Crowdsourcing is widely used in mobile network quality data collection since it can derive huge amounts of data. Although the results of crowdsourcing measurement strongly depend on the monitor user population, requirements for monitor users in crowdsourcing measurement have not been fully considered. For this study, we analyzed the relationship between user attributes and measured QoE through crowdsourcing measurement. We also discuss the effect of user contexts on QoE, which differs from that of network performance.
{"title":"Crowdsourced QoE evaluation of mobile device usage with consideration on user dependence","authors":"Fumiya Kobayashi, Ginga Kawaguti, Hideki Nojiri, Akira Takahashi","doi":"10.1109/APNOMS.2015.7275348","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275348","url":null,"abstract":"Crowdsourcing is widely used in mobile network quality data collection since it can derive huge amounts of data. Although the results of crowdsourcing measurement strongly depend on the monitor user population, requirements for monitor users in crowdsourcing measurement have not been fully considered. For this study, we analyzed the relationship between user attributes and measured QoE through crowdsourcing measurement. We also discuss the effect of user contexts on QoE, which differs from that of network performance.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275401
H. S. Kang, J. Son, C. Hong
Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems but most of these seem to be passive and limited in terms of detecting attacks and applying to large scale of networks. In this paper, we propose a defense technique for loss of VM resources against the network attacks called spoofing of poison on OpenStack environment. In our proposal, we use reliable ARP table which makes our proposal more reliable in cloud computing environment. Finally we conclude this paper showing that the proposed mechanism is an effective way to defend the ARP spoofing attack.
{"title":"Defense technique against spoofing attacks using reliable ARP table in cloud computing environment","authors":"H. S. Kang, J. Son, C. Hong","doi":"10.1109/APNOMS.2015.7275401","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275401","url":null,"abstract":"Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems but most of these seem to be passive and limited in terms of detecting attacks and applying to large scale of networks. In this paper, we propose a defense technique for loss of VM resources against the network attacks called spoofing of poison on OpenStack environment. In our proposal, we use reliable ARP table which makes our proposal more reliable in cloud computing environment. Finally we conclude this paper showing that the proposed mechanism is an effective way to defend the ARP spoofing attack.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275359
Yuh-Jiuh Cheng, Yhi Shiau, Shu-Ying Cheng
In this paper, we first introduce some current methods used in router offload strategies. Then we propose a new router offload method with an optical flow switch (OFS) based on LCoS (Liquid Crystal on Silicon) technologies. With the significant increase in broadband new services on the Internet, we can use this OFS router offload strategy to separate IP traffic smartly to allow the small packet traffic to be transferred with the existing IP network transmission and the larger packet flows such as photos and video data to be transferred using our proposed OFS method. The proposed 16 × 16 OFS using LCoS technologies without optical buffers can quickly transfer the big data to the output ports. The main purpose of OFS is that it can provide a new solution to solve high speed transmission requirements as an efficient router offload strategy. The router offload strategy with an OFS method can also be used in the all-optical content delivery network which is composed of OFSs for a large amount of photos and video data transmissions in the future.
在本文中,我们首先介绍了目前用于路由器卸载策略的一些方法。在此基础上,提出了一种基于LCoS (Liquid Crystal on Silicon)技术的光流开关(OFS)路由器卸载方法。随着互联网上宽带新业务的显著增加,我们可以使用OFS路由器卸载策略巧妙地分离IP流量,使小数据包流量与现有IP网络传输一起传输,而大数据包流量(如照片和视频数据)使用我们提出的OFS方法传输。采用LCoS技术的16 × 16 OFS无需光缓冲器,可以快速将大数据传输到输出端口。OFS的主要目的是作为一种有效的路由器卸载策略,为解决高速传输需求提供一种新的解决方案。采用OFS方法的路由器卸载策略也可用于未来由OFS组成的全光内容分发网络中,用于大量的照片和视频数据传输。
{"title":"Router offload strategies with an optical flow switch based on LCoS technologies","authors":"Yuh-Jiuh Cheng, Yhi Shiau, Shu-Ying Cheng","doi":"10.1109/APNOMS.2015.7275359","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275359","url":null,"abstract":"In this paper, we first introduce some current methods used in router offload strategies. Then we propose a new router offload method with an optical flow switch (OFS) based on LCoS (Liquid Crystal on Silicon) technologies. With the significant increase in broadband new services on the Internet, we can use this OFS router offload strategy to separate IP traffic smartly to allow the small packet traffic to be transferred with the existing IP network transmission and the larger packet flows such as photos and video data to be transferred using our proposed OFS method. The proposed 16 × 16 OFS using LCoS technologies without optical buffers can quickly transfer the big data to the output ports. The main purpose of OFS is that it can provide a new solution to solve high speed transmission requirements as an efficient router offload strategy. The router offload strategy with an OFS method can also be used in the all-optical content delivery network which is composed of OFSs for a large amount of photos and video data transmissions in the future.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275443
Jian Li, Jae-Hyoung Yoo, J. W. Hong
Software-Defined Network (SDN) is an emerging network paradigm which enables flexible network management by separating control plane from data plane. Since SDN adopts a centralized management scheme, with large scale SDN network, it brings intensive overhead to control plane. One way of limiting this overhead is to either distribute the overhead to multiple controllers, or offload the overhead to switches. However, both of the approaches require modification on SDN de-facto standard, therefore, it is not viable for practical use. As an alternative solution, we propose a new control plane management method without changing the underlying SDN protocol. The key idea of the proposed method is to maximize the switch resource utilization by maintaining as much information as possible inside the switches, so that the switches may less frequently query the controller for new information. However, it is non-trivial problem to control the switch resource utilization under the capacity, due to the absence of a detailed correlation model between resource utilization and the affecting parameters. To resolve this issue, our management method adopts a lightweight feedback loop based control scheme - Proportional-Integral-Derivative (PID) to adaptively tune the affecting parameters to minimize the control plane overhead, while avoiding the switch's resource exhaustion. We design and implement the proposed method as an SDN application and evaluate its performance in an emulated network.
{"title":"PID-based adaptive control plane management method for software-defined networks","authors":"Jian Li, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/APNOMS.2015.7275443","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275443","url":null,"abstract":"Software-Defined Network (SDN) is an emerging network paradigm which enables flexible network management by separating control plane from data plane. Since SDN adopts a centralized management scheme, with large scale SDN network, it brings intensive overhead to control plane. One way of limiting this overhead is to either distribute the overhead to multiple controllers, or offload the overhead to switches. However, both of the approaches require modification on SDN de-facto standard, therefore, it is not viable for practical use. As an alternative solution, we propose a new control plane management method without changing the underlying SDN protocol. The key idea of the proposed method is to maximize the switch resource utilization by maintaining as much information as possible inside the switches, so that the switches may less frequently query the controller for new information. However, it is non-trivial problem to control the switch resource utilization under the capacity, due to the absence of a detailed correlation model between resource utilization and the affecting parameters. To resolve this issue, our management method adopts a lightweight feedback loop based control scheme - Proportional-Integral-Derivative (PID) to adaptively tune the affecting parameters to minimize the control plane overhead, while avoiding the switch's resource exhaustion. We design and implement the proposed method as an SDN application and evaluate its performance in an emulated network.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275356
Dai Hoang Tran, Chuan Pham, Cuong T. Do, T. Dung, Nguyen H. Tran, E. Huh, C. Hong
In the area of cloud infrastructure environment, the management tool to monitor and control the cloud resources is the important factor that can drive the cost benefit of the cloud vendors. But most these tools are bundled within the high cost commercial platforms and are optimized to run on desktop computers. With the vision that Mobile Cloud Computing will be the future technology paradigm that dominates the IT industry, we want to create a cloud management tool that is open source, fast, lightweight and mobile friendly. We take the initial steps by implementing our framework using several popular technologies such as RESTful, Java Message Service, JSON, and we call it “High performance and Lightweight Mobile Cloud Infrastructure Monitor and Benchmark Service” or HiLiCloud. The initial testings show competitive evaluation results.
{"title":"HiLiCLoud: High performance and lightweight mobile cloud infrastructure for monitor and benchmark services","authors":"Dai Hoang Tran, Chuan Pham, Cuong T. Do, T. Dung, Nguyen H. Tran, E. Huh, C. Hong","doi":"10.1109/APNOMS.2015.7275356","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275356","url":null,"abstract":"In the area of cloud infrastructure environment, the management tool to monitor and control the cloud resources is the important factor that can drive the cost benefit of the cloud vendors. But most these tools are bundled within the high cost commercial platforms and are optimized to run on desktop computers. With the vision that Mobile Cloud Computing will be the future technology paradigm that dominates the IT industry, we want to create a cloud management tool that is open source, fast, lightweight and mobile friendly. We take the initial steps by implementing our framework using several popular technologies such as RESTful, Java Message Service, JSON, and we call it “High performance and Lightweight Mobile Cloud Infrastructure Monitor and Benchmark Service” or HiLiCloud. The initial testings show competitive evaluation results.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275389
I. G. D. Nugraha, M. F. Muthohar, J. Prayuda, Priagung Khusumanegara, Deokjai Choi
A Software Defined Network (SDN) is a new paradigm in network management that separates control plane and data plane. A control plane has an important role in managing the whole networks. Since SDN introduces control plane as the manager of the network, it also introduces the single point of failure. When SDN controller is unreachable by the network devices, the whole networks will collapse. One of the attack methods that can make SDN controller unreachable is DDoS attack. This paper reports our initial step of our research to develop the method for DDoS attack detection and mitigation for SDN controller. The method considers the time duration of DDoS attack detection and attacks time pattern of DDoS attack to prevent the future attack. In this paper, we present the potential vulnerabilities in SDN controller that can be exploited for DDoS attack and discuss the methods to detect and mitigate DDoS attack.
{"title":"Time-based DDoS detection and mitigation for SDN controller","authors":"I. G. D. Nugraha, M. F. Muthohar, J. Prayuda, Priagung Khusumanegara, Deokjai Choi","doi":"10.1109/APNOMS.2015.7275389","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275389","url":null,"abstract":"A Software Defined Network (SDN) is a new paradigm in network management that separates control plane and data plane. A control plane has an important role in managing the whole networks. Since SDN introduces control plane as the manager of the network, it also introduces the single point of failure. When SDN controller is unreachable by the network devices, the whole networks will collapse. One of the attack methods that can make SDN controller unreachable is DDoS attack. This paper reports our initial step of our research to develop the method for DDoS attack detection and mitigation for SDN controller. The method considers the time duration of DDoS attack detection and attacks time pattern of DDoS attack to prevent the future attack. In this paper, we present the potential vulnerabilities in SDN controller that can be exploited for DDoS attack and discuss the methods to detect and mitigate DDoS attack.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"67 39","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131638374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research discusses a system architecture that comes up with potentially better resiliency and faster recovery from failures based on the renowned genetic algorithm. Additionally, we aim to achieve a globally optimized performance as well as a service solution that can remain financially and operationally balanced according to customer preferences. The proposed methodology has undergone numerous and severe evaluations to be proclaimed of their effectiveness and efficiency, even when put under tight comparison with other existing work.
{"title":"A procedure to achieve cost and performance optimization for recovery in cloud computing","authors":"Pham Phuoc Hung, Xuan-Qui Pham, Ga-Won Lee, Bui Tuan-Anh, E. Huh","doi":"10.1109/APNOMS.2015.7275402","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275402","url":null,"abstract":"This research discusses a system architecture that comes up with potentially better resiliency and faster recovery from failures based on the renowned genetic algorithm. Additionally, we aim to achieve a globally optimized performance as well as a service solution that can remain financially and operationally balanced according to customer preferences. The proposed methodology has undergone numerous and severe evaluations to be proclaimed of their effectiveness and efficiency, even when put under tight comparison with other existing work.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275383
S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Thant Zin Oo, Tuan LeAnh, S. I. Moon, C. Hong
The installation of low power small cells under macro cells using the same spectrum is a promising approach to enhance the spectral efficiency and data-rate for the end users. These installations are becoming very dense in order to support the users' requirements (especially 5G networks) which make resource allocation using the same spectrum a very challenging problem. In this study, we address the downlink resource allocation problem for underlay small cell tier. We formulate the optimization problem for resource (channel) allocation in small cells while keeping the total interference to macro tier under an acceptable level. The objective of resource allocation is to maximize the throughput of small cells under the cross tier interference constraint. We employ matching theory to find a stable match for the resource allocation problem. We simulate our proposition to validate the stability of the network and the convergence of the resource allocation algorithm in terms of rate in a dense heterogeneous network. The matching results in an optimal solution which outperforms the existing sub-optimal resource allocation solutions.
{"title":"Resource management in dense heterogeneous networks","authors":"S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Thant Zin Oo, Tuan LeAnh, S. I. Moon, C. Hong","doi":"10.1109/APNOMS.2015.7275383","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275383","url":null,"abstract":"The installation of low power small cells under macro cells using the same spectrum is a promising approach to enhance the spectral efficiency and data-rate for the end users. These installations are becoming very dense in order to support the users' requirements (especially 5G networks) which make resource allocation using the same spectrum a very challenging problem. In this study, we address the downlink resource allocation problem for underlay small cell tier. We formulate the optimization problem for resource (channel) allocation in small cells while keeping the total interference to macro tier under an acceptable level. The objective of resource allocation is to maximize the throughput of small cells under the cross tier interference constraint. We employ matching theory to find a stable match for the resource allocation problem. We simulate our proposition to validate the stability of the network and the convergence of the resource allocation algorithm in terms of rate in a dense heterogeneous network. The matching results in an optimal solution which outperforms the existing sub-optimal resource allocation solutions.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121274252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275403
Taekhee Kim, Tae-Ryang Koo, E. Paik
With dynamic networking environment demands from Internet applications and services, network operators are adopting software-based infrastructure and functions. Software-Defined Networking (SDN) and Network Function Virtualization (NFV) promise increased flexibility and agility for their networks. Accordingly, the SDN and NFV performance benchmarking methodologies are under discussion in standardization bodies. SDN and NFV combine. Information Technology (IT) with Communication Technology (CT). As the benchmarking metrics are different between IT and CT, new benchmarking metrics are highly necessary. This paper introduces benchmarking test metrics presented in standardization bodies and proposes SDN and NFV benchmarking metrics for performance and reliability from the perspective of operators. Moreover, benchmarking influence elements are also considered. In conclusion, the paper discusses benchmarking issues to put SDN and NFV into practical uses.
{"title":"SDN and NFV benchmarking for performance and reliability","authors":"Taekhee Kim, Tae-Ryang Koo, E. Paik","doi":"10.1109/APNOMS.2015.7275403","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275403","url":null,"abstract":"With dynamic networking environment demands from Internet applications and services, network operators are adopting software-based infrastructure and functions. Software-Defined Networking (SDN) and Network Function Virtualization (NFV) promise increased flexibility and agility for their networks. Accordingly, the SDN and NFV performance benchmarking methodologies are under discussion in standardization bodies. SDN and NFV combine. Information Technology (IT) with Communication Technology (CT). As the benchmarking metrics are different between IT and CT, new benchmarking metrics are highly necessary. This paper introduces benchmarking test metrics presented in standardization bodies and proposes SDN and NFV benchmarking metrics for performance and reliability from the perspective of operators. Moreover, benchmarking influence elements are also considered. In conclusion, the paper discusses benchmarking issues to put SDN and NFV into practical uses.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-28DOI: 10.1109/APNOMS.2015.7275368
Seongbok Baik, Younggil Lim, Jongwoo Kim, Youngwoo Lee
The SDN controllers maintain the flow tables to manage all the data flows passing through the SDN switches. In some cases, monitoring activities are required for the specific flows to detect the special events. Current de facto standard of SDN architecture enforces SDN switch to stay awake all the time from the time it receives the event monitoring request from SDN controller to catch the target event on the corresponding flow. This mechanism might disturb the fundamental SDN philosophy, which recommends the SDN switch to focus on the data forwarding, resulting in the degrading the performance of the whole SDN network. In order to tackle this problem in the real world domain, this paper focuses on the flow monitoring procedure described in OpenFlow specification version 1.4[1]. Starting from pointing out the problem of the current procedure in OpenFlow specification 1.4, we propose the detailed brand-new procedure, improved message format, and the system configuration to resolve the corresponding problem. The proposed idea can help the network service provider to build and operate their networks more efficiently and effectively.
{"title":"Adaptive flow monitoring in SDN architecture","authors":"Seongbok Baik, Younggil Lim, Jongwoo Kim, Youngwoo Lee","doi":"10.1109/APNOMS.2015.7275368","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275368","url":null,"abstract":"The SDN controllers maintain the flow tables to manage all the data flows passing through the SDN switches. In some cases, monitoring activities are required for the specific flows to detect the special events. Current de facto standard of SDN architecture enforces SDN switch to stay awake all the time from the time it receives the event monitoring request from SDN controller to catch the target event on the corresponding flow. This mechanism might disturb the fundamental SDN philosophy, which recommends the SDN switch to focus on the data forwarding, resulting in the degrading the performance of the whole SDN network. In order to tackle this problem in the real world domain, this paper focuses on the flow monitoring procedure described in OpenFlow specification version 1.4[1]. Starting from pointing out the problem of the current procedure in OpenFlow specification 1.4, we propose the detailed brand-new procedure, improved message format, and the system configuration to resolve the corresponding problem. The proposed idea can help the network service provider to build and operate their networks more efficiently and effectively.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}