• Electronics Optics & Control
  • Vol. 22, Issue 11, 61 (2015)
JIA Wei and XIA Jing-bo
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2015.11.014 Cite this Article
    JIA Wei, XIA Jing-bo. Resource Monitoring Policy for Network Virtualization Environment[J]. Electronics Optics & Control, 2015, 22(11): 61 Copy Citation Text show less
    References

    [1] WANG A, IYER M, DUTTA R, et al.Network virtualization:technologies, perspectives, and frontiers[J].Journal of Lightwave Techology, 2013, 31(4):523-547.

    [2] KERDSRI J, WIPUSITWARKUN K.Network virtualization for military application:review and initial development of conceptual design[C]//The 14th International Conference on Advanced Communication Technology (ICACT), Pyeong Chang, 2012:61-66.

    [3] FISCHER A, BOTERO J F.Virtual network embedding:a survey[J].IEEE Communications Surveys & Tutorials, 2013, 15(4):1888-1906.

    [4] CHOWDHURY M, RAHMAN M R, BOUTABA R.ViNEYard: virtual network embedding algorithms with coordinated node and link mapping[J].IEEE/ACM Transanctions on Networking, 2012, 20(1):206-219.

    [5] YUAN Y, WANG C R, WANG C, et al.Load controllable virtual network embedding algorithm based on discrete particle swarm optimization[J].Journal of Northeastern University:Natural Science Edition, 2014, 35(1):10-14.

    [6] HUANG B B, RONG H, PENG K, et al.Load-balancing based on particle swarm optimization in virtual network mapping[J].Journal of Electronics & Information Technology, 2013, 35(7):1753-1759.

    [7] ZHANG S, WU J.Virtual network embedding with opportunistic resource sharing[J].IEEE Transactions on Parallel and Distributed Systems, 2014, 25(3):816-827.

    [8] MELO M, SARGENTO S, KILLAT U, et al.Optimal virtual network embedding:node-link formulation[J].IEEE Transactions on Network and Service Management, 2013, 10(4):356-368.

    [9] CLEGG R G, CLAYMAN S.On the selection of management/monitoring nodes in highly dynamic networks[J].IEEE Transactions on Computer, 2013, 62(6):1207-1220.

    [10] MAMATAS L, CLAYMAN S.Towards an information ma-nagement overlay for emerging networks[C]//Proceedings of Network Operations and Management Symposium, 2010:527-534.

    [11] JIANG Y M, LAN J L, ZHOU H Q.Resource monitoring policy for network virtualization environment[J].Journal of Electronics & Information Technology, 2014, 36(3):708-714.

    [12] LIU X H, JING N, YIN J P, et al.The hierarchical network monitoring model with bounded bandwidth and delay constraints[J].Journal of Electronics & Information Technology, 2008, 30(3):712-716.

    [13] LIU X H, YIN J P, LU X C, et al.The distributed network monitoring model with bounded delay constraints [J]. Wuhan University Journal of Natural Science Edition, 2004, 9(4):429-434.

    [14] ZHOU Y L, WANG J H, YIN J.A discrete particle swarm optimization algorithm based on estimation of distribution[J].Acta Electronica Sinica, 2008, 36(6):1242-1248.

    [15] LIOTTA A,PAULOU G, KNIGHT G.Exploiting agent mobility for large-scale network monitoring[J].IEEE Network, 2002, 16(3):7-15.

    JIA Wei, XIA Jing-bo. Resource Monitoring Policy for Network Virtualization Environment[J]. Electronics Optics & Control, 2015, 22(11): 61
    Download Citation