SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
DOI: 10.5121/ijcnc.2018.10103 35
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN
NFV-BASED NETWORKS UNDER NETWORK DELAY
CONSTRAINTS
Shin-ichi Kuribayashi
Department of Computer and Information Science, Seikei University, Japan
ABSTRACT
NFV-based network implements a variety of network functions with software on general-purpose servers
and this allows the network operator to select any capacity and location of network functions without any
physical constraints. The authors proposed an algorithm of virtual routing function allocation in the NFV-
based network for minimizing the total power consumption or the total network cost, and developed
effective allocation guidelines for virtual routing functions.
This paper evaluates the effect of the maximum tolerable network delay on the guidelines for the allocation
of virtual routing functions, which minimizes the total network cost. The following points are clear from
quantitative evaluations: (1) The shorter the maximum tolerable network delay, the greater the number of
areas where the routing function must be allocated, resulting in an increase in the total network cost. (2)
The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the
total network cost caused by the maximum tolerable network delay. This paper also provides the possible
guideline how to decide the value of maximum tolerable network delay when the condition of allowable
increase in network cost is given.
KEYWORDS
NFV, resource allocation, virtual routing function, minimum total network cost
1. INTRODUCTION
In recent years, network carriers have begun to implement network functions based on a new
technology called network functions virtualization (NFV) [1]-[3]. In an NFV-based network,
network functions are implemented in a virtual manner by software on general-purpose servers.
NFV makes it possible to select both the capacity and location of each function without physical
constraints. Therefore, to build an economical NFV-based network, it is important to determine
where each network function should be allocated in the network and what its capacity should be.
The authors proposed an algorithm of virtual routing function allocation in the NFV network for
minimizing the total power consumption or the total network cost, and developed effective
allocation guidelines for virtual routing functions [4],[5]. Specifically, it was found that the
greater the power consumption of the routing function relative to that of the circuit bandwidth,
and the greater the peak coefficient of traffic between areas is, the smaller the total power
consumption or the total network cost can be made by integrating the routing functions of some
areas into those of a small number of areas. It was also indicated that there can be cases where
distributing low-capacity routing functions in the network, which has been difficult to implement
in conventional networks but is made possible by NFV, can dramatically reduce the network
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
36
power consumption. The above studies were not meant just to address the VNE (virtual network
resource allocation) problem [6],[7]. Rather, the aim was at developing function allocation
guidelines, which show how much capacity each virtual routing function is required to have and
what the effective way of allocating each function is depending on the ratio of the cost of a
routing function to that of a circuit bandwidth and the peak coefficient of traffic between areas.
References [4] and [5] did not take network quality into consideration. This paper evaluates the
effect of the maximum tolerable network delay on the guidelines for allocating the virtual routing
function. The objective function in this paper is to minimize the total network cost.
The rest of this paper is organized as follows. Section 2 explains related works. Section 3
proposes to enhance the existing routing function allocation algorithm, which was proposed in
References [4] and [5]. Section 4 evaluates the effect of the maximum tolerable network delay on
the function allocation guidelines, with a ladder-shaped network model that simulates the network
structure of Japan. Finally, Section 5 presents the conclusions. This paper is an extension of the
study in Reference [17].
2. RELATED WORK
One of the related studies is the VNE (virtual network resource allocation) problem, a problem of
allocating virtual nodes and links to a physical network efficiently [6],[7]. Reference [8]
evaluates the allocation of multiple VNFs. Reference [9] proposes a functional allocation
assuming a hybrid arrangement in which dedicated hardware and virtual functions are used.
References [10] and [11] proposes dynamic resource allocation and scheduling. Reference [12]
evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW)
functions in a mobile network in terms of network load and network delay. Based on an
evaluation made on a network that simulates the network structure of the U.S.A., it shows that
four data centers that completely virtualize these GWs are required. Reference [13] proposes a
method for solving the virtual DPI allocation problem, which is aimed at minimizing the cost.
We proposed a resource allocation method in a cloud environment in which computing power and
access bandwidths are allocated simultaneously [14]-[16]. The key point of this method is how to
pack as many requirements (simultaneously requiring two different types of resource of
computing power and access bandwidths with service quality being not uniform) as possible into
multiple sets of computing power and bandwidths.
Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite
physical network resources efficiently. In contrast, references [4] and [5] and this paper try to
develop allocation guidelines that indicate how much capacity is required for each virtual
network function and what is the effective way of allocating each function, both of which depend
on the relative costs of the routing function and the circuit bandwidth and the inter-area traffic
distribution. We believe that these guidelines provide network carriers with essential information
when they design and build an NFV-based network in a medium to long term.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
37
3. ENHANCED ROUTING FUNCTION ALLOCATION ALGORITHM UNDER
NETWORK DELAY CONSTRAINTS
It is proposed to enhance the existing routing function allocation algorithm proposed in
References [4] and [5], in order to ensure that the network delay does not exceed the maximum
tolerable network delay. In this paper, the constraint of the maximum tolerable network delay is
applied to only intra-area communication and communication between adjacent areas. This is
because, in communication between remote areas, the locations of routing functions do not
greatly affect communication distances. Moreover, we evaluate the maximum tolerable network
delay with the maximum number of transit areas, N.
In the existing allocation algorithm [4]-[5], the routing function is first allocated to each area.
Next, an area with the smallest number of packets received and transmitted over a certain period
is selected. If integrating the routing function of this area (integration-origin area) into the routing
function of another area (integration-destination area) reduces the total network cost, this
integration is done. If not, the integration processing will not be done. Then, the integration
judgment is similarly performed on the next integration-origin area candidate. This process is
terminated when there is no integration-origin area left.
The following extension is proposed in the existing routing function integration process, to ensure
that the network delay does not exceed the maximum tolerable network delay. That is, the
integration processing will not be carried out if there is even one communication flow that does
not satisfy N in the integration judgment for each integration-origin area candidate.
4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION
ALGORITHM
4.1 EVALUATION CONDITIONS
(1) We have developed a simulation program in C language that executes the enhanced allocation
algorithm proposed in Section 3.
(2) Network structure: The ladder-shaped model illustrated in Figure 1, which simulates the shape
of Japan, is used as in References [4] and [5].
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
38
(3) Traffic flow: The traffic flow is the same as that used in References [4] and [5]. The amount
of traffic between Area #5 and each of the remaining areas is M times (peak coefficient) that of
traffic between other areas. Thus, M=1 means that traffic flows between areas are uniform.
(4) Since the ratio of the cost of the routing function to the cost of the circuit bandwidth greatly
affects the total network cost, the following ratio is defined as in Reference [5]:
Zc = αc/βc (1)
Where αc is the cost of the routing function per pps (packets per second), and βc the cost of the
circuit bandwidth per Mbps per 10 km. The fixed costs of the routing function and circuit
bandwidth are not taken into consideration here.
(5) Routing policy: We revise the routing policy in References [4] and [5] so that the cost will be
lower.
The route selection procedure is explained below.
① Select the route from the source area to the destination area in the horizontal direction.
② If one of the source area number and destination area number is an odd number and the other
is an even number, select the route until a destination area appears upward or downward.
Afterwards if the destination area number is odd, the upward direction is selected. If it is an even
number, the downward direction is selected.
③ If there is no area where the route selection function is deployed on the route based on ①
and ②, select the area in which virtual routing function is deployed as the transit area, that will
be the shortest distance when relaying the packet.
④ The route selection both from source area to transit area and from transit area to destination
area follows ① and ②.
An example of route selection based on the above route selection procedure is shown in Figure 2.
Route selection function is allocated in Area # 4 and Area # 7, and shows the route when packet
is transferred from Area # 1 to Area # 6, Area # 9, and Area # 10.
Moreover, the allowable maximum number of transit areas in the ladder-shaped network topology
in Figure 2could be 7 as shown in Figure 3.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
39
4.2 EVALUATION RESULTS AND DISCUSSIONS
The evaluation results are shown in Figures 4 to 10. Figure 4 shows the result when Zc is 2.0 and
M is 2. Figures 5, 6, and 7 illustrate graphs in which Zc is changed to 1.0, 0.5, 0.1, respectively.
Figure 8 shows the result when M is 20 and Zc is 1. Figures 6, 7, 5 illustrate graphs in which M
is changed to 10, 5, 2, respectively. The horizontal axis in Figures shows the allowable maximum
number of transit areas (N). The vertical axis shows the total network cost (normalized value).
Moreover, Figures 5, 7 and 9illustrate the cost of optimal deployment (dashed line), in addition to
the cost based on the proposed algorithm (solid line).Here, we calculate all the deployment
patterns and decide the deployment with the lowest cost as the optimal deployment. Figure 11
shows the final allocations when N is varied under the conditions of Figure 5. The following
points are clear from these Figs:
1) The smaller N is (i.e., the more severe the network delay requirement is), the greater the total
network cost. However, in cases where routing functions end up being allocated to multiple areas
(as in Figure 7), a decrease in N does not greatly increase the total network cost unless N is
extremely small (for example, N is 2).
<Reason> As shown in Figure 11, in cases where there is no restriction on N (N is 7) under the
conditions of Figure 5, concentrating the routing function on Area #5 alone is the most
economical. However, as N becomes smaller, it becomes necessary to allocate the routing
function to many areas in order to satisfy the smaller N.
The value of maximum tolerable network delay can be decided if the condition of allowable
increase of network cost is given. For example, if the allowable maximum number of transit areas
is limited to 3 in the example of Figure 4, the total network cost increases by about approximately
40%, resulting in 40% increase in service fee as well. If the carrier would like to limit the increase
in service fee to 20% or less, it should limit the allowable maximum number of transit areas to 4
in this example. One of the main objectives of this paper is to be able to provide such network
design guidelines.
2) The greater Zc is and the greater M is, the greater an increase in the total network cost caused
by the restriction on N.
<Reason> If Zc is small, the cost of the routing function is small relative to the cost of the circuit
bandwidth. As a result, the cost increase caused by an increase in the number of areas (to which
the routing function is allocated) in order to satisfy N becomes relatively small. As M increases,
the cost reduction achieved by the integration of the routing function increases and it becomes
more desirable to integrate the routing function.
3) The proposed algorithm could get results that are close to the optimal deployment by 85% or
more in this evaluation, as in Figures 5, 7, and 9.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
40
Figure 7. Simulation result 4 (ZC=0.1, M=2)
2 3 4 5 6 7
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
Proposed algorithmOptimal solution
Figure 6. Simulation result 3 (ZC=0.5, M=2)
Allowable maximum number of transit areas
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Figure 5. Simulation result 2 (ZC=1.0, M=2)
Allowable maximum number of transit areas
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Optimal solution
Figure 4. Simulation result 1 (ZC=2.0, M=2)
Allowable maximum number of transit areas
2 3 4 5 6 7
2.0
1.5
1.0
Proposed algorithm
Totalnetworkcost(Normalizedvalue)
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
41
Figure 9. Simulation result 7 (ZC=1.0, M=10)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
Optimal solution
Figure 8. Simulation result 5 (ZC=1.0, M=20)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
Figure 10. Simulation result 7 (ZC=1.0, M=5)
Allowable maximum number of transit areas
2.0
1.5
1.0
Totalnetworkcost(Normalizedvalue)
2 3 4 5 6 7
Proposed algorithm
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
42
Although the specific network topology is assumed in the evaluation of this paper, the major
trend and the network design guidelines clarified this time could be applicable in the same way,
even if the number of areas is increased to 100, or a star or loop topology is assumed. As the
proposed algorithm, which repeats the judgment as to whether the total network cost is lower if
the virtual routing functions in the specific area is integrated in the other area, is also applicable,
the similar evaluation results such as ‘the shorter the maximum tolerable network delay, the
greater the number of areas where the routing function must be allocated, resulting in an increase
in the total network cost’ could be expected. It is noted that the areas in which virtual routing
functions are actually deployed depend on the network topology.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
43
5. CONCLUSIONS
This paper has evaluated the effect of the maximum tolerable network delay on the guidelines for
the allocation of virtual routing functions. Our results with the ladder-shaped network have
revealed the following: (1) The shorter the maximum tolerable network delay, the greater the
number of areas where the routing function must be allocated, resulting in an increase in the total
network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the
greater the increase in the total network cost caused by the maximum tolerable network delay.
This paper has also provided the possible guideline how to decide the value of maximum
tolerable network delay when the condition of allowable increase of network cost is given.
Moreover, this paper has also indicated that the proposed algorithm could get results that are
close to the optimal solution by 85% or more.
It is required to study cases where the fixed costs of the routing function and circuit bandwidth
are taken into consideration, and where multiple virtual network functions (ex. firewall function,
DPI function) are to be allocated.
ACKNOWLEDGMENT
We would like to thank Mr. Kenichiro HIDA for his help with the evaluation.
REFERENCES
[1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers, Challenges
and Call for Action,” ETSI NFV, Oct. 2012.
[2] “Network Functions Virtualisation (NFV); Architectural Framework,” ETSI GS NFV 002 v1.2.1,
Dec. 2014.
file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf
[3] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function
Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys &
Tutorials, Vol. 18, Issue 1, pp.236-262, 2016.
[4] K.Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total
Network Power Consumption,” 18th International Conference on Information and Communication
Systems (ICICS Venice 2016), Aug. 2016.
[5] S.Kuribayashi, “Flexible Virtual Routing Function Deployment in NFV-based network with
Minimum Total Network Cost,” International Journal of Computer Networks & Communications
(IJCNC) Vol.8, No.5, pp.15-26, Nov.2016.
[6] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A
Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013.
[7] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud
Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014.
[8] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network
functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014,
pp. 7–13.
[9] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network
functions,” in Network and Service Management (CNSM), 2014 10th International Conference on,
Nov 2014, pp. 418–423.
[10] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of
Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on
Network Softwarization (NetSoft), pp.1-9, 2015.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
44
[11] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual
Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014.
[12] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE
Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular:
Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014.
[13] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,”
International Journal of Network Management, pp.490-506, 2015.
[14] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer
communications networks”, APCC2006, 2F-4 (2006.8)
[15] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing
Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS),
Vol.2, No.1, pp.1-8, Feb. 2011.
[16] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different
Service Quality to Users at Multiple Access”, International Journal of Computer Networks &
Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015.
[17] K. Hida and S. Kuribayashi, “NFV-based virtual routing function deployment under network delay,”
19th International Conference on Computer Communications and Applications (ICCCA Kyoto
2017), pp.862-866, Nov. 2017.
AUTHOR
Shin-Ichi kuribayashi Received The B.E., M.E., And D.E. Degrees From Tohoku
University, Japan, In 1978, 1980, And 1988 Respectively. He Joined Ntt Electrical
Communications Labs In 1980. He Has Been Engaged In The Design And
Development Of Ddx And Isdn Packet Switching, Atm, Phs, And Imt 2000 And Ip-Vpn
Systems. He Researched Distributed Communication Systems At Stanford University
From December 1988 Through December 1989. He Participated In International
Standardization On Atm Signaling And Imt2000 Signaling Protocols At Itu-T Sg11
From 1990 Through 2000. Since April 2004, He Has Been A Professor In The Department Of Computer
And Information Science, Faculty Of Science And Technology, Seikei University. His Research Interests
Include Resource Management For Nfv And Sdn-Based Networks, Qos Control, Traffic Control For Cloud
Computing Environments And Green Network. He Is A Member Of Ieee, Ieice And Ipsj.

More Related Content

What's hot

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
IJCNCJournal
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
University of Piraeus
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
Abir Hossain
 
A study on “link
A study on “linkA study on “link
A study on “link
prj_publication
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
csandit
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
IJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
paperpublications3
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
cscpconf
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
ijmnct
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
IAESIJEECS
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
ijwmn
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
ijceronline
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
graphhoc
 
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
IJERA Editor
 
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
Multiflow Model for Routing and Policing Traffic in  Infocommunication NetworkMultiflow Model for Routing and Policing Traffic in  Infocommunication Network
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
International Journal of Engineering Inventions www.ijeijournal.com
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
ijcsit
 

What's hot (17)

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...
 
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
Multiflow Model for Routing and Policing Traffic in  Infocommunication NetworkMultiflow Model for Routing and Policing Traffic in  Infocommunication Network
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 

Similar to VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
IJCNCJournal
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
TELKOMNIKA JOURNAL
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
B.T.L.I.T
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
IJCNCJournal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
IJCNCJournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
IJCNCJournal
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
IOSR Journals
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
IJCNCJournal
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
IJCNCJournal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
IJCSES Journal
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
IRJET Journal
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
IJERA Editor
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
ijasuc
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ijgca
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
ijgca
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Jitender Grover
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
IJERA Editor
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
IJECEIAES
 

Similar to VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS (20)

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 

More from IJCNCJournal

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
IJCNCJournal
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
IJCNCJournal
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
IJCNCJournal
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
IJCNCJournal
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 

More from IJCNCJournal (20)

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 DOI: 10.5121/ijcnc.2018.10103 35 VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY CONSTRAINTS Shin-ichi Kuribayashi Department of Computer and Information Science, Seikei University, Japan ABSTRACT NFV-based network implements a variety of network functions with software on general-purpose servers and this allows the network operator to select any capacity and location of network functions without any physical constraints. The authors proposed an algorithm of virtual routing function allocation in the NFV- based network for minimizing the total power consumption or the total network cost, and developed effective allocation guidelines for virtual routing functions. This paper evaluates the effect of the maximum tolerable network delay on the guidelines for the allocation of virtual routing functions, which minimizes the total network cost. The following points are clear from quantitative evaluations: (1) The shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the total network cost caused by the maximum tolerable network delay. This paper also provides the possible guideline how to decide the value of maximum tolerable network delay when the condition of allowable increase in network cost is given. KEYWORDS NFV, resource allocation, virtual routing function, minimum total network cost 1. INTRODUCTION In recent years, network carriers have begun to implement network functions based on a new technology called network functions virtualization (NFV) [1]-[3]. In an NFV-based network, network functions are implemented in a virtual manner by software on general-purpose servers. NFV makes it possible to select both the capacity and location of each function without physical constraints. Therefore, to build an economical NFV-based network, it is important to determine where each network function should be allocated in the network and what its capacity should be. The authors proposed an algorithm of virtual routing function allocation in the NFV network for minimizing the total power consumption or the total network cost, and developed effective allocation guidelines for virtual routing functions [4],[5]. Specifically, it was found that the greater the power consumption of the routing function relative to that of the circuit bandwidth, and the greater the peak coefficient of traffic between areas is, the smaller the total power consumption or the total network cost can be made by integrating the routing functions of some areas into those of a small number of areas. It was also indicated that there can be cases where distributing low-capacity routing functions in the network, which has been difficult to implement in conventional networks but is made possible by NFV, can dramatically reduce the network
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 36 power consumption. The above studies were not meant just to address the VNE (virtual network resource allocation) problem [6],[7]. Rather, the aim was at developing function allocation guidelines, which show how much capacity each virtual routing function is required to have and what the effective way of allocating each function is depending on the ratio of the cost of a routing function to that of a circuit bandwidth and the peak coefficient of traffic between areas. References [4] and [5] did not take network quality into consideration. This paper evaluates the effect of the maximum tolerable network delay on the guidelines for allocating the virtual routing function. The objective function in this paper is to minimize the total network cost. The rest of this paper is organized as follows. Section 2 explains related works. Section 3 proposes to enhance the existing routing function allocation algorithm, which was proposed in References [4] and [5]. Section 4 evaluates the effect of the maximum tolerable network delay on the function allocation guidelines, with a ladder-shaped network model that simulates the network structure of Japan. Finally, Section 5 presents the conclusions. This paper is an extension of the study in Reference [17]. 2. RELATED WORK One of the related studies is the VNE (virtual network resource allocation) problem, a problem of allocating virtual nodes and links to a physical network efficiently [6],[7]. Reference [8] evaluates the allocation of multiple VNFs. Reference [9] proposes a functional allocation assuming a hybrid arrangement in which dedicated hardware and virtual functions are used. References [10] and [11] proposes dynamic resource allocation and scheduling. Reference [12] evaluates the virtualization of S-GW (serving GW) and P-GW (packet data network GW) functions in a mobile network in terms of network load and network delay. Based on an evaluation made on a network that simulates the network structure of the U.S.A., it shows that four data centers that completely virtualize these GWs are required. Reference [13] proposes a method for solving the virtual DPI allocation problem, which is aimed at minimizing the cost. We proposed a resource allocation method in a cloud environment in which computing power and access bandwidths are allocated simultaneously [14]-[16]. The key point of this method is how to pack as many requirements (simultaneously requiring two different types of resource of computing power and access bandwidths with service quality being not uniform) as possible into multiple sets of computing power and bandwidths. Most of the above evaluations deal with how to pack (allocate) virtual network functions to finite physical network resources efficiently. In contrast, references [4] and [5] and this paper try to develop allocation guidelines that indicate how much capacity is required for each virtual network function and what is the effective way of allocating each function, both of which depend on the relative costs of the routing function and the circuit bandwidth and the inter-area traffic distribution. We believe that these guidelines provide network carriers with essential information when they design and build an NFV-based network in a medium to long term.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 37 3. ENHANCED ROUTING FUNCTION ALLOCATION ALGORITHM UNDER NETWORK DELAY CONSTRAINTS It is proposed to enhance the existing routing function allocation algorithm proposed in References [4] and [5], in order to ensure that the network delay does not exceed the maximum tolerable network delay. In this paper, the constraint of the maximum tolerable network delay is applied to only intra-area communication and communication between adjacent areas. This is because, in communication between remote areas, the locations of routing functions do not greatly affect communication distances. Moreover, we evaluate the maximum tolerable network delay with the maximum number of transit areas, N. In the existing allocation algorithm [4]-[5], the routing function is first allocated to each area. Next, an area with the smallest number of packets received and transmitted over a certain period is selected. If integrating the routing function of this area (integration-origin area) into the routing function of another area (integration-destination area) reduces the total network cost, this integration is done. If not, the integration processing will not be done. Then, the integration judgment is similarly performed on the next integration-origin area candidate. This process is terminated when there is no integration-origin area left. The following extension is proposed in the existing routing function integration process, to ensure that the network delay does not exceed the maximum tolerable network delay. That is, the integration processing will not be carried out if there is even one communication flow that does not satisfy N in the integration judgment for each integration-origin area candidate. 4. EVALUATION OF THE PROPOSED ROUTING FUNCTION ALLOCATION ALGORITHM 4.1 EVALUATION CONDITIONS (1) We have developed a simulation program in C language that executes the enhanced allocation algorithm proposed in Section 3. (2) Network structure: The ladder-shaped model illustrated in Figure 1, which simulates the shape of Japan, is used as in References [4] and [5].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 38 (3) Traffic flow: The traffic flow is the same as that used in References [4] and [5]. The amount of traffic between Area #5 and each of the remaining areas is M times (peak coefficient) that of traffic between other areas. Thus, M=1 means that traffic flows between areas are uniform. (4) Since the ratio of the cost of the routing function to the cost of the circuit bandwidth greatly affects the total network cost, the following ratio is defined as in Reference [5]: Zc = αc/βc (1) Where αc is the cost of the routing function per pps (packets per second), and βc the cost of the circuit bandwidth per Mbps per 10 km. The fixed costs of the routing function and circuit bandwidth are not taken into consideration here. (5) Routing policy: We revise the routing policy in References [4] and [5] so that the cost will be lower. The route selection procedure is explained below. ① Select the route from the source area to the destination area in the horizontal direction. ② If one of the source area number and destination area number is an odd number and the other is an even number, select the route until a destination area appears upward or downward. Afterwards if the destination area number is odd, the upward direction is selected. If it is an even number, the downward direction is selected. ③ If there is no area where the route selection function is deployed on the route based on ① and ②, select the area in which virtual routing function is deployed as the transit area, that will be the shortest distance when relaying the packet. ④ The route selection both from source area to transit area and from transit area to destination area follows ① and ②. An example of route selection based on the above route selection procedure is shown in Figure 2. Route selection function is allocated in Area # 4 and Area # 7, and shows the route when packet is transferred from Area # 1 to Area # 6, Area # 9, and Area # 10. Moreover, the allowable maximum number of transit areas in the ladder-shaped network topology in Figure 2could be 7 as shown in Figure 3.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 39 4.2 EVALUATION RESULTS AND DISCUSSIONS The evaluation results are shown in Figures 4 to 10. Figure 4 shows the result when Zc is 2.0 and M is 2. Figures 5, 6, and 7 illustrate graphs in which Zc is changed to 1.0, 0.5, 0.1, respectively. Figure 8 shows the result when M is 20 and Zc is 1. Figures 6, 7, 5 illustrate graphs in which M is changed to 10, 5, 2, respectively. The horizontal axis in Figures shows the allowable maximum number of transit areas (N). The vertical axis shows the total network cost (normalized value). Moreover, Figures 5, 7 and 9illustrate the cost of optimal deployment (dashed line), in addition to the cost based on the proposed algorithm (solid line).Here, we calculate all the deployment patterns and decide the deployment with the lowest cost as the optimal deployment. Figure 11 shows the final allocations when N is varied under the conditions of Figure 5. The following points are clear from these Figs: 1) The smaller N is (i.e., the more severe the network delay requirement is), the greater the total network cost. However, in cases where routing functions end up being allocated to multiple areas (as in Figure 7), a decrease in N does not greatly increase the total network cost unless N is extremely small (for example, N is 2). <Reason> As shown in Figure 11, in cases where there is no restriction on N (N is 7) under the conditions of Figure 5, concentrating the routing function on Area #5 alone is the most economical. However, as N becomes smaller, it becomes necessary to allocate the routing function to many areas in order to satisfy the smaller N. The value of maximum tolerable network delay can be decided if the condition of allowable increase of network cost is given. For example, if the allowable maximum number of transit areas is limited to 3 in the example of Figure 4, the total network cost increases by about approximately 40%, resulting in 40% increase in service fee as well. If the carrier would like to limit the increase in service fee to 20% or less, it should limit the allowable maximum number of transit areas to 4 in this example. One of the main objectives of this paper is to be able to provide such network design guidelines. 2) The greater Zc is and the greater M is, the greater an increase in the total network cost caused by the restriction on N. <Reason> If Zc is small, the cost of the routing function is small relative to the cost of the circuit bandwidth. As a result, the cost increase caused by an increase in the number of areas (to which the routing function is allocated) in order to satisfy N becomes relatively small. As M increases, the cost reduction achieved by the integration of the routing function increases and it becomes more desirable to integrate the routing function. 3) The proposed algorithm could get results that are close to the optimal deployment by 85% or more in this evaluation, as in Figures 5, 7, and 9.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 40 Figure 7. Simulation result 4 (ZC=0.1, M=2) 2 3 4 5 6 7 Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) Proposed algorithmOptimal solution Figure 6. Simulation result 3 (ZC=0.5, M=2) Allowable maximum number of transit areas Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Figure 5. Simulation result 2 (ZC=1.0, M=2) Allowable maximum number of transit areas Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Optimal solution Figure 4. Simulation result 1 (ZC=2.0, M=2) Allowable maximum number of transit areas 2 3 4 5 6 7 2.0 1.5 1.0 Proposed algorithm Totalnetworkcost(Normalizedvalue)
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 41 Figure 9. Simulation result 7 (ZC=1.0, M=10) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm Optimal solution Figure 8. Simulation result 5 (ZC=1.0, M=20) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm Figure 10. Simulation result 7 (ZC=1.0, M=5) Allowable maximum number of transit areas 2.0 1.5 1.0 Totalnetworkcost(Normalizedvalue) 2 3 4 5 6 7 Proposed algorithm
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 42 Although the specific network topology is assumed in the evaluation of this paper, the major trend and the network design guidelines clarified this time could be applicable in the same way, even if the number of areas is increased to 100, or a star or loop topology is assumed. As the proposed algorithm, which repeats the judgment as to whether the total network cost is lower if the virtual routing functions in the specific area is integrated in the other area, is also applicable, the similar evaluation results such as ‘the shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost’ could be expected. It is noted that the areas in which virtual routing functions are actually deployed depend on the network topology.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 43 5. CONCLUSIONS This paper has evaluated the effect of the maximum tolerable network delay on the guidelines for the allocation of virtual routing functions. Our results with the ladder-shaped network have revealed the following: (1) The shorter the maximum tolerable network delay, the greater the number of areas where the routing function must be allocated, resulting in an increase in the total network cost. (2) The greater the routing function cost relative to the circuit bandwidth cost, the greater the increase in the total network cost caused by the maximum tolerable network delay. This paper has also provided the possible guideline how to decide the value of maximum tolerable network delay when the condition of allowable increase of network cost is given. Moreover, this paper has also indicated that the proposed algorithm could get results that are close to the optimal solution by 85% or more. It is required to study cases where the fixed costs of the routing function and circuit bandwidth are taken into consideration, and where multiple virtual network functions (ex. firewall function, DPI function) are to be allocated. ACKNOWLEDGMENT We would like to thank Mr. Kenichiro HIDA for his help with the evaluation. REFERENCES [1] M. Chiosi et al., “Network Functions Virtualization - An Introduction, Benefits, Enablers, Challenges and Call for Action,” ETSI NFV, Oct. 2012. [2] “Network Functions Virtualisation (NFV); Architectural Framework,” ETSI GS NFV 002 v1.2.1, Dec. 2014. file:///C:/Users/Kuribayashi/Downloads/gs_NFV002v010201p.pdf [3] R.Mijumbi, J.Serrat, J.Gorricho, N.Bouten, F.D.Trurck and R.Boutaba, “Network Function Virtualization: State-of-the-art and Research Challenges,” IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp.236-262, 2016. [4] K.Hida and S. Kuribayashi, “Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption,” 18th International Conference on Information and Communication Systems (ICICS Venice 2016), Aug. 2016. [5] S.Kuribayashi, “Flexible Virtual Routing Function Deployment in NFV-based network with Minimum Total Network Cost,” International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, pp.15-26, Nov.2016. [6] A.Fischer, J.F.Botero, M.T.Beck, H.Meer, and X.Hesselbach,” Virtual Network Embedding: A Survey”, IEEE Communications Surveys & Tutorials, Vol. 15, No.4, 2013. [7] X.Wei, S.Hu, H.Li, F.Yang and Y.Jin, “A Survey on Virtual Network Embedding in Cloud Computing Centers”, The Open Automation and Control Systems Journal, Vol. 6, pp.414-425, 2014. [8] S. Mehraghdam, M. Keller, and H. Karl, “Specifying and placing chains of virtual network functions,” in Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, Oct 2014, pp. 7–13. [9] H. Moens and F. D. Turck, “VNF-P: A model for efficient placement of virtualized network functions,” in Network and Service Management (CNSM), 2014 10th International Conference on, Nov 2014, pp. 418–423. [10] R.Mijumbi, J.Serrat, J.Gorricho, N.Boutenz, F.Turckz and S.Davy, “Design and Evaluation of Algorithms for Mapping and Scheduling of Virtual Network Functions,” 1st IEEE Conference on Network Softwarization (NetSoft), pp.1-9, 2015.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018 44 [11] S.Clayman, E.Mainiy, A.Galis, A.Manzaliniz and N. Mazzocca, “The Dynamic Placement of Virtual Network Functions,”IEEE Network Operations and Management Symposium (NOMS),pp.1-9, 2014. [12] A.Basta, W.Kellerer, M.Hoffmann, H.J.Morper, and K.Hoffmann, "Applying NFV and SDN to LTE Mobile Core Gateways; The Functions Placement Problem," 4th Workshop on All Things Cellular: Operations, Applications and Challenges 2014, pp.33-38, Aug. 2014. [13] M.Bouet, J.Leguay and V.Conan, “Cost-based placement of vDPI functions in NFV infrastructures,” International Journal of Network Management, pp.490-506, 2015. [14] S.Tsumura and S.Kuribayashi, “Simultaneous allocation of multiple resources for computer communications networks”, APCC2006, 2F-4 (2006.8) [15] S.Kuribayashi, “Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments”, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2, No.1, pp.1-8, Feb. 2011. [16] S.Kuribayashi,“Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access”, International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, pp.33-51, Nov.2015. [17] K. Hida and S. Kuribayashi, “NFV-based virtual routing function deployment under network delay,” 19th International Conference on Computer Communications and Applications (ICCCA Kyoto 2017), pp.862-866, Nov. 2017. AUTHOR Shin-Ichi kuribayashi Received The B.E., M.E., And D.E. Degrees From Tohoku University, Japan, In 1978, 1980, And 1988 Respectively. He Joined Ntt Electrical Communications Labs In 1980. He Has Been Engaged In The Design And Development Of Ddx And Isdn Packet Switching, Atm, Phs, And Imt 2000 And Ip-Vpn Systems. He Researched Distributed Communication Systems At Stanford University From December 1988 Through December 1989. He Participated In International Standardization On Atm Signaling And Imt2000 Signaling Protocols At Itu-T Sg11 From 1990 Through 2000. Since April 2004, He Has Been A Professor In The Department Of Computer And Information Science, Faculty Of Science And Technology, Seikei University. His Research Interests Include Resource Management For Nfv And Sdn-Based Networks, Qos Control, Traffic Control For Cloud Computing Environments And Green Network. He Is A Member Of Ieee, Ieice And Ipsj.