An evaluation method for secure virtual network embedding algorithms
Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algor...
Gespeichert in:
Veröffentlicht in: | Journal of Computer Virology and Hacking Techniques 2017-11, Vol.13 (4), p.265-270 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 270 |
---|---|
container_issue | 4 |
container_start_page | 265 |
container_title | Journal of Computer Virology and Hacking Techniques |
container_volume | 13 |
creator | Kim, Hak Suh Lee, Sang-Ho |
description | Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm. |
doi_str_mv | 10.1007/s11416-017-0303-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1964626181</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1964626181</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</originalsourceid><addsrcrecordid>eNp1kD1PwzAURS0EElXpD2CzxGzwcxzbGavyUaRKLDBbju20KUlc7KSIf0-qMHRhene45z7pIHQL9B4olQ8JgIMgFCShGc1IcYFmjImMKJlll2f5Gi1S2lNKgeVKinyGHpcd9kfTDKavQ4db3--Cw1WIOHk7RI-PdewH0-DO998hfmLflt65utti02xDrPtdm27QVWWa5Bd_d44-np_eV2uyeXt5XS03xGYgelIK40BZq4SHAnIhLS9LVuWuKjxzFWN5bpRS1DDrrOOS5wWTVnFTAHOcVtkc3U27hxi-Bp96vQ9D7MaXGgrBBROgYGzB1LIxpBR9pQ-xbk380UD1yZeefOnRlz750sXIsIlJY7fb-ni2_C_0C2FAbTY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1964626181</pqid></control><display><type>article</type><title>An evaluation method for secure virtual network embedding algorithms</title><source>SpringerNature Journals</source><source>Alma/SFX Local Collection</source><creator>Kim, Hak Suh ; Lee, Sang-Ho</creator><creatorcontrib>Kim, Hak Suh ; Lee, Sang-Ho</creatorcontrib><description>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</description><identifier>ISSN: 2263-8733</identifier><identifier>EISSN: 2263-8733</identifier><identifier>DOI: 10.1007/s11416-017-0303-9</identifier><language>eng</language><publisher>Paris: Springer Paris</publisher><subject>Algorithms ; Computer Science ; Computer simulation ; Infrastructure ; Original Paper ; Resource allocation ; Virtual networks</subject><ispartof>Journal of Computer Virology and Hacking Techniques, 2017-11, Vol.13 (4), p.265-270</ispartof><rights>Springer-Verlag France SAS 2017</rights><rights>Copyright Springer Science & Business Media 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</citedby><cites>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11416-017-0303-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11416-017-0303-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kim, Hak Suh</creatorcontrib><creatorcontrib>Lee, Sang-Ho</creatorcontrib><title>An evaluation method for secure virtual network embedding algorithms</title><title>Journal of Computer Virology and Hacking Techniques</title><addtitle>J Comput Virol Hack Tech</addtitle><description>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Infrastructure</subject><subject>Original Paper</subject><subject>Resource allocation</subject><subject>Virtual networks</subject><issn>2263-8733</issn><issn>2263-8733</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kD1PwzAURS0EElXpD2CzxGzwcxzbGavyUaRKLDBbju20KUlc7KSIf0-qMHRhene45z7pIHQL9B4olQ8JgIMgFCShGc1IcYFmjImMKJlll2f5Gi1S2lNKgeVKinyGHpcd9kfTDKavQ4db3--Cw1WIOHk7RI-PdewH0-DO998hfmLflt65utti02xDrPtdm27QVWWa5Bd_d44-np_eV2uyeXt5XS03xGYgelIK40BZq4SHAnIhLS9LVuWuKjxzFWN5bpRS1DDrrOOS5wWTVnFTAHOcVtkc3U27hxi-Bp96vQ9D7MaXGgrBBROgYGzB1LIxpBR9pQ-xbk380UD1yZeefOnRlz750sXIsIlJY7fb-ni2_C_0C2FAbTY</recordid><startdate>20171101</startdate><enddate>20171101</enddate><creator>Kim, Hak Suh</creator><creator>Lee, Sang-Ho</creator><general>Springer Paris</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20171101</creationdate><title>An evaluation method for secure virtual network embedding algorithms</title><author>Kim, Hak Suh ; Lee, Sang-Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Infrastructure</topic><topic>Original Paper</topic><topic>Resource allocation</topic><topic>Virtual networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Hak Suh</creatorcontrib><creatorcontrib>Lee, Sang-Ho</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Hak Suh</au><au>Lee, Sang-Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An evaluation method for secure virtual network embedding algorithms</atitle><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle><stitle>J Comput Virol Hack Tech</stitle><date>2017-11-01</date><risdate>2017</risdate><volume>13</volume><issue>4</issue><spage>265</spage><epage>270</epage><pages>265-270</pages><issn>2263-8733</issn><eissn>2263-8733</eissn><abstract>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</abstract><cop>Paris</cop><pub>Springer Paris</pub><doi>10.1007/s11416-017-0303-9</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2263-8733 |
ispartof | Journal of Computer Virology and Hacking Techniques, 2017-11, Vol.13 (4), p.265-270 |
issn | 2263-8733 2263-8733 |
language | eng |
recordid | cdi_proquest_journals_1964626181 |
source | SpringerNature Journals; Alma/SFX Local Collection |
subjects | Algorithms Computer Science Computer simulation Infrastructure Original Paper Resource allocation Virtual networks |
title | An evaluation method for secure virtual network embedding algorithms |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T13%3A32%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20evaluation%20method%20for%20secure%20virtual%20network%20embedding%20algorithms&rft.jtitle=Journal%20of%20Computer%20Virology%20and%20Hacking%20Techniques&rft.au=Kim,%20Hak%20Suh&rft.date=2017-11-01&rft.volume=13&rft.issue=4&rft.spage=265&rft.epage=270&rft.pages=265-270&rft.issn=2263-8733&rft.eissn=2263-8733&rft_id=info:doi/10.1007/s11416-017-0303-9&rft_dat=%3Cproquest_cross%3E1964626181%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1964626181&rft_id=info:pmid/&rfr_iscdi=true |