scholarly journals Design and Implementation of Distributed Controller Clustering for Solving the Issue of Single Failure in SDN Networks

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 1365-1378
Author(s):  
Wed Kadhim Oleiwi ◽  
Alharith A. Abdullah

Abstract Software-Defined Networks (SDN) It is a centralized control structure in the network that opens up new possibilities that did not exist before. The significant characteristic of this innovative approach is the focus on the capability of proposing networks of high dynamicity and programmability to transform the intelligence of underlying systems to the networks via controllers. The main issue of the SDN approach is found in its security, mainly due to its central-controlling architecture since the entire network is controlled from a central point. This makes it very vulnerable to single-point failure. In this paper, a fully Distributed SDN controller is proposed for solving the one point failure which exists within the single SDN controller. In general, the concept involves forming cluster of distributed controllers whereby each controller controls its domain and can thereby share the load within the network. The experimental results of the proposed system show an increase and enhancement in the performance of the network. The single-point failure issues have been overcome. The throughput of the proposed system increased with 20% while the packet loss rate was minimize with 33%.

The Software Defined Network (SDN) provides an innovative paradigm for networking, which improve the programmability and flexibility of the network. Due to the separation between the control and data plane, all the control logic transfer to the controller. In SDN, the controller, which provides a global view of the whole network. That is why it acts as the “Network Brain” of the network. Because the controller has the capability to configure or reconfigure the forwarding devices by customizing their policies in a dynamic manner. Thus, the controller provides a centralized logical view of the entire network. Therefore, all manipulation and implementation in the network are control by the single controller in the SDN, which increases the maximum chance of a single point of failure (SPOF) in the network. As a consequence, it collapses the entire network. Therefore, a fault tolerance mechanism is required which reduce single point of failure in the network by using multiple controllers. As a significance, this mechanism also increases the scalability, reliability, and high availability of services in the network. The three different roles of multiple controllers are equal, master and slave exist in the SDN. In the simulation, the Ryu SDN controller and Mininet tool are utilized. During the simulation to analysis, what is happen when a single point of failure (SPOF) occur in the network and how to use the different roles of the multiple controllers (such as equal, master and slave) which reduces the threat of single point of failure in SDN network.


2019 ◽  
Vol 16 (05) ◽  
pp. 1950029
Author(s):  
Mohammed Abdul Rahman AlShehri ◽  
Shailendra Mishra

Software defined network (SDN) controller selection in SDN is a key challenge to the network administrator. In SDN, control plane is an isolated process and operate on control layer. The controller provides a universal view of the entire network and support applications and services. The three focused parameters for controller selection are productivity, campus network and open source. In SDN, it is vital to have a good device for the efficient processing of all requests made by the switch and for good behavior of the network. For selecting best controller for the specified parameters, decision logic has to be developed that allow us to do comparison of the available controllers. Therefore, in this research we have suggested a methodology that uses analytic-hierarchy-process (AHP) to find a best controller. The approach has been studied and verified for a big organization network setup of Al-Majmaah University, Saudi Arabia. The approach is found to be more effective and increase the network performance significantly.


2012 ◽  
Vol 30 (1) ◽  
pp. 27-31 ◽  
Author(s):  
Hidetoshi Mori ◽  
Tim Hideaki Tanaka ◽  
Hiroshi Kuge ◽  
Ken Sasaki

Objective To determine whether any difference exists in responses to indirect moxibustion relative to thermal stimulation sites. Methods Twenty one healthy men of mean±SD age 22.5±6.1 years were randomly divided into two groups, one receiving a single moxibustion stimulation in three locations (the three-point stimulation group, n=10 participants) and the other receiving three stimulations in one location (the one-point stimulation group, n=11 participants). The thermal stimulation sites were GV14, GV9 and GV4 acupuncture points. A thermograph was used to obtain the skin temperature on the posterior trunks of the participants. To analyse skin temperature, four arbitrary frames (the scapular, interscapular, lumbar and vertebral regions) were made on the posterior trunk. Result An increase in skin temperature on the posterior trunk was observed following both one- and three-point moxibustion administrations. The skin temperature of the lumbar region showed a significant increase after three-point stimulation compared with single-point stimulation (p=0.011). There was also a significant increase in skin temperature of the spinal region after three-point stimulation compared with one-point stimulation (p=0.046). Conclusion Administration of single moxibustion doses on the GV14, GV9 and GV4 points produces greater changes in skin temperature than three applications of moxibustion to the GV14 point only.


1961 ◽  
Vol 4 (1) ◽  
pp. 13-21
Author(s):  
R. G. de Buda

On an orientable surface of genus p, a set of 2p fundamental circuits can be selected which all pass through a single point A. After cutting along the 2p circuits, the surface can be unfolded into a flat region bounded by a 4p-gon so that: the set of vertices corresponds to the one point A; and the 2p pairs of edges to the 2p fundamental circuits; and the interior of the polygon to the remainder of the surface. If the edges of the polygon are directed, the 2 edges which correspond to one fundamental circuit will be directed in opposite sense, since the surface is orientable [1]. The sequence and direction of the edges is the same as the sequence of the fundamental circuits.


Author(s):  
Maria Chikarkova ◽  

Although graffiti is a well-known phenomenon of street art, there is still no single point of view on this phenomenon (even if it is considered art at all). Both the essence and the manifestations of graffiti remain a matter of debate - there are dozens of different classifications, that they are based on different characteristics. However, the phenomenon has rarely attracted attention from the point of view of semiotics, though it is the semiotic reading of graffiti that makes it possible to understand its nature more deeply. Due to semiotics we could create an integrative classification, which would combine stylistics and subject matter into one system. The article made exactly such an attempt –providing of the semiotic classification of graffiti, based on Ch. Peirce’s classification of semiotic signs. Graffiti is a sign, because it has a material shell of the latter, a marked object and rules of interpretation. It functions within the subculture and signifies the individual's desire to escape from the deterministic nature of urban life (J. Baudrillard). It is a culture of the semiosphere, which continuously gives rise to new connotations and, accordingly, generates new receptions. An important component of graffiti interpretation is the cultural code; it is not read outside the field of conventionality, cultural context. Decoding of graffiti can occur in three ways. From our point of view, it is appropriate to use S. Hall’sclassification. He suggested a scheme for "decrypting" messages in the media, however, in our opinion, his scheme works for any communicative act (including graffiti). He distinguished dominant ("dominant-hegemonic"), oppositional ("oppositional") and negotiated ("negotiated") decoding. In the graffiti situation, oppositional decoding prevails among ordinary recipients (passers-by). U. Eco called this type aberrant, because it provides "decryption" of text with a different code than the one it was created for. Authors of graffiti themselves are often not fully aware of what they createalso. Modern writers use techniques of op-art, Dadaism, surrealism, etc., without being very oriented in all these directions. When graffiti combines different types of art (for example, the combination of painting with literature), it takes into account the features of inter-semiotic translation, which makes the decoding situation even more complicated. We offercreating a semioticclassificationofgraffiti, that might be based on Ch. Peirce’s classification of semiotic signs, whichdistinguishthesigns-copies, signs-indexes, signs-symbols. It could help the essence of graffiti and decode them.


2021 ◽  
pp. 1-12
Author(s):  
Yinghua Feng ◽  
Wei Yang

In order to overcome the problems of high energy consumption and low execution efficiency of traditional Internet of things (IOT) packet loss rate monitoring model, a new packet loss rate monitoring model based on differential evolution algorithm is proposed. The similarity between each data point in the data space of the Internet of things is set as the data gravity. On the basis of the data gravity, combined with the law of gravity in the data space, the gravity of different data is calculated. At the same time, the size of the data gravity is compared, and the data are classified. Through the classification results, the packet loss rate monitoring model of the Internet of things is established. Differential evolution algorithm is used to solve the model to obtain the best monitoring scheme to ensure the security of network data transmission. The experimental results show that the proposed model can effectively reduce the data acquisition overhead and energy consumption, and improve the execution efficiency of the model. The maximum monitoring efficiency is 99.74%.


Author(s):  
Uttam Ghosh ◽  
Pushpita Chatterjee ◽  
Sachin Shetty

Software-defined networking (SDN) provides flexibility in controlling, managing, and dynamically reconfiguring the distributed heterogeneous smart grid networks. Considerably less attention has been received to provide security in SDN-enabled smart grids. Centralized SDN controller protects smart grid networks against outside attacks only. Furthermore, centralized SDN controller suffers from a single point of compromise and failure which is detrimental to security and reliability. This chapter presents a framework with multiple SDN controllers and security controllers that provides a secure and robust smart grid architecture. The proposed framework deploys a local IDS to provide security in a substation. Whereas a global IDS is deployed to provide security in control center and overall smart grid network, it further verifies the consequences of control-commands issued by SDN controller and SCADA master. Performance comparison and simulation result show that the proposed framework is efficient as compared to existing security frameworks for SDN-enabled smart grids.


Sign in / Sign up

Export Citation Format

Share Document