OpenFlow Controllers over EstiNet Network Simulator and Emulator: Functional Validation and Performance Evaluation
|
|
- Sylvia Gray
- 5 years ago
- Views:
Transcription
1 OpenFlow Controllers over EstiNet Network Simulator and Emulator: Functional Validation and Performance Evaluation 1 Shie-YuanWang Chih-LiangChou andchun-mingyang DepartmentofComputerScience,NationalChiaoTungUniversity,Taiwan shieyuan@cs.nctu.edu.tw EstiNetTechnologies,Inc. clchou@estinet.com Abstract In this article, we use the EstiNet OpenFlow network simulator and emulator to perform functional validation and performance evaluation of the widely-used NOX OpenFlow controller. EstiNet uses an unique kernel reentering simulation methodology to enable real applications to run on nodes in its simulated network. As a result, without any modification, the real NOX OpenFlow controller readily runs on a host in an EstiNet simulated network to control thousands of simulated OpenFlow switches. Using EstiNet as the testing and evaluation platform, we studied how NOX implements the learning bridge protocol(lbp) and the spanning tree protocol(stp) based on the OpenFlow 1.0 protocol. Our simulation results show that these protocols, which are implemented as loadable components in NOX, do not synchronize their gathered information well and thus NOX may give wrong forwarding instructions toanopenflowswitchafteralinkfailure.wealsofoundthatwhennox sstpdetectsalinkfailure, itdoesnotsendamessagetoanaffectedopenflowswitchtodeleteobsoleteflowentries.asaresult, becausetheobsoleteflowentryexpiresonlyafteranidleperiodof5seconds,itmaybematchedand used endlessly causing the OpenFlow switch to continue to forward incoming matched packets onto a brokenlink.ourresultsrevealthatthelbpandstpcomponentsprovidedinnoxserveonlyasbasic implementations and lack information synchronization, and there is much room left to further enhance them.
2 2 I. INTRODUCTION Software-Defined Networks(SDN)[1] is a new type of network that can be programmed by a software controller according to various needs and purposes. The goal of SDN is to facilitate innovations in network architecture and protocol designs. To achieve this goal, the OpenFlow protocol[2] has been proposed to define the internal architecture of an OpenFlow switch and the messages exchanged between an OpenFlow controller and OpenFlow switches. In an OpenFlow network, because the operation and intelligence of the network are fully controlled by an OpenFlow controller, the correctness and efficiency of the functions implemented by the controller must be fully tested before its uses in a production network. Testing the correctness and evaluating the performance of a network protocol can be performed in several approaches. One approach is performing these tests over an experimental testbed(e.g., Emulab[3] and PlanetLab[4]). Although this approach uses real devices running real operating systems and applications and can generate more realistic testing results, the cost of building a large experimental testbed is huge and generally the testbed is not easily accessible to many users. Traditionally, modeling checking and symbolic execution have long been used to automate testing a system[5][6]. However, the scalability is the main challenge for this approach because thetestspaceisverylarge. Another common approach is via simulation, in which the operations of real devices and their interactions are modeled and executed in a software program. The simulation approach has many advantages such as lost cost, flexible, controllable, scalable, repeatable, accessible to manyusers,andfastthanrealtimeinmanycases.however,ifthemodelingofrealdevices is not accurate enough, the simulation results may differ from the experimental results. To overcome this problem, the emulation experiment approach may be used. Emulation differs from simulationinthatanemulationislikeanexperimentandthusmustbeexecutedinrealtimewhile simulation speed can be faster or slower than the real time. Furthermore, in an emulation some real devices running real operation systems and application programs will interact with some simulated devices. In contrast, in a simulation generally no real operation systems or applications are involved. In this article, we introduce the EstiNet OpenFlow network simulator and emulator[7]. EstiNet uses an unique approach to testing the functions and performances of OpenFlow controllers. By
3 3 using an innovative simulation methodology, which is called the kernel reentering methodology, EstiNet combines the advantages of both the simulation and the emulation approaches. In a network simulated by EstiNet, a simulated device can run the real Linux operating system and any UNIX-based real application program can readily run on a simulated device without any modification. With these unique capabilities, EstiNet s simulation results are as accurate as those obtained from an emulation while still preserving the many advantages of the simulation approach. In testing OpenFlow controllers, since the first and most widely-used NOX OpenFlow controller[8]isarealapplicationprogramrunnableonlinux,noxcanreadilyrunonahostin an EstiNet simulated network to control thousands of simulated OpenFlow switches. In EstiNet, because these real OpenFlow controllers are tested and evaluated in simulations rather than in emulations, the tests and evaluations can be performed much faster than real time. In addition, in EstiNet, the performance results of a simulated OpenFlow network managed by these OpenFlow controllers are correct, accurate, and repeatable. These performance results can be correctly explained based on the parameter settings(e.g., link bandwidth, delay, downtime, etc.) and configurations(e.g., network size, mobility pattern or speed) of the simulated OpenFlow network. We have used EstiNet to perform functional validation and performance evaluation of several protocols that are implemented by NOX as components. In this article, we choose the learning bridge protocol(lbp) and the spanning tree protocol(stp) as illustration examples. We studied the complicated interactions among these OpenFlow-implemented protocols and the address resolution protocol(arp) when the network traffic is TCP traffic. Our simulation results and detailed logs reveal their behavior, efficiency, and implementation flaws under the tested network settings. II. SIMULATION ARCHITECTURE OF ESTINET To implement the kernel reentering methodology, EstiNet uses tunnel network interfaces to automatically intercept the packets exchanged by two real applications and redirect them into the EstiNet simulation engine. As shown in Figure 1(a), inside the EstiNet simulation engine, a protocol stack composed of the MAC/Phy layers along with other layers below the IP layer are createdforeachsimulatedhost.packetstobesentoutonhost1aresentouttotheoutputqueue of tunnel interface 1 where the simulation engine will fetch them later. After fetching a packet
4 4 from tunnel interface 1, the simulation engine processes the packet through the protocol stack created for host 1 to simulate the MAC/Phy and many other mechanisms of the network interface usedbyhost1.forexample,theeffectsofthelinkdelay,linkbandwidth,linkdowntime,and linkbit-error-rate(ber)areallsimulatedinthephymodule.thephymoduleofhost1will deliverthepackettothephymoduleofhost2afterthelinkdelayplusthetransmissiontimeof thepacketonthislinkbasedonthesimulationclock.then,thepacketwillbeprocessedfrom thephymoduleuptotheinterfacemodule,whereitiswrittenbackintothekernelviatunnel interface 2. The packet will then go through the IP/TCP/Socket layers and finally be received by the application running on host 2, which ends its journey. By this methodology, all Linux-based real applications can run on a simulated network in EstiNet without any modification and they all use the real TCP/IP protocol stack in the Linux kernel to create their TCP connections. Figure1(b)showshowweextendthismethodologytosupportrunningarealOpenFlow controller on an EstiNet simulated network. Since real OpenFlow controllers such as NOX are normal application programs, they readily run on a simulated host in EstiNet without any modification. However, because a real OpenFlow switch needs to set up a TCP connection to the OpenFlow controller to receive its messages, we simulate the operations of each OpenFlow switchinsidethesimulationengineandletitcreateanopenflowtcpsocketboundtoanetwork interface(in this example, the used network interface is tunnel interface 2). With this design, inestinetasimulatedopenflowswitchcansetuparealtcpconnectiontoarealopenflow controller to receive its messages. All messages exchanged between a real OpenFlow controller and a simulated OpenFlow switch are accurately scheduled based on the simulation clock. Therefore, the results of functional validation and performance evaluation of a real OpenFlow controller are correct and repeatable over EstiNet. III. COMPARISON WITH RELATED TOOLS Currently, very few network simulators support the OpenFlow protocol and the most notable oneisns-3[9].ns-3isthemostwidelyusednetworksimulatorintheworld.thereisaprojectof ns-3 about supporting the OpenFlow protocol and the version of the OpenFlow protocol supported is0.89,whichisoldasthelatestversionofopenflowasofthiswritingisalready1.3.1.ns-3 simulates the operations of an OpenFlow switch by compiling and linking an OpenFlow switch C++ module with its simulation engine code. To simulate a real OpenFlow controller, ns-3 also
5 5 User Space Host 1 s Application (1) (4) Program Socket Simulation Engine Host 1 Host 2 Interface Interface ARP FIFO MAC8023 TCPDUMP Phy (5) TCP/UDP ARP FIFO MAC8023 TCPDUMP Phy (2) IP (7) (3) Tunnel 1 Tunnel 2 Kernel Space (a) The host to host case (6) Host 2 s Application Program Socket (9) (8) Simulation Engine OpenFlow Switch Socket User Space Interface Interface FIFO ARP ARP MAC8023 FIFO FIFO Phy TCPDUMP TCPDUMP MAC8023 MAC8023 Controller Socket Phy Phy TCP IP Tunnel 1 Tunnel 2 (b) The controller to OpenFlowSwitch case Kernel Space Fig. 1: Simulation Architecture of EstiNet implementsitasac++moduleandcompilesandlinksitwithitssimulationenginecode.in fact, all devices/objects simulated in ns-3 are implemented as C++ modules compiled and linked together with its simulation engine code to form a user-level executable program(i.e., the ns-3). Because the ns-3 program is a user-level program and a real OpenFlow controller such as NOX is also a user-level program, a real OpenFlow controller program cannot be compiled and
6 6 linkedtogetherwiththens-3programtoformasingleexecutableprogram.asaresult,areal OpenFlow controller cannot readily run without modification on a node in a network simulated byns-3.itisthisreasonwhyns-3hastoimplementitsownopenflowcontrollerfromscratch as a C++ module. This approach wastes much time and effort to re-implement widely-used real OpenFlow controllers. In addition, the running behavior of a re-implemented OpenFlow controllermoduleinns-3maynotbethesameasthebehaviorofarealopenflowcontroller because the former is a much-simplified abstraction of the latter. For example, as documented in ns-3, the spanning tree protocol and the MPLS function are not supported. As another example, in ns-3 there is no TCP connection between a simulated OpenFlow switch and its simulated OpenFlow controller. Since this usage is not the usage in the real world, the simulation results will differ from the real results when the TCP connection in the real world experiences packet losses or congestion. Regarding network emulators that support the OpenFlow protocol, currently there are very few such tools and the most notable one is Mininet[10]. Mininet uses the virtualization approach to create emulated hosts and uses the Open vswitch[11] to create software OpenFlow switches on a physical server. The links connecting a software OpenFlow switch to emulated hosts or to other software OpenFlow switches are implemented by using the virtual Ethernet pair mechanism provided by the Linux kernel. Because an emulated host in Mininet is like a virtual machine, real applications can readily run on it to exchange information. A real OpenFlow controller, which is alsoarealapplication,canalsorunonanemulatedhosttosetuptcpconnectionstosoftware OpenFlow switches to control them. With this approach, emulated hosts and software OpenFlow switches can be connected together to form a desired network topology and be controlled by a real OpenFlow controller. Although Mininet can be used to as a rapid prototyping for software-defined networks, it has several limitations. As stated in[10], the most significant limitation of Mininet is its lack of performance fidelity because it provides no guarantee that an emulated host in Mininet that is readytosendapacketwillbescheduledpromptlybytheoperatingsystemtosendthepacketand it provides no guarantee that all software OpenFlow switches in Mininet will forward packets atthesamerate.thepacketforwardingrateofasoftwareopenflowswitchinmininetis unpredictable and varies in every experimental run as it depends on the CPU speed, the main memory bandwidth, the numbers of emulated hosts and software OpenFlow switches that must
7 7 bemultiplexedoveracpuinmininet,andthecurrentsystemactivitiesandload.asaresult, MininetcanonlybeusedtostudythebehaviorofanOpenFlowcontrollerbutcannotbeused to study any time-related network/application performance. In contrast, EstiNet combines the advantages of both the simulation and the emulation approaches without their respective shortcomings. Like in an emulation, in EstiNet a real OpenFlow controller can readily run without modification to control simulated OpenFlow switches and real applications can readily run on hosts running a real operating system to generate realistic network traffic. However, the operations and interactions among these real applications, the real OpenFlow controller, the OpenFlow switches, hosts and links in a studied network are all scheduled by the EstiNet simulation engine based on its simulation clock, rather than be multiplexed and executed in an unpredictable way by the operating system. For this reason, differing from Mininet, EstiNet generates time-related OpenFlow performance results correctly and the results are repeatable. In Figure 2, we compare EstiNet, ns-3, and Mininet according to their latest developments. Most comparison results are self-explanatory and thus we only explain the scalability and GUI comparison results. EstiNet uses the kernel reentering methodology to use a single kernel to support multiple hosts and its simulation engine process can support multiple OpenFlow switches. As a result, it is highly scalable. Ns-3 is also highly scalable as its simulated hosts, OpenFlow switches, and controller are all implemented as C++ modules and linked together as a single process. In contrast, Mininet needs to run up a shell process(e.g.,/bin/bash) to emulate each hostandneedstorunupauser-spaceopenvswitchprocess(orakernel-spaceopenvswitch)to simulate each OpenFlow switch. As a result, it is less scalable than EstiNet and ns-3. Regarding theguisupports,whichareveryimportantfortheuser,estinet sguicanbeusedtoeasilyset upandconfigureasimulationcaseandbeusedtoobservethepacketplaybackofasimulation run.theguiofns-3,ontheotherhand,canonlybeusedforobservationoftheresultsand theuserneedstowritec++orscriptstosetupandconfigurethesimulationcase.formininet, itsguicanbeusedforobservationpurposesonlyandtheuserneedstowritepythonscriptsto set up and configure the simulation case. IV. STUDY TARGETS AND SIMULATION SETTINGS WeusedthenetworktopologyshowninFigure3tostudyhowNOXimplementsitsLBP and STP. These protocols are implemented as the switch and the spanning tree components
8 8 Fig. 2: A comparison of EstiNet, ns-3, and Mininet innox.thereasonwhywechosetostudythemisbecausetheseprotocolsareimportantand fundamental to the operations of a network and they are relatively the most complicated ones among those provided in NOX. During the simulations, these components are loaded into and reside in the core of NOX simultaneously. Nodes3,4,5and11aresimulatedhostsrunningtherealLinuxoperatingsystemwherereal applications can run without modification. Nodes 6, 7, 8, 9, and 10 are simulated OpenFlow switches supporting the OpenFlow 1.0 protocol. Node 1 is the host where NOX will be running duringsimulation.(inthefollowing,wecallitthe controllernode forbrevity.)node2isa simulated legacy(normal) switch that connects all simulated OpenFlow switches together with the controller node. It forms a management network over which the TCP connection between each simulated OpenFlow switch and the controller node will be set up. All OpenFlow messages between NOX and simulated OpenFlow switches are exchanged over this management network. In contrast, the network formed by simulated OpenFlow switches, simulated hosts, and the links connecting them together is the data network over which real applications running on simulated
9 9 hostswillexchangetheirinformation.wesetthebandwidthanddelayofeachlinkinboththe management and data networks to be 10 Mbps and 10 ms, respectively. To test the path-finding and network convergence performance of NOX after a link failure, each simulation run starts at 0 thsecandendsat100 thsecinthesimulatednetworkandthelinkbetweennodes6and7is purposely turned down between 40 th sec and 65 th sec. Fig.3:ThetopologyofthetestedOpenFlownetworkandtheoriginalpathofaTCPtraffic flow We tested the behaviorof a greedy TCP flow on the data network controlled by NOX. Because in EstiNet real applications can directly run on simulated hosts, we chose node 11 asthedestinationhostandranupthe rtcp applicationonit.wechosenode3asthesource hostandranupthe stcp applicationonit.oncethestcpsuccessfullysetsuparealtcp connectionwiththertcp,itgeneratesgreedytcptraffictothertcpsubjecttothetcperror, flow, and congestion control algorithms. All of these real applications are set to start at 30 th sec ratherthan0 thsec.thisisbecausewewantthenox sstptohaveformedastablespanning treeoverthedatanetworkbeforeanypacketentersintoit. We also tested the effects of the ARP protocol on the path-finding and network convergence speed of the simulated OpenFlow network. Normally, on a real network the ARP protocol is
10 10 enabledoneveryhostandtriggeredondemandtofindoutthe(macaddress,ipaddress) mapping relationship. However, under some circumstances. this mapping table can be pre-built toavoidthearprequest/replylatencyandinthiscasethearpprotocolisdisabledonhosts. Our simulation results show that enabling or disabling the ARP protocol can have a significant impact on the path-finding capability/speed of an OpenFlow network. V. FUNCTIONAL VALIDATION Before presenting the functions of NOX s LBP and STP over the tested network, we briefly explain the main OpenFlow messages exchanged between NOX and OpenFlow switches to implement LBP and STP. InOpenFlow1.0,aPacketInmessageisissuedbyanOpenFlowswitch(tosavespace,inthe followingwewilluse switch torefertoanopenflowswitchwhenthereisnoambiguity) tothecontrollertoaskithowtoprocessareceivedpacket.itcancontainthefullcontentof thepacketorjusttheheadersofthepacketwithafewbytesofthedatapayload.apacketout messageisissuedbythecontrollertoaswitchtoinstructithowtoprocessandsendoutapacket. ThepacketmaybecarriedinthePacketOutmessageorisapacketthatisalreadybufferedina switch waiting for a PacketOut message. A FlowModify message is issued by the controller to aswitchtoadd/modify/removeaflowentryintheflowtable.whenapacketentersaswitch, itismatchedagainstallflowentriesintheflowtable.ifitmatchesoneormoreentries,the entrywiththehighestprioritywillbeusedtoprocessthepacket.eachentrycanbeassociated withsomeactions,whichmaybedrop,forward,etc.andtheactionswillbeappliedtoa matchedpacket.ifthereisnomatchintheflowtable(whichiscalledatablemiss),aswitch candecidetodropthepacketorissueapacketinmessagetothecontrolleraskingithowto process the packet. Initially, the flow table in every switch is empty. The PortModify message isissuedbythecontrollertoaswitchtochangethestatusofoneofitsports.forexample,the statusofaportcanbesettofloodornonflood,whichmeansthatwhentheswitchneedsto sendapacketoutofallofitsports(excludingtheingressport),whetherthisportshouldbe included or not for a flood operation.
11 11 A.LBPinNOX HereweuseFigure3toexplainhowNOX slbpworksonthetestednetwork.suppose thatthesourcehost(node3)sendsitsfirsttcpdatapackettothedestinationhost(node 11).Whenthispacketentersnode6,atablemisseventisgeneratedbecausethereisnoflow entryinthetablethatcanbematchedtoit.thiseventcausesnode6toissueapacketin message to NOX asking it how to process this packet. After receiving the message, NOX learns the(sourcenode,ingressport)=(node3,leftport)mappinginformationfornode6.itthen issuesapacketoutmessagetoinstructnode6tofloodthispacketbecauseitdoesnothaveany forwarding information for the destination host(node 11) so far. After receiving the PacketOut message,node6floodsthepackettonodes9and7.tosimplifythediscussion,wenowfocus onthefloodingpathalongnodes6,9,and10. Afternode9receivesthepacket,likewhathasoccurredinnode6,itissuesaPacketInmessage tonoxandnoxlearnsthatonnode9(sourcenode,ingressport)=(node3,topport).not knowingtowhichoutputporttoforwardthispacket,noxalsosendsoutapacketouttonode9 instructing it to flood the packet. When node 10 receives the packet, the same scenario happens andnoxlearnsthatonnode10(sourcenode,ingressport)=(node3,leftport).finally,when node11(thedestinationhost)receivesthepacket,itsendsbackatcpackpackettothe sourcehost(node3).whenthispacketentersnode10,becausethereisnoentryinitsflow table for this reverse flow, node 10 issues a PacketIn message to NOX asking for instructions. Now with the mapping information learned previously, NOX issues a FlowModify message to node10instructingittoaddaflowentryof(destinationnode,outputport)=(node3,leftport) intoitsflowtableandforwardthepacketoutofitsleftport.whennode9receivesthepacket, thesamescenariooccurs.itissuesapacketintonoxandnoxinstructsittoaddanentryof (destinationnode,outputport)=(node3,topport)andforwardthepacketoutofitstopport. Thesamescenarioappliestonode6andfinallytheTCPACKpacketreachesnode3,finishing a round trip. WhentheTCPACKpacketiscomingbackonthereturningpath,becausenodes10,9,and 6eachissuesaPacketInmessagetoNOX,NOXalsolearned(sourcenode,ingressport)= (node11,bottomport),(node11,rightport),and(node11,bottomport)fornodes10,9,and6, respectively. However, we found that although NOX learns a mapping from a PacketIn message
12 12 issuedbyaswitch,itdoesnotimmediatelyaddthismappingasaflowentrytothatswitch using the FlowModify message. Instead, it silently keeps the learned mapping information until themappingisusedinthefuture.forthisreason,whenthesecondtcpdatapackettraverses nodes6,9,and10toreachnode11,eachofthesenodeswillgenerateatablemisseventand issueapacketinmessagetonoxagain.however,atthistimenoxalreadyknowshowto forward the packet to node 11 on these nodes. Therefore, it issues FlowModify messages to add theselearnedmappinginformationintotheflowtablesofnodes6,9,and10andinstructthem toforwardthepacketoutofaportaccordingtothenewlyaddedentries.sofar,allrequired flowentriesforboththeforwardandreversedirectionsofthistcpflowhavebeeninstalledin theflowtablesofnodes6,9,and10.startingfromthethirdtcpdatapacket,whenatcp DATAorACKpacketentersthesenodes,nomorePacketInmessageswillneedtobesentto NOX from these nodes. Intheabovecase,however,ifthesourcehostsendsoutUDPpacketstothedestinationhost andthedestinationhostdoesnotreplyanypackettothesourcehost,wefoundthatthebehavior oftheopenflownetworkisverydifferentfromthetcptrafficcase.whenthefirstudppacket traverses nodes 6, 9, 10 to reach the destination host, the interactions between these nodes and NOXarethesameasthoseintheTCPtrafficcase.However,becausethereisnoreturningpacket fromthedestinationhosttothesourcehost,noxhasnochancetolearn(sourcenode,ingress port)=(node11,bottomport),(node11,rightport),and(node11,bottomport)fornodes10,9, and6,respectively.asaresult,whenthesecondandalloffollowingudppacketscontinueto traversenodes6,9,and10,eachofthemwilltriggeratablemisseventoneachofthesenodes, causing an excessive number of PacketIn messages to be sent to NOX continuously. Conceivably, whenthenumberofnodesonthepathislarge,whenthesendingrateofanunidirectionaludp flowishigh,orwhentherearemanyunidirectionaludpflowsinthenetwork,noxwillbe burdened by a high rate of PacketIn messages, reducing its capability to manage a large network. B.STPinNOX NOX s STP uses the LLDP(Link Layer Discovery Protocol)[12] packets to discover the topologyofanopenflownetwork.foreachswitch,afteritispoweredonandhasestablisheda TCPconnectiontoNOX,NOXimmediatelysendsitaFlowModifymessagetoaddanentryinto its flow table. This flow entry will match future received LLDP packets and its associated action
13 13 is SendthereceivedLLDPpackettothecontroller. Foreachportofaswitch,every5seconds (the LLDP transmission interval) NOX sends a PacketOut message to the switch asking it to send the LLDP packet carried in the PacketOut message out of the specified port. Since every switch has already had a flow entry matching received LLDP packets, when a switch receives anlldppacketfromoneofitsneighboringswitches,itwillsendthereceivedlldppacketto NOX. With these received LLDP packets from all switches, NOX builds the complete network topologyandcomputesaspanningtreeoverit.foralinkthatisincluded/notincludedonthe computed spanning tree, NOX sends a PortModify message to each of the two switches that areatthetwoendsofthelink.thismessageenables/disablesthefloodingstatusoftheport connectedtothelink.foreachlinkdetectedinnox,a10-second(whichistwotimesofthe LLDP transmission interval) timer is set up in NOX to monitor its connectivity. If a link s timer expires, NOX views that this link is currently down and recomputes a new spanning tree. Then, it uses PortModify messages to change the flooding status of the affected ports. We found that the PacketIn and PacketOut messages triggered by the exchanges of LLDP packetsonalargenetworkcancauseaheavyprocessingburdenfornox.forexample,ifthere are 100 switches in the network and each has 24 ports connecting to neighboring switches, becausethereare2,400portsintotalinthenetwork,noxwillhavetoprocess2,400packetout messages plus 2,400 PacketIn messages every 5 seconds just for LLDP packets alone. VI. PERFORMANCE EVALUATION WestudyhowquicklyaTCPflowcanchangeitspathtoanewpathafteralinkfailure.In Section VI-A, we first study the details of two cases when the LLDP transmission interval is theoriginalvalueof5seconds,withthefirstcasecarriedoutwhenarpisenabledandthe secondcasecarriedoutwhenarpisdisabled.then,insectionvi-b,westudytheeffectsof thelldptransmissionintervalonthenewpathfindingtimeofthetcpflowwhenarpis enabled. A. Detailed Case Studies OnthetestednetworkdepictedinFigure3,beforethelinkbetweennodes6and7breaksat 40 thsec,nox sstpdisablesthelinkbetweennodes9and10andthelinkbetweennodes10 and8.therefore,thetcpflowfromthesourcehosttothedestinationhosttraversesnodes3,6,
14 14 Fig.4:ThenewpathofaTCPtrafficflowafterthelinkbetweennodes6and7becomes down under the ARP-enabled condition 7,10,and11.Afterthelinkbreakage,NOX sstpenablesbackthesetwolinksbutdisablesthe linkbetweennodes7and8tomaintainalooplessandconnectedtopology.inthefollowing,we showthat(1)whenarpisenabled,thenewpathtakenbythetcpflowischangedtothepath traversingnodes3,6,9,10,and11at62 thsec,asshowninfigure4;however,thetcpflow neverchangesbacktoitsoriginalpathafterthelinkdowntime;and(2)whenarpisdisabled, thetcpflowneverchangesitspathtothenewpathduringthelinkdowntimebetween40 th secand65 thsecanditbecomesactiveovertheoriginalpathafterthelinkdowntimeat84 th sec.theseresultsarecausedbytheflowidletimersusedinopenflowswitches,nox slbp and STP implementations, and their interactions with ARP. Figure5(a)showsthetimelineoftheimportanteventsoftheTCPflowwhenARPisenabled on hosts. Since the link becomes down at 40 th sec, as discussed previously, because NOX s STP usesaseparate10-secondtimertodetectthefailureofeachlink,onewouldexpectthatthenew spanningtreewouldbeformedveryquicklyaround50+ thsecandthetcpflowwouldchange tothenewpathquicklyafterthenewspanningtreeisformed(i.e.,alsoaround50+ thsec). However,thisisnotthecaseandtheTCPflowactuallychangestothenewpathandbecomes
15 15 activeataround62 thsec(atthefevent). Fig.5:ThetimelineforaTCPflowtochange/keepitspathafterthelinkbetweennodes6and 7breaksat40 thsec TheeventsA,B,C,D,EandFrepresentthetimestampswhentheTCPflowcontinues toresendapacketlostonthebrokenlink.thetimestampofeventais40.3 thsecandthe intervals between two successive retransmission events starting from event A are 0.7, 1.38, 2.72, 5.44, and seconds, respectively. These exponentially-growing intervals are caused by the TCP congestion control algorithm on the source host. The F event represents the successful retransmission of the lost packet over the new path. After that, the TCP flow becomes active in transmitting packets over the new path. The X event represents the source host sending an ARP request while the Y event represents the destination host returning the ARP reply back tothesourcehost.thexeventistriggeredbythetcpflowretransmittingthelostpacketat theftimestamp.thisisbecauseonthesourcehostthearpentryforthedestinationhosthad expired during the long TCP retransmission interval and an ARP request must be broadcast to thenetworktorebuildtheentry.(note:anarpentrymayexpireafteranidleperiodofbetween
16 16 2 and 4 seconds in the simulations, depending on the relative timing between the installation of the entry and the 2-second periodic flush operations.) In the following, we explain why the TCP flow experiences unexpected delays before it successfully changes to the new path when ARP is enabled. The reason why the retransmission attemptsateventsa,b,c,dandefailisthesame.fromtheestinetlog,wefoundthatnox s STPdoesnotdetectthelinkfailurebetween40 thsecand50 thsecandthenewspanningtree isformedat52 thsec,whichisafterthetimestampofevente.therefore,alloftheseresent TCPpacketsareforwardedoverthebrokenlinkandgetlost.(NotethatNOXusesa5-second interval to periodically update the Flood/NonFlood status of the ports of a switch and our log showsthattheupdateoccursat52 thsec.)asfortheretransmissionateventf,itsucceedsand the reason is explained below. As discussed before, the broadcast ARP request at the timestamp ofxistriggeredbytheresenttcppacketateventf.becausetheflowentriesaddedinall switches for the previous ARP request/reply transmitted by the source and destination hosts had expired during the long TCP retransmission timeout, when an ARP request enters a switch, the switch will issue a PacketIn message to NOX asking for forwarding instructions. In return, NOX sends back a PacketOut message instructing the switch to flood the ARP request(which isabroadcastpacket)outofallofitsports.althoughtherightportofnode6connectstothe brokenlink,thebottomportconnectingtonode9isfunctioning.asaresult,thearprequest cantraversenodes6,9,10toreachthedestinationhostandthedestinationhostcansendback theunicastarpreplybacktothesourcehost,likethescenariodescribedinsectionv-a. TheeffectsoftheseARPrequestandreplypacketsnotonlyinstallARPflowentriesin switches but also let NOX learn the most updated flow forwarding information for each switch. Later,whentheresentTCPpacketentersnode6,becausethereisnoentryforthisTCPflow (notethatthereisanarpentryjustinstalled,however,becauseitstypeisnottcp,thisflow entrydoesnotmatchtheincomingtcppacket),node6issuesapacketinmessagetonox asking for instructions. For this TCP packet, NOX now returns a PacketOut message instructing theswitchtoaddanupdatedandcorrectflowentryforthistcpflowandforwardthetcp packetoutofthebottomportofnode6,whichiscorrect.afterthat,thistcppacketanditsack packet follow the scenario described in Section V-A to(1) update NOX of correct forwarding informationforthistcpflowonallswitchesand(2)installcorrectflowentriesforthistcp flow in all switches. With all correct entries installed in the switches on the new path, starting
17 17 fromthesecondtcppacketafterthetimeout,thetcpflowbecomesactiveonthenewpathat 62 th sec. IncontrasttothefactthattheTCPflowcanchangetoanewpathwhenARPisenabled, whenarpisdisabledthetcpflowneverchangestothenewpathbutinsteadbecomesactive againontheoriginalpathat84 thsec.inthefollowing,weexplainthereasons. WhenARPisdisabledonhosts,asshowninFigure5(b),oneseesthattheretransmission attempt at event P fails. This failure doubles the TCP retransmission interval from seconds to22.60secondsandcausesthetcpflowtoresendthelostpacketatthetimestampofpplus 22.60seconds,whichisat84 thsec(attheqtimestamp).aftereventq,becausethelink downtimehaspassedandnoxneverfoundanewpathforthetcpflowduringthelink downtime, the TCP flow still uses its old path to successfully transmit its packets. AsforthereasonwhywhenARPisdisabledtheretransmissionattemptateventPstillfails, wefoundthatitiscausedbyabugofnox sstp.foreachentryaddedtotheflowtableofa switch,theswitchsetsupanidletimerforitandwillremovetheentryifithasnotbeenused formorethan5seconds.asaresult,theflowentryforthetcpflowexpiresandisremoved atthetimestampofeplus5seconds(whichis56 thsec).fromtheestinetlog,weobserved thatnode6doessendaflowremovedmessagetonoxtoinformitoftheremovalofthis flowentryat56 thsec.laterat62 thsecwhenaresenttcppacketentersnode6,becausethe flowentryforthistcpflowhadexpiredandbeenremovedbefore,theswitchissuesapacketin message to NOX asking for its forwarding instruction. Surprisingly, we found that NOX issues back a PacketOut message instructing the switch toaddaflowentryforthisflowandforwardtheresentpacketoutoftheportconnectedto the broken link. That is, even though NOX has received the FlowRemoved notification from theswitchat56 thsec,itstillkeepstheoldandobsoleteforwardinginformationforthisflow and gives the wrong forwarding entry and instruction to the switch at 62 th sec. Since this resentpacketislostagainonthebrokenlink,thetcpflowhastoresendthepacketatthe next retransmission timeout, which occurs at 84 th sec. We note that the EstiNet log shows thatnox sstphasdetectedthebrokenlinkandre-formedanewspanningtreeat52 thsec. However, the above results show that detecting a link failure and accordingly disabling that link does not cause NOX to automatically remove all obsolete forwarding information related to that link. These results indicate that in NOX the STP and LBP components do not synchronize their
18 18 gathered information well and thus, as shown in this study, they may result in wrong operations ofanopenflownetwork.notethatthisbugdoesnothappenwhenarpisenabledandthe ARP request/reply transmissions happen before the transmission of the resent TCP packet, as shown in Figure 5(a). Since the ARP request/reply trigger PacketIn messages sent to NOX, we conjecture that these PacketIn messages replace the wrong forwarding information stored in NOX with correct information. AnotherimportantfindingfromFigure5(a)isthattheTCPflowdoesnotchangeitspath fromthenewpathbacktoitsoriginalpathafterthelinkdowntime,eventhoughthespanning treehasbeenrestoredtotheoriginalone.thisproblemiscausedbytheflowidletimersusedin theswitchesonthenewpath.becausethetcpflowisactiveinsendingpacketsafterchanging tothenewpath,theflowentriesforthetcpflowintheseswitches,whichwerecreatedover the spanning tree during the link downtime, will never expire. Since every incoming TCP packet willmatchtheseentriesandwillnotgenerateatablemissevent,theseswitcheswillnotsend any PacketIn messages to NOX. Therefore, NOX has no chances to install new entries into the flowtablesoftheseswitchestochangethepathofthetcpflowbacktoitsoriginalone,which maybebetterthanthenewpathintermsofhopcountoravailablebandwidth. B. Effects of the LLDP Interval To study the effects of the LLDP transmission interval and the link failure detection timeout value(whichistwotimesofthelldptransmissioninterval)onthenewpathfindingtimeof thetcpflowwhenarpisenabled,wevariedthevalueofthelldpintervalfrom1,2,3,...,to10secondsandobservedatwhattimethetcpflowcanswitchtothenewpath.(note: WhenARPisdisabled,wehaveshownthattheTCPflowwillneverchangetoanewpathdue to the implementation of NOX.) Figure 6 shows the results. After careful investigations into the causes, we found that this phenomenon is caused by the complicated interactions among several timersusedinanopenflowswitchandnox.whenthelldpintervalisreducedto1second, alinkfailurecanbedetectedquicklyafter2*1=2seconds.however,becausetheflowentry forthetcpflowinnode6isusedandmatchedoneachresenttcppacket,thisobsoleteflow entry(whoseoutputportstillpointstothebrokenlink)continuestoresideintheflowtableand beusedfortheresenttcppacketsateventa,b,c,anddinfigure5(a).asaresult,allof these retransmitted TCP packets are lost on the broken link.(note: This finding shows a design
19 19 flawinnox sstpasitshouldsendaflowmodifymessagetonode6todeletetheobsolete TCPflowentryassoonasitdetectsthelinkfailure.) 100 ARP enabled New path finding time (sec) LLDP transmission interval (sec) Fig.6:ThenewpathfindingtimeofaTCPflowunderdifferentLLDPtransmissionintervals On the next retransmission attempt at event E, because the TCP retransmission timeout between eventdandeis5.44seconds(whichislargerthanthe5-secondflowentryidletimeoutvalue), theflowentryforthistcpflowhadexpiredandatablemisseventwillbegenerated.however, becausethearpentryonthesourcehosthadexpiredaswellduringthislongtcpretransmission interval,atthetimestampofevente,anarprequestisinsteadgeneratedandentersintonode 6. Starting from this moment, the scenario that we described in Section VI-A when explaining eventsx,y,andfoccursagain.therefore,thetcpflowcannowswitchtothenewpathat 52 thsecwhenthelldpintervalisreducedto1second. AlloftheresultsshowninFigure6canbeexplainedaccuratelybasedontheOpenFlow protocolandtheimplementationsofarp,tcp,andnox sstpandlbp.duetothepaper length limitation, however, we can only pick one result to explain in details. Nevertheless, this study already shows the performance fidelity of EstiNet when used to evaluate a real OpenFlow controller.
20 20 VII. CONCLUSION In this article, we present the EstiNet OpenFlow network simulator and emulator and use it as a platform to perform functional validation and performance evaluation of the NOX OpenFlow controller. EstiNet uses an unique kernel reentering simulation methodology to combine the advantages of both the simulation approach and the emulation approach. By this methodology. a real OpenFlow controller can run without modification to control thousands of simulated OpenFlow switches. In addition, real applications can run without modification on simulated hosts that run the real Linux operating system to generate realistic network traffic. Our simulation study provides important insights into how NOX implements the functions of the learning bridge protocol(lbp) and the spanning tree protocol(stp) based on the OpenFlow 1.0 protocol. NOX implements these protocols as separate components that can be loaded into the core of NOX simultaneously. Our detailed logs reveal that the LBP and STP components in NOX do not synchronize their gathered information well and thus NOX may give wrong forwarding instructions to an OpenFlow switch after a link failure. Our another finding is that whennox sstpdetectsalinkfailure,itdoesnotsendamessagetoanaffectedswitchto delete obsolete flow entries. As a result, because the obsolete flow entry expires only after an idleperiodof5seconds,itmaybematchedandusedendlesslycausingtheopenflowswitch to continue to forward incoming packets onto a broken link. Insummary,ourresultsshowthattheLBPandSTPcomponentsprovidedinNOXonly implement basic functions and lack information synchronization. As revealed in this paper, there ismuchroomlefttofurtherimprovethem. REFERENCES [1] Software-Defined Networking: The New Norm for Networks, a white paper of Open Networking Foundation, April 13, [2] Nick Mckeown, Tom Anderson, Hari BalaKrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner, OpenFlow: Enabling Innovation in Campus Networks, ACM SIGCOMM Computer Communication Review, Volume 38 Issue 2, April [3] B.White,J.Lepreau,L.Stoller,R.Ricci,S.Guruprasad,M.Newbold,M.Hibler,C.Barb,andA.Joglekar. AnIntegrated Experimental Environment for Distributed Systems and Networks, In Proc. of the Fifth Symposium on Operating Systems Design and Implementation, pages , Boston, MA, Dec [4] B. Chun, D. Culler, T. Roscoe, A. Bravier, L, Peterson, M. Wawrzoniak, and M. Bowman, PlanetLab: an Overlay Testbed for Broad-Coverage Services, ACM SIGCOMM Computer Communication Review, Volume 33 Issue 3, July 2003.
21 21 [5] N. Foster, R. Harrison, M.J. Freedman, C. Monsanto, and J. Rexford, A. Story, and D. Walker, Frenetic: A Network Programming Language, in Proc. of ICFP [6] Macro Canini, Daniele Venzano, Peter Peresini, Dejan Kostic, and Jennifer Rexford, A NICE Way to Test OpenFlow Applications, in Proc. of Networked System Design and Implementation, April [7] EstiNet 8.0 OpenFlow Network Simulator and Emulator, EstiNet Technologies Inc., available at [8] Natasha Gude, Teemu Koponen, Justin Pettit, Ben Pfaff, Martn Casado, Nick McKeown, Scott Shenker, NOX: towards an Operating System for Networks, ACM SIGCOMM Computer Communication Review, Volume 38 Issue 3, July 2008 [9] T. R. Henderson, M. Lacage, and G. F. Riley, Network Simulations with the ns-3 Simulator, ACM SIGCOMM 08, August 17-22, 2008, Seattle, USA. [10] Bob Lantz, Brandon Heller, and Nick McKeown, A Network in a Laptop: Rapid Prototyping for Software-Defined Networks ACM Hotnets 2010, October 20-21, 2010, Monterey, CA, USA. [11] B. Pfaff, J. Pettit, T. Koponen, K. Amidon, M. Casado, and S. Shenker, Extending Networking into the Virtualization Layer, in Prof. of HOTNETS [12] Link Layer Discovery Protocol, IEEE 802.1AB standards.
Comparison of SDN OpenFlow Network Simulator and Emulators: EstiNet vs. Mininet
Comparison of SDN OpenFlow Network Simulator and Emulators: EstiNet vs. Mininet Shie-Yuan Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan shieyuan@cs.nctu.edu.tw Abstract
More informationSOFTWARE DEFINED TESTBED USING MININET EMULATOR
SOFTWARE DEFINED TESTBED USING MININET EMULATOR Vipin Gupta 1, Sukhveer Kaur 2, Karamjeet Kaur 3 1 U-Net Solutions, Moga, India 2,3 Computer Science and Applications, AD College, Dharamkot, Moga, India
More informationFloodlight Controller onto Load Balancing of SDN Management
ISSN: 2349-3224 Volume 04 - Issue 08 August-2017 PP. 124-131 Floodlight Controller onto Load Balancing of SDN Management Mohammad Qassim 1, Mohammed Najm Abdullah 2, Abeer Tariq 3 Dept. of Comp.Science,
More informationThe Asian Conference on Technology, Information and Society Official Conference Proceedings 2014
Performance Evaluation of TCP/IP vs. OpenFlow in INET Framework Using OMNeT++, and Implementation of Intelligent Computational Model to Provide Autonomous Behaviour Pakawat Pupatwibul, University of Technology
More informationAutomatic bootstrapping of OpenFlow networks
Automatic bootstrapping of OpenFlow networks Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet and Piet Demeester Department of Information Technology (INTEC), Ghent University - iminds E-mail:
More informationSoftware Defined Networks (S.D.N): Experimentation with Mininet Topologies
Indian Journal of Science and Technology, Vol 9(32), DOI: 10.17485/ijst/2016/v9i32/100195, August 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Software Defined Networks (S.D.N): Experimentation
More informationAvailable online at ScienceDirect. Procedia Computer Science 34 (2014 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services
More informationSoftware-Defined Networking:
Software-Defined Networking: OpenFlow and Frenetic Mohamed Ismail Background Problem: Programming Networks is Hard 3/39 Network Stack Pros Key to the success of the Internet Layers and layers of abstraction
More informationExtending Dijkstra s Shortest Path Algorithm for Software Defined Networking
Extending Dijkstra s Shortest Path Algorithm for Software Defined Networking Jehn-Ruey Jiang, Hsin-Wen Huang, Ji-Hau Liao, and Szu-Yuan Chen Department of Computer Science and Information Engineering National
More informationDynamic Traffic Diversion in SDN: Testbed vs Mininet
Dynamic Traffic Diversion in SDN: Testbed vs Mininet Robert Barrett, Andre Facey, Welile Nxumalo, Josh Rogers, Phil Vatcher and Marc St-Hilaire School of Information Technology Carleton University, Ottawa,
More informationPort-Space Isolation for Multiplexing a Single IP Address through Open vswitch
Port-Space Isolation for Multiplexing a Single IP Address through Open vswitch Ping Du 1, Maoke Chen 1, and Akihiro Nakao 2 1 National Institute of Information and Communications Technology (NICT), Japan
More informationThe design and implementation of the NCTUns network simulation engine
Simulation Modelling Practice and Theory 15 (2007) 57 81 www.elsevier.com/locate/simpat The design and implementation of the NCTUns network simulation engine S.Y. Wang *, C.L. Chou, C.C. Lin Department
More informationManaging Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow
Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow Vivek S 1, Karthikayini T 2 1 PG Scholar, Department of Computer Science and Engineering, New Horizon College of Engineering,
More informationADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow
Spring Term 2014 ADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow Assigned on: 8 May 2014 Due by: 21 May 2014, 23:59 1 Introduction The goal of this assignment is to give an introduction
More informationPerformance benchmarking of SDN experimental platforms
Loughborough University Institutional Repository Performance benchmarking of SDN experimental platforms This item was submitted to Loughborough University's Institutional Repository by the/an author Citation:
More informationADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow
Spring Term 2015 ADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow Assigned on: 7 May 2015 Due by: 20 May 2015, 23:59 1 Introduction The goal of this assignment is to give an introduction
More informationUsing libnetvirt to control the virtual network
Using libnetvirt to control the virtual network Daniel Turull, Markus Hidell, Peter Sjödin KTH Royal Institute of Technology, School of ICT Kista, Sweden Email: {danieltt,mahidell,psj}@kth.se Abstract
More informationInterconnected Multiple Software-Defined Network Domains with Loop Topology
Interconnected Multiple Software-Defined Network Domains with Loop Topology Jen-Wei Hu National Center for High-performance Computing & Institute of Computer and Communication Engineering NARLabs & NCKU
More informationITU Kaleidoscope 2016 ICTs for a Sustainable World Multi-path Chunked Video Exchanges over SDN Cloud Playground
ITU Kaleidoscope 2016 ICTs for a Sustainable World Multi-path Chunked Video Exchanges over OF@TEIN SDN Cloud Playground Phyo May Thet*, JongWon Kim, Chaodit Aswakul* Wireless Network and Future Internet
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN :
2347 OpenFlow Security Threat Detection and Defense Services Wanqing You Department of Computer Science, Southern Polytechnic State University, Georgia Email: wyou@spsu.edu Kai Qian Department of Computer
More informationCongestion Control Techniques in Programmable Computer Networks
Congestion Control Techniques in Programmable Computer Networks Ankita 1, S. Vamshi Krishna 2 1 Ms., M-tech (EC) Student, MGM COET, Department of ECE, Noida, UP, India 2 Head of the Department, MGM COET,
More informationOn the Practical Applicability of SDN Research
On the Practical Applicability of SDN Research Roberto di Lallo Gabriele Lospoto Massimo Rimondini Mirko Gradillo Claudio Pisa IEEE/IFIP Network Operations and Management Symposium Istanbul Turkey 25/29
More informationA Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping
322 JOURNAL OF NETWORKS, VOL. 10, NO. 5, MAY 2015 A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping Pakawat Pupatwibul, Ameen Banjar, Abdallah AL Sabbagh, and Robin Braun Centre
More informationSofware Defined Networking Architecture and Openflow Network Topologies
Sofware Defined Networking Architecture and Openflow Network Topologies Fahad Kameez, M.Tech.(VLSI and ES) Department of Electronics and Communication Rashtreeya Vidyalaya College of Engineering Bengaluru,
More informationExperimenting with Scalability of Floodlight Controller in Software Defined Networks
2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT) Experimenting with Scalability of Floodlight Controller in Software Defined Networks
More informationA New Methodology for Easily Constructing Extensible and High-Fidelity TCP/IP Network Simulators
A New Methodology for Easily Constructing Extensible and High-Fidelity TCP/IP Network Simulators S.Y. Wang shieyuan@csie.nctu.edu.tw Department of Computer Science and Info. Engr. National Chiao Tung University
More informationPerformance Evaluation. Flow Creation Inside an OpenFlow Network
Performance Evaluation of Flow Creation Inside an OpenFlow Network Walber José Adriano Silva Abstract A top concern in Software Defined Networking (SDN) is the management of network flows because of resource
More informationBuilding NetOpen Networking Services over OpenFlow-based Programmable Networks
Building NetOpen Networking Services over -based Programmable Networks Namgon Kim and JongWon Kim Networked Media Lab., School of Information and Communications, Gwangju Institute of Science and Technology
More informationDesign and Performance Analysis of OpenFlow-Enabled Network Topologies Using Mininet
Design and Performance Analysis of OpenFlow-Enabled Network Topologies Using Mininet Idris Zoher Bholebawa*, Upena D. Dalal Electronics and Communication Engineering Department, S. V. National Institute
More informationPerformanceAnalysisofDifferentOpenflowbasedControllerOverSoftwareDefinedNetworking
Global Journal of omputer Science and Technology: Software & Data Engineering Volume 18 Issue 1 Version 1.0 Year 2018 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationDelay Controlled Elephant Flow Rerouting in Software Defined Network
1st International Conference on Advanced Information Technologies (ICAIT), Nov. 1-2, 2017, Yangon, Myanmar Delay Controlled Elephant Flow Rerouting in Software Defined Network Hnin Thiri Zaw, Aung Htein
More informationOFIAS: A Platform for Exploring In-Network Processing
OFIAS: A Platform for Exploring In-Network Processing Ping Du 1, Maoke Chen 1, and Akihiro Nakao 1,2 1 National Institute of Information and Communications Technology (NICT), Japan 2 The University of
More informationIncremental Update for a Compositional SDN Hypervisor
Incremental Update for a Compositional SDN Hypervisor Xin Jin Princeton University xinjin@cs.princeton.edu Jennifer Rexford Princeton University jrex@cs.princeton.edu David Walker Princeton University
More informationOPTIMAL METHOD FOR SHARING INTERNET IN WIRELESS MESH NETWORK USING FIXED- BAND NON-SHARING, NON-FIXED-BAND NON-SHARING / SHARING ALGORITHMS
OPTIMAL METHOD FOR SHARING INTERNET IN WIRELESS MESH NETWORK USING FIXED- BAND NON-SHARING, NON-FIXED-BAND NON-SHARING / SHARING ALGORITHMS Palanivel.N Assistant Professor Department of CSE Manakula Vinayagar
More informationMininet Performance Fidelity Benchmarks
Mininet Performance Fidelity Benchmarks Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, Bob Lantz, Nick McKeown October 21, 2012 1 Introduction This initial Mininet technical report evaluates the
More informationThe design and implementation of the NCTUns 1.0 network simulator
Computer Networks 42 (2003) 175 197 www.elsevier.com/locate/comnet The design and implementation of the NCTUns 1.0 network simulator S.Y. Wang *, C.L. Chou, C.H. Huang, C.C. Hwang, Z.M. Yang, C.C. Chiou,
More informationA new methodology for easily constructing extensible and high-fidelity TCP/IP network simulators q
Computer Networks 40 (2002) 257 278 www.elsevier.com/locate/comnet A new methodology for easily constructing extensible and high-fidelity TCP/IP network simulators q S.Y. Wang a, *, H.T. Kung b a Department
More informationNETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*
NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.
More informationIntroduction to Software-Defined Networking UG3 Computer Communications & Networks (COMN)
Introduction to Software-Defined Networking UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Courtesy note: Slides from course CPS514 Spring 2013 at Duke University and
More informationAssignment 5. 2 Assignment: Emulate a Data Center and Manage it via a Cloud Network Controller
University of Crete Computer Science Department Lecturer: Prof. Dr. X. Dimitropoulos TAs: Dimitrios Gkounis, George Nomikos Manos Lakiotakis, George Vardakis HY436 - Software Defined Networks Tasks of
More informationThe effect of Mobile IP handoffs on the performance of TCP
Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,
More informationApplication-Aware SDN Routing for Big-Data Processing
Application-Aware SDN Routing for Big-Data Processing Evaluation by EstiNet OpenFlow Network Emulator Director/Prof. Shie-Yuan Wang Institute of Network Engineering National ChiaoTung University Taiwan
More informationUsing the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches
Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction
More informationDesign the DNS-like Smart Switch for Heterogeneous Network base on SDN Architecture
2016 International Computer Symposium Design the DNS-like Smart Switch for Heterogeneous Network base on SDN Architecture Jih-Ching Chiu, An-Ting Liu*, Chien-Chin Liao* Department of Electrical Engineering,
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationoach for Monitoring Resour
IJCTA, 9(21), 2016, pp. 147-153 International Science Press A Novel Approach for Monitoring Resources in Virtual Environment 147 A Novel Appr pproac oach for Monitoring Resour esources in Vir irtual Envir
More informationThe RIT SDN Testbed and GENI
Rochester Institute of Technology RIT Scholar Works Articles 2015 The RIT SDN Testbed and GENI Bruce Hartpence Follow this and additional works at: http://scholarworks.rit.edu/article Recommended Citation
More informationVeriFlow: Verifying Network-Wide Invariants in Real Time
VeriFlow: Verifying Network-Wide Invariants in Real Time Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey Department of Computer Science University of Illinois at Urbana-Champaign 201
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationInteractive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN
Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,
More informationOpenFlow Controller Benchmarking Methodologies
OpenFlow Controller Benchmarking Methodologies Version 1.0 November 2016 ONF TR-539 ONF Document Type: Technical Recommendations ONF Document Name: OpenFlow Controller Benchmarking Methodologies Disclaimer
More informationRouting-State Abstraction Based on Declarative Equivalence
Routing-State Abstraction Based on Declarative Equivalence Kai Gao Xin Wang Jun Bi Guohai Chen Andreas Voellmy + Y. Richard Yang + Tongji University Tsinghua University + Yale University ABSTRACT Providing
More informationA Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Software-Defined Networking Security Controller Architecture Fengjun Shang, Qiang Fu College of Computer Science
More informationData Center Virtualization: Open vswitch
Data Center Virtualization: Open vswitch Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 10, 2014 Slides from ACM SIGCOMM Workshop
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationAn Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed
An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed Suhas Mathur suhas@winlab.rutgers.edu Communication Networks II Spring 2005 Talk Outline Introduction: The future internet
More informationIN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
More informationOpen Access Mobile Management Method for SDN-Based Wireless Networks
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-Based Wireless Networks Min
More informationScalability of Software Defined Network on Floodlight Controller using OFNet
2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT) Scalability of Software Defined Network on Floodlight Controller using OFNet Saleh
More informationComparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures
Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationInternational Journal of Scientific Research and Modern Education (IJSRME) ISSN (Online): ( Volume I, Issue I,
EFFECTIVE LEARNING WITH USAGE OF SIMULATORS A CASE OF NCTUNS SIMULATOR IN COMPUTER NETWORKS Subrahmanya Bhat* & Dr. K. R. Kamath** * Department of Computer Application, Srinivas Institute of Management
More informationReal Time Monitoring of Packet Loss in Software Defined Networks
Real Time Monitoring of Packet Loss in Software Defined Networks Yash Sinha 1(B), Shikhar Vashishth 2, and K. Haribabu 1 1 Department of Computer Science and Information Systems, BITS, Pilani, Pilani Campus,
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationLanguages for SDN (Frenetic)
Languages for SDN (Frenetic) Software Defined Networking: The Data Centre Perspective Seminar Informatikdienste A. Pantelopoulos 20.05.2016 1 SDN is useful Direct network control. Enables new applications,
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationWIRELESS mesh networks (WMNs) is formed as distributed
IEEE ANTS 214 1721923 1 2 3 4 6 7 8 9 1 11 12 13 14 1 16 17 18 19 2 21 22 23 24 2 26 27 28 29 3 31 32 33 34 3 36 37 38 39 4 41 42 43 44 4 46 47 48 49 1 2 3 4 6 7 6 61 62 63 64 6 Communication Overhead
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationMobile Management Method for SDN-based Wireless Networks
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-based Wireless Networks Min
More informationReliable Communication in Overlay Networks
Reliable Communication in Overlay Networks Yair Amir and Claudiu Danilov Johns Hopkins University Email: yairamir, claudiu @cs.jhu.edu Technical Report CNDS-23-1 http://www.cnds.jhu.edu February 19, 23
More informationVIRTUALIZATION IN OPENFLOW NETWORKS
VIRTUALIZATION IN OPENFLOW NETWORKS Miladin Tomić, Milutin Radonjić, Neđeljko Lekić, Igor Radusinović Keywords: FlowVisor, OpenFlow, SDN, virtualization. Abstract: Network virtualization allows network
More informationImplementation and Analysis of Large Receive Offload in a Virtualized System
Implementation and Analysis of Large Receive Offload in a Virtualized System Takayuki Hatori and Hitoshi Oi The University of Aizu, Aizu Wakamatsu, JAPAN {s1110173,hitoshi}@u-aizu.ac.jp Abstract System
More informationVirtualizing the Network Forwarding Plane
Virtualizing the Network Forwarding Plane Martín Casado Nicira Teemu Koponen Nicira Rajiv Ramanathan Google Scott Shenker UC Berkeley 1 Introduction Modern system design often employs virtualization to
More informationSDN-based Defending against ARP Poisoning Attack
Journal of Advances in Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 8, No. 2, May 2017), Pages: 95- www.jacr.iausari.ac.ir SDN-based
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationA Low-Load QoS Routing Method for OpenFlow Networks
Communications and Network, 2016, 8, 144-157 Published Online August 2016 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/10.4236/cn.2016.83015 A Low-Load QoS Routing Method for OpenFlow Networks
More informationService Chaining for NFV and Delivery of other Applications in a Global Multi-Cloud Environment
Service Chaining for NFV and Delivery of other s in a Global Multi-Cloud Environment Subharthi Paul, Raj Jain Dept. of Computer Science and Engineering Washington University in St. Louis St. Louis, MO
More informationProgramming Assignment 3: Transmission Control Protocol
CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm
More informationComputer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory
Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI Department Of Information Systems lakis@elte.hu http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further
More informationQOS Quality Of Service
QOS Quality Of Service Michael Schär Seminar in Distributed Computing Outline Definition QOS Attempts and problems in the past (2 Papers) A possible solution for the future: Overlay networks (2 Papers)
More informationEvaluation of OpenFlow s Enhancements
Proceedings of the Asia-Pacific Advanced Network 2012 v. 34, p. 1-10. http://dx.doi.org/10.7125/apan.34.1 ISSN 2227-3026 Evaluation of OpenFlow s Enhancements Othman Othman M.M. 1, and Koji OKAMURA 2 1
More informationCPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members)
CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 Q 2 Kurose chapter 3, review question R15 Q 3 Kurose
More informationTable of Contents Chapter 1 MSTP Configuration
Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationRD-TCP: Reorder Detecting TCP
RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies
More informationCS 640 Introduction to Computer Networks Spring 2009
CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,
More informationFast failure recovery for in-band OpenFlow networks
Fast failure recovery for in-band OpenFlow networks Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet and Piet Demeester Department of Information Technology (INTEC), Ghent University - iminds
More informationMulti-agent tasks scheduling system in software defined networks
Home Search Collections Journals About Contact us My IOPscience Multi-agent tasks scheduling system in software defined networks This content has been downloaded from IOPscience. Please scroll down to
More informationNCTUNS TOOL FOR INNOVATIVE NETWORK EMULATIONS
In: Computer-Aided Design ISBN 978-1-60456-860-8 Editors: C. M. De Smet and J. A. Peeters, pp. 2009 Nova Science Publishers, Inc. Chapter 13 NCTUNS TOOL FOR INNOVATIVE NETWORK EMULATIONS Shie-Yuan Wang
More informationConnecting Omnetpp to virtual Ethernet Interfaces
Connecting Omnetpp to virtual Ethernet Interfaces Sorin COCORADĂ Department of Electronics and Computers Transilvania University of Brasov Address (12pt Times New Roman, centered) ROMANIA sorin.cocorad@unitbv.ro
More informationReal-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)
Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,
More informationDesign and development of the reactive BGP peering in softwaredefined routing exchanges
Design and development of the reactive BGP peering in softwaredefined routing exchanges LECTURER: HAO-PING LIU ADVISOR: CHU-SING YANG (Email: alen6516@gmail.com) 1 Introduction Traditional network devices
More informationLecture 9. Address Resolution Protocol (ARP)
Lecture 9. Direct Datagram Forwarding: Address Resolution Protocol (ARP) G.Bianchi, G.Neglia, V.Mancuso Problem statement Routing decision for packet X has two possible outcomes: You are arrived to the
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationImpact of Controller Placement in an OpenFlow WAN
SCITECH Volume 7, Issue 2 RESEARCH ORGANISATION April 27, 2018 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Impact of Controller Placement in an OpenFlow WAN
More informationThis is the accepted version of a paper presented at The 1st European Workshop on Software Defined Networks (EWSDN).
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at The 1st European Workshop on Software Defined Networks (EWSDN). Citation for the original published paper: Kuzniar,
More information