Professional Documents
Culture Documents
Abstract—Recently network virtualization has been proposed embedding/mapping/assignment 1 of each of the online VN
as a promising way to overcome the current ossification of the requests is of utmost importance in order to increase utilization
Internet by allowing multiple heterogeneous virtual networks of the substrate network resources and consequently revenues
(VNs) to coexist on a shared infrastructure. A major challenge
in this respect is the VN embedding problem that deals with of the InPs.
efficient mapping of virtual nodes and virtual links onto the However, the VN embedding problem, with constraints on
substrate network resources. Since this problem is known to be virtual nodes and virtual links, can be reduced to the N P-
N P-hard, previous research focused on designing heuristic-based hard multi-way separator problem [5], even if all the VN
algorithms which had clear separation between the node mapping
requests are known in advance. Even when all the virtual
and the link mapping phases.
This paper proposes VN embedding algorithms with better nodes are already mapped, embedding the virtual links with
coordination between the two phases. We formulate the VN em- bandwidth constraints onto substrate paths is still N P-hard
bedding problem as a mixed integer program through substrate in the unsplittable flow scenario. As a result, a number
network augmentation. We then relax the integer constraints to of heuristic-based algorithms have appeared in the relevant
obtain a linear program, and devise two VN embedding algo- literature [6]–[9]. Most of these proposals focused primarily
rithms D-ViNE and R-ViNE using deterministic and randomized
rounding techniques, respectively. Simulation experiments show on edge mapping (using, for example, shortest path, k-shortest
that the proposed algorithms increase the acceptance ratio and paths, and multi-commodity flow algorithms) after employing
the revenue while decreasing the cost incurred by the substrate greedy methods to preselect the node mappings. However,
network in the long run. preselecting node mappings without considering its relation to
the link mapping stage restricts the solution space, and may
I. I NTRODUCTION result in poor performance.
In this paper, we introduce better correlation between the
Since its inception, the Internet has proven its worth by node mapping and the link mapping phases by proposing two
supporting myriads of distributed applications and heteroge- new VN embedding algorithms D-ViNE (Deterministic VN
neous networking technologies. However, due to the existence Embedding) and R-ViNE (Randomized VN Embedding). In
of multiple stakeholders with conflicting goals and policies, these algorithms, we map the virtual nodes to substrate nodes
alterations, even necessary ones, to the present architecture in a way that facilitates the mapping of virtual links to physical
have now become almost impossible to achieve. To fend off paths in the subsequent phase. To this end, we extend the
the rigidity of the existing Internet once and for all, network physical network graph by introducing meta-nodes for each
virtualization has been propounded as a fundamental diversify- virtual node and connect the meta-nodes to a selected subset
ing attribute of the future inter-networking paradigm that will of physical nodes (Section IV-A). We then treat each virtual
allow multiple heterogeneous network architectures to coexist link with bandwidth constraints as a commodity consisting of
on a shared substrate [1], [2]. In a network virtualization a pair of meta-nodes. As a result, finding an optimal flow for
environment (NVE), multiple service providers (SPs) will be the commodity is equivalent to mapping the virtual link in
able to create heterogeneous virtual networks (VNs) to offer an optimal way. If we introduce additional binary constraints
customized end-to-end services to the end users by leasing that force only one meta-edge to be selected for each meta-
shared resources from one or more infrastructure providers node, we can effectively select exactly one substrate node for
(InPs) without significant investment in physical infrastructure each meta-node corresponding to a particular virtual node. We
[2]–[4]. use mixed integer programming (MIP) formulation [10] to
Each VN in the NVE is a collection of virtual nodes (e.g., solve the embedding problem with binary constraints on the
virtual routers) that are hosted on different substrate nodes meta-edges and linear constraints on actual substrate network
and interconnected by physical paths in the substrate network
corresponding to virtual links. Since multiple VNs can share 1 The words ‘embedding’, ‘mapping’, and ‘assignment’ are used inter-
the same underlying physical resources, efficient and effective changeably throughout this paper.
edges. Since solving an MIP is known to be N P-hard [10], space by assuming infinite capacity of the substrate network
finding an optimal VN embedding using MIP becomes N P- resources, nor do we assume any specialized VN topologies.
hard as well. As a result, we relax the integer program to Contrary to the algorithms proposed in this paper, all the
obtain a linear programming formulation which can be solved existing algorithms can clearly be separated into two basic
in polynomial time. We then use deterministic and randomized phases:
rounding techniques on the solution of the linear program to 1) assigning virtual nodes using some greedy heuristics,
approximate the values of the binary variables in the original e.g., assign virtual nodes with higher processing require-
MIP. Once all the virtual nodes have been mapped, we use ments to substrate nodes with more available resources
the multi-commodity flow algorithm to map the virtual links [8], [9], and
onto the substrate network between the mapped virtual nodes 2) embedding virtual links onto substrate paths using short-
[9], [11]. This can also be solved in polynomial-time since est path algorithms [8] in case of unsplittable flows,
we assume that path splitting is supported by the substrate or using multi-commodity flow algorithms in case of
network [9]. splittable flows [9], [11].
The rest of this paper is organized as follows. Section II The authors in [14] have proposed a distributed algorithm
provides an overview of the related work. Following that, Sec- that simultaneously maps virtual nodes and virtual links
tion III formalizes the network model and the VN embedding without any centralized controller, but the scalability and
problem itself. In Section IV, we provide the optimal MIP performance of their algorithm is still not comparable with
formulation for the VN embedding problem using substrate the centralized ones.
network augmentation. Section V relaxes the MIP formulation The integer and mixed integer programming approaches
to obtain a linear program and presents D-ViNE and R-ViNE have been applied to a number of resource allocation and
using deterministic and randomized rounding techniques. Sec- optimization problems in the networking area. In [15], the
tion VI presents simulation results that evaluate the proposed authors have proposed an integer programming model to solve
algorithms, and we conclude in Section VII identifying future the VPN tree computation problem for bandwidth provision-
research directions. ing in VPNs. Techniques of randomized rounding for linear
II. R ELATED W ORK programming relaxations to obtain approximation algorithms
The VN assignment problem is similar to the previous was first introduced in [16].
works on embedding Virtual Private Networks (VPN) in a In this paper, we take a formal approach to solve the online
shared provider topology and the network testbed mapping VN embedding problem using a mixed integer programming
problem [12], [13]. However, a typical VPN request con- formulation. To the best of our knowledge, this is the first
sists only of bandwidth requirements, specified in terms of attempt to apply mathematical programming to this problem.
a traffic matrix, without any constraint on its nodes. As a III. N ETWORK M ODEL AND P ROBLEM D ESCRIPTION
result, most VPN design algorithms come down to finding
A. Substrate Network
paths for source/destination pairs. On the other hand, the
Assign algorithm [13] used in the Emulab testbed considers We model the substrate network
as a weighted undirected
bandwidth constraints alongside constraints on exclusive use graph and denote it by GS = N S , E S , where N S is the set
of nodes, i.e., different VNs cannot share a substrate node. of substrate nodes and E S is the set of substrate links. Each
S S
But in network virtualization, there are capacity and placement substrate node n S∈ N is associated with the CPU capacity
requirements on both the virtual nodes and the virtual links; in weight value c n and geographic location loc nS . Each
addition, substrate nodes and links can be shared by multiple substrate link eS (i, j) ∈ E S between two substrate nodes i
VNs. j is associated with the bandwidth capacity weight value
and
In order to reduce the hardness of the VN assignment b eS denoting the total amount of bandwidth.
problem and to enable efficient heuristics, existing research We denote the set of all substrate paths by P S , and the set
has been restricting the problem space in different dimensions, of substrate paths from the source node s to the destination
which include: node t by P S (s, t).
1) considering offline version of the problem (i.e., all the Fig. 1 shows a substrate network, where the numbers over
VN requests are known in advance) [7], [8], the links represent available bandwidths and the numbers in
2) ignoring either node requirements or link requirements rectangles represent available CPU resources 2 .
[6], [7], B. VN Request
3) assuming infinite capacity of the substrate nodes and
Similar to the substrate network, we model VN requests
links to obviate admission control [6]–[8], and
as weighted
undirected
graphs and denote a VN request by
4) focusing on specific VN topologies [7].
GV = N V , E V . We express the requirements on virtual
The authors in [9] consider all these issues, except for the lo- nodes and virtual links in terms of the attributes of the nodes
cation constraints on the virtual nodes, by envisioning support and links of the substrate network. Each VN request has an
from the substrate network through node and link migration
as well as multi-path routing. We do not restrict the problem 2 We use notations similar to [9] to denote capacities and requirements.
10
80 55 1) Node assignment: Each virtual node from the same VN
a 15 c
A B request 3 is assigned to a different substrate node by a mapping
10 12
d MN : N V → N S from virtual nodes to substrate nodes such
b c 22
12 that for all nV , mV ∈ N V ,
10
10 10 a 90 50
VN Request 1 C
15
D
20
E
10
F MN nV ∈ N S
20
60 e 85 MN mV = MN nV , iff mV = nV
17 25
e f subject to
17
5 5 G H
b c nV ≤ RN MN nV (1a)
d f 70 65
20 20 dis loc nV , loc MN nV ≤ DV (1b)
VN Request 2 Substrate Network
where dis(i, j) measures the distance between the location of
Fig. 1. Mapping of VN requests onto a shared substrate network. two substrate nodes i and j.
In Fig. 1, the first VN request has the node mapping
{a → C, b → H, c → B} and the second VN request has
associated non-negative value DV expressing how far a virtual {d → A, e → D, f → H}. Note that two virtual nodes b and f
V V from different VN requests are mapped onto the same substrate
node nV ∈ N
V
can be placed from the location specified by
loc n . D can be expressed in terms of physical distance node H.
or in terms of permissible delay (e.g., RTT) from loc nV . 2) Link assignment: Each virtual link is mapped to a
Fig. 1 shows two VN requests with node and link constraints. substrate path (unsplittable flow) or a set of substrate paths
(splittable flow) between the corresponding substrate nodes
C. Measurement of Substrate Network Resources that host the end virtual nodes of that virtual link. It is defined
by a mapping ME : E V → P S from virtual
links to substrate
The
residual
or the available capacity of a substrate node, paths such that for all eV = mV , nV ∈ E V ,
RN nS is defined as the available CPU capacity of the
substrate node nS ∈ N S . ME mV , nV ⊆ P S MN mV , MN nV
RN nS = c nS − c(nV ) subject to
∀nV ↑nS
RE (P ) ≥ b eV , ∀P ∈ ME eV (2)
where x ↑ y denotes that the virtual node x is hosted on the
substrate node y. The first VN
request in Fig. 1 has been assigned the
Similarly, the residual capacity of a substrate link, RE eS link mapping (a, b) → {(C, D), (D, G), (G, H)} , (a, c) →
is defined as the total amount of bandwidth available on the {(C, A), (A, B)} , (b, c) → {(H, F ), (F, E), (E, B)} , and
substrate link eS ∈ E S .
the second VN request has the link mapping (d, e) →
RE eS = b eS − b(eV )
{(A, C), (C, D)} , (e, f ) → {(D, G), (G, H)} .
∀eV ↑eS
where x ↑ y denotes that the substrate path of the virtual link E. Objectives
x passes through the substrate link y. Our main interest in this paper is to propose online VN
The available bandwidth capacity of a substrate path P ∈ embedding algorithms that map multiple VN requests with
P S is given by node and link constraints. We also want to increase revenue
and decrease cost of the InP in the long run, in addition to
RE (P ) = min RE eS balancing load of the substrate network resources.
eS ∈P
Similar to the previous work in [8], [9], we define the
D. VN Assignment revenue of a VN request as:
When a VN request arrives, the substrate network has to R(GV ) = b eV + c nV (3)
determine whether to accept the request or not. If the request eV ∈E V nV ∈N V
is accepted, the substrate network then determines a suitable
While revenue gives an insight into how much an InP will
assignment for the VN and allocates network resources on the
gain by accepting a VN request, it is not very useful without
substrate nodes and paths selected by that assignment. The
knowing the cost the InP will incur for embedding that request.
allocated resources are released once the VN expires.
The assignment of the VN request V to the substrate 3 Even though multiple virtual nodes from different VN requests can be
network can be decomposed into two major components: mapped to the same substrate node.
An example of augmented graph construction is shown in
a A B c Fig. 2.
B. MIP Formulation
i Constraints:
fuv ≥ 0, ∀u, v ∈ N S (15)
- Capacity Constraints:
xuv ∈ {0, 1} , ∀u, v ∈ N S (16)
i i
(fuv + fvu ) ≤ RE (u, v) xu,v , ∀u, v ∈ N S
Remarks: i
• The objective function (5) of the MIP tries to minimize RN (w) ≥ xmw c (m) , ∀m ∈ N S \ N S , ∀w ∈ N S
the cost of embedding the VN request as well as balance
the load. By dividing the cost with the residual capacity, it - Flow Related Constraints:
i i
is ensured that the resources with more residual capacities fuw − fwu = 0, ∀i, ∀u ∈ N S \ {si , ti }
are preferred over the resources with less residual capac- w∈N S w∈N S
ities. 1 ≤ αuv ≤ RE (u, v) and 1 ≤ βw ≤ RN (w) are
fsii w − i
fws = b(eVi ), ∀i
parameters to control the importance of load balancing i
w∈N S w∈N S
while embedding a request. δ → 0 is a small positive
constant to avoid dividing by zero in computing the ftii w − i
fwti
= −b(eVi ), ∀i
objective function. w∈N S w∈N S
• Constraint set (6) and (7) contains the node and edge - Meta and Relaxed Binary Constraints:
i i
capacity bounds. Summing up fuv and fvu in (6) en- xmw = 1, ∀m ∈ N S \ N S
sures that the summation of flows on both directions of w∈Ω(m)
the undirected edge (u, v) remains within its available
servation conditions, which denote that the net flow to a xuv = xvu , ∀u, v ∈ N S
node is zero, except for the source node si and the sink - Domain Constraints:
node ti . i
fuv ≥ 0, ∀u, v ∈ N S
• Constraint sets (11) and (12) are related to the augmented
xuv ≥ 0, ∀u, v ∈ N S (18)
portion of the substrate graph. Constraint set (11) makes
sure that only one substrate node is selected for each Remarks:
meta-node, whereas constraint set (12) ensures that no • The domain constraint set (18) on the xuv variables has
more than one meta-node is placed on a substrate node. been relaxed.
• Constraint sets (13) and (14) together with (2) ensure that • The rest of the constraints are similar to the ones in
xuv is set whenever there is any flow in either direction VNE MIP.
of the substrate edge (u, v). A. Deterministic Rounding Based Virtual Network Embedding
• Finally, constraint sets (15) and (16) denote the real and Algorithm (D-ViNE)
i
binary domain constraints on the variables fuv and xuv , D-ViNE (Fig. 3) takes online VN requests as inputs and
respectively. maps them onto the substrate network one at a time. It takes
decisions based only on the past VN requests that it has already
V. LP R ELAXATION AND ROUNDING -BASED A LGORITHMS seen, i.e., D-ViNE uses no look-ahead. Since the integer
Since solving an MIP is known to be computationally domain constraints (16) on the x variables have already been
intractable [10], simultaneous node and link embedding using relaxed, we no longer get integer values for the x variables.
VNE MIP is practically infeasible. Hence we relax the integer Instead, we employ deterministic rounding technique to get
constraints (16) of the MIP, and obtain the following linear integer values for x. We introduce ϕ : N S → {0, 1}, which
program (VNE LP RELAX). Once we have the LP solution, is initially set to zero for all nS ∈ N S signifying that all the
we use deterministic and randomized rounding techniques substrate nodes are initially unused. Whenever a virtual node
1: procedure D-V I NE(GV = (N V , E V )) 1: procedure R-V I NE(GV = (N V , E V ))
2: Create augmented substrate graph GS = N S , E S 2: Create augmented substrate graph GS = N S , E S
3: Solve VNE LP RELAX 3: Solve VNE LP RELAX
4: for all nS ∈ N S do 4: for all nS ∈ N S do
5: ϕ(nS ) ← 0 5: ϕ(nS ) ← 0
6: end for 6: end for
7: for all n ∈ N V do 7: for all n ∈ N V do
8: if Ω(n) ∩ {nS ∈ N S |ϕ(nS ) = 1} = ∅ then 8: if Ω(n) ∩ {nS ∈ N S |ϕ(nS ) = 1} = ∅ then
9: VN request cannot be satisfied 9: VN request cannot be satisfied
10: return 10: return
11: end if 11: end if
12: for all z ∈ Ω(n) do 12: for all z ∈ Ω(n) do
i i i i
13: pz ← ( i fµ(n)z + fzµ(n) )xµ(n)z 13: pz ← ( i fµ(n)z + fzµ(n) )xµ(n)z
14: end for 14: end for
15: Let zmax = arg maxz∈Ω(n) {pz |ϕ(z) = 0} 15: psum ← z∈Ω(n) pz
16: set MN (n) ← zmax 16: for all z ∈ Ω(n) do
17: ϕ(zmax ) ← 1 17: pz ← pz /psum
18: end for 18: end for
19: Solve MCF to map virtual edges. 19: set MN (n) ← z with probability pz
20: Update residual capacities of the network resources. 20: ϕ(z) ← 1 with probability pz
21: end procedure 21: end for
22: solve MCF to map virtual edges.
Fig. 3. D-ViNE: Deterministic rounding based Virtual Network Embedding
algorithm
23: Update residual capacities of the network resources.
24: end procedure
0.75
at [17]. The substrate network topologies in our experiments
are randomly generated with 50 nodes using the GT-ITM
tool [18] in (25 × 25) grids. Each pair of substrate nodes 0.7
average rate of 4 VNs per 100 time units, and each one has an
exponentially distributed lifetime with an average of μ = 1000 0.55
0 10000 20000 30000 40000 50000
time units. In each VN request, the number of virtual nodes Time
is randomly determined by a uniform distribution between 2
and 10 following similar setups to previous works [8], [9]. The Fig. 5. VN request acceptance ratio over time
average VN connectivity is fixed at 50%. The cpu requirements
of the virtual nodes are real numbers uniformly distributed
between 0 to 20 and the bandwidth requirements of the virtual 4
links are uniformly distributed between 0 to 50. We have used D-ViNE
G-SP
the open source mixed integer programming library glpk [19] D-ViNE-SP
G-MCF
to solve VNE LP RELAX. 3.5 D-ViNE-LB
R-ViNE
B. Comparison Method
Average Revenue
3
In our evaluation, we have compared six algorithms that
combine different node mapping and link mapping strategies
including our contributions and algorithms from previous 2.5
0.15 long as it can, leaving those critical resources available for the
VN requests that absolutely need them.
0.1 (3) Randomization can lead to better performance. It
is well established in the algorithm design literature that
D-ViNE randomization allows efficient solutions to many intractable
0.05 G-SP
D-ViNE-SP problems in polynomial time with low probability of error.
G-MCF
D-ViNE-LB
R-ViNE
Our experiments show that the randomized version of our
0 VN embedding algorithm (R-ViNE) performs better than its
0 10000 20000 30000 40000 50000
Time deterministic counterpart (D-ViNE) in terms of acceptance
ratio and revenue generation (Fig. 5 and Fig. 6).
Fig. 8. Average node utilization In addition to that, for networks with large numbers of
nodes randomization has been shown to be effective for
load balancing [20]. This phenomena is also visible in our
experiments, since R-ViNE performs similar to D-ViNE-LB
0.45 in most scenarios.
0.4 (4) Load balancing slightly increases the average pro-
0.35
visioning cost. While load balancing increases revenue and
acceptance ratio by avoiding highly utilized resources, it runs
0.3
the risk of increasing the average provisioning cost as shown
Link Utilization