scholarly journals Towards Causal Consistent Updates in Software-Defined Networks

2020 ◽  
Vol 10 (6) ◽  
pp. 2081
Author(s):  
Amine Guidara ◽  
Saúl E. Pomares Hernández ◽  
Lil María X. Rodríguez Henríquez ◽  
Hatem Hadj Kacem ◽  
Ahmed Hadj Kacem

A network paradigm called the Software-Defined Network (SDN) has recently been introduced. The idea of SDN is to separate the control logic from forwarding devices to enable a centralized control platform. However, SDN is still a distributed and asynchronous system: events can be triggered by any network entity, while messages and packets are prone to arbitrary and unpredictable transmission delays. Moreover, the absence of a global temporal reference results in a broad combinatorial range space of event order. During network updates, an out-of-order execution of events may result in a deviation from desirable consistent network update properties, leading, for example, to forwarding loops and forwarding black holes, among others. In this paper, we introduce a study of the Transient Forwarding Loop (TFL) phenomenon during SDN updates; for this, we define a formal model of the TFL based on causal dependencies that capture the conditions under which it may occur. Based on this model, we introduce an algorithm that ensures the causal dependencies of the system oriented toward TFL-free SDN updating. We formally prove that it is sufficient to ensure the causal dependencies in order to guarantee TFL-free network updates. Finally, we analytically evaluate our algorithm and discuss how it outperforms the state-of-the-art in terms of updating overhead.

Author(s):  
Gianluca Savaia ◽  
Zoleikha Abdollahi Biron ◽  
Pierluigi Pisu

This paper focuses on networked control systems subject to network-induced constraints, namely transmission delays and packet dropping. The proposed framework is based on a switching control logic which selects the optimal control action in a finite set of strategies tailored to a specific scenario. The switching logic relies on a receding horizon optimization — which resembles model predictive control — and does not require any prior knowledge on the condition of the network. This strategy is tested on a platoon of connected vehicles engaged in cooperative adaptive cruise control which communicate over an imperfect DSRC network. The main objective consists in avoiding unsafe scenarios where the network is subject to the aforementioned failures; results show the proposed approach achieves the objective whereas a nominal controller would lead the platoon to crash.


2019 ◽  
Vol 113 (3) ◽  
pp. 778-795 ◽  
Author(s):  
SEAN GAILMARD

In the colonial period of American history, the British Crown reviewed, and sometimes nullified, acts of colonial assemblies for “repugnancy to the laws of England.” In this way, Crown review established external, legal constraints on American legislatures. I present a formal model to argue that Crown legislative review counteracted political pressure on imperial governors from colonial assemblies, to approve laws contrary to the empire’s interests. Optimal review in the model combines both legal and substantive considerations. This gives governors the strongest incentive to avoid royal reprisal by vetoing laws the Crown considered undesirable. Thus, review of legislation for consistency with higher law helped the Crown to grapple with agency problems in imperial governance, and ultimately achieve more (but still incomplete) centralized control over policy. I discuss the legacy of imperial legislative review for early American thinking about constitutional review of legislation by courts.


2021 ◽  
Vol 11 (15) ◽  
pp. 6999
Author(s):  
Raniyah Wazirali ◽  
Rami Ahmad ◽  
Suheib Alhiyari

Software-defined networking (SDN) is an innovative architecture that separates the control plane from the data plane to simplify and speed up the management of large networks. This means the control logic has been moved from the network hardware level to the centralized control management level. Therefore, the use of the OpenFlow Discovery Protocol (OFDP) is one of the most common protocols used to discover the network topology in a data plane and then transmit it to the control plane for management. However, OFDP has various shortcomings in its performance such as exchanging too many messages between both levels (control and data), which in turn increases the load on the SDN-Controller. Additionally, since the application layer depends entirely on the network topologies plotted in the control plane, it is very important to obtain accurate network topology information from data plane. Therefore, after providing background on topology discovery protocols to the reader, we will concentrate on performance issues. The present study identifies and discuss the primary concerns involved in the complex query process, infrastructure, influencing factors, and challenges for the topology discovery process. Furthermore, this paper will present several recent studies that have overcome and enhanced these issues. In addition, open discussion and future work concerning these issues are also discussed.


2017 ◽  
Vol 35 (11) ◽  
pp. 2542-2552 ◽  
Author(s):  
Jiaqi Zheng ◽  
Guihai Chen ◽  
Stefan Schmid ◽  
Haipeng Dai ◽  
Jie Wu ◽  
...  
Keyword(s):  

Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1239
Author(s):  
Yung-Hao Tung ◽  
Hung-Chuan Wei ◽  
Yen-Wu Ti ◽  
Yao-Tung Tsou ◽  
Neetesh Saxena ◽  
...  

Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.


Author(s):  
Mohammad Ashraful Hoque ◽  
MD Shibli Mollah ◽  
MD. Razu

Software-defined networking is the talk of the town in today’s networking industry. Because of the limitations of traditional networking, SDN is getting more popular every year. Lots of researches are taking place to improve the efficiency and overcome the challenges of SDN though it has many advantages. Hence one key problem of SDN is the network update. If the route update does not perform well, it causes congestion and inconsistencies in the network system whereas bandwidth utilization and security is our main concern. We have compared two pre-built algorithms especially for routing path update and proposed a new algorithm with maximum security and loop-free network.


2014 ◽  
Vol 666 ◽  
pp. 349-353
Author(s):  
Lukas Kopecki ◽  
Sebastian Lauck

This document introduces a new kind of non-autonomous petri net for modelling decentralized systems in intralogistics controlled by PLCs. It extends the Signal Interpreted Petri Net with hybrid elements for continuous and discrete aspects to control external input-/output-events, places and transitions. It enables the modelling of continuous changes on the output places, e.g. linear acceleration of motors. After the formal model-definition, an example of one conveyor and the corresponding control-logic is given.


Author(s):  
Zaiyu Pang ◽  
Xiao Huang ◽  
Zonghui Li ◽  
Sukun Zhang ◽  
Yanfen Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document