Disjoint end-to-end walks for Service Function Chain provisioning and protection

IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Mohand Yazid Saidi
{"title":"Disjoint end-to-end walks for Service Function Chain provisioning and protection","authors":"Mohand Yazid Saidi","doi":"10.1016/j.comcom.2025.108193","DOIUrl":null,"url":null,"abstract":"<div><div>Service Function Chains (SFCs) enable traffic to flow through Virtual Network Functions (VNFs) deployed on physical servers to deliver network services. While SDN (Software Defined Network)/NFV (Network Function Virtualization) provides flexible network management, ensuring service continuity remains challenging and requires robust protection mechanisms.</div><div>Network failures can be addressed through local or end-to-end protection approaches. Local protection relies on multiple detours, potentially protecting against failures of the same components, which leads to complex management and multiple detour activations for single failures. End-to-end protection ensures service continuity through two end-to-end disjoint SFC provisioning paths, significantly reducing both route maintenance overhead and resource allocations.</div><div>This paper addresses the challenge of finding two end-to-end disjoint paths for SFC provisioning and protection. We first model the problem using ILP and prove its <span><math><mi>NP</mi></math></span>-completeness, even in over-resourced networks where single SFC provisioning is polynomial-time solvable. To address this complexity, we propose a novel three-step heuristic that enhances protection through transient route computation that is intended to “leave room” and facilitate disjoint provisioning identification. Recomputation of the transient route is established to enhance the resource allocation while improving the protection efficiency. Our extensive simulations demonstrate significant improvements over conventional approaches, showing notable enhancement in both protection efficiency and SFC path quality without incurring additional costs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108193"},"PeriodicalIF":4.5000,"publicationDate":"2025-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366425001501","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Service Function Chains (SFCs) enable traffic to flow through Virtual Network Functions (VNFs) deployed on physical servers to deliver network services. While SDN (Software Defined Network)/NFV (Network Function Virtualization) provides flexible network management, ensuring service continuity remains challenging and requires robust protection mechanisms.
Network failures can be addressed through local or end-to-end protection approaches. Local protection relies on multiple detours, potentially protecting against failures of the same components, which leads to complex management and multiple detour activations for single failures. End-to-end protection ensures service continuity through two end-to-end disjoint SFC provisioning paths, significantly reducing both route maintenance overhead and resource allocations.
This paper addresses the challenge of finding two end-to-end disjoint paths for SFC provisioning and protection. We first model the problem using ILP and prove its NP-completeness, even in over-resourced networks where single SFC provisioning is polynomial-time solvable. To address this complexity, we propose a novel three-step heuristic that enhances protection through transient route computation that is intended to “leave room” and facilitate disjoint provisioning identification. Recomputation of the transient route is established to enhance the resource allocation while improving the protection efficiency. Our extensive simulations demonstrate significant improvements over conventional approaches, showing notable enhancement in both protection efficiency and SFC path quality without incurring additional costs.
不相交的端到端行走,用于业务功能链的发放和保护
sfc (Service Function Chains)是指业务功能链,通过物理服务器上部署的VNFs (Virtual Network Functions)来提供网络服务。虽然SDN(软件定义网络)/NFV(网络功能虚拟化)提供了灵活的网络管理,但确保业务连续性仍然是一个挑战,需要强大的保护机制。网络故障可以通过本地或端到端保护方法来解决。本地保护依赖于多个弯路,潜在地防止相同组件的故障,这导致复杂的管理和针对单个故障的多个弯路激活。端到端保护通过两条端到端不相连的SFC发放路径保证业务连续性,大大减少了路由维护开销和资源分配。本文解决了为SFC提供和保护找到两个端到端不相交路径的挑战。我们首先使用ILP对问题建模,并证明了它的np完备性,即使在资源过剩的网络中,单个SFC配置是多项式时间可解的。为了解决这种复杂性,我们提出了一种新的三步启发式方法,通过瞬态路由计算增强保护,旨在“留出空间”并促进不连接供应识别。建立暂态路由的重新计算,在提高保护效率的同时加强资源分配。我们的大量模拟表明,与传统方法相比,该方法有了显著的改进,在不产生额外成本的情况下,保护效率和SFC路径质量都得到了显著提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Communications
Computer Communications 工程技术-电信学
CiteScore
14.10
自引率
5.00%
发文量
397
审稿时长
66 days
期刊介绍: Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms. Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信