Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (2): 550-556.DOI: 10.11772/j.issn.1001-9081.2021020297
• Advanced computing • Previous Articles Next Articles
Weijian DENG1, Xi CHEN1,2(
)
Received:2021-03-01
Revised:2021-06-08
Accepted:2021-06-10
Online:2022-02-11
Published:2022-02-10
Contact:
Xi CHEN
About author:DENG Weijian, born in 1994, M. S. candidate. His research interests include network virtualization, software defined network.Supported by:通讯作者:
陈曦
作者简介:邓伟健(1994—),男,广东肇庆人,硕士研究生,主要研究方向:网络虚拟化、软件定义网络;基金资助:CLC Number:
Weijian DENG, Xi CHEN. Containerized network embedding algorithm based on time-varying resources[J]. Journal of Computer Applications, 2022, 42(2): 550-556.
邓伟健, 陈曦. 基于时变资源的容器化虚拟网络映射算法[J]. 《计算机应用》唯一官方网站, 2022, 42(2): 550-556.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021020297
| 节点 | CPU | 内存/GB | 系统 |
|---|---|---|---|
| Master | Inter Core i7-6700 | 16 | Ubuntu18.04LTS |
| Woeker1 | Inter Core i7-6700 | 16 | Ubuntu18.04LTS |
| Worker2 | Inter Core i7-6700 | 8 | Ubuntu18.04LTS |
Tab. 1 Configuration of physical hosts
| 节点 | CPU | 内存/GB | 系统 |
|---|---|---|---|
| Master | Inter Core i7-6700 | 16 | Ubuntu18.04LTS |
| Woeker1 | Inter Core i7-6700 | 16 | Ubuntu18.04LTS |
| Worker2 | Inter Core i7-6700 | 8 | Ubuntu18.04LTS |
| 网元类型 | CPU使用率/% | 内存使用/MB |
|---|---|---|
| OVS | 0.25 | 88.5 |
| Host | 0.10 | 8.0 |
| Router | 0.02 | 7.5 |
| DHCP | 0.01 | 34.8 |
| Web | 0.20 | 8.6 |
Tab. 2 Part theoretical value data of network element resource usage
| 网元类型 | CPU使用率/% | 内存使用/MB |
|---|---|---|
| OVS | 0.25 | 88.5 |
| Host | 0.10 | 8.0 |
| Router | 0.02 | 7.5 |
| DHCP | 0.01 | 34.8 |
| Web | 0.20 | 8.6 |
| 1 | CHAE M, LEE H, LEE K. A performance comparison of Linux containers and virtual machines using Docker and KVM[J]. Cluster Computing, 2019, 22(S1): 1765-1775. 10.1007/s10586-017-1511-2 |
| 2 | SOLTESZ S, PÖTZL H, FIUCZYNSKI M E, et al. Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors [C]// Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems. New York: ACM, 2007: 275-287. 10.1145/1272996.1273025 |
| 3 | MERKEL D. Docker: lightweight Linux containers for consistent development and deployment[J]. Linux Journal, 2014, 2014(239): No.2. |
| 4 | VENCIONECK R D, VASSOLER G, MARTINELLO M, et al. FlexForward: enabling an SDN manageable forwarding engine in Open vSwitch [C]// Proceedings of the 10th International Conference on Network and Service Management and Workshop. Piscataway: IEEE, 2014: 296-299. 10.1109/cnsm.2014.7014178 |
| 5 | HIBLER M, RICCI R, STOLLER L, et al. Large-scale virtualization in the Emulab network testbed [C]// Proceedings of the 2008 USENIX Annual Technical Conference. Berkeley: USENIX Association, 2008: 113-128. |
| 6 | TSAI P W, PICCIALLI F, TSAI C W, et al. Control frameworks in network emulation testbeds: a survey[J]. Journal of Computational Science, 2017, 22: 148-161. 10.1016/j.jocs.2017.03.003 |
| 7 | CUI P, WANG X, PEI J, et al. A survey on network embedding[J]. IEEE Transactions on Knowledge and Data Engineering, 2019, 31(5): 833-852. 10.1109/tkde.2018.2849727 |
| 8 | FISCHER A, BOTERO J F, BECK M T, et al. Virtual network embedding: a survey[J]. IEEE Communications Surveys and Tutorials, 2013, 15(4): 1888-1906. 10.1109/surv.2013.013013.00155 |
| 9 | ROST M, SCHMID S. On the hardness and inapproximability of virtual network embeddings[J]. IEEE/ACM Transactions on Networking, 2020, 28(2): 791-803. 10.1109/tnet.2020.2975646 |
| 10 | FAJJARI I, AITSAADI N, PUJOLLE G, et al. VNE-AC: virtual network embedding algorithm based on ant colony metaheuristic [C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE, 2011: 1-6. 10.1109/icc.2011.5963442 |
| 11 | ARAÚJO S M A, DE SOUZA F S H, MATEUS G R. Virtual network embedding in multi-domain environments with energy efficiency concepts [C]// Proceedings of the 2018 International Conference on Information Networking. Piscataway: IEEE, 2018: 205-210. 10.1109/icoin.2018.8343111 |
| 12 | WANG S, BI J, WU J P, et al. VNE-TD: a virtual network embedding algorithm based on temporal-difference learning[J]. Computer Networks, 2019, 161: 251-263. 10.1016/j.comnet.2019.05.004 |
| 13 | THAKKAR H K, DEHURY C K, SAHOO P K. MUVINE: multi-stage virtual network embedding in cloud data centers using reinforcement learning-based predictions[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(6): 1058-1074. 10.1109/jsac.2020.2986663 |
| 14 | veth (4) — Linux manual page[EB/OL]. [2021-02-26]. . 10.1002/9781119578956.ch1 |
| 15 | MAHALINGAM M, DUTT D, DUDA K, et al. Virtual eXtensible Local Area Network (VXLAN): a framework for overlaying virtualized layer 2 networks over layer 3 networks[EB/OL]. [2021-02-26]. . 10.17487/rfc7348 |
| 16 | YAN Y H, WANG H B. Open vSwitch VXLAN performance acceleration in cloud computing data center [C]// Proceedings of the 5th International Conference on Computer Science and Network Technology. Piscataway: IEEE, 2016: 567-571. 10.1109/iccsnt.2016.8070222 |
| 17 | 彭利民.基于广度优先搜索的虚拟网络映射算法[J].四川大学学报(工程科学版), 2015, 47(2): 117-122. 10.15961/j.jsuese.2015.02.018 |
| PENG L M. Virtual network embedding algorithm based on breadth-first search[J]. Journal of Sichuan University (Engineering Science Edition), 2015, 47(2): 117-122. 10.15961/j.jsuese.2015.02.018 | |
| 18 | 孙罡.虚拟网络的映射技术研究[D].成都:电子科技大学, 2012: 32-39. |
| SUN G. Research on virtual network mapping technologies[D]. Chengdu: University of Electronic Science and Technology of China, 2012: 32-39. | |
| 19 | 李贞,郑向伟,张辉.基于多目标粒子群优化的虚拟网络映射算法[J].计算机应用, 2017, 37(3): 755-759, 776. 10.11772/j.issn.1001-9081.2017.03.755 |
| LI Z, ZHENG X W, ZHANG H. Virtual network mapping algorithm based on multi-objective particle swarm optimization[J]. Journal of Computer Applications, 2017, 37(3): 755-759, 776. 10.11772/j.issn.1001-9081.2017.03.755 |
| [1] | Zhizheng ZHANG, Xiaojian ZHANG, Junqing WANG, Guanghui FENG. Federated spatial data publication method with differential privacy and secure aggregation [J]. Journal of Computer Applications, 2024, 44(9): 2777-2784. |
| [2] | Shangbin MO, Wenjun WANG, Ling DONG, Shengxiang GAO, Zhengtao YU. Single-channel speech enhancement based on multi-channel information aggregation and collaborative decoding [J]. Journal of Computer Applications, 2024, 44(8): 2611-2617. |
| [3] | Zhangjian JI, Na DU. Tiny target detection based on improved VariFocalNet [J]. Journal of Computer Applications, 2024, 44(7): 2200-2207. |
| [4] | Sailong SHI, Zhiwen FANG. Gaze estimation model based on multi-scale aggregation and shared attention [J]. Journal of Computer Applications, 2024, 44(7): 2047-2054. |
| [5] | Fanjun MENG, Bin HAN, Shucheng HUANG, Xiangdong MEI. Distributed temporal index for temporal aggregation range query [J]. Journal of Computer Applications, 2024, 44(6): 1848-1854. |
| [6] | Wenping ZHENG, Huilin GE, Meilin LIU, Gui YANG. Node classification algorithm fusing 2-connected motif-structure information [J]. Journal of Computer Applications, 2024, 44(5): 1464-1470. |
| [7] | Pengfei ZHANG, Litao HAN, Hengjian FENG, Hongmei LI. Point cloud semantic segmentation based on attention mechanism and global feature optimization [J]. Journal of Computer Applications, 2024, 44(4): 1086-1092. |
| [8] | Keyi FU, Gaocai WANG, Man WU. Few-shot object detection method based on improved region proposal network and feature aggregation [J]. Journal of Computer Applications, 2024, 44(12): 3790-3797. |
| [9] | Shuaihua ZHANG, Shufen ZHANG, Mingchuan ZHOU, Chao XU, Xuebin CHEN. Malicious traffic detection model based on semi-supervised federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3487-3494. |
| [10] | Bin LIU, Qian ZHANG, Yaqin WEI, Xueying CUI, Hongying ZHI. Graph to equation tree model based on expression layer-by-layer aggregation and dynamic selection [J]. Journal of Computer Applications, 2023, 43(8): 2390-2395. |
| [11] | Haiwei FAN, Xinsiyu LU, Limiao ZHANG, Yisheng AN. Citation recommendation algorithm fusing knowledge graph and graph attention network [J]. Journal of Computer Applications, 2023, 43(8): 2420-2425. |
| [12] | Xueyu HUANG, Huaiyu HE, Huimin LIN, Jinshui CHEN. Classification and recognition method of copper alloy metallograph based on feature aggregation [J]. Journal of Computer Applications, 2023, 43(8): 2593-2601. |
| [13] | Zhangjian JI, Ming ZHANG, Zilong WANG. High-precision object detection algorithm based on improved VarifocalNet [J]. Journal of Computer Applications, 2023, 43(7): 2147-2154. |
| [14] | Xingshen WEI, Peng GAO, Zhuo LYU, Yongjian CAO, Jian ZHOU, Zhihao QU. Adaptive interaction feedback based trust evaluation mechanism for power terminals [J]. Journal of Computer Applications, 2023, 43(6): 1878-1883. |
| [15] | Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN. Network intrusion detection model based on efficient federated learning algorithm [J]. Journal of Computer Applications, 2023, 43(4): 1169-1175. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||