Flow initiation in software defined networking

Download
2014
Soltani, Ahmad
With today’s technology requirements, computer networks and specifically the Internet is being expected to provide mobile, distributed and constantly changing services to its users. Forwarding middle boxes used in the industry nowadays are configured to have their low-level switching operations (e.g. packet handling), tightly coupled to their high-level control definitions and algorithms. This fact has contributed in slowing down the innovation in computer networks. Software Defined Networking has recently been introduced as an abstraction between those low-level and high-level functionalities by introducing a standard protocol to act as an interface, which divides control and data planes in middle-boxes. There are a number of challenges related to SDN most of which are still treated with conventional network or computer science techniques, however some challenges unique to SDN paradigm such as flow initiation overhead and controller handling in networks also exist. The present study includes a comprehensive literature review of the current state-of-the-art techniques, which tackles these challenges and proposes a hybrid mechanism to address the flow initiation issue for minimizing the overhead and the delay. This proposal uses the unified network map available on controllers to form a-priori knowledge for switches for making better forwarding decisions during the flow initiation process.

Suggestions

Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks
Altuntas, S; Baykal, Buyurman (Elsevier BV, 2005-03-15)
As the wireless networking technologies advance rapidly, providing mobile users with roaming freely in heterogeneous wireless access domains, the need for multi-access arises. This paper introduces the Mobile Multi-Access Management Architecture (MMA-IP) for IP-based future wireless networks. MMA-IP enables mobile users to utilize multiple access domains synchronously and to switch between different access domains. In order to handle multi-access operations, MMA-IP defines a new special mobility agent, call...
A study of Kangaroo Transaction model for mobile transaction management
Örenç, Zülfü; Coşar, Ahmet; Department of Information Systems (2004)
Wireless network technology has advanced to the point that it is possible to use Internet connectivity to perform job tasks while moving in a city. We simulate and experimentally evaluate Dunham̕s Kangaroo Transaction (KT) model, and a modified version of it. Our results show that the modified-KT model does not have much communication overhead (although more than the original KT model) and it is more resilient to failures of base stations.
Improving performance of network intrusion detection systems through concurrent mechanisms
Atakan, Mustafa; Şener, Cevat; Department of Computer Engineering (2003)
As the bandwidth of present networks gets larger than the past, the demand of Network Intrusion Detection Systems (NIDS) that function in real time becomes the major requirement for high-speed networks. If these systems are not fast enough to process all network traffic passing, some malicious security violations may take role using this drawback. In order to make that kind of applications schedulable, some concurrency mechanism is introduced to the general flowchart of their algorithm. The principal aim is...
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
Ranchal, Rohit; Bhargava, Bharat; Angın, Pelin; ben Othmane, Lotfi (Institute of Electrical and Electronics Engineers (IEEE), 2019-05-01)
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of...
ARC: The analytical rate control scheme for real-time traffic in wireless networks
Akan, OB; Akyildiz, IF (Institute of Electrical and Electronics Engineers (IEEE), 2004-08-01)
Next-generation wireless Internet (NGWI) is expected to provide a wide range of services including real-time multimedia to mobile users. However, the real-time multimedia traffic transport requires rate control deployment to protect shared Internet from unfairness and further congestion collapse. The transmission rate control method must also achieve high throughput and satisfy multimedia requirements such a delay or jitter bound. However, the existing solutions are mostly for the wired Internet, and hence,...
Citation Formats
A. Soltani, “Flow initiation in software defined networking,” M.S. - Master of Science, Middle East Technical University, 2014.