Multi-Provider Virtual Network Embedding With Limited Information Disclosure

Download statistics - Document (COUNTER):

Dietrich, D.; Rizk, A.; Papadimitriou, P.: Multi-Provider Virtual Network Embedding With Limited Information Disclosure. In: IEEE Transactions on Network and Service Management 12 (2015), Nr. 2, S. 188-201. DOI: https://doi.org/10.1109/TNSM.2015.2417652

Repository version

To cite the version in the repository, please use this identifier: https://doi.org/10.15488/1677

Selected time period:

year: 
month: 

Sum total of downloads: 230




Thumbnail
Abstract: 
The ever-increasing need to diversify the Internet has recently revived the interest in network virtualization. Wide-area virtual network (VN) deployment raises the need for VN embedding (VNE) across multiple Infrastructure Providers (InPs), due to the InP's limited geographic footprint. Multi-provider VNE, in turn, requires a layer of indirection, interposed between the Service Providers and the InPs. Such brokers, usually known as VN Providers, are expected to have very limited knowledge of the physical infrastructure, since InPs will not be willing to disclose detailed information about their network topology and resource availability to third parties. Such information disclosure policies entail significant implications on resource discovery and allocation. In this paper, we study the challenging problem of multi-provider VNE with limited information disclosure (LID). In this context, we initially investigate the visibility of VN Providers on substrate network resources and question the suitability of topology-based requests for VNE. Subsequently, we present linear programming formulations for: (i) the partitioning of traffic matrix based VN requests into segments mappable to InPs, and (ii) the mapping of VN segments into substrate network topologies. VN request partitioning is carried out under LID, i.e., VN Providers access only information which is not deemed confidential by InPs. We further investigate the suboptimality of LID on VNE against a best-case scenario where the complete network topology and resource availability information is available to VN Providers. © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
License of this version: Es gilt deutsches Urheberrecht. Das Dokument darf zum eigenen Gebrauch kostenfrei genutzt, aber nicht im Internet bereitgestellt oder an Außenstehende weitergegeben werden.
Document Type: Article
Publishing status: acceptedVersion
Issue Date: 2015
Appears in Collections:Fakultät für Elektrotechnik und Informatik

distribution of downloads over the selected time period:

downloads by country:

pos. country downloads
total perc.
1 image of flag of Germany Germany 81 35.22%
2 image of flag of United States United States 32 13.91%
3 image of flag of China China 24 10.43%
4 image of flag of Greece Greece 16 6.96%
5 image of flag of No geo information available No geo information available 15 6.52%
6 image of flag of France France 8 3.48%
7 image of flag of Iran, Islamic Republic of Iran, Islamic Republic of 7 3.04%
8 image of flag of Italy Italy 6 2.61%
9 image of flag of Russian Federation Russian Federation 4 1.74%
10 image of flag of Hong Kong Hong Kong 4 1.74%
    other countries 33 14.35%

Further download figures and rankings:


Hinweis

Zur Erhebung der Downloadstatistiken kommen entsprechend dem „COUNTER Code of Practice for e-Resources“ international anerkannte Regeln und Normen zur Anwendung. COUNTER ist eine internationale Non-Profit-Organisation, in der Bibliotheksverbände, Datenbankanbieter und Verlage gemeinsam an Standards zur Erhebung, Speicherung und Verarbeitung von Nutzungsdaten elektronischer Ressourcen arbeiten, welche so Objektivität und Vergleichbarkeit gewährleisten sollen. Es werden hierbei ausschließlich Zugriffe auf die entsprechenden Volltexte ausgewertet, keine Aufrufe der Website an sich.

Search the repository


Browse