• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lin Xiao, Ji Shuo, Yue Shengnan, Sun Weiqiang, Hu Weisheng. Node-Constraint Store-and-Forward Scheduling Method for Inter-Datacenter Networks[J]. Journal of Computer Research and Development, 2021, 58(2): 319-337. DOI: 10.7544/issn1000-1239.2021.20200384
Citation: Lin Xiao, Ji Shuo, Yue Shengnan, Sun Weiqiang, Hu Weisheng. Node-Constraint Store-and-Forward Scheduling Method for Inter-Datacenter Networks[J]. Journal of Computer Research and Development, 2021, 58(2): 319-337. DOI: 10.7544/issn1000-1239.2021.20200384

Node-Constraint Store-and-Forward Scheduling Method for Inter-Datacenter Networks

Funds: This work was supported by the National Natural Science Foundation of China for Young Scientists (61901118), the Key Program of the National Natural Science Foundation of China (61433009), and the Open Foundation of the State Key Laboratory of Advanced Optical Communication Systems and Networks (2019GZKF03003).
More Information
  • Published Date: January 31, 2021
  • Performing store-and-forward (SnF) using abundant storage resources inside datacenters has been proven to be effective in overcoming the challenges faced by inter-datacenter bulk transfers. Most prior studies attempt to fully leverage the network infrastructure and maximize the flexibility of the SnF scheme. Their proposed scheduling methods hence aim at a full storage placement where all network nodes (e.g., datacenters) are SnF-enabled and every node is taken into account in the scheduling process. However, the computational complexity of the prior methods exponentially increases with the network scale. As a result, the prior methods may become too complicated to implement for large-scale networks and online scheduling. In this work, based on the inter-datacenter optical network, SnF models are presented to quantify the impact of the number of SnF-enabled nodes on the performance and the complexity of the SnF scheduling problem. Our key findings show that taking a few SnF-enabled nodes into account in the scheduling process can provide high performance while maintaining low complexity under certain circumstances. It is unnecessary to take every node into account in the scheduling process. Therefore, a node-constraint SnF scheduling method is proposed, whose features are twofold: 1) by taking a portion of nodes into account, it reduces the complexity of the SnF scheduling problem; 2) by introducing a topology abstraction, it condenses the link states between the considered nodes and hence reduces the problem size, which improves its efficiency in solving the SnF scheduling problem. Simulations demonstrate that the proposed method outperforms the prior method in terms of blocking probability and computation time.
  • Related Articles

    [1]Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
    [2]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [3]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [4]Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    [5]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [6]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [7]Wu Xuangou, Wang Pengfei, Zheng Xiao, Fan Xu, Wang Xiaolin. Trajectory Privacy Protection Based on Road Segment Report in VANETs[J]. Journal of Computer Research and Development, 2017, 54(11): 2467-2474. DOI: 10.7544/issn1000-1239.2017.20170371
    [8]Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen. A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion[J]. Journal of Computer Research and Development, 2016, 53(11): 2454-2464. DOI: 10.7544/issn1000-1239.2016.20150553
    [9]Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
    [10]Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.
  • Cited by

    Periodical cited type(20)

    1. 冉玲琴,彭长根,许德权,吴宁博. 基于区块链技术架构的隐私泄露风险评估方法. 计算机工程. 2023(01): 146-153 .
    2. 张学旺,林金朝,黎志鸿,姚亚宁. 基于新型公平盲签名和属性基加密的食用农产品溯源方案. 电子与信息学报. 2023(03): 836-846 .
    3. 俞惠芳,吕芝蕊. 基于联盟链的身份环签密方案. 电子与信息学报. 2023(03): 865-873 .
    4. 陈亮,黄华威,吴嘉婧,郑子彬. 区块链原理与技术课程建设探索与实践. 计算机教育. 2023(04): 74-78 .
    5. 宋露燕,刘雪凤. 区块链赋能海洋数据共享:技术路径与风险议题. 科技与经济. 2023(02): 66-70 .
    6. 陈志刚. 论非同质化通证的数据财产属性. 政法论丛. 2023(05): 149-160 .
    7. 邓崧,吕雨婷,杨迪. 数据垄断的演化与分类——基于国内公共数据与商业数据. 信息资源管理学报. 2022(01): 80-90 .
    8. 陈丽莎,李雪莲,高军涛. 支持数据完整性验证的可问责数据交易方案. 系统工程与电子技术. 2022(04): 1364-1371 .
    9. 乔鹏程,张岩松. 农业公司使用区块链技术能否提升营运效率?. 会计之友. 2022(12): 144-150 .
    10. 袁冰. 智媒环境下个人信息保护的场域迁移与框架建构. 科技传播. 2022(10): 126-128 .
    11. 钟锭,刘金红,夏新斌,周良荣. 基于区块链技术的湖南省道地药材全过程追溯体系构建. 中国医药导报. 2022(24): 194-197 .
    12. 许思源,李畅,李贺鑫,谢沂伯,肖飞. 基于区块链的生物样本信息共享系统模型研究. 中国卫生信息管理杂志. 2022(04): 471-475+534 .
    13. 宋晓玲,刘勇,董景楠,黄勇飞. 元宇宙中区块链的应用与展望. 网络与信息安全学报. 2022(04): 45-65 .
    14. 周磊,陈珍珠,付安民,苏铓,俞研. 支持密钥更新与审计者更换的云安全审计方案. 计算机研究与发展. 2022(10): 2247-2260 . 本站查看
    15. 程晗蕾,鲁静. 区块链技术驱动融资租赁平台优化策略探究. 财会月刊. 2022(20): 154-160 .
    16. 黄思云,齐金平. 云计算环境下基于XML的异构数据共享研究. 信息与电脑(理论版). 2022(19): 16-19 .
    17. 岳增龙,陈海燕,张晓晶. NKN区块链技术在物联网中的应用. 中国新通信. 2021(10): 91-92 .
    18. 张茹,曹佳远. 基于区块链技术的造纸绿色材料供应量控制技术. 造纸科学与技术. 2021(04): 53-57+76 .
    19. 杨信廷,王杰伟,邢斌,罗娜,于华竟,孙传恒. 基于区块链的畜牧养殖资产监管身份认证研究. 农业机械学报. 2021(11): 170-180 .
    20. 刘芬,朱壮友,许勇. 基于区块链的电子病历数据共享模型研究. 安徽师范大学学报(自然科学版). 2021(06): 536-544 .

    Other cited types(28)

Catalog

    Article views (715) PDF downloads (292) Cited by(48)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return