Invulnerability mapping method of multicast virtual network

A mapping method and technology for virtual networks, applied in the field of survivable mapping of multicast virtual networks, can solve the problems of high algorithm complexity, inability to apply virtual network mapping, inability to process nodes and links, etc., to save network resources, Improve survivability and optimize the effect of mapping costs

Inactive Publication Date: 2013-12-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not take into account the sudden failure of the underlying network, and cannot deal with the failure of nodes and links in the underlying network, that is, it cannot realize the invulnerability mapping of the multicast virtual network.
Moreover, this method adopts an enumeration mechanism when completing the mapping. Although the optimal mapping result is guaranteed, the algorithm complexity is high and the convergence speed is too slow, so it cannot be applied to large-scale virtual network mapping problems.
In practical applications, the node mapping of the multicast virtual network often has restrictions on the access area, and the VMNDDVCM algorithm cannot cope with such business requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invulnerability mapping method of multicast virtual network
  • Invulnerability mapping method of multicast virtual network
  • Invulnerability mapping method of multicast virtual network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention. It should be noted that in the following description, when detailed descriptions of known functions and designs may dilute the main content of the present invention, these descriptions will be omitted here.

[0049] figure 1 It is a flow chart of a specific embodiment of the invulnerability mapping method of the multicast virtual network of the present invention. like figure 1 As shown, the invulnerability mapping method of the multicast virtual network of the present invention includes the following steps:

[0050] S101: Multicast virtual network data statistics:

[0051] Note that the root node in the multicast virtual network is v, and the set of leaf nodes is V N , the set of underlying data centers that each node can access is N F , the set of underlying data centers t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an invulnerability mapping method of a multicast virtual network. The invulnerability mapping method of the multicast virtual network comprises the steps that leaf node sets capable of being covered with each bottom layer data center are obtained according to the zone requirements of each bottom layer data center where each leaf node in the multicast virtual network has access, a set scheme that all the leaf nodes are covered with the sets in the minimum number is obtained by the adoption of the minimum set covering algorithm, mapping of the leaf nodes is conducted through the corresponding bottom layer data centers, and the leaf nodes covered with the same bottom layer data center share node protection resources; the bottom layer data centers where root nodes have access serve as standby bottom layer data centers, primary link mapping is conducted on each standby bottom layer data center, the leaf nodes covered with the same bottom layer data center share a protecting route, and after link mapping is completed, a link mapping scheme with the smallest total resource consumption is selected from the link mapping schemes corresponding to the standby bottom layer data centers to serve as the optimal link mapping scheme. According to the invulnerability mapping method of the multicast virtual network, invulnerability mapping with low cost is achieved.

Description

technical field [0001] The invention belongs to the field of virtual network technology, and more specifically, relates to an indestructible mapping method of a multicast virtual network. Background technique [0002] The Internet has had great success in defining the model of how information is acquired and exchanged in today's world. Over the past three decades, the Internet has demonstrated the value of its own architecture by supporting a large number of decentralized applications and a large number of different network technologies. However, the widespread use of the Internet has also become the biggest obstacle to its further development. Due to its multi-supplier characteristics, adding new structures or adjustments to the existing Internet structure requires the common approval of all operators, so today's network Structures are limited to slow and simple updates, not rapid changes. [0003] Network virtualization, as a technical means to solve the current Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/733H04L12/753H04L12/761H04L45/122H04L45/16
Inventor 廖丹肖克祥孙罡许都虞红芳陆川淦茂
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products