An Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths
|
|
- Godfrey Kennedy
- 6 years ago
- Views:
Transcription
1 , pp An Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths Dongryeol Kim, Byoung-Dai Lee Kyonggi university, Department of Computer Science, Suwon, Republic of Korea {kdr, Abstract. As essential infrastructure networks become more common in diverse areas, a wide range of services have appeared related to increasing traffic and high-capacity content, though network-management problems have also increased. Because these problems cannot be easily solved within existing networks, new software defined networks (SDNs) technology has appeared. However, when the network becomes too large, the control plane s overhead may increase due to differing device performance within the data plane. This leads to network performance problems because of the characteristics of SDNs, in which the control plane controls management of the entire network. In this paper, problems that occur because of performance differences among the devices that constitute the data plane are explained, and a flow table management scheme able to reduce network overhead, occurring when the controller manages the flow table, is proposed. Keywords: SDN, flow, flow table, flow table replacement. 1 Introduction Networks that develop rapidly have become essential infrastructures, and as networks have become increasingly important in different areas, diverse services have appeared, including representative services such as high-definition streaming and VOD. Network traffic increases as high-capacity content continues to increase, and many difficulties have risen for managing the network. The most popular solution for this problem is the use of SDNs. SDNs divide network structures into control and data planes and centralize network management on control planes [1]. Control planes are enabled to make various packet transmission-related decisions so that new services can be implemented and networks can be efficiently operated in flow units [2], [3]. As the scale of networks and the types and number of network devices increase, constituting a network using the same devices is difficult and may cause problems. For instance, when there is a network consisting of switches containing flow tables in different sizes, flow table replacement occurs in the switches that contain flow tables smaller than the number of all flows occurring in the network. Flows that should be deleted from the table are determined according to the network policy, and new flows are created to revise the table. This process acts as a large overhead on the controller, in terms of network operation, the performance of the entire network will be ISSN: ASTL Copyright 2016 SERSC
2 degraded. Therefore, securing space for additional flow tables reduces the workload of the controller related to deleting flows, which is very important. In this paper, problems that can occur due to differences in the performance of switches that constitute an SDN are examined. A flow table management scheme is proposed to enable efficient use of network resources and minimize delays that occur during packet transmission, by securing space for additional flow to flow tables in networks containing diverse switches. 2 Problem Description In the SDN, when a user operates a network, the network can be configured by adjusting the performance levels of virtual switches to fit the network. If the network is configured and operates with significant differences in the level of performance of virtual switches, the following problems may occur. Fig 1 shows an SDN consisting of switches containing different table sizes. When a flow table is completely filled, as illustrated by switch #3 in Fig 1, to deliver a new input packet without any flow to the table, unnecessary flows should be deleted and newly created flows should be added. Fig. 1. An SDN consisting of switches with different performance levels. When a packet has been entered into a switch, the packet is matched with a flow using flow table look up, and if there is no matching flow, a flow table containing new flows will be created through message exchanges with the controller. Thereafter, a matching flow is found from the flow table to take further action. However, all switches in the moving path of the packet to make new flow table through message exchanges with the controller, overhead such as packet transmission delays and resource waste will occur. Network performance degrades in situations where traffic Copyright 2016 SERSC 89
3 is significantly diverse. Therefore, a method of maintaining network performance during diverse traffic situations is necessary. Traffic patterns can be divided into those that occur in the short run and those that occur repeatedly at certain intervals. Cases in which traffic is terminated after receiving data from multiple servers occur frequently, and deleting flows from the entire packet-moving path is efficient in terms of network performance because the flows are not used again. Cases in which traffic is periodically repeated occur frequently, and if flows are deleted from the entire packetmoving path, the flows should be recreated when packets are entered because the flow will be used again. Therefore, permanently maintaining the flows in the table is efficient in this case because the flows are repeatedly and continuously used, and accordingly, deleting flows from only those switches that have completely filled flow tables is beneficial for network performance. This problem should be solved without fail to ensure network performance in the current situation, where network traffics are rapidly increasing due to the use of high-capacity content. 3 Proposed Scheme The flow table management scheme proposed in this paper secures available spaces in flow tables and reduces network overhead, such as packet transmission delays. It does so by deleting all related flows from the all switches passed by the relevant flow and considers network traffic when flows are deleted during the process of updating. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: Function Flow() while true do packet = nextpacket() flow = searchflow(packet) if no flow then newflow = generateflow(flow) pattern = analysistrafficpattern() if table is full then if pattern == temporary then deleteflow(table) deleteallflow(table) insertflow(newflow) if pattern == periodic then deleteflow(table) insertflow(newflow) flow = searchflow(packet) Action(flow) end Function Fig. 2. Pseudo code of flow table management scheme Fig 2 is the pseudo code of the proposed flow table management scheme. If the packet arrives at the first switch, a flow that matches with the packet will be searched from the flow table (line 3 4). If there is a matching flow, actions that correspond to 90 Copyright 2016 SERSC
4 the flow will be taken, and if there is no matching flow, new flows will be created (line 5 6). Thereafter, traffic patterns will be analyzed (line 7). If flow tables are full (line 8), current traffic will be found, and if additional traffic occurs, one-time (line 9) flows will be selected and deleted according to the flow table replacement algorithm (i.e., LRU, LFU), and all flows related to the deleted flows will also be deleted from the flow tables of switches in the packet moving path. Then, the tables will be updated by adding newly created flow (line 10 12). If the current traffic pattern contains traffic that occurs periodically (line 13), flows will be deleted from only those switches that have completely filled flow tables, and the tables will be updated by adding newly created flow (line 14 15). Thereafter, flows that match the packet will be found from the updated flow tables, and actions that correspond to the flows will be taken (line 16 17). Through this process, the priorities of flows for deletion and traffic patterns should be considered first so that the flow tables can be managed dynamically to fit diverse network situations. Fig 3 shows an SDN network in which all the flow tables of switches with different performance levels have no available space. A path through which packets pass is set as shown in path (1), and the arrows in the dotted lines in Fig 3 indicate communication between the switches and the controller. Fig. 3. An SDN in whitch all the flow tables of individual switches are being used. Src -> switch #1 -> switch #3 -> switch #2 -> dst (1) When a packet enters a switch, if there is no corresponding flow, the flow table should be revised. The number of flow deletions by individual switches through communication with the controller becomes equal to the number of switches with completely filled flow tables in the packet-moving path. In Fig 3, because three switches with completely filled flow tables are in the packet-moving path, the flow table update is repeated three times. Copyright 2016 SERSC 91
5 Fig. 4. An SDN applied with the proposed flow table management scheme. Fig 4 shows an SDN applied with the proposed flow table management scheme in which available spaces are secured in the tables of switches in path (1). If packets occurring one time, pass through path (1), all flows related to the packets will be deleted from all flow tables in path (1). As shown in Fig 3, when a packet arrives at switch 1 through path (1), a flow that corresponds to the packet is searched for in the flow table, and if the relevant flow is not in the table, the controller is requested to create the flow. The controller uses the table replacement algorithm to determine which flow is to be deleted. Then, all flows related to the flow are deleted from switches 3 and 2 so that all available space for adding the flow to path (1) are secured, as shown in Fig 4. Through this process, flow tables are revised in switches 3 and 2 during the packet delivery process without overhead that occur during the process of deleting flows. Using this scheme, the process of deleting flows through communication with controllers is implemented once in switch 1, and this is much more efficient than the existing process. Even in large networks, such as data centers, switches can secure available space through a one-time message exchange, and the network overhead can be reduced. 4 Conclusion and Future Work In this paper, the problem of increased network overhead, occurring due to flow table replacements, was examined. A flow table management scheme able to solve the problem by first securing space in flow tables was proposed. In future research, to verify the performance of the proposed flow table management scheme, the proposed scheme will be applied to environments containing significant network traffic that changes rapidly, to compare and evaluate the scheme s performance with existing flow table management schemes. 92 Copyright 2016 SERSC
6 Acknowledgments. This work is supported by Kyonggi University Research Grant References 1. ONF.: Software-Defined Networking: The New Norm for Networks. ONF White Paper, pp. 7, April Sezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., and Rao, N.: Are We Ready for SDNs? Implementation Challenges for Software-Defined Networks. Communications Magazine, IEEE, vol. 51, no. 7, pp , July Yim, T., Kyung, Y., Nguyen, T.M., Hong, K., and Park, J.: A Fast and Scalable Mobile Flow Management Method for IP-based Mobile Networks. J. KICS, vol. 39B, no. 1, pp. 8 16, January Copyright 2016 SERSC 93
Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network
, pp.106-110 http://dx.doi.org/10.14257/astl.2014.51.25 Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network Backhyun Kim and Iksoo Kim 1 Faculty of Liberal Education, Incheon National
More informationA Survey on Signaling Load in Mobility Management
ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org
More informationDynamic Priority-adjustment for Real-time Flows in Software-defined Networks
Dynamic Priority-adjustment for Real-time Flows in Software-defined Networks Namwon An, Taejin Ha, Kyung-Joon Park, and Hyuk Lim Gwangju Institute of Science and Technology (GIST, Gwangju, Republic of
More informationDelay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment
, pp.42-46 http://dx.doi.org/10.14257/astl.2015.94.10 Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment Rae Hyeon Kim, Jeong Gon Kim 1 Department of Electronic Engineering Korea
More informationA Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System
, pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek
More informationBig Data Service Combination for Efficient Energy Data Analytics
, pp.455-459 http://dx.doi.org/10.14257/astl.2016.139.90 Big Data Service Combination for Efficient Energy Data Analytics Tai-Yeon Ku, Wan-ki Park, Il-Woo Lee Energy IT Technology Research Section Hyper-connected
More informationA study on improvement of evaluation method on web accessibility automatic evaluation tool's <IMG> alternative texts based on OCR
, pp.162-166 http://dx.doi.org/10.14257/astl.2015.113.33 A study on improvement of evaluation method on web accessibility automatic evaluation tool's alternative texts based on OCR Eunju Park 1,1,
More informationThe Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
More informationA study on accessibility to mobile websites - Centering on public institution mobile websites in Korea -
, pp.140-144 http://dx.doi.org/10.14257/astl.2013 A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea - Eunju Park 1-1, Yangwon Lim 1, Hankyu Lim 1 1
More informationArchitecture for QoS-enabled Application Service Deployment in Virtualized Environment
, pp.121-125 http://dx.doi.org/10.14257/astl.2016.142.22 Architecture for QoS-enabled Application Service Deployment in Virtualized Environment Hyun-Min Yoon, Zeqi Liu, Woo-Suk Yang, Jung-Ho Kim and Jae-Oh
More informationMapping Mechanism to Enhance QoS in IP Networks
Mapping Mechanism to Enhance QoS in IP Networks by Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru in The 32nd International Conference on Information Networking (ICOIN 2018)
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationEAI Endorsed Transactions
EAI Endorsed Transactions on Research Article Software-Defined Network Testbed Using ZodiacFX a Hardware for Fahad Nazir 1 *, Qazi Humayun 2, R Badlishah Ahmad 3, Shamsul Jamel Elias 4 1,2 University Malaysia
More informationFrequency-based NCQ-aware disk cache algorithm
LETTER IEICE Electronics Express, Vol.11, No.11, 1 7 Frequency-based NCQ-aware disk cache algorithm Young-Jin Kim a) Ajou University, 206, World cup-ro, Yeongtong-gu, Suwon-si, Gyeonggi-do 443-749, Republic
More informationA Configurable Packet Classification Architecture for Software- Defined Networking
A Configurable Packet Classification Architecture for Software- Defined Networking Guerra Pérez, K., Yang, X., Scott-Hayward, S., & Sezer, S. (2014). A Configurable Packet Classification Architecture for
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationA Mobile Agent Platform for Supporting Ad-hoc Network Environment
International Journal of Grid and Distributed Computing 9 A Mobile Agent Platform for Supporting Ad-hoc Network Environment Jinbae Park, Hyunsang Youn, Eunseok Lee School of Information and Communication
More informationDistributed Video Systems Chapter 3 Storage Technologies
Distributed Video Systems Chapter 3 Storage Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 3.1 Introduction 3.2 Magnetic Disks 3.3 Video
More informationSecurity Research for Software Defined Network
, pp.87-93 http://dx.doi.org/10.14257/astl.2016.134.15 Security Research for Software Defined Network 1 Jianfei Zhou, 2 Na Liu 1 Admission and Employment Office, Chongqing Industry Polytechnic College
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationA Packet-Based Caching Proxy with Loss Recovery for Video Streaming
A Packet-Based Caching Proxy with Loss Recovery for Video Streaming Kuan-Sheng Hsueh and Sheng-De Wang Department of Electrical Engineering, National Taiwan University {kshsueh, sdwang}@hpc.ee.ntu.edu.tw
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationEfficient Resource Management for the P2P Web Caching
Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationA study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment
, pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationCausal Order Multicast Protocol Using Different Information from Brokers to Subscribers
, pp.15-19 http://dx.doi.org/10.14257/astl.2014.51.04 Causal Order Multicast Protocol Using Different Information from Brokers to Subscribers Chayoung Kim 1 and Jinho Ahn 1, 1 Dept. of Comp. Scie., Kyonggi
More informationThe Design and Implementation of a BLE-based WebD2D Service for Android Smartphone
, pp.1-5 http://dx.doi.org/10.14257/astl.2017.146.01 The Design and Implementation of a BLE-based WebD2D Service for Android Smartphone Do-Hyung Kim 1, Seok-Jin Yoon 1, Hyung-Seok Lee 1 and Jae-Ho Lee
More informationDistributed Mobility Control for Mobile-Oriented Future Internet Environments
Distributed Mobility Control for Mobile-Oriented Future Internet Environments Ji-In Kim Kyungpook National University Daegu, KOREA jiin16@gmail.com Heeyoung JUNG ETRI Daejon, KOREA hyjung@etri.re.kr Seok
More informationThe Functional User Requirement Analysis of a Web Broadcasting Management System
The Functional User Requirement Analysis of a Web Broadcasting Management System Gyeyoung Lee, Jaegeol Yim Dept. of Computer Engineering, Dongguk University at Gyeongju Korea {lky, yim}@dongguk.ac.kr Abstract.
More informationA Study on Multi-resolution Screen based Conference Broadcasting Technology
2 : (Young-ae Kim et al.: A Study on Multi-resolution Screen based Conference Broadcasting Technology) (Special Paper) 23 2, 2018 3 (JBE Vol. 23, No. 2, March 2018) https://doi.org/10.5909/jbe.2018.23.2.253
More informationOpen Access Mobile Management Method for SDN-Based Wireless Networks
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-Based Wireless Networks Min
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy
More informationOptimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing
, pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,
More informationApplication of SDN: Load Balancing & Traffic Engineering
Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection
More informationMobile Management Method for SDN-based Wireless Networks
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-based Wireless Networks Min
More informationA Design of Building Group Management Service Framework for On-Going Commissioning
, pp.84-88 http://dx.doi.org/10.14257/astl.2014.49.18 A Design of Building Group Management Service Framework for On-Going Commissioning Taehyung Kim 1, Youn Kwae Jeong 1 and Il Woo Lee 1, 1 Electronics
More informationAn Efficient Routing Protocol with Multihop in Ad-hoc Sensor Network in SDN Environment
ISBN 978-93-84422-80-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-2017) Pattaya (Thailand) Dec. 28-29, 2017 An Efficient Routing Protocol
More informationA Study on the IoT Sensor Interaction Transmission System based on BigData
Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young
More informationA Load Balancing Scheme for Games in Wireless Sensor Networks
, pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,
More informationRemote Direct Storage Management for Exa-Scale Storage
, pp.15-20 http://dx.doi.org/10.14257/astl.2016.139.04 Remote Direct Storage Management for Exa-Scale Storage Dong-Oh Kim, Myung-Hoon Cha, Hong-Yeon Kim Storage System Research Team, High Performance Computing
More informationA Study on Mobile Commerce AAA Mechanism for Wireless LAN *
A Study on Mobile Commerce AAA Mechanism for Wireless LAN * Gwanyeon Kim 1, Chinu Lee 1, Sehyun Park 1 **, Ohyoung Song 1, and Byungho Jung 2 1 School of Electrical and Electronic Engineering, Chung-Ang
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationLightweight caching strategy for wireless content delivery networks
Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,
More informationA Design of Authentication Protocol for a Limited Mobile Network Environment
Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationMultimedia Caching Strategy Based on Popularity in Mobile Ad-Hoc Network
, pp.173-182 http://dx.doi.org/10.14257/ijmue.2015.10.4.17 Multimedia Caching Strategy Based on Popularity in Mobile Ad-Hoc Network Backhyun Kim * and Iksoo Kim ** 1 * Faculty of Liberal Education, Incheon
More informationDesign of Self-Adaptive System Observation over Internet of Things
, pp.165-171 http://dx.doi.org/10.14257/astl.2015.117.39 Design of Self-Adaptive System Observation over Internet of Things Young-Joo Kim 1, Jong-Soo Seok 1, Moon Soo Lee 1, Jeong-Si Kim 1, and YungJoon
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationDelay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet
Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering
More informationA Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks
, pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo
More informationAvailable online at ScienceDirect. Procedia Computer Science 56 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 266 270 The 10th International Conference on Future Networks and Communications (FNC 2015) A Context-based Future
More informationA Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking
A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking Dongjin Hong, Jinyong Kim, and Jaehoon (Paul) Jeong Department of Electrical and Computer Engineering, Sungkyunkwan
More informationAndroid App for Smooth Multimedia Recording Service via the Frame Buffer
, pp.46-51 http://dx.doi.org/10.14257/astl.2014.51.11 Android App for Smooth Multimedia Recording Service via the Frame Buffer Sang-Min Seo 1, Hyeon seok Oh 1, Yoon-Ho Choi 2 1 Department of Computer Science,
More informationDetermination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS
Vol. (Architecture and Civil Engineering 2), pp.8-22 http://dx.doi.org/.42/astl.2..2 Determination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS Joon
More informationA Virtual-Synchronized-File Based Privacy Protection System
Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System
More informationDesign of a Processing Structure of CNN Algorithm using Filter Buffers
, pp.37-41 http://dx.doi.org/10.14257/astl.2016.129.08 Design of a Processing Structure of CNN Algorithm using Filter Buffers Kwan-Ho Lee 1, Jun-Mo Jeong 2, Jong-Joon Park 3 1 Dept. of Electronics and
More informationAn Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-
, pp.321-326 http://dx.doi.org/10.14257/astl.2013.29.68 An Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-
More informationAnalysis of Virtual Machine Scalability based on Queue Spinlock
, pp.15-19 http://dx.doi.org/10.14257/astl.2017.148.04 Analysis of Virtual Machine Scalability based on Queue Spinlock Seunghyub Jeon, Seung-Jun Cha, Yeonjeong Jung, Jinmee Kim and Sungin Jung Electronics
More informationInterference Management Scheme for Wireless Sensor Network
, pp.64-69 http://dx.doi.org/0.4257/astl.204.46.5 Interference Management Scheme for Wireless Sensor Network Sangmi Moon, Saransh Malik, Bora Kim, Hun Choi, Jinsul Kim, Cheolhong Kim, and Intae Hwang Dept.
More information* Hyun Suk Park. Korea Institute of Civil Engineering and Building, 283 Goyangdae-Ro Goyang-Si, Korea. Corresponding Author: Hyun Suk Park
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.47-59 Determination of The optimal Aggregation
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationAdaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks
Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationAn Adaptive Congestion Avoidance ACA_AODV Routing Protocol
An Adaptive Congestion Avoidance ACA_AODV Routing Protocol Paing Thwe Soe, and Soe Soe Khaing Abstract Congestion is the major problem in network communication that decreases network performance and throughput.
More informationTowards Secure Virtual Machine Migration in Vehicular Cloud Environment
, pp.85-89 http://dx.doi.org/10.14257/astl.2014.66.21 Towards Secure Virtual Machine Migration in Vehicular Cloud Environment Nkenyereye Lewis and Kyung Hyune Rhee 1 1 Department of IT Convergence and
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationMobile Edge Computing for 5G: The Communication Perspective
Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng
More informationAn Improvement of the Occlusion Detection Performance in Sequential Images Using Optical Flow
, pp.247-251 http://dx.doi.org/10.14257/astl.2015.99.58 An Improvement of the Occlusion Detection Performance in Sequential Images Using Optical Flow Jin Woo Choi 1, Jae Seoung Kim 2, Taeg Kuen Whangbo
More informationFast distribution of Data in Wireless Sensor Network using Concurrency Operation
Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Geetha N, Janani V Abstract Wireless Sensor Network can be applied in verity of applications in real time. Efficient data
More informationEnergy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks
Energy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks L. Sridhara Rao, 2 Dr. Md. Ali Hussain Research Scholar, Dept. of Computer Science,
More informationMobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6
Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Taihyong Yim, Tri M. Nguyen, Youngjun Kim and Jinwoo Park School of Electrical Engineering Korea University Seoul, Rep. of Korea
More information2018. Fast network congestion detection and avoidance using P4.
ABSTRACT Belma Turkovic Delft University of Technology B.Turkovic-2@tudelft.nl Niels van Adrichem TNO niels.vanadrichem@tno.nl Along with exciting visions for 5G communications and the Tactile Internet,
More informationPERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK
I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationTrajectory Planning for Mobile Robots with Considering Velocity Constraints on Xenomai
, pp.1-5 http://dx.doi.org/10.14257/astl.2014.49.01 Trajectory Planning for Mobile Robots with Considering Velocity Constraints on Xenomai Gil Jin Yang and Byoung Wook Choi *, Seoul National University
More informationFreeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks
, pp.187-191 http://dx.doi.org/10.14257/astl.2014.63.41 Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks Hyeon-Jin Jeong 1, Seung-Sik Choi 1 1 Computer Engineering Department,
More informationImproving Energy Efficiency of Block-Matching Motion Estimation Using Dynamic Partial Reconfiguration
, pp.517-521 http://dx.doi.org/10.14257/astl.2015.1 Improving Energy Efficiency of Block-Matching Motion Estimation Using Dynamic Partial Reconfiguration Jooheung Lee 1 and Jungwon Cho 2, * 1 Dept. of
More informationOnline Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1.
, pp.1-10 http://dx.doi.org/10.14257/ijmue.2014.9.1.01 Design and Implementation of Binary File Similarity Evaluation System Sun-Jung Kim 2, Young Jun Yoo, Jungmin So 1, Jeong Gun Lee 1, Jin Kim 1 and
More informationRobot localization method based on visual features and their geometric relationship
, pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department
More informationPerformance Analysis of UGS and BE QoS classes in WiMAX
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 7 (2013), pp. 805-810 Research India Publications http://www.ripublication.com/aeee.htm Performance Analysis of UGS and
More informationDomain Level Page Sharing in Xen Virtual Machine Systems
Domain Level Page Sharing in Xen Virtual Machine Systems Myeongjae Jeon, Euiseong Seo, Junghyun Kim, and Joonwon Lee CS Division, Korea Advanced Institute of Science and Technology {mjjeon,ses,joon}@calabkaistackr
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationAnalysis of Quality of Service for IPTV in the Republic of Macedonia
Analysis of Quality of Service for IPTV in the Republic of Macedonia Kostandina Veljanovska Department of Intelligent Systems, Faculty of ICT, University St. KlimentOhridski - Bitola ABSTRACT Quality-of-Service
More informationDistributed Mobility Control Schemes in the HIP-based Mobile Networks
ICACT Transactions on Advanced Communications Technology (TACT) Vol. 2, Issue 4, July 2013 269 Distributed Mobility Control Schemes in the HIP-based Mobile Networks Sang-Il Choi, Seok-Joo Koh School of
More informationFault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks Jinho Ahn 1 1 Dept. of Computer Science, College of Natural
More informationImproving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks
Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s
More informationPerformance of Optical Burst Switching Techniques in Multi-Hop Networks
Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,
More informationDistributed Mobility Management in Proxy Mobile IPv6 using Hash Function
Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function Ji In Kim School of Computer Science and Engineering Kyungpook National University Daegu, Korea jiin16@gmail.com Seok Joo Koh School
More informationCommon Service Discovery Scheme in IoT Environments
, pp.28-32 http://dx.doi.org/10.14257/astl.2018.149.07 Common Service Discovery Scheme in IoT Environments Joosang Youn 1 * and TaeJin Lee 2 1 Dept. of Industrial ICT Engineering, Dong-Eui University 176,
More informationAn Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network
An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,
More informationProceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) SDN Flow Caching
Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) 2016 SDN Flow Caching N.B.U.S. Nanayakkara, R.M.L.S. Bandara, N.B. Weerasinghe, S,N, Karunarathna Department of Computer
More informationAutomatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud
, pp.43-47 http://dx.doi.org/10.14257/astl.2014.67.11 Automatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud Ashok Kumar Patil, Seong Sill Park, Pavitra Holi,
More informationSDN-Based Network Security Functions for VoIP and VoLTE Services
SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationLayered Self-Identifiable and Scalable Video Codec for Delivery to Heterogeneous Receivers
Layered Self-Identifiable and Scalable Video Codec for Delivery to Heterogeneous Receivers Wei Feng, Ashraf A. Kassim, Chen-Khong Tham Department of Electrical and Computer Engineering National University
More informationCentralization of Network using Openflow Protocol
Indian Journal of Science and Technology, Vol 8(S2), 165 170, January 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS2/61217 Centralization of Network using Openflow
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationidash: improved Dynamic Adaptive Streaming over HTTP using Scalable Video Coding
idash: improved Dynamic Adaptive Streaming over HTTP using Scalable Video Coding Yago Sánchez, Thomas Schierl, Cornelius Hellge, Thomas Wiegand - Fraunhofer HHI, Germany Dohy Hong - N2N Soft, France Danny
More information