SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
DOI: 10.5121/ijcnc.2018.10103 35
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN
NFV-BASED NETWORKS UNDER NETWORK DELAY
CONSTRAINTS
Shin-ichi Kuribayashi
Department of Computer and Information Science, Seikei University, Japan
ABSTRACT
NFV-based network implements a variety of network functions with software on general-purpose servers
and this allows the network operator to select any capacity and location of network functions without any
physical constraints. The authors proposed an algorithm of virtual routing function allocation in the NFV-
based network for minimizing the total power consumption or the total network cost, and developed
effective allocation guidelines for virtual routing functions.
This paper evaluates the effect of the maximum tolerable network delay on the guidelines for the allocation
of virtual routing functions, which minimizes the total network cost. The following points are clear from
quantitative evaluations: (1) The shorter the maximum tolerable network delay, the greater the number of
areas where the routing function must be allocated, resulting in an increase in the total network cost. (2)
The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the
total network cost caused by the maximum tolerable network delay. This paper also provides the possible
guideline how to decide the value of maximum tolerable network delay when the condition of allowable
increase in network cost is given.
KEYWORDS
NFV, resource allocation, virtual routing function, minimum total network cost
1. INTRODUCTION
In recent years, network carriers have begun to implement network functions based on a new
technology called network functions virtualization (NFV) [1]-[3]. In an NFV-based network,
network functions are implemented in a virtual manner by software on general-purpose servers.
NFV makes it possible to select both the capacity and location of each function without physical
constraints. Therefore, to build an economical NFV-based network, it is important to determine
where each network function should be allocated in the network and what its capacity should be.
The authors proposed an algorithm of virtual routing function allocation in the NFV network for
minimizing the total power consumption or the total network cost, and developed effective
allocation guidelines for virtual routing functions [4],[5]. Specifically, it was found that the
greater the power consumption of the routing function relative to that of the circuit bandwidth,
and the greater the peak coefficient of traffic between areas is, the smaller the total power
consumption or the total network cost can be made by integrating the routing functions of some
areas into those of a small number of areas. It was also indicated that there can be cases where
distributing low-capacity routing functions in the network, which has been difficult to implement
in conventional networks but is made possible by NFV, can dramatically reduce the network
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
36
power consumption. The above studies were not meant just to address the VNE (virtual network
resource allocation) problem [6],[7]. Rather, the aim was at developing function allocation
guidelines, which show how much capacity each virtual routing function is required to have and
what the effective way of allocating each function is depending on the ratio of the cost of a
routing function to that of a circuit bandwidth and the peak coefficient of traffic between areas.
References [4] and [5] did not take network quality into consideration. This paper evaluates the
effect of the maximum tolerable network delay on the guidelines for allocating the virtual routing
function. The objective function in this paper is to minimize the total network cost.
The rest of this paper is organized as follows. Section 2 explains related works. Section 3
proposes to enhance the existing routing function allocation algorithm, which was proposed in
References [4] and [5]. Section 4 evaluates the effect of the maximum tolerable network delay on
the function allocation guidelines, with a ladder-shaped network model that simulates the network
structure of Japan. Finally, Section 5 presents the conclusions. This paper is an extension of the
study in Reference [17].
2. RELATED WORK
One of the related studies is the VNE (virtual network resource allocation) problem, a problem of
allocating virtual nodes and links to a physical network efficiently [6],[7]. Reference [8]
evaluates the allocation of multiple VNFs. Reference [9] proposes a functional allocation
assuming a hybrid arrangement in which dedicated hardware and virtual functions are used.
References [10] and [11] proposes dynamic resource allocation and scheduling. Reference [12]
evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW)
functions in a mobile network in terms of network load and network delay. Based on an
evaluation made on a network that simulates the network structure of the U.S.A., it shows that
four data centers that completely virtualize these GWs are required. Reference [13] proposes a
method for solving the virtual DPI allocation problem, which is aimed at minimizing the cost.
We proposed a resource allocation method in a cloud environment in which computing power and
access bandwidths are allocated simultaneously [14]-[16]. The key point of this method is how to
pack as many requirements (simultaneously requiring two different types of resource of
computing power and access bandwidths with service quality being not uniform) as possible into
multiple sets of computing power and bandwidths.
Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite
physical network resources efficiently. In contrast, references [4] and [5] and this paper try to
develop allocation guidelines that indicate how much capacity is required for each virtual
network function and what is the effective way of allocating each function, both of which depend
on the relative costs of the routing function and the circuit bandwidth and the inter-area traffic
distribution. We believe that these guidelines provide network carriers with essential information
when they design and build an NFV-based network in a medium to long term.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
37
3. ENHANCED ROUTING FUNCTION ALLOCATION ALGORITHM UNDER
NETWORK DELAY CONSTRAINTS
It is proposed to enhance the existing routing function allocation algorithm proposed in
References [4] and [5], in order to ensure that the network delay does not exceed the maximum
tolerable network delay. In this paper, the constraint of the maximum tolerable network delay is
applied to only intra-area communication and communication between adjacent areas. This is
because, in communication between remote areas, the locations of routing functions do not
greatly affect communication distances. Moreover, we evaluate the maximum tolerable network
delay with the maximum number of transit areas, N.
In the existing allocation algorithm [4]-[5], the routing function is first allocated to each area.
Next, an area with the smallest number of packets received and transmitted over a certain period
is selected. If integrating the routing function of this area (integration-origin area) into the routing
function of another area (integration-destination area) reduces the total network cost, this
integration is done. If not, the integration processing will not be done. Then, the integration
judgment is similarly performed on the next integration-origin area candidate. This process is
terminated when there is no integration-origin area left.
The following extension is proposed in the existing routing function integration process, to ensure
that the network delay does not exceed the maximum tolerable network delay. That is, the
integration processing will not be carried out if there is even one communication flow that does
not satisfy N in the integration judgment for each integration-origin area candidate.
4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION
ALGORITHM
4.1 EVALUATION CONDITIONS
(1) We have developed a simulation program in C language that executes the enhanced allocation
algorithm proposed in Section 3.
(2) Network structure: The ladder-shaped model illustrated in Figure 1, which simulates the shape
of Japan, is used as in References [4] and [5].
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
38
(3) Traffic flow: The traffic flow is the same as that used in References [4] and [5]. The amount
of traffic between Area #5 and each of the remaining areas is M times (peak coefficient) that of
traffic between other areas. Thus, M=1 means that traffic flows between areas are uniform.
(4) Since the ratio of the cost of the routing function to the cost of the circuit bandwidth greatly
affects the total network cost, the following ratio is defined as in Reference [5]:
Zc = αc/βc (1)
Where αc is the cost of the routing function per pps (packets per second), and βc the cost of the
circuit bandwidth per Mbps per 10 km. The fixed costs of the routing function and circuit
bandwidth are not taken into consideration here.
(5) Routing policy: We revise the routing policy in References [4] and [5] so that the cost will be
lower.
The route selection procedure is explained below.
① Select the route from the source area to the destination area in the horizontal direction.
② If one of the source area number and destination area number is an odd number and the other
is an even number, select the route until a destination area appears upward or downward.
Afterwards if the destination area number is odd, the upward direction is selected. If it is an even
number, the downward direction is selected.
③ If there is no area where the route selection function is deployed on the route based on ①
and ②, select the area in which virtual routing function is deployed as the transit area, that will
be the shortest distance when relaying the packet.
④ The route selection both from source area to transit area and from transit area to destination
area follows ① and ②.
An example of route selection based on the above route selection procedure is shown in Figure 2.
Route selection function is allocated in Area # 4 and Area # 7, and shows the route when packet
is transferred from Area # 1 to Area # 6, Area # 9, and Area # 10.
Moreover, the allowable maximum number of transit areas in the ladder-shaped network topology
in Figure 2could be 7 as shown in Figure 3.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
39
4.2 EVALUATION RESULTS AND DISCUSSIONS
The evaluation results are shown in Figures 4 to 10. Figure 4 shows the result when Zc is 2.0 and
M is 2. Figures 5, 6, and 7 illustrate graphs in which Zc is changed to 1.0, 0.5, 0.1, respectively.
Figure 8 shows the result when M is 20 and Zc is 1. Figures 6, 7, 5 illustrate graphs in which M
is changed to 10, 5, 2, respectively. The horizontal axis in Figures shows the allowable maximum
number of transit areas (N). The vertical axis shows the total network cost (normalized value).
Moreover, Figures 5, 7 and 9illustrate the cost of optimal deployment (dashed line), in addition to
the cost based on the proposed algorithm (solid line).Here, we calculate all the deployment
patterns and decide the deployment with the lowest cost as the optimal deployment. Figure 11
shows the final allocations when N is varied under the conditions of Figure 5. The following
points are clear from these Figs:
1) The smaller N is (i.e., the more severe the network delay requirement is), the greater the total
network cost. However, in cases where routing functions end up being allocated to multiple areas
(as in Figure 7), a decrease in N does not greatly increase the total network cost unless N is
extremely small (for example, N is 2).
<Reason> As shown in Figure 11, in cases where there is no restriction on N (N is 7) under the
conditions of Figure 5, concentrating the routing function on Area #5 alone is the most
economical. However, as N becomes smaller, it becomes necessary to allocate the routing
function to many areas in order to satisfy the smaller N.
The value of maximum tolerable network delay can be decided if the condition of allowable
increase of network cost is given. For example, if the allowable maximum number of transit areas
is limited to 3 in the example of Figure 4, the total network cost increases by about approximately
40%, resulting in 40% increase in service fee as well. If the carrier would like to limit the increase
in service fee to 20% or less, it should limit the allowable maximum number of transit areas to 4
in this example. One of the main objectives of this paper is to be able to provide such network
design guidelines.
2) The greater Zc is and the greater M is, the greater an increase in the total network cost caused
by the restriction on N.
<Reason> If Zc is small, the cost of the routing function is small relative to the cost of the circuit
bandwidth. As a result, the cost increase caused by an increase in the number of areas (to which
the routing function is allocated) in order to satisfy N becomes relatively small. As M increases,
the cost reduction achieved by the integration of the routing function increases and it becomes
more desirable to integrate the routing function.
3) The proposed algorithm could get results that are close to the optimal deployment by 85% or
more in this evaluation, as in Figures 5, 7, and 9.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
40
Figure 7. Simulation result 4 (ZC=0.1, M=2)
2 3 4 5 6 7
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
Proposed algorithmOptimal solution
Figure 6. Simulation result 3 (ZC=0.5, M=2)
Allowable maximum number of transit areas
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Figure 5. Simulation result 2 (ZC=1.0, M=2)
Allowable maximum number of transit areas
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Optimal solution
Figure 4. Simulation result 1 (ZC=2.0, M=2)
Allowable maximum number of transit areas
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Totalnetworkcost(Normalizedvalue)
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
41
Figure 9. Simulation result 7 (ZC=1.0, M=10)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
Optimal solution
Figure 8. Simulation result 5 (ZC=1.0, M=20)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
Figure 10. Simulation result 7 (ZC=1.0, M=5)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
42
Although the specific network topology is assumed in the evaluation of this paper, the major
trend and the network design guidelines clarified this time could be applicable in the same way,
even if the number of areas is increased to 100, or a star or loop topology is assumed. As the
proposed algorithm, which repeats the judgment as to whether the total network cost is lower if
the virtual routing functions in the specific area is integrated in the other area, is also applicable,
the similar evaluation results such as ‘the shorter the maximum tolerable network delay, the
greater the number of areas where the routing function must be allocated, resulting in an increase
in the total network cost’ could be expected. It is noted that the areas in which virtual routing
functions are actually deployed depend on the network topology.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
43
5. CONCLUSIONS
This paper has evaluated the effect of the maximum tolerable network delay on the guidelines for
the allocation of virtual routing functions. Our results with the ladder-shaped network have
revealed the following: (1) The shorter the maximum tolerable network delay, the greater the
number of areas where the routing function must be allocated, resulting in an increase in the total
network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the
greater the increase in the total network cost caused by the maximum tolerable network delay.
This paper has also provided the possible guideline how to decide the value of maximum
tolerable network delay when the condition of allowable increase of network cost is given.
Moreover, this paper has also indicated that the proposed algorithm could get results that are
close to the optimal solution by 85% or more.
It is required to study cases where the fixed costs of the routing function and circuit bandwidth
are taken into consideration, and where multiple virtual network functions (ex. firewall function,
DPI function) are to be allocated.
ACKNOWLEDGMENT
We would like to thank Mr. Kenichiro HIDA for his help with the evaluation.
REFERENCES
[1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers, Challenges
and Call for Action,” ETSI NFV, Oct. 2012.
[2] “Network Functions Virtualisation (NFV); Architectural Framework,” ETSI GS NFV 002 v1.2.1,
Dec. 2014.
file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf
[3] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function
Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys &
Tutorials, Vol. 18, Issue 1, pp.236-262, 2016.
[4] K.Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total
Network Power Consumption,” 18th International Conference on Information and Communication
Systems (ICICS Venice 2016), Aug. 2016.
[5] S.Kuribayashi, “Flexible Virtual Routing Function Deployment in NFV-based network with
Minimum Total Network Cost,” International Journal of Computer Networks & Communications
(IJCNC) Vol.8, No.5, pp.15-26, Nov.2016.
[6] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A
Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013.
[7] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud
Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014.
[8] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network
functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014,
pp. 7–13.
[9] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network
functions,” in Network and Service Management (CNSM), 2014 10th International Conference on,
Nov 2014, pp. 418–423.
[10] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of
Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on
Network Softwarization (NetSoft), pp.1-9, 2015.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
44
[11] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual
Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014.
[12] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE
Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular:
Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014.
[13] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,”
International Journal of Network Management, pp.490-506, 2015.
[14] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer
communications networks”, APCC2006, 2F-4 (2006.8)
[15] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing
Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS),
Vol.2, No.1, pp.1-8, Feb. 2011.
[16] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different
Service Quality to Users at Multiple Access”, International Journal of Computer Networks &
Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015.
[17] K. Hida and S. Kuribayashi, “NFV-based virtual routing function deployment under network delay,”
19th International Conference on Computer Communications and Applications (ICCCA Kyoto
2017), pp.862-866, Nov. 2017.
AUTHOR
Shin-Ichi kuribayashi Received The B.E., M.E., And D.E. Degrees From Tohoku
University, Japan, In 1978, 1980, And 1988 Respectively. He Joined Ntt Electrical
Communications Labs In 1980. He Has Been Engaged In The Design And
Development Of Ddx And Isdn Packet Switching, Atm, Phs, And Imt 2000 And Ip-Vpn
Systems. He Researched Distributed Communication Systems At Stanford University
From December 1988 Through December 1989. He Participated In International
Standardization On Atm Signaling And Imt2000 Signaling Protocols At Itu-T Sg11
From 1990 Through 2000. Since April 2004, He Has Been A Professor In The Department Of Computer
And Information Science, Faculty Of Science And Technology, Seikei University. His Research Interests
Include Resource Management For Nfv And Sdn-Based Networks, Qos Control, Traffic Control For Cloud
Computing Environments And Green Network. He Is A Member Of Ieee, Ieice And Ipsj.

More Related Content

What's hot

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlUniversity of Piraeus
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pbIAESIJEECS
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...IJERA Editor
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
 

What's hot (17)

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
 
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
Multiflow Model for Routing and Policing Traffic in  Infocommunication NetworkMultiflow Model for Routing and Policing Traffic in  Infocommunication Network
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 

Similar to VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKIJCNCJournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...IJCNCJournal
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...IJCNCJournal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 

Similar to VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS (20)

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 DOI: 10.5121/ijcnc.2018.10103 35 VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS Shin-ichi Kuribayashi Department of Computer and Information Science, Seikei University, Japan ABSTRACT NFV-based network implements a variety of network functions with software on general-purpose servers and this allows the network operator to select any capacity and location of network functions without any physical constraints. The authors proposed an algorithm of virtual routing function allocation in the NFV- based network for minimizing the total power consumption or the total network cost, and developed effective allocation guidelines for virtual routing functions. This paper evaluates the effect of the maximum tolerable network delay on the guidelines for the allocation of virtual routing functions, which minimizes the total network cost. The following points are clear from quantitative evaluations: (1) The shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the total network cost caused by the maximum tolerable network delay. This paper also provides the possible guideline how to decide the value of maximum tolerable network delay when the condition of allowable increase in network cost is given. KEYWORDS NFV, resource allocation, virtual routing function, minimum total network cost 1. INTRODUCTION In recent years, network carriers have begun to implement network functions based on a new technology called network functions virtualization (NFV) [1]-[3]. In an NFV-based network, network functions are implemented in a virtual manner by software on general-purpose servers. NFV makes it possible to select both the capacity and location of each function without physical constraints. Therefore, to build an economical NFV-based network, it is important to determine where each network function should be allocated in the network and what its capacity should be. The authors proposed an algorithm of virtual routing function allocation in the NFV network for minimizing the total power consumption or the total network cost, and developed effective allocation guidelines for virtual routing functions [4],[5]. Specifically, it was found that the greater the power consumption of the routing function relative to that of the circuit bandwidth, and the greater the peak coefficient of traffic between areas is, the smaller the total power consumption or the total network cost can be made by integrating the routing functions of some areas into those of a small number of areas. It was also indicated that there can be cases where distributing low-capacity routing functions in the network, which has been difficult to implement in conventional networks but is made possible by NFV, can dramatically reduce the network
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 36 power consumption. The above studies were not meant just to address the VNE (virtual network resource allocation) problem [6],[7]. Rather, the aim was at developing function allocation guidelines, which show how much capacity each virtual routing function is required to have and what the effective way of allocating each function is depending on the ratio of the cost of a routing function to that of a circuit bandwidth and the peak coefficient of traffic between areas. References [4] and [5] did not take network quality into consideration. This paper evaluates the effect of the maximum tolerable network delay on the guidelines for allocating the virtual routing function. The objective function in this paper is to minimize the total network cost. The rest of this paper is organized as follows. Section 2 explains related works. Section 3 proposes to enhance the existing routing function allocation algorithm, which was proposed in References [4] and [5]. Section 4 evaluates the effect of the maximum tolerable network delay on the function allocation guidelines, with a ladder-shaped network model that simulates the network structure of Japan. Finally, Section 5 presents the conclusions. This paper is an extension of the study in Reference [17]. 2. RELATED WORK One of the related studies is the VNE (virtual network resource allocation) problem, a problem of allocating virtual nodes and links to a physical network efficiently [6],[7]. Reference [8] evaluates the allocation of multiple VNFs. Reference [9] proposes a functional allocation assuming a hybrid arrangement in which dedicated hardware and virtual functions are used. References [10] and [11] proposes dynamic resource allocation and scheduling. Reference [12] evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW) functions in a mobile network in terms of network load and network delay. Based on an evaluation made on a network that simulates the network structure of the U.S.A., it shows that four data centers that completely virtualize these GWs are required. Reference [13] proposes a method for solving the virtual DPI allocation problem, which is aimed at minimizing the cost. We proposed a resource allocation method in a cloud environment in which computing power and access bandwidths are allocated simultaneously [14]-[16]. The key point of this method is how to pack as many requirements (simultaneously requiring two different types of resource of computing power and access bandwidths with service quality being not uniform) as possible into multiple sets of computing power and bandwidths. Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite physical network resources efficiently. In contrast, references [4] and [5] and this paper try to develop allocation guidelines that indicate how much capacity is required for each virtual network function and what is the effective way of allocating each function, both of which depend on the relative costs of the routing function and the circuit bandwidth and the inter-area traffic distribution. We believe that these guidelines provide network carriers with essential information when they design and build an NFV-based network in a medium to long term.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 37 3. ENHANCED ROUTING FUNCTION ALLOCATION ALGORITHM UNDER NETWORK DELAY CONSTRAINTS It is proposed to enhance the existing routing function allocation algorithm proposed in References [4] and [5], in order to ensure that the network delay does not exceed the maximum tolerable network delay. In this paper, the constraint of the maximum tolerable network delay is applied to only intra-area communication and communication between adjacent areas. This is because, in communication between remote areas, the locations of routing functions do not greatly affect communication distances. Moreover, we evaluate the maximum tolerable network delay with the maximum number of transit areas, N. In the existing allocation algorithm [4]-[5], the routing function is first allocated to each area. Next, an area with the smallest number of packets received and transmitted over a certain period is selected. If integrating the routing function of this area (integration-origin area) into the routing function of another area (integration-destination area) reduces the total network cost, this integration is done. If not, the integration processing will not be done. Then, the integration judgment is similarly performed on the next integration-origin area candidate. This process is terminated when there is no integration-origin area left. The following extension is proposed in the existing routing function integration process, to ensure that the network delay does not exceed the maximum tolerable network delay. That is, the integration processing will not be carried out if there is even one communication flow that does not satisfy N in the integration judgment for each integration-origin area candidate. 4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION ALGORITHM 4.1 EVALUATION CONDITIONS (1) We have developed a simulation program in C language that executes the enhanced allocation algorithm proposed in Section 3. (2) Network structure: The ladder-shaped model illustrated in Figure 1, which simulates the shape of Japan, is used as in References [4] and [5].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 38 (3) Traffic flow: The traffic flow is the same as that used in References [4] and [5]. The amount of traffic between Area #5 and each of the remaining areas is M times (peak coefficient) that of traffic between other areas. Thus, M=1 means that traffic flows between areas are uniform. (4) Since the ratio of the cost of the routing function to the cost of the circuit bandwidth greatly affects the total network cost, the following ratio is defined as in Reference [5]: Zc = αc/βc (1) Where αc is the cost of the routing function per pps (packets per second), and βc the cost of the circuit bandwidth per Mbps per 10 km. The fixed costs of the routing function and circuit bandwidth are not taken into consideration here. (5) Routing policy: We revise the routing policy in References [4] and [5] so that the cost will be lower. The route selection procedure is explained below. ① Select the route from the source area to the destination area in the horizontal direction. ② If one of the source area number and destination area number is an odd number and the other is an even number, select the route until a destination area appears upward or downward. Afterwards if the destination area number is odd, the upward direction is selected. If it is an even number, the downward direction is selected. ③ If there is no area where the route selection function is deployed on the route based on ① and ②, select the area in which virtual routing function is deployed as the transit area, that will be the shortest distance when relaying the packet. ④ The route selection both from source area to transit area and from transit area to destination area follows ① and ②. An example of route selection based on the above route selection procedure is shown in Figure 2. Route selection function is allocated in Area # 4 and Area # 7, and shows the route when packet is transferred from Area # 1 to Area # 6, Area # 9, and Area # 10. Moreover, the allowable maximum number of transit areas in the ladder-shaped network topology in Figure 2could be 7 as shown in Figure 3.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 39 4.2 EVALUATION RESULTS AND DISCUSSIONS The evaluation results are shown in Figures 4 to 10. Figure 4 shows the result when Zc is 2.0 and M is 2. Figures 5, 6, and 7 illustrate graphs in which Zc is changed to 1.0, 0.5, 0.1, respectively. Figure 8 shows the result when M is 20 and Zc is 1. Figures 6, 7, 5 illustrate graphs in which M is changed to 10, 5, 2, respectively. The horizontal axis in Figures shows the allowable maximum number of transit areas (N). The vertical axis shows the total network cost (normalized value). Moreover, Figures 5, 7 and 9illustrate the cost of optimal deployment (dashed line), in addition to the cost based on the proposed algorithm (solid line).Here, we calculate all the deployment patterns and decide the deployment with the lowest cost as the optimal deployment. Figure 11 shows the final allocations when N is varied under the conditions of Figure 5. The following points are clear from these Figs: 1) The smaller N is (i.e., the more severe the network delay requirement is), the greater the total network cost. However, in cases where routing functions end up being allocated to multiple areas (as in Figure 7), a decrease in N does not greatly increase the total network cost unless N is extremely small (for example, N is 2). <Reason> As shown in Figure 11, in cases where there is no restriction on N (N is 7) under the conditions of Figure 5, concentrating the routing function on Area #5 alone is the most economical. However, as N becomes smaller, it becomes necessary to allocate the routing function to many areas in order to satisfy the smaller N. The value of maximum tolerable network delay can be decided if the condition of allowable increase of network cost is given. For example, if the allowable maximum number of transit areas is limited to 3 in the example of Figure 4, the total network cost increases by about approximately 40%, resulting in 40% increase in service fee as well. If the carrier would like to limit the increase in service fee to 20% or less, it should limit the allowable maximum number of transit areas to 4 in this example. One of the main objectives of this paper is to be able to provide such network design guidelines. 2) The greater Zc is and the greater M is, the greater an increase in the total network cost caused by the restriction on N. <Reason> If Zc is small, the cost of the routing function is small relative to the cost of the circuit bandwidth. As a result, the cost increase caused by an increase in the number of areas (to which the routing function is allocated) in order to satisfy N becomes relatively small. As M increases, the cost reduction achieved by the integration of the routing function increases and it becomes more desirable to integrate the routing function. 3) The proposed algorithm could get results that are close to the optimal deployment by 85% or more in this evaluation, as in Figures 5, 7, and 9.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 40 Figure 7. Simulation result 4 (ZC=0.1, M=2) 2 3 4 5 6 7 Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) Proposed algorithmOptimal solution Figure 6. Simulation result 3 (ZC=0.5, M=2) Allowable maximum number of transit areas Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Figure 5. Simulation result 2 (ZC=1.0, M=2) Allowable maximum number of transit areas Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Optimal solution Figure 4. Simulation result 1 (ZC=2.0, M=2) Allowable maximum number of transit areas 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Totalnetworkcost(Normalizedvalue)
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 41 Figure 9. Simulation result 7 (ZC=1.0, M=10) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm Optimal solution Figure 8. Simulation result 5 (ZC=1.0, M=20) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm Figure 10. Simulation result 7 (ZC=1.0, M=5) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 42 Although the specific network topology is assumed in the evaluation of this paper, the major trend and the network design guidelines clarified this time could be applicable in the same way, even if the number of areas is increased to 100, or a star or loop topology is assumed. As the proposed algorithm, which repeats the judgment as to whether the total network cost is lower if the virtual routing functions in the specific area is integrated in the other area, is also applicable, the similar evaluation results such as ‘the shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost’ could be expected. It is noted that the areas in which virtual routing functions are actually deployed depend on the network topology.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 43 5. CONCLUSIONS This paper has evaluated the effect of the maximum tolerable network delay on the guidelines for the allocation of virtual routing functions. Our results with the ladder-shaped network have revealed the following: (1) The shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the total network cost caused by the maximum tolerable network delay. This paper has also provided the possible guideline how to decide the value of maximum tolerable network delay when the condition of allowable increase of network cost is given. Moreover, this paper has also indicated that the proposed algorithm could get results that are close to the optimal solution by 85% or more. It is required to study cases where the fixed costs of the routing function and circuit bandwidth are taken into consideration, and where multiple virtual network functions (ex. firewall function, DPI function) are to be allocated. ACKNOWLEDGMENT We would like to thank Mr. Kenichiro HIDA for his help with the evaluation. REFERENCES [1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers, Challenges and Call for Action,” ETSI NFV, Oct. 2012. [2] “Network Functions Virtualisation (NFV); Architectural Framework,” ETSI GS NFV 002 v1.2.1, Dec. 2014. file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf [3] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp.236-262, 2016. [4] K.Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption,” 18th International Conference on Information and Communication Systems (ICICS Venice 2016), Aug. 2016. [5] S.Kuribayashi, “Flexible Virtual Routing Function Deployment in NFV-based network with Minimum Total Network Cost,” International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, pp.15-26, Nov.2016. [6] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013. [7] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014. [8] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014, pp. 7–13. [9] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network functions,” in Network and Service Management (CNSM), 2014 10th International Conference on, Nov 2014, pp. 418–423. [10] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on Network Softwarization (NetSoft), pp.1-9, 2015.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 44 [11] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014. [12] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular: Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014. [13] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,” International Journal of Network Management, pp.490-506, 2015. [14] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer communications networks”, APCC2006, 2F-4 (2006.8) [15] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2, No.1, pp.1-8, Feb. 2011. [16] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access”, International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015. [17] K. Hida and S. Kuribayashi, “NFV-based virtual routing function deployment under network delay,” 19th International Conference on Computer Communications and Applications (ICCCA Kyoto 2017), pp.862-866, Nov. 2017. AUTHOR Shin-Ichi kuribayashi Received The B.E., M.E., And D.E. Degrees From Tohoku University, Japan, In 1978, 1980, And 1988 Respectively. He Joined Ntt Electrical Communications Labs In 1980. He Has Been Engaged In The Design And Development Of Ddx And Isdn Packet Switching, Atm, Phs, And Imt 2000 And Ip-Vpn Systems. He Researched Distributed Communication Systems At Stanford University From December 1988 Through December 1989. He Participated In International Standardization On Atm Signaling And Imt2000 Signaling Protocols At Itu-T Sg11 From 1990 Through 2000. Since April 2004, He Has Been A Professor In The Department Of Computer And Information Science, Faculty Of Science And Technology, Seikei University. His Research Interests Include Resource Management For Nfv And Sdn-Based Networks, Qos Control, Traffic Control For Cloud Computing Environments And Green Network. He Is A Member Of Ieee, Ieice And Ipsj.