scholarly journals Mobility-Aware Hybrid Flow Rule Cache Scheme in Software-Defined Access Networks

Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 160
Author(s):  
Youngjun Kim ◽  
Jinwoo Park ◽  
Yeunwoong Kyung

Due to the dynamic mobility feature, the proactive flow rule cache method has become one promising solution in software-defined networking (SDN)-based access networks to reduce the number of flow rule installation procedures between the forwarding nodes and SDN controller. However, since there is a flow rule cache limit for the forwarding node, an efficient flow rule cache strategy is required. To address this challenge, this paper proposes the mobility-aware hybrid flow rule cache scheme. Based on the comparison between the delay requirement of the incoming flow and the response delay of the controller, the proposed scheme decides to install the flow rule either proactively or reactively for the target candidate forwarding nodes. To find the optimal number of proactive flow rules considering the flow rule cache limits, an integer linear programming (ILP) problem is formulated and solved using the heuristic method. Extensive simulation results demonstrate that the proposed scheme outperforms the existing schemes in terms of the flow table utilization ratio, flow rule installation delay, and flow rules hit ratio under various settings.

2018 ◽  
Vol 7 (4) ◽  
pp. 44 ◽  
Author(s):  
Amitangshu Pal ◽  
Asis Nasipuri

In this paper, we investigate mechanisms for improving the quality of communications in wireless-optical broadband access networks (WOBAN), which present a promising solution to meet the growing needs for capacity of access networks. This is achieved by using multiple gateways and multi-channel operation along with a routing protocol that effectively reduces the effect of radio interference. We present a joint route and channel assignment scheme with the objective of maximizing the end-to-end probability of success and minimizing the end-to-end delay for all active upstream traffic in the WOBAN. Performance evaluations of the proposed scheme are presented using ns-2 simulations, which show that the proposed scheme improves the network throughput up to three times and reduces the traffic delay by six times in presence of 12 channels and four network interface cards (NICs), compared to a single channel scenario.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 46 ◽  
Author(s):  
Sanjeetha R ◽  
Shikhar Srivastava ◽  
Rishab Pokharna ◽  
Syed Shafiq ◽  
Dr Anita Kanavalli

Software Defined Network (SDN) is a new network architecture which separates the data plane from the control plane. The SDN controller implements the control plane and switches implement the data plane. Many papers discuss about DDoS attacks on primary servers present in SDN and how they can be mitigated with the help of controller. In our paper we show how DDoS attack can be instigated on the SDN controller by manipulating the flow table entries of switches, such that they send continuous requests to the controller and exhaust its resources. This is a new, but one of the possible way in which a DDoS attack can be performed on controller. We show the vulnerability of SDN for this kind of attack. We further propose a solution for mitigating it, by running a DDoS Detection module which uses variation of flow entry request traffic from all switches in the network to identify compromised switches and blocks them completely.


2014 ◽  
Vol 679 ◽  
pp. 30-34 ◽  
Author(s):  
A.O. Aldhaibani ◽  
S.A. Aljunid ◽  
M.S. Anuar ◽  
A.R. Arief

In this paper, we describe the improved performance of the SAC-OCDMA system using OFDM technique compared to SCM/SAC-OCDMA system. The theoretical results of proposed system shows that the new SAC/OCDMA system with OFDM technique provides better performance compared to SCM/OCDMA system based on multi diagonal code (MD), and the results have been evaluated based on BER and number of users for bit rate 1Gb/s and 10 Gb/s . Thus this system could be a promising solution to symmetric high capacity access networks with high spectral efficiency, cost effectiveness, good flexibility and enhanced security, which is candidate for next generation networks.


Author(s):  
Ulyana Khaleeva

The research aims to form a new method for evaluating interfaces, ensuring its multi-criteria nature and eliminating the shortcomings of previous methods. A combination of expert and heuristic approach is proposed, to detect a wide range of UI/UX problems, to ensure assessment competence and to reduce the level of distrust of the expert. In the first experiment, two groups of interfaces with different characteristics were evaluated, with two interfaces in each group. Fifteen heuristics were evaluated: ten general purpose criteria and five specialized criteria. Thirteen experts were involved, for whom weighting coefficients were previously calculated, taking into account their professional competencies and personal qualities influencing the reasonableness of the evaluation. After analyzing the results of the first experiment, it was decided to investigate the influence of the number of experts in the sample on the overall UI score. Therefore, for the second experiment, the optimal number of experts in the group was calculated to ensure the lowest score variance. Applications were evaluated in five groups (the number of heuristics did not change). Also, in each experiment, the outlier weights of the experts were calculated to ensure consistency of the opinions of the sample group members. In the conclusion, an analysis of the feasibility of applying the new method to mobile interfaces was performed. Conclusions on the suitability of the chosen mathematical apparatus and further ways of development of the method have been made.


2012 ◽  
Vol 56 (7) ◽  
pp. 2080-2095 ◽  
Author(s):  
Mursalin Akon ◽  
Mohammad Towhidul Islam ◽  
Xuemin (Sherman) Shen ◽  
Ajit Singh

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Junchang Wang ◽  
Shaojin Cheng ◽  
Xiong Fu

High-level programming is one of the critical building blocks of the effective use of software-defined networking (SDN). Existing solutions, however, either (1) cannot utilize the state-of-the-art switches with flow table pipelining, a key technique to prevent flow rule set explosion or (2) force programmers to manually organize and manage hardware flow table pipelines, which is time-consuming and error-prone. This paper presents a high-level SDN programming framework to address these issues. The framework can automatically (1) generate rule sets for heterogeneous switches with different flow table pipelining designs and (2) update installed rules when the network state changes. As a result, the framework can not only generate efficient rule sets for switches but also provide programmers a centralized, intuitive, and hence easy-to-use programming API. Experiments show that the framework can generate compact rule sets that are 29–116 times smaller than those generated by other open-source SDN controllers. Besides, the framework is 5 times faster to recover from network link failures in comparison to other controllers.


Author(s):  
Mina Taheri ◽  
Nirwan Ansari

Optical access network is a promising solution to meet the ever-increasing demand for broadband services. Fiber-based technologies such as Fiber To The Home (FTTH), Fiber To The Building (FTTB), and Fiber To The Curb (FTTC) are well suited to support high bandwidth services and mitigate bandwidth bottlenecks. However, implementing optical fiber to all end points imposes considerable CAPEX. Moreover, fiber cannot directly reach mobile users and devices. Although untethered features of wireless networks are attractive, their limited supported bandwidth cannot answer today’s enormous demands. Combining complementary features of these two technologies for broadband access is imminent and meritorious. Thus, integrated Fiber-Wireless (FiWi) access networks are considered as a scalable and economical means for broadband access. In FiWi, end points receive services through a wireless subnetwork, which acts as the front end and is connected to the optical subnetwork, which serves as the back end via gateway nodes.


2020 ◽  
Vol 6 (2) ◽  
pp. 64-67
Author(s):  
Nehemia Edbertus ◽  
Samuel Hutagalung ◽  
Hargyo Tri Nugroho

One of the generally launched attacks is Distributed Denial of Service that renders its target unable to provide its service. Gaussian Naïve Bayes Classifier is one out of several techniques used in detecting those attacks by classifying network traffic in a window as an attack or a normal traffic based on normal distribution previously calculated from normal and attack traffic datasets. This research focuses on mitigating SYN Flood Type DDoS attacks on OpenFlow Network using Zodiac FX as a switch. The developed system utilizes OpenFlow Protocol to apply flow rule in switch’s flow table in order to detect and mitigate SYN Flood attacks in real-time. Applied mitigation procedure is to divert incoming packets into SYN Proxy so that only legitimate TCP packets are able to reach the server. The results show that the system has a bandwidth of up to 60Mbps under normal condition and 5,03Mbps under attack. Maximum malicious packets that could reach server before it is diverted to SYN Proxy is estimated to be 400 packets and not affected by the number of attacks, assuming that the flow rule sent by the controller are enacted immediately.


Sign in / Sign up

Export Citation Format

Share Document