[1]MIJUMBI R,SERRAT J,GORRICHO J L,et al.Network function virtualization:state-of-the-art and research challenges[J].IEEE Communications Surveys and Tutorials,2016,18(1):236-262.
[2]OSSEIRAN A,BOCCARDI F,BRAUN V,et al.Scenarios for 5G mobile and wireless communications:the vision of the METIS project[J].IEEE Communications Magazine,2014,52(5):26-35.
[3]RAHMAN M R,BOUTABA R.SVNE:survivable virtual network embedding algorithms for network virtualization[J].IEEE Transactions on Network and Service Management,2013,10(2):105-118.
[4]BODK P,MENACHE I,CHOWDHURY M,et al.Surviving failures in bandwidth-constrained datacenters[J].ACM SIGCOMM Computer Communication Review,2012,42(4):431-442.
[5]LEE K,MODIANO E,LEE H W.Cross-layer survivability in WDM-based networks[J].IEEE/ACM Transactions on Networking,2011,19(4):1000-1013.
[6]GILL P,JAIN N,NAGAPPAN N.Understanding network failures in data centers:measurement,analysis,and implications[J].ACM SIGCOMM Computer Communication Review,2011,41(4):350-361.
(下转第112页)
(上接第106页)
[7]GONZALEZ A J,HELVIK B E.Characterization of router and link failure processes in UNINETT’s IP backbone network[J].International Journal of Space-based and Situated Computing,2013,2(1):3-11.
[8]JIANG H,WANG Y,GONG L,et al.Availability-aware survivable virtual network embedding in optical datacenter networks[J].IEEE/OSA Journal of Optical Communications and Networking,2015,7(12):1160-1171.
[9]GUO T,WANG N,MOESSNER K,et al.Shared backup network provision for virtual network embedding[C]//Proceedings of IEEE International Conference on Commu-nications.Washington D.C.,USA:IEEE Press,2011:1-5.
[10]YU M,YI Y,REXFORD J,et al.Rethinking virtual network embedding:substrate support for path splitting and migration[J].ACM SIGCOMM Computer Communication Review,2008,38(2):17-29.
[11]KHAN M M A,SHAHRIAR N,AHMED R,et al.Multi-path link embedding for survivability in virtual networks[J].IEEE Transactions on Network and Service Management,2016,13(2):253-266.
[12]MARKOPOULOU A,IANNACCONE G,BHATTACHARYYA S,et al.Characterization of failures in an IP backbone[C]//Proceedings of IEEE Joint Conference on Computer and Communications Societies.Washington D.C.,USA:IEEE Press,2004:2307-2317.
[13]FISCHER A,BOTERO J F,BECK M T,et al.Virtual network embedding:a survey[J].IEEE Communications Surveys and Tutorials,2013,15(4):1888-1906.
[14]程祥,张忠宝,苏森,等.基于粒子群优化的虚拟网络映射算法[J].电子学报,2011,39(10):2240-2244.
[15]MENGER K.Zur allgemeinen Kurventheorie[EB/OL].[2017-12-05].http://matwbn.icm.edu.pl/ksiazki/fm/fm10/fm1012.pdf.
[16]KARGER D R,LEVINE M S.Finding maximum flows in undirected graphs seems easier than bipartite matching[C]//Proceedings of the 30th ACM Symposium on Theory of Computing.New York,USA:ACM Press,1998:69-78.
[17]ZEGURA E W,CALVERT K L,ACHARJEE S B.How to model an internetwork[C]//Proceedings of INFOCOM’96.Washington D.C.,USA:IEEE Press,1996:594-602. |