Acta Armamentarii ›› 2024, Vol. 45 ›› Issue (7): 2306-2317.doi: 10.12382/bgxb.2023.0258
Previous Articles Next Articles
CAO Dai1, ZHAN Siyu2,*(), HAO Xinsheng3, GUAN Kai4, FU Haotong3
Received:
2023-03-27
Online:
2023-07-13
Contact:
ZHAN Siyu
CLC Number:
CAO Dai, ZHAN Siyu, HAO Xinsheng, GUAN Kai, FU Haotong. Scheduling Strategy of Aviation Information Network Service Function Chain Requirements[J]. Acta Armamentarii, 2024, 45(7): 2306-2317.
Add to citation manager EndNote|Ris|BibTeX
参数 | 取值 |
---|---|
VNFR类型Θ | 10 |
VNFR流量请求/Mbps | [5,20] |
SFCR长度 | [3,6] |
SFCR到达率 | λ=0.7的泊松分布 |
SFCR生存周期 | μ=10的指数分布 |
平台计算资源Rc/MIPS | 500 |
平台存储资源Rm/Mbps | 500 |
链路带宽/Mbps | 400 |
优化函数权重因子 | α=β=0.3,γ=0.4 |
Table 1 Simulation parameter settings
参数 | 取值 |
---|---|
VNFR类型Θ | 10 |
VNFR流量请求/Mbps | [5,20] |
SFCR长度 | [3,6] |
SFCR到达率 | λ=0.7的泊松分布 |
SFCR生存周期 | μ=10的指数分布 |
平台计算资源Rc/MIPS | 500 |
平台存储资源Rm/Mbps | 500 |
链路带宽/Mbps | 400 |
优化函数权重因子 | α=β=0.3,γ=0.4 |
算法 | 算法描述 |
---|---|
JOLR算法[ | 对路径时延和VNF复用率联合优化,选取值大的路径优先映射 |
BFHA[ | 基于Best-fit思想,将流量请求较大的VNFR优先映射到满足映射条件且资源利用率较大的平台 |
CCMA[ | 以各服务功能之间带宽资源需求最小化为优化目标进行服务功能链的构建及映射 |
HGM算法[ | 提出了一种超图匹配算法,通过处理冲突图来寻找顶点不相交的超图的最大权值子集,合理地将多租户SFC置于多个约束下以最小化资源消耗 |
Table 2 Algorithms and descriptions
算法 | 算法描述 |
---|---|
JOLR算法[ | 对路径时延和VNF复用率联合优化,选取值大的路径优先映射 |
BFHA[ | 基于Best-fit思想,将流量请求较大的VNFR优先映射到满足映射条件且资源利用率较大的平台 |
CCMA[ | 以各服务功能之间带宽资源需求最小化为优化目标进行服务功能链的构建及映射 |
HGM算法[ | 提出了一种超图匹配算法,通过处理冲突图来寻找顶点不相交的超图的最大权值子集,合理地将多租户SFC置于多个约束下以最小化资源消耗 |
[1] |
赵尚弘, 陈柯帆, 吕娜, 等. 软件定义航空集群机载战术网络[J]. 通信学报, 2017, 38(8):140-155.
doi: 10.11959/j.issn.1000-436x.2017157 |
|
|
[2] |
|
[3] |
|
[4] |
|
[5] |
|
[6] |
|
[7] |
|
[8] |
|
[9] |
|
[10] |
|
[11] |
|
[12] |
|
[13] |
|
[14] |
|
[15] |
|
[16] |
|
[17] |
孙士清, 彭建华, 游伟, 等. 5G网络下资源感知的服务功能链协同构建和映射算法[J]. 西安交通大学学报, 2020, 54(8):140-148.
|
|
|
[18] |
|
[19] |
|
[20] |
|
[21] |
|
[22] |
|
[23] |
|
[24] |
|
[25] |
|
[26] |
|
[27] |
|
[28] |
|
[29] |
|
[30] |
|
[31] |
|
[32] |
|
[33] |
|
[34] |
|
[1] | WANG Yongzhen, TONG Ming, YAN Xuefeng, WEI Mingqiang. Transformer-CNN-based Multi-feature Aggregation Algorithm for Real Battlefield Image Dehazing [J]. Acta Armamentarii, 2024, 45(4): 1070-1081. |
[2] | XIONG Jiamei, WANG Yongzhen, YAN Xuefeng, WEI Mingqiang. An Algorithm of Battlefield Image Desmoking Based on Semantic Guidance and Contrastive Learning [J]. Acta Armamentarii, 2024, 45(2): 671-683. |
[3] | WANG Gang, WANG Zhiyi, ZHANG Enning, MA Runnian, CHEN Tongrui. Markov Evolutionary Game Model and Migration Strategies for Multi-stage Platform Dynamic Defense [J]. Acta Armamentarii, 2021, 42(8): 1690-1697. |
[4] | HUANG Yingchun, MOU Xinming. A Fuzzy Comprehensive Evaluation Method for Attack Effectiveness of the Application Layer of Command Information System [J]. Acta Armamentarii, 2020, 41(5): 932-940. |
[5] | WANG Zengguang, LU Yu, LI Xi. Active Defense Strategy Selection of Military Information Network Based on Incomplete Information Game [J]. Acta Armamentarii, 2020, 41(3): 608-617. |
[6] | WU Tianhao, WANG Jingsong, NIU Kan, SUN Miao, WU Shaoqiang. Adaptive Dynamic Indicators Configuration Method for Dealing with Electromagnetic Interference in Battlefield [J]. Acta Armamentarii, 2019, 40(8): 1648-1657. |
[7] | LI Eryu, GONG Jianxing, HUANG Jian. Analysis about Functional Invulnerability of Convergent Network Based on Function Chain [J]. Acta Armamentarii, 2019, 40(7): 1450-1459. |
[8] | ZHANG Shi, ZHANG Bai-hai, WANG Fei-fan, GUAN Zi-xiao. Node Localization Algorithm Based on Hop-count Quantization in Wireless Sensor Networks [J]. Acta Armamentarii, 2017, 38(5): 932-939. |
[9] | LI Xu, HE Hao-xiong, PENG Jin-lin, SONG Gu-yang, SHAO Xiao-tao. A Hybrid Routing Protocol for Differentiating Route Frequencies in MANET [J]. Acta Armamentarii, 2016, 37(12): 2308-2316. |
[10] | HE Shao-tong, XUE Lun-sheng, CHEN Xi-hong, ZHANG Kai. Anti-fracture Technology of Ad Hoc Network Routing in Tropospheric Scatter Channel [J]. Acta Armamentarii, 2016, 37(12): 2317-2323. |
[11] | FENG Yong-xin, ZHAO Yun-tao, SU Guang-nan, HUANG Ying-chun. A Fuzzy Efficiency Evaluation Method for SOAP Flooding Attack [J]. Acta Armamentarii, 2015, 36(11): 2203-2208. |
[12] | LIU Tian-hua, ZHU Hong-feng. An Improved Tree-based Distributed Group Key Agreement Protocol [J]. Acta Armamentarii, 2012, 33(6): 702-705. |
[13] | QIAN Yu-wen, SONG Hua-jü, KONG Jian-shou, ZHU Xiao-mei. Study on the Module of Network Thumb Printer Based on Network Covert Time Channel [J]. Acta Armamentarii, 2012, 33(1): 19-25. |
[14] | MA Jun-chun, SUN Ji-yin, WANG Yong-jun, ZHAO Bao-kang, CHEN Shan. Study of Attack Graph Construction Based on Distributed Parallel Processing [J]. Acta Armamentarii, 2012, 33(1): 109-115. |
[15] | LI Xiaohang, ZHANG Zhihu, SONG Chunlin, WU Qiang, DONG Fangyong. Adaptive Compensation Control under False Data Injection Attack [J]. Acta Armamentarii, 2020, 41(11): 2260-2265. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||