Disclosure of Invention
Aiming at the defects of the existing method, the invention provides a Robust Energy Efficiency Routing method (REERA) for a teaching cloud computing network, so as to realize teaching and scientific research of a high-Energy Efficiency network for cloud computing service and simultaneously maintain the stability and robustness of the whole network.
The technical scheme of the invention is realized as follows: a robust energy efficiency routing method for a teaching cloud computing network comprises the following steps:
the method comprises the following steps: calculating link utilization
Establishing a link model and calculating the link utilization rate;
step two: dormancy of redundant links using SRLA algorithm
In the SRLA algorithm, a Dijkstra algorithm is used for calculating a shortest path tree of each router node, then a dispatch mechanism and an entry mechanism obtain a modified path tree, and a redundant link is calculated by comparing an SPT (shortest Path first) and an MPT (Multi-Path first) and is dormant;
step three: establishing REERA model
Establishing a REERA model by using the link weight as the input routing flow of the Dijkstra algorithm;
step four: determining SRLA algorithm parameters
Determining parameters, iteration orders and times which are suitable for an SRLA algorithm, triggering the frequency of the SRLA, and time interval T;
step five: calculating link criticality
Calculating link criticality based on the link capacity matrix;
step six: minimizing network criticality
Mapping the value of the link criticality to the link weight, minimizing the network criticality and realizing the most robust network;
step seven: obtaining an optimal routing path by the network link weight matrix;
the appropriate routing path is selected by the network link weight matrix using Dijkstra's algorithm.
Further, the first step calculates the link utilization, and the specific process is as follows:
the cloud computing backbone network is modeled as G (V, E, W), where V is a set of nodes, E is a set of links, and W represents a link weight matrix of the network. In the model, the link states are defined as follows:
wherein x is
ij∈{0,1},L
ijE represents a link from node i to node j;
the link energy consumption comprises a base energy consumption
And energy consumption related to flow
The basic energy consumption means that the constant energy consumption of the operation link is guaranteed to be expressed as:
wherein,
represents a link L
ijBasic energy consumption of c
ijRepresenting the link capacity, δ is a basic energy related parameter, β represents the ratio of the link's energy consumption to its capacity, and the traffic-related energy consumption is:
wherein f is
ij(t) denotes a pass-through link L
ijThe flow rate of (a);
representing the relationship between link energy consumption and the traffic energy consumption carried by it;
link L
ijThe energy consumption of (a) is modeled as:
link L in T period
ijAverage energy efficiency of
Can be expressed as:
only the dormancy of redundant links of the network is considered in the network and does not involve the shutdown of network nodes. Thus, the energy efficiency of the entire network
Can be expressed as:
wherein N is
sRepresenting a source node, N
dRepresenting a destination node, fl
sd(t) denotes a slave source node N
sE.g. V to destination node N
dInstantaneous flow, x, over e V
ijIndicating the state of the link, N
iRepresenting a node, p
0Representing the power of nodes in the network, set to a constant value,
representing a node N
sTo node N
dAverage flow rate of L
ijRepresents a link from node i to node j, V represents a set of nodes, and E represents a set of links;
L
ijthe link utilization of (a) is:
wherein,
indicating that the link is from L
ijAverage flow rate of above; c. C
ijRepresents the link capacity;
after T time interval, u
ijFor link utilization as:
wherein,
indicating the average utilization of the initial link upon user request,
representing the average utilization of the link.
Further, the specific method of the second step is as follows:
modeling a backbone network of cloud computing as G (V, E, W), wherein V is a node set, E is a link set, N and L are cardinality of the sets V and E respectively, and W represents a link weight matrix of the network; calculating a shortest path tree SPT (v) of each router node by a Dijkstra algorithm, wherein v represents the router nodes in the network; set of active links E
ADefined as the set of links E involved in the shortest spanning tree
A=U
v∈VSPT(v),U
v∈VRepresents a complete subgraph of diagram G; after a shortest path tree SPT (v) of each router node in a network model of cloud computing is obtained, a degree-out mechanism and a degree-in mechanism are utilized to carry out loop iteration to obtain a modified path tree, wherein the degree-out mechanism is to find a degree-out router node ER with the maximum degree in the network; routing router node IR among the ER's neighbors, computing the shortest path trees of ER and IR, comparing the shortest path trees of ER and IR to generate a modified path tree; and finally, comparing the MPT with the SPT to obtain a redundant link and converting the redundant link into a dormant state, and repeating the steps to realize the SRLA algorithm.
Further, the establishing of the REERA model in the third step:
s.t.
connection(N
s,N
d)=1 (9b)
equation (9a) represents a cost function that maximizes the energy efficiency of the network; equation (9b) shows that any traction node is always connected and the traffic between any two nodes is non-negative; equation (9c) indicates that the link weight is used as the link cost when constructing the route; equation (9d) means link L
ijIs equal to the load across link L
ijThe sum of the flow rates of all OD (origin destination) streams; equation (9e) indicates that the link utilization is not greater than the link capacity; costl
ijRepresents a link l
ijOverhead of traffic of w
ijA link weight value indicating the end of the request,
representing (s, d) passing through the link l
ijFlow rate of (c)
ijRepresents a link l
ijThe capacity of (c).
Further, the fourth step of determining parameters of the SRLA algorithm includes the following specific processes:
in order to maximize network energy efficiency, the number of iterations is set to 3, then the frequency of triggering the SRLA is determined, the time interval is set to T, the effect of the time interval T can be offset in the energy efficiency calculation process, and most user requests can be responded within a time interval.
Further, the link criticality is calculated in the fifth step, and the specific process is as follows:
the smaller the criticality of the network is, the stronger the robustness of the network is; therefore, the criticality τ of the network is:
τ=2nTr(L
+) (10)
where n is the number of network nodes, Tr (-) represents the matrix trajectory,
is the Moore-Penrose inverse of Laplace matrix L; in equation (6), the criticality τ of the network represents the sum of the resistive distances between all two nodes;
defining a linear relationship between link capacity and initial link weight value, i.e. c
ij=k·w
oij+ a, where the parameters k and a are constants, w
oijRepresenting an initial value of link weight, and calculating link criticality based on a link capacity matrix; the normalized form of the network criticality τ is expressed as:
the formula for calculating the criticality of the network is as follows:
d=diag(c
1,c
2,…c
n) (12b)
L
c=d-W (12c)
wherein, A (r) represents the set of active nodes, and W represents the link weight matrix; equation (12a) represents the degree of fanout, c, of node r
rjRepresents the link capacity from node r to node j; equation (12b) represents a matrix constructed from diagonal vectors of the link capacity matrix; equation (12c) represents a new matrix consisting of a diagonal vector matrix and a weight matrix of link capacities; equation (12d) represents how to compute the normalized network criticality.
Further, the network criticality is minimized in the sixth step, and the specific process is as follows:
due to the relationship between the network criticality and robustness, the objective equation for implementing the most robust network is:
Minτ (13a)
s.t.
∑
(i,j)∈Lw
ij≤c
ij,c
ijis fixed (13b)
0≤w
ij≤c
ij(13c)
wherein, c
ijIs a link capacity matrix; w is a
ijIs a link L
ijWeights, which can obtain reasonable network link weight values by optimizing the routing algorithm, thereby improving the robustness of the whole network, equation (13a) represents an objective function, and equations (13b) and (13c) represent limits;
equation (10) indicates that the criticality τ of the network is a network-wide measure and can be used to describe network robustness, the smaller the criticality τ of the network, the more robust the network is; equation (13a) represents an objective function that minimizes the criticality τ of the network, the second and third equations showing the constraints satisfied by the weight of each link; equation (13) represents that by minimizing the criticality τ of the network, the optimal link weight satisfying a plurality of constraints is found, and a robust route is constructed;
equation (12) indicates that when the bandwidth capacity of a link changes, the criticality of the link also changes, and for a high-load link, the influence on the whole network in the routing process is large; thus, the value of link criticality is mapped to the link weight, which is updated as the bandwidth capacity of the network link decreases by the following formula:
τ=n(n-1)τ′ (14a)
Δτ=τ-τ
0(14b)
w
ij=b·Δτ+w
0ij(14c)
an initial network criticality value for a time interval T; τ is the network criticality value at the end of time T, τ
0Representing an initial network criticality within a particular time interval T; b is a constant, which is based on a simulation of a real network; n is the number of network nodes; w is a
0ijIs the initial link weight value, w, of time T
ijIs the link weight value at the end of time interval T; equation (14a) represents the relationship between the criticality of the network and its normalized value; equation (14b) represents a change in the criticality value of the network; equation (14c) characterizes the relationship between the change in the criticality of the network and the link weight value.
The symbols involved in the present invention are defined as follows:
n denotes the collective V cardinal number (where N | | V |), L denotes the cardinal number of the collective E (where L | | | E |), P
ij(t) denotes a link L
ijInstantaneous power, f
ij(t) denotes a link L
ijInstantaneous flow of (fl)
sd(t) denotes a source node N
sE.v and destination node N
dE.g. instantaneous flow between V, P
ijIndicating the link L within the period T
ijAverage power of f
ijIndicating the link L within the period T
ijAverage flow of, fl
sdRepresents N within the period T
sAnd N
dIs a constant, and po represents the power of the node in the network, c
ijRepresents a link L
ijThe capacity of the electric power transmission device is,
represents a link L
ijβ denotes the link L
ijRatio of energy consumption to capacity, delta representing a parameter related to the base energy, x
ijIndicating the link status, η
ijRepresents a link L
ijThe average energy efficiency over a period T, μ represents the change matrix of link utilization after a user request T period, ω
ijIndicating the link L at the end of the time interval T
ijWeight value, w
oijRepresents the initial link L
ijWeight values, A (k) represents the active node set, W represents the link weight matrix, τ
0An initial network criticality value representing the time interval T, τ representing the network criticality value at the end of time T, b representing a constant, which is based on a simulation of a real network, and n representing the number of network nodes.
The invention has the beneficial effects that:
the method provided by the invention can meet the QoS requirement, realize a robust energy-saving network and provide highly reliable and energy-efficient cloud computing service for learning and teaching. The present invention applies SRLA to find the largest set of sleepable links and converts redundant links to a sleep state as much as possible to achieve an energy efficient network. The REERA can meet the network robustness requirement under the condition of ensuring normal network routing. The MCRA routing algorithm represents the stability of the whole network through network criticality, and finally, the dormant redundant link algorithm is combined with the minimum criticality routing algorithm to construct a robust, efficient and energy-saving route of the cloud computing network, so that the problem of operation of a cloud computing backbone network with low energy efficiency is solved. More importantly, the method can dynamically change and adjust the link weight, ensures that the links can be used uniformly to the maximum extent, avoids flow congestion when some links of the cloud computing network are used excessively, and can improve the performance of the whole network. Simulation analysis shows that the proposed REERA can save a large amount of energy consumption, and is far superior to the existing network routing algorithm based on OSPF (open Shortest Path first).
Detailed Description
The invention is described in further detail below with reference to the following figures and specific examples:
a robust energy-saving routing method for cloud computing network learning comprises the following specific steps:
step one, calculating the link utilization rate, specifically comprising the following steps:
the cloud computing backbone network is modeled as G (V, E, W), where V is a set of nodes, E is a set of links, and W represents a link weight matrix of the network. In the model, the link states are defined as follows:
wherein x is
ij∈{0,1},L
ijE represents the link from node i to node j.
The link energy consumption comprises a base energy consumption
And energy consumption related to flow
The basic energy consumption refers to the constant energy consumption of the guaranteed operation link, and is expressed as:
in the formula,
represents a link L
ijBasic energy consumption of c
ijRepresenting the link capacity, δ is a basic energy related parameter, β represents the ratio of the link's energy consumption to its capacity, and the traffic-related energy consumption is:
wherein f is
ij(t) denotes a pass-through link L
ijThe flow rate of (a);
representing the relationship between the link energy consumption and the traffic energy consumption carried by it.
Link L
ijThe energy consumption of (a) is modeled as:
where B represents the base energy and R represents the flow related energy.
Therefore, the link L in the T period
ijThe average energy efficiency of (d) can be expressed as:
only dormant network redundant links are considered herein, but not the shutdown node. The energy efficiency of the entire network can be expressed as:
wherein N is
sRepresenting a source node, N
dRepresenting a destination node, fl
sd(t) denotes a slave source node N
sE.g. V to destination node N
dInstantaneous flow, x, over e V
ijIndicating the state of the link, N
iRepresenting a node, p
0Representing the power of nodes in the network, set to a constant value,
representing a node N
sTo node N
dAverage flow rate of L
ijRepresenting a link from node i to node j, V representing a set of nodes, and E representing a set of links.
L
ijThe link utilization of (a) is defined as:
wherein,
indicating that the link is from L
ijAverage flow rate of above; c. C
ijIndicating link capacity
After T cycles requested by the user, u is set as a variable matrix of link utilization, and the mathematical formula is as follows:
wherein,
and
respectively representing the average utilization rate of the initial link and the average utilization rate of the link after the user requests.
Step two: computing dormant redundant links using SRLA algorithm
Modeling a backbone network of cloud computing as G (V, E, W), wherein V is a node set, E is a link set, N and L are cardinality of the sets V and E respectively, and W represents a link weight matrix of the network. Calculating the shortest circuit of each router node by Dijkstra algorithmA path tree SPT (v), v represents a router node in the network; set of active links E
ADefined as the set of links E involved in the shortest spanning tree
A=U
v∈VSPT(v),U
v∈VRepresenting a complete sub-diagram of diagram G. After a Shortest Path Tree (SPT) (v) of each router node in a network model of cloud computing is obtained, a degree-out mechanism and a degree-in mechanism are utilized to carry out loop iteration to obtain a Modified Path Tree (MPT), wherein the basic idea of the degree-out mechanism is to find out the degree-out router node (Exproter Router, ER) with the maximum degree in the network; an ingress Router node (IR) among the ER's neighbors computes a shortest path tree of ER and IR, which compares spt (IR) with spt (ER) to generate a Modified Path Tree (MPT). And finally, comparing the MPT with the SPT to obtain a redundant link and converting the redundant link into a dormant state, and repeating the steps to realize the SRLA algorithm.
Establishing a REERA model in the third step, which comprises the following specific processes:
the REERA can be seen as an integrated algorithm of SRLA and MCRA, according to a model of a robust energy routing algorithm in the backbone network. Through the above analysis, a REERA optimization model is established.
REERA can be expressed as the following mathematical expression:
s.t.
connection(N
s,N
d)=1 (9b)
equation (9a) represents a cost function that maximizes the energy efficiency of the network. Equation (9b) shows that any traction node is always connected and that the traffic between any two nodes is non-negative. Equation (9c) indicates that the link weight is used as the link cost when constructing the route. Equation (9d) means link L
ijIs equal to the load across link L
ijThe sum of all the OD flows. Equation (9e) indicates that the link utilization is not greater than the link capacity.
Step four, determining the parameters of the SRLA algorithm, which comprises the following specific processes:
to maximize network energy efficiency, the order of the SRLA iteration needs to be determined. Based on the analysis, the number of iterations is set to 3, then the frequency of triggering the SRLA is determined, and the time interval is set to T. The effect of the time interval T can be offset in the energy efficiency calculation process. However, it must be determined that most users' requests can be responded to within a time interval.
Step five, calculating the link criticality, wherein the specific process is as follows:
the less critical the network, the more robust the network is. At the beginning of the initial network link capacity, the value of network criticality is minimal. The robustness of a communication network is reflected using the chain criticality, which is defined directly as:
where n is the number of network nodes, Tr (-) represents the matrix trajectory,
is the inverse Moore-Penrose transform of the laplacian matrix L. In equation (10), the criticality τ of the network represents the sum of the resistive distances between all two nodes, which is a graph-theory based global metric.
Now define a linear relationship between link capacity and initial link weight value, i.e. c
ij=k·w
oij+ a (it)The parameters k and a are constants, w
oijRepresenting link weight initial values) based on the link capacity matrix. Normalizing the criticality τ of the network to produce a variable, i.e.
The formula for calculating the criticality of the network is as follows:
d=diag(c
1,c
2,…c
n) (12b)
L
c=d-W (12c)
wherein, A (r) represents the set of active nodes, and W represents the link weight matrix; equation (12a) represents the degree of fanout, c, of node r
rjRepresents the link capacity from node r to node j; equation (12b) represents a matrix constructed from diagonal vectors of the link capacity matrix; equation (12c) represents a new matrix consisting of a diagonal vector matrix and a weight matrix of link capacities; equation (12d) represents how to compute the normalized network criticality.
And step six, minimizing the network criticality, which comprises the following specific processes:
due to the relationship between the network criticality and the robustness, the network criticality is minimized, and the network with the strongest robustness is realized, wherein the target equation is as follows:
Minτ (13a)
s.t.
∑
(i,j)∈Lw
ij≤c
ij,c
ijis fixed (13b)
0≤w
ij≤c
ij(13c)
wherein, c
ijIs a link capacity matrix; w is a
ijIs a link L
ijAnd (4) weighting. By optimizing the routing algorithmAnd obtaining a reasonable network link weight value, thereby improving the robustness of the whole network. Equation (13a) represents the objective function, while equations (13b) and (13c) represent the constraints.
Equation (10) indicates that the criticality τ of the network is a network-wide metric and can be used to describe network robustness. The smaller the criticality τ of the network, the more robust the network is. Equation (13a) represents an objective function that minimizes the criticality τ of the network; the second and third equations show the constraints that are satisfied by the weight of each link. Equation (13) indicates that finding optimal link weights that satisfy multiple constraints can help build robust routes by minimizing the criticality τ of the network.
Equation (12) indicates that as the bandwidth capacity of a link changes, the criticality of the link also changes. For a highly loaded link, the available bandwidth of the link capacity is relatively low, and the link has a large impact on the entire network during routing. Thus, the method can map the value of link criticality to link weights, which will vary with τ as the bandwidth capacity of the network link decreases. Updating the weight values of the links by the following formula:
τ=n(n-1)τ′ (14a)
Δτ=τ-τ
0(14b)
w
ij=b·Δτ+w
0ij(14c)
wherein, a certain time interval T is a criticality value of the initial network; τ is the network criticality value at the end of time interval T; tau is
0Representing an initial network criticality within a particular time interval T; b is a constant, which is based on a simulation of a real network; n is the number of network nodes; w is a
0ijIs the initial link weight value, w, of time T
ijIs the link weight value at the end of time interval T.
Equation (14a) represents the relationship between the criticality of the network and its normalized value; equation (14b) represents a change in the criticality value of the network; equation (14c) characterizes the relationship between the change in the criticality of the network and the link weight value.
And seventhly, obtaining the optimal routing path by the network link weight matrix, wherein the specific process is as follows:
the appropriate routing path is selected by the network link weight matrix using the Dijkstra algorithm, which has been described in step one.
Examples
In the simulation of the present invention, the basic power consumption of each router was set to 10W/h. It is divided into each interface (link) according to the simulated topology. FIG. 5 shows a network topology of data used in the simulation process; there are 23 nodes and 74 links in the graph, that is, the positions of the nodes and the lengths of the links do not represent the specific meaning of the network, and there is a direct relationship between the traffic size and the link weight. In order to analyze the superior robustness of the proposed energy-efficient routing algorithm, REERA is compared with ospfara, and the specific implementation steps are as follows:
the method comprises the following steps: calculating link utilization
Establishing a link model and calculating the link utilization rate; FIG. 6 is a histogram routing algorithm for both link utilization, showing that the algorithm's link utilization is better in the range of 2-5, showing that the algorithm's routing structure can keep the link utilization between 20% and 50%; link utilization is neither too high, resulting in network congestion and link failure, nor too low resulting in considerable waste of resources.
Step two: dormancy of redundant links using SRLA algorithm
In the SRLA algorithm, a Dijkstra algorithm is used for calculating a Shortest Path Tree (SPT) of each router node, then an outbound mechanism and an inbound mechanism obtain a Modified Path Tree (MPT), and a redundant link is calculated and is dormant by comparing the SPT and the MPT;
step three: establishing REERA model
Using the link weight as the input routing flow of Dijkstra algorithm, and establishing a REERA model through analysis;
step four: determining parameters for SRLA algorithms
Determining parameters, iteration orders and times which are suitable for an SRLA algorithm, triggering the frequency of the SRLA, and time interval T;
step five: calculating link criticality
Calculating link criticality based on the link capacity matrix;
step six: minimizing network criticality
Mapping the value of the link criticality to the link weight, minimizing the network criticality and realizing the most robust network; fig. 9 shows the distribution of the number of dormant links, and the link weight of the ospfara algorithm remains unchanged after initialization, so that the network cannot dynamically change the distribution of the routes according to the state of the user request, and cannot realize load balancing, so that the robustness of the network is relatively weak. As shown in fig. 9, the REERA may shut down and wake up the link in a time-varying manner. Simulation experiments show that the REERA proposed herein is effective, not only to improve the energy efficiency of the network, but also to improve the robustness of the network.
Step seven: obtaining optimal routing path from network link weight matrix
Selecting a proper routing path by the network link weight matrix by using Dijkstra algorithm; further verifying the performance of both algorithms, run times for different numbers of user requirements were analyzed, as shown in fig. 10, where the method runs 100 simulations for the same user request to calculate the average run time of both. From the method of fig. 10, it can be seen that REERA and OSPFRA remain low on-time. The method uses a desktop computer with 2 cores 3.2ghz cpu and 16G memory for simulation. Less runtime is obtained if a special hardware platform is used. This indicates that rera is actually feasible, and can dynamically change the link weights, ensure that most links are uniformly used, and avoid traffic congestion when some links of the cloud computing network are excessively used, so that the performance of the whole network is improved. By comparing REERA with an Open Shortest Path First (OSPF) algorithm, simulation results show that REERA is superior to the OSPF algorithm, and REERA can realize an energy-saving routing algorithm under the premise of network robustness constraint.