{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:03:40Z","timestamp":1760241820568,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2018,9,15]],"date-time":"2018-09-15T00:00:00Z","timestamp":1536969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401499"],"award-info":[{"award-number":["61401499"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Network virtualization can offer more flexibility and better manageability for next generation Internet. With the increasing deployments of virtual networks in military and commercial networks, a major challenge is to ensure virtual network survivability against hybrid multiple failures. In this paper, we study the problem of recovering virtual networks affected by hybrid multiple failures in substrate networks and provide an integer linear programming formulation to solve it. We propose a heuristic algorithm to tackle the complexity of the integer linear programming formulation, which includes a faulty virtual network reconfiguration ranking method based on weighted relative entropy, a hybrid multiple failures ranking algorithm, and a virtual node migration method based on weighted relative entropy. In the faulty virtual network reconfiguration ranking method based on weighted relative entropy and virtual node migration method based on weighted relative entropy, multiple ranking indicators are combined in a suitable way based on weighted relative entropy. In the hybrid multiple failures ranking algorithm, the virtual node and its connective virtual links are re-embedded, firstly. Evaluation results show that our heuristic method not only has the best acceptance ratio and normal operation ratio, but also achieves the highest long-term average revenue to cost ratio compared with other virtual network reconfiguration methods.<\/jats:p>","DOI":"10.3390\/e20090711","type":"journal-article","created":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T10:42:20Z","timestamp":1537180940000},"page":"711","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic Virtual Network Reconfiguration Method for Hybrid Multiple Failures Based on Weighted Relative Entropy"],"prefix":"10.3390","volume":"20","author":[{"given":"Yuze","family":"Su","sequence":"first","affiliation":[{"name":"College of Information and Navigation, Air Force Engineering University, Xi\u2019an 710077, China"}]},{"given":"Xiangru","family":"Meng","sequence":"additional","affiliation":[{"name":"College of Information and Navigation, Air Force Engineering University, Xi\u2019an 710077, China"}]},{"given":"Qiaoyan","family":"Kang","sequence":"additional","affiliation":[{"name":"College of Information and Navigation, Air Force Engineering University, Xi\u2019an 710077, China"}]},{"given":"Xiaoyang","family":"Han","sequence":"additional","affiliation":[{"name":"College of Information and Navigation, Air Force Engineering University, Xi\u2019an 710077, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,9,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1109\/SURV.2013.013013.00155","article-title":"Virtual network embedding: A survey","volume":"15","author":"Fischer","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zhao, C., Wu, H., Lin, M., and Duan, R. (2016). Virtual network embedding based on graph entropy. Entropy, 20.","DOI":"10.3390\/e20050315"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","article-title":"Network function virtualization: State-of-the-art and research challenges","volume":"18","author":"Mijumbi","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tajiki, M.M., Shojafar, M., Akbari, B., Salsano, S., Conti, M., and Singhal, M. (2018, July 01). Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN. Available online: http:\/\/cn.arxiv.org\/pdf\/1807.00324.","DOI":"10.1016\/j.comnet.2019.07.006"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shojafar, M., Canali, C., Lancellotti, R., and Baccarelli, E. (2016, January 27\u201330). Minimizing computing-plus-communication energy consumptions in virtualized networked data centers. Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy.","DOI":"10.1109\/ISCC.2016.7543890"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/JSAC.2018.2815430","article-title":"Virtual network survivability through joint space capacity allocation and embedding","volume":"36","author":"Shahriar","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TAC.2016.2539326","article-title":"A distributed networked approach for fault detection of large-scale systems","volume":"62","author":"Boem","year":"2016","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_8","unstructured":"Herker, S., Khan, A., and An, X. (2013, January 24\u201329). Survey on survivable virtual network embedding problem and solutions. Proceedings of the 9th International Conference on Networking and Services (ICNS), Lisbon, Portugal."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1587\/transinf.2017EDP7291","article-title":"On the optimal approach of survivable virtual network embedding in virtualized SDN","volume":"101","author":"Li","year":"2018","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1364\/JOCN.8.000408","article-title":"Survivable virtual topology design in multi-domain optical networks","volume":"8","author":"Sangjin","year":"2016","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1109\/JLT.2016.2522823","article-title":"Dynamic virtual network reconfiguration over SDN orchestrated multi-technology optical transport domains","volume":"34","author":"Aguado","year":"2016","journal-title":"J. Lightw. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TNSM.2016.2574239","article-title":"Dedicated protection for survivable virtual network embedding","volume":"13","author":"Chowdhury","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3218","DOI":"10.1109\/TNET.2015.2510864","article-title":"Towards promoting backup-sharing in survivable virtual network design","volume":"24","author":"Ayoubi","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chang, X., Muppala, J.K., Wang, B., Liu, J., and Sun, L. (2012, January 12\u201314). Migration cost aware virtual network re-embedding in presence of resource failures. Proceedings of the 18th IEEE International Conference on Networks (ICON), Singapore.","DOI":"10.1109\/ICON.2012.6506528"},{"key":"ref_15","first-page":"110","article-title":"A topology-awareness virtual network reconfiguration algorithm","volume":"47","author":"Peng","year":"2015","journal-title":"J. Sichuan Univ."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ghaleb, A.M., Khalifa, T., Ayoubi, S., and Shaban, K.B. (2016, January 25\u201329). Surviving link failures in multicast VN embedded applications. Proceedings of the IEEE\/IFIP Network Operations and Management Symposium, Istanbul, Turkey.","DOI":"10.1109\/NOMS.2016.7502871"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Qiang, Z., Qiang, W., Sheng, F., and Wu, L. (2014, January 20\u201321). Heuristic survivable virtual network embedding based on node migration and link remapping. Proceedings of the IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, China.","DOI":"10.1109\/ITAIC.2014.7065031"},{"key":"ref_18","unstructured":"Shahriar, N., Ahmed, R., Khan, A., Chowdhury, S.R., Boutaba, R., Mitra, J., and David, R. (November, January 31). ReNoVatE: Recovery from node failure in virtual network embedding. Proceedings of the 12th International Conference on Network and Service Management (CNSM), Montreal, QC, Canada."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TNSM.2017.2693404","article-title":"Generalized recovery from node failure in virtual network embedding","volume":"14","author":"Shahriar","year":"2017","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_20","first-page":"522","article-title":"Virtual network embedding with multi-attribute node ranking based on TOPSIS","volume":"10","author":"Gong","year":"2016","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"ref_21","first-page":"79","article-title":"Environment adaptive and joint topology aware virtual network embedding algorithm","volume":"40","author":"Su","year":"2018","journal-title":"J. Electr. Inf. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhu, Y., and Ammar, M. (2006, January 23\u201329). Algorithms for assigning substrate network resources to virtual network components. Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.322"},{"key":"ref_23","first-page":"180","article-title":"Trust-aware secure virtual network embedding algorithm","volume":"36","author":"Gong","year":"2015","journal-title":"J. Commun."},{"key":"ref_24","first-page":"3393","article-title":"Virtual network embedding based on node connectivity awareness and path integration evaluation","volume":"11","author":"Zhao","year":"2017","journal-title":"KSII Trans. Int. Inf. Syst."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/9\/711\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:20:47Z","timestamp":1760196047000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/9\/711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,15]]},"references-count":24,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["e20090711"],"URL":"https:\/\/doi.org\/10.3390\/e20090711","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2018,9,15]]}}}