Electronics Optics & Control, Volume. 22, Issue 11, 61(2015)

Resource Monitoring Policy for Network Virtualization Environment

JIA Wei and XIA Jing-bo
Author Affiliations
  • [in Chinese]
  • show less
    References(15)

    [1] [1] WANG A, IYER M, DUTTA R, et al.Network virtualization:technologies, perspectives, and frontiers[J].Journal of Lightwave Techology, 2013, 31(4):523-547.

    [2] [2] KERDSRI J, WIPUSITWARKUN K.Network virtualization for military application:review and initial development of conceptual design[C]//The 14th International Conference on Advanced Communication Technology (ICACT), Pyeong Chang, 2012:61-66.

    [3] [3] FISCHER A, BOTERO J F.Virtual network embedding:a survey[J].IEEE Communications Surveys & Tutorials, 2013, 15(4):1888-1906.

    [4] [4] CHOWDHURY M, RAHMAN M R, BOUTABA R.ViNEYard: virtual network embedding algorithms with coordinated node and link mapping[J].IEEE/ACM Transanctions on Networking, 2012, 20(1):206-219.

    [5] [5] YUAN Y, WANG C R, WANG C, et al.Load controllable virtual network embedding algorithm based on discrete particle swarm optimization[J].Journal of Northeastern University:Natural Science Edition, 2014, 35(1):10-14.

    [6] [6] HUANG B B, RONG H, PENG K, et al.Load-balancing based on particle swarm optimization in virtual network mapping[J].Journal of Electronics & Information Technology, 2013, 35(7):1753-1759.

    [7] [7] ZHANG S, WU J.Virtual network embedding with opportunistic resource sharing[J].IEEE Transactions on Parallel and Distributed Systems, 2014, 25(3):816-827.

    [8] [8] MELO M, SARGENTO S, KILLAT U, et al.Optimal virtual network embedding:node-link formulation[J].IEEE Transactions on Network and Service Management, 2013, 10(4):356-368.

    [9] [9] CLEGG R G, CLAYMAN S.On the selection of management/monitoring nodes in highly dynamic networks[J].IEEE Transactions on Computer, 2013, 62(6):1207-1220.

    [10] [10] MAMATAS L, CLAYMAN S.Towards an information ma-nagement overlay for emerging networks[C]//Proceedings of Network Operations and Management Symposium, 2010:527-534.

    [11] [11] JIANG Y M, LAN J L, ZHOU H Q.Resource monitoring policy for network virtualization environment[J].Journal of Electronics & Information Technology, 2014, 36(3):708-714.

    [12] [12] LIU X H, JING N, YIN J P, et al.The hierarchical network monitoring model with bounded bandwidth and delay constraints[J].Journal of Electronics & Information Technology, 2008, 30(3):712-716.

    [13] [13] LIU X H, YIN J P, LU X C, et al.The distributed network monitoring model with bounded delay constraints [J]. Wuhan University Journal of Natural Science Edition, 2004, 9(4):429-434.

    [14] [14] ZHOU Y L, WANG J H, YIN J.A discrete particle swarm optimization algorithm based on estimation of distribution[J].Acta Electronica Sinica, 2008, 36(6):1242-1248.

    [15] [15] LIOTTA A,PAULOU G, KNIGHT G.Exploiting agent mobility for large-scale network monitoring[J].IEEE Network, 2002, 16(3):7-15.

    Tools

    Get Citation

    Copy Citation Text

    JIA Wei, XIA Jing-bo. Resource Monitoring Policy for Network Virtualization Environment[J]. Electronics Optics & Control, 2015, 22(11): 61

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jan. 29, 2015

    Accepted: --

    Published Online: Dec. 18, 2015

    The Author Email:

    DOI:10.3969/j.issn.1671-637x.2015.11.014

    Topics