VNE

A heuristic-based algorithm for privacy-oriented virtual network embedding

Network virtualization has become increasingly popular in recent years. It has the potential to allow timely handling of network infrastructure requests and, after instantiated, their lifecycle. In addition, it enables improved physical resource …

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding

As research in the area of network virtualization continues to advance, there have been numerous efforts to solve the challenge of efficiently mapping virtual networks on top of physical structures. Despite these efforts, current state-of-the-art …

Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding

One of the research challenges approached recently in the literature is the efficient mapping of virtual networks on top of physical infrastructures. Although there have been efforts to solve it, we observe that a number of virtual network requests …

DoS-resilient virtual networks through multipath embedding and opportunistic recovery

Network virtualization can potentially limit the impact of attacks by isolating traffic from different networks. However, routers and links are still vulnerable to attacks on the underlying network. Specifically, should a physical link be compromised

Characterizing the impact of network substrate topologies on virtual network embedding

Network virtualization is a mechanism that allows the coexistence of multiple virtual networks on top of a single physical substrate. One of the research challenges addressed recently in the literature is the efficient mapping of virtual resources on …

No more backups: Toward efficient embedding of survivable virtual networks

Although network virtualization can improve security by isolating traffic from different networks, routers and links are still vulnerable to attacks on the underlying network. High capacity physical links, in particular, constitute good targets since …

Security-aware optimal resource allocation for virtual network embedding