Next Article in Journal
The Online Reservation Problem
Next Article in Special Issue
Dynamic Virtual Network Slicing and Orchestration for Selective MEC Services over Wide-Area SDN
Previous Article in Journal
Feasibility Analysis and Application of Reinforcement Learning Algorithm Based on Dynamic Parameter Adjustment
Open AccessArticle

Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT

Faculty of Computer Science and Mathematics, University of Passau, 94032 Passau, Germany
Author to whom correspondence should be addressed.
Current address: Innstraße 43, 94032 Passau, Germany.
Algorithms 2020, 13(9), 240;
Received: 17 August 2020 / Revised: 14 September 2020 / Accepted: 17 September 2020 / Published: 22 September 2020
(This article belongs to the Special Issue Virtual Network Embedding)
The autonomic composition of Virtual Networks (VNs) and Service Function Chains (SFCs) based on application requirements is significant for complex environments. In this paper, we use graph transformation in order to compose an Extended Virtual Network (EVN) that is based on different requirements, such as locations, low latency, redundancy, and security functions. The EVN can represent physical environment devices and virtual application and network functions. We build a generic Virtual Network Embedding (VNE) framework for transforming an Application Request (AR) to an EVN. Subsequently, we define a set of transformations that reflect preliminary topological, performance, reliability, and security policies. These transformations update the entities and demands of the VN and add SFCs that include the required Virtual Network Functions (VNFs). Additionally, we propose a greedy proactive heuristic for path-independent embedding of the composed SFCs. This heuristic is appropriate for real complex environments, such as industrial networks. Furthermore, we present an Industrail Internet of Things (IIoT) use case that was inspired by Industry 4.0 concepts, in which EVNs for remote asset management are deployed over three levels; manufacturing halls and edge and cloud computing. We also implement the developed methods in Alevin and show exemplary mapping results from our use case. Finally, we evaluate the chain embedding heuristic while using a random topology that is typical for such a use case, and show that it can improve the admission ratio and resource utilization with minimal overhead. View Full-Text
Show Figures

Figure 1

MDPI and ACS Style

Mandarawi, W.; Rottmeier, J.; Rezaeighale, M.; de Meer, H. Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT. Algorithms 2020, 13, 240.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop