Document Type : Original/Review Paper

Authors

1 Department of Electrical and Computer Engineering, North Tehran Branch, Islamic Azad University, Tehran, Iran.

2 Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran.

10.22044/jadm.2021.9737.2106

Abstract

Generally, the issue of quality assurance is a specific assurance in computer networks. The conventional computer networks with hierarchical structures that are used in organizations are formed using some nodes of Ethernet switches within a tree structure. Open Flow is one of the main fundamental protocols of Software-defined networks (SDNs) and provides the direct access to and change in program of sending network equipment such as switches and routers, physically and virtually. Lack of an open interface in data sending program has led to advent of integrated and close equipment that are similar to CPU in current networks. This study proposes a solution to reduce traffic using a correct placement of virtual machines while their security is maintained. The proposed solution is based on the moth-flame optimization, which has been evaluated. The obtained results indicate the priority of the proposed method.

Keywords

[1] A. Beloglazov, R. Buyya, Y. C. Lee, and A. Zomaya (2011). “A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems”, pp. 47–111.
[2] Tajamolian, M., Ghasemzadeh, M. (2019). Analytical evaluation of an innovative decision-making algorithm for VM live migration. Journal of AI and Data Mining, 7(4), 589-596. doi: 10.22044/jadm.2018.7178.1847.
[3] Mabhoot, N., Momeni, H. (2021). An Energy-aware Real-time Task Scheduling Approach in a Cloud Computing Environment. Journal of AI and Data Mining, (), -. doi: 10.22044/jadm.2021.10344.2171.
[4] Donyagard Vahed, N., Ghobaei‐Arani, M., & Souri, A. (2019). Multiobjective virtual machine placement mechanisms using nature‐inspired metaheuristic algorithms in cloud environments: A comprehensive review. International Journal of Communication Systems, 32(14), e4068.
[5] Masdari, M., Gharehpasha, S., Ghobaei-Arani, M., & Ghasemi, V. (2019). Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions. Cluster Computing, 1-31.
[6] J. Anderson and J.-H. Cho (2017). “Software Defined Network Based Virtual Machine Placement in Cloud Systems,” in MILCOM 2017 IEEE Military Communications Conference (MILCOM), pp. 876–881.
[7] M.C. Silva Filho, C.C. Monteiro, P.R.M. Inácio, and M. M. Freire (2018). “Approaches for optimizing virtual machine placement and migration in cloud environments: A survey,” J. Parallel Distrib Comput, Vol. 111, pp. 222–250.
[8] L. Zhang, Y. Zhuang, and W. Zhu (2013). “Constraint Programming based Virtual Cloud Resources Allocation Model,” Int. J. Hybrid Inf. Technol., Vol. 6, No. 6, pp. 333–344.
[9] C. Dupont, T. Schulze, G. Giuliani, A. Somov, and F. Hermenier (2012). “An energy aware framework for virtual machine placement in cloud federated data centres,” in Proceedings of the 3rd International Conference on Future Energy Systems Where Energy, Computing and Communication Meet- e-Energy’12, pp. 1–10.
[10] J. Dong, H. Wang, and S. Cheng (2015). “Energy-performance tradeoffs in IaaS cloud with virtual machine scheduling,” China Commun., Vol. 12, No. 2, pp. 155–166.
[11] W. Song, Z. Xiao, Q. Chen, and H. Luo (2014). “Adaptive Resource Provisioning for the Cloud using Online Bin Packing,” IEEE Trans. Comput., Vol. 63, No. 11, pp. 2647–2660.
[12] G. Gambosi, A. Postiglione, and M. Talamo (2000). “Algorithms for the Relaxed Online Bin-Packing Model,” SIAM J. Comput., Vol. 30, No. 5, pp. 1532–1551.
[13] T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif (2009). “Sandpiper: Black-box and gray-box resource management for virtual machines,” Comput. Networks, Vol. 53, No. 17, pp. 2923–2938.
[14] A. Singh, M. Korupolu, and D. Mohapatra (2008). “Server-storage virtualization: Integration and load balancing in data centers,” in 2008 SC-International Conference for High Performance Computing, Networking, Storage and Analysis, pp. 1–12.
[15] N. Bobroff, A. Kochut, and K. Beaty (2007). “Dynamic Placement of Virtual Machines for Managing SLA Violations,” in 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp. 119–128.
[16] R. Enns. NETCONF Configuration Protocol. RFC 4741 (Proposed Standard), Dec. 2006. Obsoleted by RFC 6241.
[17] Brent Salisbury (2012). The Northbound API- a Big Little Problem, www.networkstatic.net.
[18] Seyedali Mirjalili (2015). “Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm”, Knowledge-based Systems 89, 228–249.
[19] S. Agrawal, S. Bose, and S. Sundarrajan (2009). “Grouping genetic algorithm for solving the server consolidation problem with conflicts,” Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, pp. 1-8.
[20] Ghobaei‐Arani, M., Rahmanian, A. A., Shamsi, M., & Rasouli‐Kenari, A. (2018). A learning‐based approach for virtual machine placement in cloud data centers. International Journal of Communication Systems, 31(8), e3537.
[21] R.K. Gupta and R. Pateriya (2019). “Survey on virtual machine placement techniques in cloud computing environment,” International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 4, No. 4, pp. 1–7.
[22] S.-H. Wang, P.P.W. Huang, C.H.P. Wen, and L.-C. Wang (2020). “EQVMP: Energy-efficient and qos-aware virtual machine placement for software defined datacenter networks,” in IEEE International Conference on Information Networking.
[23] R.R.R. Barbosa, R. Sadre, A. Pras, and R.V.D. Meent (2010). “Simpleweb/university of twente traffic traces data repository,” Tech. Rep. [Online]. Available: http://eprints.eemcs.utwente.nl/17829/
[24] T. Benson, A. Akella, and D. Maltz (2010). “Network traffic characteristics of data centers in the wild,” in ACM Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 267–280.
[25] Tie Li; Gang Kou; Yi Peng; Yong Shi (2017). “Classifying With Adaptive Hyper-Spheres: An Incremental Classifier based on Competitive Learning”, IEEE Transactions on Systems, Man, and Cybernetics.
[26] Gang Kou, Yanqun Lu, Yi Peng, and Yong Shi (2012). “Evaluation of Classification Algorithms using MCDM and Rank Correlation, International Journal of Information Technology & Decision Making”, Vol. 11, Issue: 1, 197-225.