{"title":"Disjoint end-to-end walks for Service Function Chain provisioning and protection","authors":"Mohand Yazid Saidi","doi":"10.1016/j.comcom.2025.108193","DOIUrl":null,"url":null,"abstract":"<div><div>Service Function Chains (SFCs) enable traffic to flow through Virtual Network Functions (VNFs) deployed on physical servers to deliver network services. While SDN (Software Defined Network)/NFV (Network Function Virtualization) provides flexible network management, ensuring service continuity remains challenging and requires robust protection mechanisms.</div><div>Network failures can be addressed through local or end-to-end protection approaches. Local protection relies on multiple detours, potentially protecting against failures of the same components, which leads to complex management and multiple detour activations for single failures. End-to-end protection ensures service continuity through two end-to-end disjoint SFC provisioning paths, significantly reducing both route maintenance overhead and resource allocations.</div><div>This paper addresses the challenge of finding two end-to-end disjoint paths for SFC provisioning and protection. We first model the problem using ILP and prove its <span><math><mi>NP</mi></math></span>-completeness, even in over-resourced networks where single SFC provisioning is polynomial-time solvable. To address this complexity, we propose a novel three-step heuristic that enhances protection through transient route computation that is intended to “leave room” and facilitate disjoint provisioning identification. Recomputation of the transient route is established to enhance the resource allocation while improving the protection efficiency. Our extensive simulations demonstrate significant improvements over conventional approaches, showing notable enhancement in both protection efficiency and SFC path quality without incurring additional costs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108193"},"PeriodicalIF":4.5000,"publicationDate":"2025-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366425001501","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Service Function Chains (SFCs) enable traffic to flow through Virtual Network Functions (VNFs) deployed on physical servers to deliver network services. While SDN (Software Defined Network)/NFV (Network Function Virtualization) provides flexible network management, ensuring service continuity remains challenging and requires robust protection mechanisms.
Network failures can be addressed through local or end-to-end protection approaches. Local protection relies on multiple detours, potentially protecting against failures of the same components, which leads to complex management and multiple detour activations for single failures. End-to-end protection ensures service continuity through two end-to-end disjoint SFC provisioning paths, significantly reducing both route maintenance overhead and resource allocations.
This paper addresses the challenge of finding two end-to-end disjoint paths for SFC provisioning and protection. We first model the problem using ILP and prove its -completeness, even in over-resourced networks where single SFC provisioning is polynomial-time solvable. To address this complexity, we propose a novel three-step heuristic that enhances protection through transient route computation that is intended to “leave room” and facilitate disjoint provisioning identification. Recomputation of the transient route is established to enhance the resource allocation while improving the protection efficiency. Our extensive simulations demonstrate significant improvements over conventional approaches, showing notable enhancement in both protection efficiency and SFC path quality without incurring additional costs.
期刊介绍:
Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms.
Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.