scholarly journals HP-SFC: Hybrid Protection Mechanism Using Source Routing for Service Function Chaining

2021 ◽  
Vol 11 (11) ◽  
pp. 5245
Author(s):  
Syed M. Raza ◽  
Haekwon Jeong ◽  
Moonseong Kim ◽  
Hyunseung Choo

Service Function Chaining (SFC) is an emerging paradigm aiming to provide flexible service deployment, lifecycle management, and scaling in a micro-service architecture. SFC is defined as a logically connected list of ordered Service Functions (SFs) that require high availability to maintain user experience. The SFC protection mechanism is one way to ensure high availability, and it is achieved by proactively deploying backup SFs and installing backup paths in the network. Recent studies focused on ensuring the availability of backup SFs, but overlooked SFC unavailability due to network failures. This paper extends our previous work to propose a Hybrid Protection mechanism for SFC (HP-SFC) that divides SFC into segments and combines the merits of local and global failure recovery approaches to define an installation policy for backup paths. A novel labeling technique labels SFs instead of SFC, and they are stacked as per the order of SFs in a particular SFC before being inserted into a packet header for traffic steering through segment routing. The emulation results showed that HP-SFC recovered SFC from failure within 20–25 ms depending on the topology and reduced backup paths’ flow entries by at least 8.9% and 64.5% at most. Moreover, the results confirmed that the segmentation approach made HP-SFC less susceptible to changes in network topology than other protection schemes.

2021 ◽  
Author(s):  
Danyang Zheng ◽  
Gangxiang Shen ◽  
Yongcheng Li ◽  
Xiaojun Cao ◽  
Biswanath Mukherjee

<p>In the upcoming 5G-and-beyond era, ultra-reliable low-latency communication (URLLC) services will be ubiquitous in edge networks. To improve network performance and quality of service (QoS), URLLC services could be delivered via a sequence of software-based network functions, also known as service function chains (SFCs). Towards reliable SFC delivery, it is imperative to incorporate deterministic fault tolerance during SFC deployment. However, deploying an SFC with deterministic fault tolerance is challenging because the protection mechanism needs to consider protection against physical/virtual network failures and hardware/software failures jointly. Against multiple and diverse failures, this work investigates how to effectively deliver an SFC in optical edge networks with deterministic fault tolerance while minimizing wavelength resource consumption. We introduce a protection augmented graph, called <i>k</i>-connected service function slices layered graph (KC-SLG), protecting against <i>k</i>-1 fiber link failures and <i>k</i>-1 server failures. We formulate a novel problem called deterministic-fault-tolerant SFC embedding and propose an effective algorithm, called most candidate first SF slices layered graph embedding (MCF-SE). MCF-SE employs two proposed techniques: <i>k</i>-connected network slicing (KC-NS) and <i>k</i>-connected function slicing (KC-FS). Through thorough mathematical proof, we show that KC-NS is <i>2</i>-approximate. For KC-FS, we demonstrate that <i>k</i> = 3 provides the best cost-efficiency. Our experimental results also show that the proposed MCF-SE achieves deterministic-fault-tolerant service delivery and performs better than the schemes directly extended from existing work regarding survivability and average cost-efficiency.</p>


Author(s):  
Leonidas Anthopoulos ◽  
Panos Fitsilis

More than a decade has passed since the conception of major Government e-strategies and significant outcomes have been delivered worldwide concerning information technology infrastructure and e-service deployment. Already, major e-Strategies have closed their lifecycles and have been reviewed. British “t-Government” and Obama's “Open Government Initiative” are only some of the transformation results, where citizens have been placed in the center of the strategic planning and e-Government priorities have been reconsidered. This paper addresses an important issue: the identification of international e-strategic transformation and the recognition of patterns for e-strategic transformation. A methodological analysis of major e-strategies is performed according to strategic lifecycle management tool and patterns for e-strategic evolution are structured.


2015 ◽  
pp. 1263-1287
Author(s):  
Leonidas Anthopoulos ◽  
Panos Fitsilis

More than a decade has passed since the conception of major Government e-strategies and significant outcomes have been delivered worldwide concerning information technology infrastructure and e-service deployment. Already, major e-Strategies have closed their lifecycles and have been reviewed. British “t-Government” and Obama's “Open Government Initiative” are only some of the transformation results, where citizens have been placed in the center of the strategic planning and e-Government priorities have been reconsidered. This paper addresses an important issue: the identification of international e-strategic transformation and the recognition of patterns for e-strategic transformation. A methodological analysis of major e-strategies is performed according to strategic lifecycle management tool and patterns for e-strategic evolution are structured.


2018 ◽  
Vol 27 (06) ◽  
pp. 1850087 ◽  
Author(s):  
Jue Chen ◽  
Jinbang Chen ◽  
Junchen Ling ◽  
Junlong Zhou ◽  
Wei Zhang

Link failures are commonly observed in computer networks, including the newly emerging Software Defined Network (SDN). Considering that failure recovery methods used in traditional networks cannot be applied to SDN networks directly, we propose a method named pro-VLAN in this paper, which calculates a backup path and assigns a unique VLAN id for each link of the network based on the protection mechanism. It makes the most of SDN’s features and can recover a single link failure in SDN with the advantages of high efficiency, strong scalability and wide applicability. More specifically, high efficiency (i.e., a fast failure recovery with a low memory consumption) is achieved by calculating backup paths for each link instead of each flow and using group tables to switch backup paths automatically and locally when failures occur. Strong scalability (i.e., the amount of backup flow entries per switch is stable) is achieved by keeping the amount of links per switch no matter how the network scale extends or how the amount of flows increases. Wide applicability is achieved by always finding a path available without modifying any hardware or protocol as long as the network is still reachable after a link failure. Simulation results and mathematical analysis demonstrate that both pro-VLAN and a flow-based protection method achieve a fast failure recovery, while pro-VLAN consumes less than 1% of the forwarding entries to store backup paths as compared to the flow-based method. Moreover, when the network scale increases from 10 to 60 switches by 500%, the increase of the number of backup flow entries per switch built by pro-VLAN is only less than 50%.


2020 ◽  
Vol 2 (3) ◽  
pp. 166-173
Author(s):  
Novaely Rachman ◽  
Pahrul Irfan

Problem faced by goods delivery service providers today is that there are found consumers they have difficulty in finding couriers to transport large goods, thus causing consumers to have to go to the owner of a pickup car or delivery service provider, it can take a lot of time and cost. To solve the problem, there is currently no system that facilitates consumers in ordering couriers optimally. Therefore, it requires a delivery system that can order couriers only through a smartphone owned. The result that was wanted to be achieved in this study was the creation of a multiplatform based courier ordering system with a REST web service architecture that can be accessed through computer and Android platforms. With the construction of this system testing of the web service, the test results of the web service function stated that, all functions tested show valid results, this means that the entire web service function on the application, already fulfilled the design, in addition to testing against the web service, conducted also the black box trial, based on the black box test results, it is concluded that the application created, already according to the design, is proven by all the parts tested showing valid status


Sign in / Sign up

Export Citation Format

Share Document