Soft Computing

, Volume 22, Issue 23, pp 7797–7810 | Cite as

A virtual cluster embedding approach by coordinating virtual network and software-defined network

  • Yusong Tan
  • Rongzhen LiEmail author
  • Qingbo Wu
  • Jianfeng Zhang


Virtual cluster, as a fundamental service of cloud computing, is an important delivery model of cloud services. Allocating physical resources for a virtual cluster is known as virtual cluster embedding (VCE), which has a significant impact on the performance. VCE includes the components of virtual machine, virtual switch, virtual link, virtual software-defined network (SDN) controller and cluster system controller. VCE needs to be considered comprehensively to adapt the influencing factor weight proportion and to be flexible for different types of embedding. This paper, based on the topology of the cloud data center network, develops a coordinated VCE approach, called CoVCE. The approach combines virtual network with SDN to form virtual SDN and weakens slightly the constraints of VM placement. The network centrality, correlation property and resource fragmentation are optimized with multiple objectives to receive more requests, increase the throughput and decrease network delay and runtime. The CoVCE method integrates not only the logical topology of virtual machines in the cluster but also the relationship with virtual switch, virtual link and control services. This does not only optimize the placement location of virtual components, but also allows the virtual resources to migrate upon virtual cluster requests. The method further improves the utilization of physical resources and reduces resource fragmentation. According to extensive simulation and emulation experiments and comparison with correlative algorithms, CoVCE effectively reduces network delays, offers a higher embedding efficiency, improves user experiences and, to some extent, also improves the revenue/cost ratio and throughput.


Virtual cluster Software-defined network Virtual cluster embedding Multi-objective optimization Network delay 



This work is supported by National Core Electronic Devices, High-end Generic Chips and Basic Software Project under Grant No. 2016ZX01040101; Mobile Terminal Operating System under Grant No. 2016ZX01040101; the National Natural Science Foundation of China under Grant No. 61602492, 61502511, 61772070; Beijing Municipal Education Commission under Grant No.KM201510016009, Beijing Higher Education Young Elite Teacher Project (Grant No. YETP1169), Excellent Teachers Development Foundation of BUCEA (No.21082717046), and National Key R&D Program of China (No.2016YFC060090).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.


  1. Al-Shabibi M, De Leenheer M, Gerola M, Koshibe A, Parulkar G, Salvadori E, Snow B (2014) OpenVirteX: make your virtual SDNs programmable. In: ACM SIGCOMM HotSDN workshopGoogle Scholar
  2. Butt NF, Chowdhury M, Boutaba R (2010) Topology-awareness and reoptimization mechanism for virtual network embedding. Springer, BerlinGoogle Scholar
  3. Cai J, Wang Y, Liu Y, Luo J-Z, Wei W, Xu X (2018) Enhancing network capacity by weakening community structure in scale-free network. Future Gener Comput Syst 87:765–771CrossRefGoogle Scholar
  4. Chen W, Chen Z, Samatova NF, Peng L, Wang J, Tang M (2014) Solving the maximum duo-preservation string mapping problem with linear programming. Theoret Comput Sci 530:1–11MathSciNetCrossRefGoogle Scholar
  5. Chowdhury M, Rahman M, Boutaba R (2012) Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans Networking 20(1):206–219CrossRefGoogle Scholar
  6. Fischer A, Botero J, Beck M, De Meer H, Hesselbach X (2013) Virtual network embedding: a survey. IEEE Commun Surv Tutor 15:1–19CrossRefGoogle Scholar
  7. Gomes RL, Bittencourt LF, Madeira ER, Cerqueira E, Gerla M (2014) An architecture for dynamic resource adjustment in VSDNs based on traffic demand. In: GLOBECOM, pp 2005–2010Google Scholar
  8. Gomes RL, Bittencourt LF, Madeira ER, Cerqueira E, Gerla M (2016) Bandwidth-aware allocation of resilient virtual software-defined networks. Comput Netw 100(5):179–194CrossRefGoogle Scholar
  9. Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934–1944CrossRefGoogle Scholar
  10. Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 56(7):1–7CrossRefGoogle Scholar
  11. He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537–3548CrossRefGoogle Scholar
  12. He P, Deng Z, Gao C, Wang X, Li J (2017) Model approach to grammatical evolution: deep-structured analyzing of model and representation. Soft Comput 21(18):5413–5423CrossRefGoogle Scholar
  13. Iperf-TCP and UDP bandwidth performance measurement tool.
  14. Jhaveri R, Patel N, Zhong Y, Sangaiah A (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEE Access. CrossRefGoogle Scholar
  15. Jiang L, Cheng Y, Yang L, Li J, Yan H, Wang X (2018) A trust-based collaborative filtering algorithm for E-commerce recommendation system. J Ambient Intell Humaniz Comput. CrossRefGoogle Scholar
  16. Lantz B, O’Connor B (2015) A Mininet-based virtual testbed for distributed SDN development. In: ACM conference on special interest group on data communication. ACM, pp 365–366Google Scholar
  17. Li X, Wang H, Ding B, Li X, Feng D (2014a) Resource allocation with multi-factor node ranking in data center networks. Future Gener Comput Syst 32:1–12CrossRefGoogle Scholar
  18. Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRefGoogle Scholar
  19. Li J, Chen X, Li M, Li J, Lee P, Lou W (2014c) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRefGoogle Scholar
  20. Li R, Zhang J, Tan Y, Wu Q (2016) TMVCE—topology-aware multipath virtual cluster embedding algorithm. In: CCIOT. IEEEGoogle Scholar
  21. Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Secur Commun Netw. CrossRefGoogle Scholar
  22. Lin W, Zhu C, Li J, Liu B, Lian H (2015) Novel algorithms and equivalence optimisation for resource allocation in cloud computing. IJWGS 11(2):193–210CrossRefGoogle Scholar
  23. Lin W, Xu S, Li J, Xu L, Peng Z (2017a) Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput 21(5):1301–1314CrossRefGoogle Scholar
  24. Lin W, Xu S, He L, Li J (2017b) Multi-resource scheduling and power simulation for cloud computing. Inf Sci 397:168–186CrossRefGoogle Scholar
  25. Medved J, Varga R, Tkacik A, Tkacik A, Gray K (2014) Opendaylight: towards a model-driven SDN controller architecture. In: 15th international symposium on 2014 IEEE. IEEE, pp 1–6Google Scholar
  26. Mehmet D, Mostafa A (2014) Design and analysis of techniques for mapping virtual networks to software-defined network substrates. Comput Commun 45:1–10CrossRefGoogle Scholar
  27. Mijumbi R, Serrat J, Rubio J (2014) Dynamic resource management in SDN-based virtualized networks. In: Proceedings of international conference on network and service management.
  28. Pang Z, Wang K, Xie M (2014) The TH express-2 high performance interconnect networks. Front Comput Sci 8(3):357–366MathSciNetCrossRefGoogle Scholar
  29. Papagianni C, Androulidakis G, Papavassiliou S (2014) Virtual topology mapping in SDN-enabled clouds. NCCAGoogle Scholar
  30. Rabbani M, Pereira Esteves R, Podlesny M, Simon G, Zambenedetti Granville L, Boutaba R (2013) On tackling virtual data center embedding problem. In: IFIP/IEEE IM 2013. Virtual network embedding base on real-time topological attributes, pp 177–184Google Scholar
  31. Salvadori E, Doriguzzi Corin R, Broglio A, Gerola M (2011) Generalizing virtual network topologies in openflow-based networks. In: IEEE global telecommunications conference (GLOBECOM 2011), Houston, TX, USA, pp 1–6Google Scholar
  32. Sun Z, Zhang Q, Li Y, Tan Y (2018) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol 28(1):193–205Google Scholar
  33. Tan Y, Xu X, Liang C, Zhang X, Zhang Q, Li Y (2018) An end-to-end covert channel via packet dropout for mobile networks. Int J Distrib Sens Netw 14(5):1550147718779568CrossRefGoogle Scholar
  34. Wang Z, Han Y, Lin T, Tang H, Ci S (2012) Virtual network embedding by exploiting topological information. In: IEEE GLOBECOMGoogle Scholar
  35. Wang Y, Li K, Li K (2017) Partition scheduling on heterogeneous multicore processors for multi-dimensional loops applications. Int J Parallel Prog 45(4):827–852CrossRefGoogle Scholar
  36. Wang H, Wang W, Cui Z, Zhou X, Zhao J, Li Y (2018a) A new dynamic firefly algorithm for demand estimation of water resources. Inf Sci 438:95–106MathSciNetCrossRefGoogle Scholar
  37. Wang C, Shen J, Liu Q, Ren Y, Li T (2018b) A novel security scheme based on instant encrypted transmission for Internet-of-Things. Secur Commun Netw. CrossRefGoogle Scholar
  38. Wei X, Li H, Yang K, Zou L (2014) Topology-aware partial virtual cluster mapping algorithm on shared distributed infrastructures. IEEE Trans Parallel Distrib Syst 25(10):2721–2730CrossRefGoogle Scholar
  39. Yu M, Yi Y, Rexford J, Chiang M (2008) Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput Commun Rev 38(2):17–29CrossRefGoogle Scholar
  40. Yu X, Tan Y, Sun Z, Liu J, Liang C, Zhang Q (2018a) A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Humaniz Comput. CrossRefGoogle Scholar
  41. Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan Y (2018b) An extra-parity energy saving data layout for video surveillance. Multimed Tools Appl 77:4563–4583CrossRefGoogle Scholar
  42. Yu X, Tan Y, Zhang C, Liang C, Khaled A, Zheng J, Zhang Q (2018c) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76–85CrossRefGoogle Scholar
  43. Zhang X, Tan Y, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against FROST for mobile devices. Clust Comput 20(3):2393–2402CrossRefGoogle Scholar
  44. Zhang X, Tan Y, Zhang C, Xue Y, Li Y, Zheng J (2018) A code protection scheme by process memory relocation for android devices. Multimed Tools Appl 77(9):11137–11157CrossRefGoogle Scholar
  45. Zhou Z, Dong M, Ota K, Wang G, Yang LT (2016) Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks. IEEE Internet Things J 3(3):428–438CrossRefGoogle Scholar
  46. Zhu H, Tan Y, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Future Gener Comput Syst 73:106–114CrossRefGoogle Scholar
  47. Zhu H, Tan Y, Yu X, Xue Y, Zhang Q, Zhu L, Li Y (2018) An identity-based proxy signature on NTRU lattice. Chin J Electron 27(2):297–303CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina

Personalised recommendations