高级搜索

弹性光网络中基于安全性感知的差异化虚拟光网络的映射策略

刘焕淋 林振宇 王欣 陈勇 向敏 马跃

引用本文: 刘焕淋, 林振宇, 王欣, 陈勇, 向敏, 马跃. 弹性光网络中基于安全性感知的差异化虚拟光网络的映射策略[J]. 电子与信息学报, 2019, 41(2): 424-432. doi: 10.11999/JEIT180335 shu
Citation:  Huanlin LIU, Zhenyu LIN, Xin WANG, Yong CHEN, Min XIANG, Yue MA. A Diverse Virtual Optical Network Mapping Strategy Based on Security Awareness in Elastic Optical Networks[J]. Journal of Electronics and Information Technology, 2019, 41(2): 424-432. doi: 10.11999/JEIT180335 shu

弹性光网络中基于安全性感知的差异化虚拟光网络的映射策略

    作者简介: 刘焕淋: 女,1970年生,教授,研究方向为光通信技术与未来网络;
    林振宇: 男,1993年生,硕士生,研究方向为光网络资源优化调度和分配;
    王欣: 女,1991年生,硕士生,研究方向为生存性虚拟光网络映射;
    陈勇: 男,1963年生,教授,研究方向为光通信技术、传感检测与自动化技术;
    向敏: 男,1974年生,博士,研究方向为智能电网、工业物联网及自动控制;
    马跃: 男,1977年生,高级工程师,研究方向为电力通信与调度优化
    通讯作者: 刘焕淋,liuhl2@sina.com
  • 基金项目: 国家电网公司科技项目(52010118000Q)

摘要: 针对虚拟环境下底层网络中光纤的概率性故障,传统的100%保护至少需要配置一条保护路径,造成资源冗余度高和虚拟网络请求接受率低的问题,该文提出一种基于安全性感知的差异化虚拟光网络的映射(SA-DVNM)策略,在链路发生故障时为差异化虚拟网络请求提供安全保证。在SA-DVNM策略中,设计了一个综合考虑物理节点对之间跳数和相邻带宽大小的节点权重式避免链路映射过长,并提出路径频谱资源使用均衡的链路映射机制,最小化瓶颈链路的数量。当单路径传输失败时,SA-DVNM策略设计允许路径分割的资源分配机制,为保障时延敏感业务的安全性,SA-DVNM策略在路由选择中设计了基于时延差优化的多路径路由频谱分配方法。仿真结果表明该文所提策略在概率故障环境中能够降低带宽阻塞率,提高频谱资源利用率和虚拟光网络接受率。

English

    1. [1]

      熊余, 刘川菠, 孙鹏. 考虑业务服务质量的光线路终端节能算法[J]. 重庆邮电大学学报(自然科学版), 2017, 29(2): 208–215. doi: 10.3979/j.issn.1673-825X.2017.02.011
      XIONG Yu, LIU Chuanbo, and SUN Peng. Energy saving algorithm for optical line terminal considering quality of service[J]. Journal of Chongqing University of Posts and Telecommunications, 2017, 29(2): 208–215. doi: 10.3979/j.issn.1673-825X.2017.02.011

    2. [2]

      ANOH N G, BABRI M, KORA A D, et al. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks[J]. Digital Communication Networks, 2016, 3(1): 11–18. doi: 10.1016/j.dcan.2016.05.001

    3. [3]

      刘焕淋, 张明佳, 陈勇, 等. 频谱可用性和保护带宽共享度感知的弹性光网络生存性多路径策略[J]. 电子与信息学报, 2017, 39(10): 2472–2478. doi: 10.11999/JEIT161374
      LIU Huanlin, ZHANG Mingjia, CHEN Yong, et al. Survivable multipath strategy based on spectrum availability and protection bandwidth sharing degree-aware for elastic optical networks[J]. Journal of Electronics &Information Technology, 2017, 39(10): 2472–2478. doi: 10.11999/JEIT161374

    4. [4]

      HADI M and PAKRAVAN M R. Spectrum-convertible BVWXC placement in OFDM-based elastic optical networks[J]. IEEE Photonics Journal, 2017, 9(1): 1–12. doi: 10.1109/JPHOT.2017.2657738

    5. [5]

      CASTRO A, GIORGETTI A, CUGINI F, et al. Superfilter technique in SDN—Controlled elastic optical networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2015, 7(2): A285–A292. doi: 10.1364/JOCN.7.00A285

    6. [6]

      HAMMAD A, NEJABATI R, and SIMEONIDOU D. Cross-layer optimization of network resource virtualization in IP over O-OFDM networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2016, 8(10): 765–776. doi: 10.1364/JOCN.8.000765

    7. [7]

      YIN Yawei, ZHANG Huan, ZHANG Mingyang, et al. Spectral and spatial 2D fragmentation-aware routing and spectrum assignment algorithms in elastic optical networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2013, 5(10): A100–A106. doi: 10.1364/JOCN.5.00A100

    8. [8]

      YE Z, ZHU Y, JI P N, et al. Virtual infrastructure mapping in software-defined elastic optical networks[J]. Photonic Network Communications, 2016, 34(1): 1–11. doi: 10.1007/s11107-016-0678-4

    9. [9]

      鲍宁海, 刘翔, 张治中, 等. WDM节能光网络中的抗毁保护算法研究[J]. 重庆邮电大学学报(自然科学版), 2012, 24(3): 278–282. doi: 10.3979/j.issn.1673-825X.2012.03.002
      BAO Ninghai, LIU Xiang, ZHANG Zhizhong, et al. Survival protection algorithm in WDM energy-efficient optical network[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2012, 24(3): 278–282. doi: 10.3979/j.issn.1673-825X.2012.03.002

    10. [10]

      XIAO Xiancui and ZHENG Xiangwei. A proposal of survivable virtual network embedding algorithm[J]. Journal of High Speed Networks, 2016(22): 241–251. doi: 10.3233/JHS-160546

    11. [11]

      RAHMAN M R and BOUTABA R. SVNE: Survivable virtual network embedding algorithms for network virtualization[J]. IEEE Transactions on Network & Service Management, 2013, 10(2): 105–118. doi: 10.1109/TNSM.2013.013013.110202

    12. [12]

      SOUALAH O, FAJJARI I, AITSAADI N, et al. A reliable virtual network embedding algorithm based on game theory within cloud’s backbone[C]. IEEE International Conference on Communications, Sydney, Australia, 2014: 2975–2981.

    13. [13]

      CHOWDHURY S R, AHMED R, KHAN M A, et al. Dedicated protection for survivable virtual network embedding[J]. IEEE Transactions on Network & Service Management, 2016, 13(4): 913–926. doi: 10.1109/TNSM.2016.2574239

    14. [14]

      WANG Yuyu, LI Xin, GUO Bingli, et al. Survivable virtual optical network mapping in elastic optical networks with shared backup path protection[C]. Wireless and Optical Communication Conference, Chengdu, China, 2016: 1–4.

    15. [15]

      YANG Hui, ZHU Xiaoxu, BAI Wei, et al. Survivable VON mapping with ambiguity similitude for differentiable maximum shared capacity in elastic optical networks[J]. Optical Fiber Technology, 2016(31): 138–146. doi: 10.1016/j.yofte.2016.07.002

    16. [16]

      JIANG Huihui, WANG Yixiang, GONG Long, et al. Availability-aware survivable virtual network embedding in optical data center networks[J]. IEEE/OSA Journal of Optical Communications & Networking, 2015, 7(12): 1160–1171. doi: 10.1364/JOCN.7.001160

    17. [17]

      CHEN Bowen. Cost-effective survivable virtual optical network mapping in flesxible bandwidth optical networks[J]. Journal of Lightwave Technology, 2016, 34(10): 2398–2412. doi: 10.1109/JLT.2016.2530846

    18. [18]

      YANG Hui and CHENG Lei. Survivable virtual optical network embedding with probabilistic network-element failures in elastic optical networks[J]. Optical Fiber Technology, 2015(23): 90–94. doi: 10.1016/j.yofte.2015.02.006

    19. [19]

      WANG Hongxiang. Opaque virtual network mapping algorithms based on available spectrum adjacency for elastic optical networks[J]. Science China Information Sciences, 2016, 59(4): 1–11. doi: 10.1007/s11432-016-5525-9

    1. [1]

      缪祥华, 单小撤. 基于密集连接卷积神经网络的入侵检测技术研究. 电子与信息学报, 2020, 41(0): 1-7.

    2. [2]

      游凌, 李伟浩, 张文林, 王科人. 基于深度神经网络的Morse码自动译码算法. 电子与信息学报, 2020, 41(0): 1-6.

  • 图 1  虚拟光网络映射例图

    图 2  虚拟链路故障概率下的路由频谱分配

    图 3  不同负载下带宽阻塞率

    图 4  不同负载下虚拟网络请求接受率

    图 5  不同负载下频谱利用率

    图 6  不同负载下平均故障概率

    表 1  路由选择和频隙消耗

    路由选择频隙数消耗频隙总数
    情形1P1, P2${F_{\rm P1}}$=26
    ${F_{\rm P2}}$=4
    情形2P1, P3${F_{\rm P1}}$=26
    ${F_{\rm P3}}$=4
    情形3P2, P3${F_{\rm P2}}$=48
    ${F_{\rm P3}}$=4
    下载: 导出CSV
  • 加载中
图(6)表(1)
计量
  • PDF下载量:  47
  • 文章访问数:  558
  • HTML全文浏览量:  299
文章相关
  • 通讯作者:  刘焕淋, liuhl2@sina.com
  • 收稿日期:  2018-04-11
  • 录用日期:  2018-08-29
  • 网络出版日期:  2018-09-13
  • 刊出日期:  2019-02-01
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

/

返回文章