A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks
Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter network following a strictly ordered chain. NF virtualization (NFV) virtualizes th...
Gespeichert in:
Veröffentlicht in: | IEEE eTransactions on network and service management 2017-09, Vol.14 (3), p.554-568 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 568 |
---|---|
container_issue | 3 |
container_start_page | 554 |
container_title | IEEE eTransactions on network and service management |
container_volume | 14 |
creator | Long Qu Assi, Chadi Shaban, Khaled Khabbaz, Maurice J. |
description | Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter network following a strictly ordered chain. NF virtualization (NFV) virtualizes these NFs and transforms them into instances of plain software referred to as virtual NFs (VNFs) and executed by virtual machines, which, in turn, are hosted over one or multiple industry-standard physical machines. The failure (e.g., hardware or software) of any one of a service chain's VNFs leads to breaking down the entire chain and causing significant data losses, delays, and resource wastage. This paper establishes a reliability-aware and delay-constrained (READ) routing optimization framework for NFV-enabled datacenter networks. READ encloses the formulation of a complex mixed integer linear program (MILP) whose resolution yields an optimal network service VNF placement and traffic routing policy that jointly maximizes the achieved respective reliabilities of supported network services and minimizes these services' respective end-to-end delays. A heuristic algorithm dubbed Greedy-k-shortest paths (GSP) is proposed for the purpose of overcoming the MILP's complexity and develop an efficient routing scheme whose results are comparable to those of READ's optimal counterparts. Thorough numerical analyses are conducted to evaluate the network's performance under GSP, and hence, gauge its merit; particularly, when compared to existing schemes, GSP exhibits an improvement of 18.5% in terms of the average end-to-end delay as well as 7.4% to 14.8% in terms of reliability. |
doi_str_mv | 10.1109/TNSM.2017.2723090 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_7967831</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7967831</ieee_id><sourcerecordid>1936249017</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-c56c137130635ce46eef988a14403edb70f1d560d4541c9bfa53ae2bed1010893</originalsourceid><addsrcrecordid>eNpNkElPwzAQhS0EEqXwAxAXS5xTvGTzseoGUimIFjhajjOhLiEBO21Vfj2OWhCnWfTem9GH0CUlPUqJuFnM5vc9RmjSYwnjRJAj1KGCsyCMeHL8rz9FZ86tCIlSKlgHfffxE5RGZaY0zS7ob5UFPINmW9t3PAe7MRrwYKlMhR9tvTHO1JWp3vCraZZ4CKXa4claWVU1AA571Wz8EowqlZWQ45Hf2k9rHOChapSGdv5Nd-fopFClg4tD7aLn8WgxuA2mD5O7QX8aaCZ4E-go1pQnlJOYRxrCGKAQaapoGBIOeZaQguZRTPIwCqkWWaEiroBlkFNCSSp4F13vcz9t_bUG18hVvbaVPyk9lZiFwmPzKrpXaVs7Z6GQ_vEPZXeSEtkili1i2SKWB8Tec7X3GAD40yciTlJO-Q9UInht</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1936249017</pqid></control><display><type>article</type><title>A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks</title><source>IEEE Xplore (Online service)</source><creator>Long Qu ; Assi, Chadi ; Shaban, Khaled ; Khabbaz, Maurice J.</creator><creatorcontrib>Long Qu ; Assi, Chadi ; Shaban, Khaled ; Khabbaz, Maurice J.</creatorcontrib><description>Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter network following a strictly ordered chain. NF virtualization (NFV) virtualizes these NFs and transforms them into instances of plain software referred to as virtual NFs (VNFs) and executed by virtual machines, which, in turn, are hosted over one or multiple industry-standard physical machines. The failure (e.g., hardware or software) of any one of a service chain's VNFs leads to breaking down the entire chain and causing significant data losses, delays, and resource wastage. This paper establishes a reliability-aware and delay-constrained (READ) routing optimization framework for NFV-enabled datacenter networks. READ encloses the formulation of a complex mixed integer linear program (MILP) whose resolution yields an optimal network service VNF placement and traffic routing policy that jointly maximizes the achieved respective reliabilities of supported network services and minimizes these services' respective end-to-end delays. A heuristic algorithm dubbed Greedy-k-shortest paths (GSP) is proposed for the purpose of overcoming the MILP's complexity and develop an efficient routing scheme whose results are comparable to those of READ's optimal counterparts. Thorough numerical analyses are conducted to evaluate the network's performance under GSP, and hence, gauge its merit; particularly, when compared to existing schemes, GSP exhibits an improvement of 18.5% in terms of the average end-to-end delay as well as 7.4% to 14.8% in terms of reliability.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2017.2723090</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Bandwidth ; Chains ; Complexity ; Cybersecurity ; datacenter ; Delay ; Delays ; Greedy algorithms ; Hardware ; Heuristic methods ; Intrusion detection systems ; Linear programming ; Mixed integer ; network functions ; Network reliability ; Optimization ; Provisioning ; Reliability ; resources ; Routing ; Routing (machining) ; Software ; Traffic flow ; Transformations (mathematics) ; Virtual environments</subject><ispartof>IEEE eTransactions on network and service management, 2017-09, Vol.14 (3), p.554-568</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-c56c137130635ce46eef988a14403edb70f1d560d4541c9bfa53ae2bed1010893</citedby><cites>FETCH-LOGICAL-c293t-c56c137130635ce46eef988a14403edb70f1d560d4541c9bfa53ae2bed1010893</cites><orcidid>0000-0002-3472-8660 ; 0000-0002-3161-1846</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7967831$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7967831$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Long Qu</creatorcontrib><creatorcontrib>Assi, Chadi</creatorcontrib><creatorcontrib>Shaban, Khaled</creatorcontrib><creatorcontrib>Khabbaz, Maurice J.</creatorcontrib><title>A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter network following a strictly ordered chain. NF virtualization (NFV) virtualizes these NFs and transforms them into instances of plain software referred to as virtual NFs (VNFs) and executed by virtual machines, which, in turn, are hosted over one or multiple industry-standard physical machines. The failure (e.g., hardware or software) of any one of a service chain's VNFs leads to breaking down the entire chain and causing significant data losses, delays, and resource wastage. This paper establishes a reliability-aware and delay-constrained (READ) routing optimization framework for NFV-enabled datacenter networks. READ encloses the formulation of a complex mixed integer linear program (MILP) whose resolution yields an optimal network service VNF placement and traffic routing policy that jointly maximizes the achieved respective reliabilities of supported network services and minimizes these services' respective end-to-end delays. A heuristic algorithm dubbed Greedy-k-shortest paths (GSP) is proposed for the purpose of overcoming the MILP's complexity and develop an efficient routing scheme whose results are comparable to those of READ's optimal counterparts. Thorough numerical analyses are conducted to evaluate the network's performance under GSP, and hence, gauge its merit; particularly, when compared to existing schemes, GSP exhibits an improvement of 18.5% in terms of the average end-to-end delay as well as 7.4% to 14.8% in terms of reliability.</description><subject>Bandwidth</subject><subject>Chains</subject><subject>Complexity</subject><subject>Cybersecurity</subject><subject>datacenter</subject><subject>Delay</subject><subject>Delays</subject><subject>Greedy algorithms</subject><subject>Hardware</subject><subject>Heuristic methods</subject><subject>Intrusion detection systems</subject><subject>Linear programming</subject><subject>Mixed integer</subject><subject>network functions</subject><subject>Network reliability</subject><subject>Optimization</subject><subject>Provisioning</subject><subject>Reliability</subject><subject>resources</subject><subject>Routing</subject><subject>Routing (machining)</subject><subject>Software</subject><subject>Traffic flow</subject><subject>Transformations (mathematics)</subject><subject>Virtual environments</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkElPwzAQhS0EEqXwAxAXS5xTvGTzseoGUimIFjhajjOhLiEBO21Vfj2OWhCnWfTem9GH0CUlPUqJuFnM5vc9RmjSYwnjRJAj1KGCsyCMeHL8rz9FZ86tCIlSKlgHfffxE5RGZaY0zS7ob5UFPINmW9t3PAe7MRrwYKlMhR9tvTHO1JWp3vCraZZ4CKXa4claWVU1AA571Wz8EowqlZWQ45Hf2k9rHOChapSGdv5Nd-fopFClg4tD7aLn8WgxuA2mD5O7QX8aaCZ4E-go1pQnlJOYRxrCGKAQaapoGBIOeZaQguZRTPIwCqkWWaEiroBlkFNCSSp4F13vcz9t_bUG18hVvbaVPyk9lZiFwmPzKrpXaVs7Z6GQ_vEPZXeSEtkili1i2SKWB8Tec7X3GAD40yciTlJO-Q9UInht</recordid><startdate>201709</startdate><enddate>201709</enddate><creator>Long Qu</creator><creator>Assi, Chadi</creator><creator>Shaban, Khaled</creator><creator>Khabbaz, Maurice J.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3472-8660</orcidid><orcidid>https://orcid.org/0000-0002-3161-1846</orcidid></search><sort><creationdate>201709</creationdate><title>A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks</title><author>Long Qu ; Assi, Chadi ; Shaban, Khaled ; Khabbaz, Maurice J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-c56c137130635ce46eef988a14403edb70f1d560d4541c9bfa53ae2bed1010893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Bandwidth</topic><topic>Chains</topic><topic>Complexity</topic><topic>Cybersecurity</topic><topic>datacenter</topic><topic>Delay</topic><topic>Delays</topic><topic>Greedy algorithms</topic><topic>Hardware</topic><topic>Heuristic methods</topic><topic>Intrusion detection systems</topic><topic>Linear programming</topic><topic>Mixed integer</topic><topic>network functions</topic><topic>Network reliability</topic><topic>Optimization</topic><topic>Provisioning</topic><topic>Reliability</topic><topic>resources</topic><topic>Routing</topic><topic>Routing (machining)</topic><topic>Software</topic><topic>Traffic flow</topic><topic>Transformations (mathematics)</topic><topic>Virtual environments</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Long Qu</creatorcontrib><creatorcontrib>Assi, Chadi</creatorcontrib><creatorcontrib>Shaban, Khaled</creatorcontrib><creatorcontrib>Khabbaz, Maurice J.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Long Qu</au><au>Assi, Chadi</au><au>Shaban, Khaled</au><au>Khabbaz, Maurice J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2017-09</date><risdate>2017</risdate><volume>14</volume><issue>3</issue><spage>554</spage><epage>568</epage><pages>554-568</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter network following a strictly ordered chain. NF virtualization (NFV) virtualizes these NFs and transforms them into instances of plain software referred to as virtual NFs (VNFs) and executed by virtual machines, which, in turn, are hosted over one or multiple industry-standard physical machines. The failure (e.g., hardware or software) of any one of a service chain's VNFs leads to breaking down the entire chain and causing significant data losses, delays, and resource wastage. This paper establishes a reliability-aware and delay-constrained (READ) routing optimization framework for NFV-enabled datacenter networks. READ encloses the formulation of a complex mixed integer linear program (MILP) whose resolution yields an optimal network service VNF placement and traffic routing policy that jointly maximizes the achieved respective reliabilities of supported network services and minimizes these services' respective end-to-end delays. A heuristic algorithm dubbed Greedy-k-shortest paths (GSP) is proposed for the purpose of overcoming the MILP's complexity and develop an efficient routing scheme whose results are comparable to those of READ's optimal counterparts. Thorough numerical analyses are conducted to evaluate the network's performance under GSP, and hence, gauge its merit; particularly, when compared to existing schemes, GSP exhibits an improvement of 18.5% in terms of the average end-to-end delay as well as 7.4% to 14.8% in terms of reliability.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2017.2723090</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-3472-8660</orcidid><orcidid>https://orcid.org/0000-0002-3161-1846</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-4537 |
ispartof | IEEE eTransactions on network and service management, 2017-09, Vol.14 (3), p.554-568 |
issn | 1932-4537 1932-4537 |
language | eng |
recordid | cdi_ieee_primary_7967831 |
source | IEEE Xplore (Online service) |
subjects | Bandwidth Chains Complexity Cybersecurity datacenter Delay Delays Greedy algorithms Hardware Heuristic methods Intrusion detection systems Linear programming Mixed integer network functions Network reliability Optimization Provisioning Reliability resources Routing Routing (machining) Software Traffic flow Transformations (mathematics) Virtual environments |
title | A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T08%3A53%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Reliability-Aware%20Network%20Service%20Chain%20Provisioning%20With%20Delay%20Guarantees%20in%20NFV-Enabled%20Enterprise%20Datacenter%20Networks&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Long%20Qu&rft.date=2017-09&rft.volume=14&rft.issue=3&rft.spage=554&rft.epage=568&rft.pages=554-568&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2017.2723090&rft_dat=%3Cproquest_RIE%3E1936249017%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1936249017&rft_id=info:pmid/&rft_ieee_id=7967831&rfr_iscdi=true |