t ) by adopting the k-shortest path [26] algorithm.
Step 3: Complete the embedding of the i - t h virtual link e i s t . Considering that the virtual link embedding should be helpful for coordinating the physical link resource consumption and reducing the embedding cost, we introduce the path embedding function (PEF) in this paper and embed the virtual link e i s t to the physical path whose PEF value is maximum. The definition of PEF is as Formula (24).
P E F ( p ) = b ( p ) b ( e i s t ) 1 h o p s ( p )
where b ( p ) represents the available bandwidth of the physical path p , and h o p s ( p ) represents the hops of the physical path p .
The reasons why PEF is selected as the physical path selection metric are as follows. First, the physical path with larger b ( p ) value indicates that the path’s available resource is higher, and the embedding virtual link onto it will balance the link stress of the physical network, thereby reducing the number of bottleneck links in the physical network. Second, the physical path with smaller h o p s ( p ) value indicates that the path has fewer hops, and the embedding virtual link onto it will reduce the embedding cost.
Step 4: Skip to step 2 and continue if the embedding of all virtual links is not completed.
The detail pseudo-code of the link embedding algorithm is given by Algorithm 2.
Algorithm 2 Link Embedding Algorithm of VNE-TP
Input: Physical network G p , virtual network G v , Node_Embedding_List
Output: Link_Embedding_List
  • Construct the embedding sequence of virtual links, and record the result into VirtualLinkList
  • for i = 1 : | E v | do
  •   Calculate Ω ( e i s t ) for the i - t h virtual link in the VirtualLinkList
  •   if Ω ( e i s t ) then
  •    return LINK_EMBEDDING_FAILED
  •   else
  •    for j = 1 : | Ω ( e i s t ) | do
  •     Calculate P E F ( p j ) for the j - t h physical path in Ω ( n i v )
  •    end for
  •    Embed e i s t to p with the largest PEF value, and record the result into Link_Embedding_List
  •   end if
  • end for
  • returnLink_Embedding_List

6. Performance Evaluation

6.1. Simulation Environments

6.1.1. Network Settings

In this paper, similar to literature of ref. [20], we use the GT-ITM tool [27] to generate the topologies of the physical and virtual networks. The physical network is set to have 100 nodes and 500 links, and the positions of the physical nodes follow a random distribution in a scope of 1000×1000. The initial CPU resource and bandwidth resource of the physical nodes and links are uniformly distributed between 50 and 100.
For each VNR, the number of virtual nodes is uniformly distributed between four and eight, and the average link connectivity rate is set to be 50%. The positions of the virtual nodes follow a random distribution in the scope of 1000 × 1000. The CPU resource requirement and bandwidth resource requirement of virtual nodes and links are uniformly distributed between 1 and 50. The arrival rate of VNRs follows a Poisson process, and the lifetime of each VNR follows an exponential distribution with an average of 500 time units. The total time of every simulation is 30,000 time units. In order to reduce the influence of random factors on the experimental results, each simulation is carried out 10 times, and the average values are taken as the final results.

6.1.2. Comparison Methods

In this paper, we set the position constraint to be D ( n s ) = 400 and compared three algorithms that are listed in Table 1. VNE-TP is our proposed algorithm, VNE-TOPSIS and VNE-MCRR are the algorithms proposed in the literature [20] and [19] respectively.

6.2. Evaluation Results

6.2.1. Performance Comparison

When the arrival rate of VNRs follows a Poisson process with a mean arrival rate of 0.06 VNR per each time unit, the comparison results of the three algorithms are shown in Figure 1.
As shown in Figure 1a, the VNE-TP algorithm has the highest acceptance ratio during the entire simulation time. In the initial time period, the acceptance ratio of the three algorithms is relatively high, because the available resources of the physical network are initially abundant. With increasing simulation time and the arriving of the VNRs, the available resources of the physical network gradually decrease, and the acceptance ratio of the three algorithms decreases gradually and tends to be stable after about 10,000 time units. When the simulation time reaches 30,000 time units, the acceptance ratio of the VNE-TP algorithm is 75.06%, which is about 9.4% and 13.9% higher than that of VNE-MCRR and VNE-TOPSIS algorithms respectively. Compared with other algorithms, the VNE-TP algorithm takes more consideration of the topology attributes of the nodes in the node embedding stage, and takes a comprehensive consideration of the bandwidth and hops of the path in the link embedding stage. These measures make the node embedding more reasonable and the link embedding more optimized, so the acceptance ratio is increased.
As can be seen from Figure 1b, the VNE-TP algorithm has the highest revenue to cost ratio during the entire simulation time. In the initial stage of the simulation, with the increase of time, the revenue to cost ratio of the three algorithms is decreased. The reason is that the available resources of the physical network is decreased with the increased number of arrived VNRs, and the virtual links have to be embedded onto the physical paths with more hops, which make the embedding cost increase. When the simulation time is longer than 10,000 time units, the arrival rate and leave rate of VNRs tend to be the same, so the available resources of the physical network tend to be stable, and the revenue to cost ratio also tends to be stable. In the stable situation, the revenue to cost ratio of VNE-TP algorithm is about 38.54%, which is about 14.1% and 10.9% higher than that of VNE-MCRR and VNE-TOPSIS algorithms respectively.

6.2.2. Evaluation with Different Arrival Rate of VNRs

In order to further verify the performance of the proposed algorithm, we investigated the influence of the arrival rate of VNRs on the performance of it. When the arrival rate of VNRs follows a Poisson process with a mean arrival rate of 0.02, 0.04, 0.06, 0.08, 0.10, 0.12, and 0.14 VNR per each time unit, respectively, the performance of the three algorithms compared in this paper can be seen in Figure 2.
From Figure 2a, we can see that the VNE-TP algorithm has the highest acceptance ratio in all the arrival rates of VNRs. For example, when the arrival rate is 0.14 VNR per each time unit, the acceptance ratio of VNE-TP algorithm is about 45.39%, which is about 11.4% and 14.9% higher than that of VNE-MCRR and VNE-TOPSIS algorithms respectively. In addition, we can see that the acceptance ratio of the three algorithms is decreased with the increase of the arrival rate of VNRs. This is because the higher arrival rate of VNRs, the larger amount of arrived VNRs within the same time, and the available resources of the physical network are limited. All of these will result in a large amount of VNRs which cannot be embedded successfully.
From Figure 2b, we can see that the VNE-TP algorithm has the highest revenue to cost ratio in all the arrival rates of VNRs. For example, when the arrival rate is 0.14 VNR per each time unit, the revenue to cost ratio of VNE-TP algorithm is about 36.49%, which is about 10.2% and 10.0% higher than that of VNE-MCRR and VNE-TOPSIS algorithms respectively. When the arrival rate of VNRs is less than 0.10 VNR per each time unit, the revenue to cost ratio of the three algorithms decreases with the increase of the arrival rate of VNRs. However, when the arrival rate of VNRs is more than 0.10 VNR per each time unit, the revenue to cost ratio of the three algorithms tends to be stable. The reasons for this result are as follows:
(1)
As the arrival rate of VNRs increases, the number of arrived VNRs increases. In order to accept as many VNRs as possible, the virtual links have to be embedded onto the physical paths with more hops, which make the revenue to cost ratio decrease.
(2)
When the arrival rate of VNRs increases to a certain extent, the number of VNRs that the physical network can host no longer increases as the arrival rate of VNRs increases. Therefore, the revenue to cost ratio tends to be stable.

6.2.3. Evaluation with Different Access Control Conditions

The VNE-TP algorithm has greedy characteristics in nature, which accepts all the VNRs that satisfy the constraints. If the revenue to cost ratio of a VNR is too low, it will take up more physical resources, thereby affecting the acceptance ratio and the revenue to cost ratio of subsequent VNRs. Therefore, in order to further optimize the performance of VNE-TP algorithm, in this paper we studied the impact of access control conditions on the performance of the VNE-TP algorithm by considering the revenue to cost thresholds as the access control conditions. The strategy of the access control is to proactively reject the VNRs whose revenue to cost ratios are lower than the threshold. The simulation results are listed in Figure 3.
From Figure 3a, we can see that the acceptance ratio of the VNE-TP algorithm increases a little with the increase of the revenue to cost threshold first and then decreases rapidly. When the revenue to cost threshold is 0.25, the VNE-TP algorithm has the highest acceptance ratio of about 78.15%, which is about 4.1% higher than that of the VNE-TP algorithm without considering the access control.
From Figure 3b, we can see that the revenue to cost ratio of the VNE-TP algorithm increases with the increase of the revenue to cost threshold. When the revenue to cost threshold is 0.25, the VNE-TP algorithm has a revenue to cost ratio of about 40.94%, which is about 6.2% higher than that of the VNE-TP algorithm without considering the access control.

7. Conclusions

In this paper, the VNE problem was investigated by introducing field theory in physics. A multi-objective integer linear programming model for VNE was constructed and a two-stage coordinated heuristic VNE algorithm, named VNE-TP, proposed. Simulation results show that the acceptance ratio and the revenue to cost ratio of the VNE-TP algorithm are about 10% higher than the existing VNE algorithms in all of the simulation conditions. The influence of the access control condition on the performance of VNE-TP algorithm was analyzed, and it was concluded that by selecting an appropriate revenue to cost threshold, the acceptance ratio and the revenue to cost ratio of the VNE-TP algorithm can be further improved.
However, we did not consider the reliability of the physical network in this paper. In the real world, the nodes and links of the physical network may fail during the working process. Therefore, in the next step, focusing on the sudden failure of the physical network, we will introduce reliability into the VNE process, and study the reliable VNE algorithm.

Author Contributions

X.L. and Z.Y. conceived and designed the experiments; X.L. performed the experiments; X.L. and B.W. analyzed the data; X.L. wrote the paper; B.W. supervised the whole work.

Funding

This research was funded by [National Science Foundation of China] grant number [61671465].

Acknowledgments

We would like to thank the anonymous reviewers for their very helpful comments and feedbacks to improve the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Anderson, T.; Peterson, L.; Shenker, S.; Turner, J. Overcoming the Internet impasse through virtualization. Computer 2005, 38, 34–41. [Google Scholar] [CrossRef] [Green Version]
  2. Fischer, A.; Botero, J.F.; Beck, M.T.; de Meer, H.; Hesselbach, X. Virtual network embedding: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 1888–1903. [Google Scholar] [CrossRef]
  3. Alcober, J.; Hesselbach, X.; de la Oliva, A.; Garcia-Saavedra, A.; Roldan, D.; Bock, C. Internet future architectures for network and media independent services and protocols. In Proceedings of the 15th International Conference on Transparent Optical Networks, Cartagena, Spain, 23–27 June 2013; pp. 1–4. [Google Scholar]
  4. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; Zaharia, M. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
  5. Colman-Meixner, C.; Develder, C.; Tornatore, M.; Mukherjee, B. A survey on resiliency techniques in cloud computing infrastructures and applications. IEEE Commun. Surv. Tutor. 2016, 18, 2244–2281. [Google Scholar] [CrossRef]
  6. Li, S.; Saidi, M.Y.; Chen, K. A cloud-oriented algorithm for virtual network embedding over multi-domain. In Proceedings of the IEEE 41st Conference on Local Computer Networks Workshops, Dubai, United Arab Emirates, 7–10 November 2016; pp. 51–57. [Google Scholar]
  7. Bavier, A.; Feamste, N.; Huang, M.; Peterson, L.; Rexford, J. In VINI veritas: Realistic and controlled network experimentation. ACM SIGCOMM Comput. Commun. Rev. 2006, 36, 3–14. [Google Scholar] [CrossRef]
  8. Zhao, C.; Parhami, B. Symmetric Agency Graphs Facilitate and Improve the Quality of Virtual Network Embedding. Symmetry 2018, 10, 63. [Google Scholar] [CrossRef]
  9. Amaldi, E.; Coniglio, S.; Koster, A.M.C.A.; Tieves, M. On the computational complexity of the virtual network embedding problem. Electron. Notes Discrete Math. 2016, 52, 213–220. [Google Scholar] [CrossRef]
  10. Yang, Z.; Guo, Y. An exact virtual network embedding algorithm based on integer linear programming for virtual network request with location constraint. China Commun. 2016, 13, 177–183. [Google Scholar] [CrossRef]
  11. Cao, H.; Yang, L.; Liu, Z.; Wu, M. Exact solutions of VNE: A survey. China Commun. 2016, 13, 48–62. [Google Scholar] [CrossRef]
  12. Ricci, R.; Alfeld, C.; Lepreau, J. A solver for the network testbed mapping problem. ACM SIGCOMM Comput. Commun. Rev. 2003, 33, 65–81. [Google Scholar] [CrossRef]
  13. Zhu, Y.; Ammar, M. Algorithms for assigning substrate network resources to virtual network components. In Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, Spain, 23–29 April 2006; pp. 1–12. [Google Scholar]
  14. Yu, M.; Yi, Y.; Rexford, J.; Chiang, M. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 17–29. [Google Scholar] [CrossRef]
  15. Zhao, Z.; Meng, X.; Su, Y.; Li, Z. Virtual network embedding based on node connectivity awareness and path integration evaluation. KSII Trans. Internet Inf. Syst. 2017, 11, 3393–3412. [Google Scholar]
  16. Ding, J.; Huang, T.; Liu, J.; Liu, Y. Virtual network embedding based on real-time topological attributes. Front. Inf. Technol. Electron. Eng. 2015, 16, 109–118. [Google Scholar] [CrossRef]
  17. Zhang, P.; Yao, H.; Liu, Y. Virtual network embedding based on the degree and clustering coefficient information. IEEE Access 2016, 4, 8572–8580. [Google Scholar] [CrossRef]
  18. Cheng, X.; Su, S.; Zhang, Z.; Wang, H.; Yang, F.; Luo, Y.; Wang, J. Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Comput. Commun. Rev. 2011, 41, 38–47. [Google Scholar] [CrossRef]
  19. Bianchi, F.; Presti, F.L. A markov reward model based greedy heuristic for the virtual network embedding problem. In Proceedings of the IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, London, UK, 19–21 September 2016; pp. 373–378. [Google Scholar]
  20. Gong, S.; Chen, J.; Zhao, S.; Zhu, Q. Virtual network embedding with multi-attribute node ranking based on TOPSIS. KSII Trans. Internet Inf. Syst. 2016, 10, 522–541. [Google Scholar]
  21. Zhang, P.; Yao, H.; Qiu, C.; Liu, Y. Virtual network embedding using node multiple metrics based on simplified ELECTRE method. IEEE Access 2018, 6, 37314–37327. [Google Scholar] [CrossRef]
  22. Gan, W.; Li, D.; Wang, J. A hierarchical clustering method based on data fields. Acta Electron. Sin. 2006, 34, 258–262. [Google Scholar]
  23. He, N.; Gan, W.; Li, D. Evaluate nodes importance in the network using data field theory. In Proceedings of the International Conference on Convergence Information Technology, Gyeongju, South Korea, 21–23 November 2007; pp. 1225–1230. [Google Scholar]
  24. Chowdhury, N.M.M.K.; Rahman, M.R.; Boutaba, R. Virtual network embedding with coordinated node and link mapping. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 783–791. [Google Scholar]
  25. Ehrgott, M.; Gandibleux, X. A survey and annotated bibliography of multiobjective combinatorial optimization. OR-Spektrum 2000, 22, 425–460. [Google Scholar] [CrossRef]
  26. Eppstein, D. Finding the k shortest paths. SIAM J. Comput. 1998, 28, 652–673. [Google Scholar] [CrossRef]
  27. Zegura, E.W.; Calvert, K.L.; Bhattacharjee, S. How to model an internetwork. In Proceedings of the IEEE INFOCOM ’96. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation, San Francisco, CA, USA, 24–28 March 1996; pp. 594–602. [Google Scholar]
Figure 1. Comparison between our algorithm and the existing algorithms: (a) Acceptance ratio over time; (b) Revenue to cost ratio over time. VNE-TP is our proposed algorithm, VNE-TOPSIS and VNE-MCRR are the algorithms proposed in the literature [20] and [19] respectively.
Figure 1. Comparison between our algorithm and the existing algorithms: (a) Acceptance ratio over time; (b) Revenue to cost ratio over time. VNE-TP is our proposed algorithm, VNE-TOPSIS and VNE-MCRR are the algorithms proposed in the literature [20] and [19] respectively.
Entropy 20 00941 g001
Figure 2. The influence of arrival rate of virtual network requests (VNRs): (a) Acceptance ratio with arrival rate; (b) Revenue to cost ratio with arrival rate.
Figure 2. The influence of arrival rate of virtual network requests (VNRs): (a) Acceptance ratio with arrival rate; (b) Revenue to cost ratio with arrival rate.
Entropy 20 00941 g002
Figure 3. The influence of access control conditions: (a) Acceptance ratio with threshold; (b) Revenue to cost ratio with threshold.
Figure 3. The influence of access control conditions: (a) Acceptance ratio with threshold; (b) Revenue to cost ratio with threshold.
Entropy 20 00941 g003
Table 1. Algorithm comparison.
Table 1. Algorithm comparison.
NotationDescription
VNE-TPIn the node embedding stage, the topology potential, the resource capability and the distance attribute are considered to rank the nodes. In the link embedding stage, the available bandwidth and the hops of the paths are considered, and a k-shortest path algorithm is used.
VNE-TOPSISIn the node embedding stage, five novel node attributes are proposed, and the nodes are ranked based on TOPSIS. In the link embedding stage, a shortest-path based algorithm is used.
VNE-MCRRIn the node embedding stage, the Markov Reward Model is introduced, and the nodes are ranked based on Markov Reward Processes. In the link embedding stage, a shortest-path based algorithm is used.

Share and Cite

MDPI and ACS Style

Liu, X.; Wang, B.; Yang, Z. Virtual Network Embedding Based on Topology Potential. Entropy 2018, 20, 941. https://doi.org/10.3390/e20120941

AMA Style

Liu X, Wang B, Yang Z. Virtual Network Embedding Based on Topology Potential. Entropy. 2018; 20(12):941. https://doi.org/10.3390/e20120941

Chicago/Turabian Style

Liu, Xinbo, Buhong Wang, and Zhixian Yang. 2018. "Virtual Network Embedding Based on Topology Potential" Entropy 20, no. 12: 941. https://doi.org/10.3390/e20120941

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop