An Algorithm for Dynamic SDN Controller in Data Centre Networks

Similar documents
A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

Mobile Ad-hoc Networks - Analysis of Dynamic Channel Allocation and Load Balancing

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Routing Protocols in MANET: Comparative Study

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Enhancing Security in MANET Using CCRVC Scheme

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Cluster based certificate revocation For mobile ad hoc networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

Figure 1. Clustering in MANET.

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

Routing Protocols in MANETs

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Improving QoS in Multicasting Through Adaptive Redundancy

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Power aware Multi-path Routing Protocol for MANETS

Performance Evaluation of Various Routing Protocols in MANET

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

All Rights Reserved 2017 IJARCET

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Packet Estimation with CBDS Approach to secure MANET

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Performance Evaluation of MANET through NS2 Simulation

Mobile Agent Driven Time Synchronized Energy Efficient WSN

A Literature survey on Improving AODV protocol through cross layer design in MANET

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

A Review Paper on Routing Protocols in Wireless Sensor Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Challenges in Mobile Ad Hoc Network

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Mobile Communications. Ad-hoc and Mesh Networks

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Efficient Certificate Revocation with Vindication Capability for Mobile Ad-Hoc Networks

SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS. X.Xiang X.Wang Y.Yang

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

3. Evaluation of Selected Tree and Mesh based Routing Protocols

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Enhancing Security in MANET using Integral Component Cluster-Based Certificate Revocation with Vindication Capability

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

Comprehensive Study and Review Various Routing Protocols in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Performance Analysis and Enhancement of Routing Protocol in Manet

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Figure 1: Ad-Hoc routing protocols.

Fig. 2: Architecture of sensor node

AVC College of Engineering, Mayiladuthurai, India

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Subject: Adhoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Cluster Based Certificate Revocation Scheme in Mobile Ad Hoc Networks

Catching BlackHole Attacks in Wireless Sensor Networks

Computation of Multiple Node Disjoint Paths

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SUMMERY, CONCLUSIONS AND FUTURE WORK

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Multicasting in ad hoc networks: Energy efficient

Survey on Multicast Routing Protocols in MANETs

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Efficient Use of Resources in Mobile Ad Hoc Networks

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

2013, IJARCSSE All Rights Reserved Page 85

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

Effects of Caching on the Performance of DSR Protocol

Arvind Krishnamurthy Fall 2003

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

Ad Hoc Networks: Issues and Routing

Comparative Study of Routing Protocols in MANET

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Time Synchronization in Wireless Sensor Networks: CCTS

Performance Analysis of MANET Routing Protocols OLSR and AODV

Webpage: Volume 4, Issue VI, June 2016 ISSN

Transcription:

IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1 (Ug Student, Department Of Ece, Dhanalakshmi Srinivasan College Of Engg&Tech, Chennai), 2 (Ug Student, Department Of Ece, Dhanalakshmi Srinivasan College Of Engg&Tech, Chennai), 3 (Associate Professor, Department Of Ece, Dhanalakshmi Srinivasan College Of Engg&Tech, Chennai) Abstract:The Geographic And Opportunistic Routing With Depth Adjustment Based Topology Control For Communication Recovery Over Void Regions Uses The Greedy Opportunistic Forwarding To Route Packets And To Move Void Nodes To New Depths To Adjust The Topology. Simulation Results Shown That MANET Outperforms The Baseline Solutions In Terms Of Packet Delivery Ratio, Latency And Energy Per Message. The Objective Of The Topology Control Algorithm Is To Adjust The Transmission Power To Minimize Interference Taking Into Account The Delay Constraint Also To Find The Duplicate Data. To Minimize The Delay For Transmission Of Data. In Opportunistic Routing, Each Packet Is Broadcast To A Forwarding Set Composed Of Several Neighbours. The Packet Will Be Retransmitted Only If None Of The Neighbours In The Set Receives It. Opportunistic Routing Can Work Together With Geographic Routing And Improve Data Delivery. Keywords- AODV Algorithm, Cluster Forming, Data Centre Networks, Reliable Minimum Energy Routing, Software Defined Networks. I. Introduction We Propose Two Novel Energy-Aware Routing Algorithms For Wireless Ad Hoc Networks, Called Reliable Minimum Energy Cost Routing (RMECR) And Reliable Minimum Energy Routing (RMER). RMECR Addresses Three Important Requirements Of Ad Hoc Networks Energy-Efficiency, Reliability, And Prolonging Network Lifetime. It Considers The Energy Consumption And The Remaining Battery Energy Nodes As Well As Quality Of Links To Find Energy-Efficient And Reliable Routes That Increase The Operational Lifetime Of The Network. RMER, On The Other Hand, Is An Energy-Efficient Routing Algorithm Which Finds Routes Minimizing The Total Energy Required For End-To-End Packet Traversal. RMER And RMECR Are Proposed For Networks In Which Either Hop-By-Hop Or End-To-End Retransmissions Ensure Reliability. Simulation Studies Show That RMECR Is Able To Find Energy-Efficient And Reliable Routes Similar To RMER, While Also Extending The Operational Lifetime Of The Network. This Makes RMECR An Elegant Solution To Increase Energy-Efficiency, Reliability, And Lifetime Of Wireless Ad Hoc Networks. A Mobile Ad Hoc Network (MANET) Further Considers Node Mobility Within The Ad Hoc Setting. Efficient Use Of Resources And Adaption Are Vital In Order To Create A High Performance MANET. This Dissertation Addresses The Efficient Use Of Network Resources To Obtain The Desired Quality Of Service And Performance In Manets. II. Related Work 2.1 Medium Access Control In Manets In Wireless Communication, The Goal Of The Medium Access Control (MANET) Protocol Is To Effectively Utilize The Wireless Medium, Which Is A Limited Resource. This Approach Uses A Soft Cluster Formation Approach Where The Clustering Mechanism Is Utilized Only For Providing Channel Access To Member Nodes. Hence, Each Node Is Capable Of Communicating Directly With Every Other Node Provided That They Are Within Communication Range Of Each Other. 2.2 MH-TRACE Summary In This Work, We Analyse The Performance Of Soft Clustering Protocols To Determine How To Best Set Their Parameters For Efficient Use Of The Channel Resources. Specifically, We Analyse The MH-TRACE Protocol. Here We Briefly Explain The Clustering Mechanisms Of MH-TRACE. In MH-TRACE, Time Is Divided Into Super Frames Of Equal Length, Where The Super Frame Is Repeated In Time And Further Divided Into Frames. Each Frame In The Super Frame Is Further Divided Into Sub-Frames. The Control Sub- Frame Constitutes The Management Overhead. Beacon, Cluster Announcement (CA), And Header Slots Of The Control Sub-Frame Are Used By The Chs, Whereas Contention Slots And Information Summarization (IS) 4 Page

Slots Are Used By The Ordinary Nodes. At The Beginning Of The Frame, The CH Announces Itself To The Nearby Nodes By Sending A Beacon Message In The Beacon Slot Of The Control Sub-Frame. 2.3 Routing In Manets Routing Makes Use Of The Clustering Structure. The Protocol Sends A Copy Of Each Data Packet To All Of The (Cluster Heads) Chs, And The Chs Retransmit These Packets To Their Cluster Members. Each Data Session Starts With An Initial Flooding Stage Where Each Rebroadcasting Node Implicitly Acknowledges Its Upstream Node Through IS Packets As A Part Of Its Transmission. In The Case Of The Existence Of More Than One Upstream Node, Only One Of Them Is Selected And Announced In The Downstream Nodes IS Packet. III. Proposed Work 3.1 Introduction Our Proposed Considers Energy Efficiency, Reliability, And Prolonging The Network Lifetime In Wireless Ad Hoc Networks Holistically. We Propose A Novel Energy-Aware Routing Algorithm, Called Reliable Minimum Energy Cost Routing (RMECR). RMECR Finds Energy Efficient And Reliable Routes That Increase The Operational Life Time Of The Network. In The Design Of RMECR, We Use An In-Depth And Detailed Analytical Model Of The Energy Consumption Of Nodes. RMECR Is Proposed For Networks With Hop-By-Hop (HBH) Retransmissions Providing Link Layer Reliability, And Networks With E2E Retransmissions Providing E2E Reliability. HBH Retransmission Is Supported By The Medium Access Control (MANET) Layer To Increase Reliability Of Packet Transmission Over Wireless Links. Nevertheless, Some MANET Protocols Such As CSMA And MANETA May Not Support HBH Retransmissions. In Such A Case, E2E Retransmission Could Be Used To Ensure E2E Reliability. Changes In The Node Distribution And Packet Generation Patterns Result In A Non-Uniform Load Distribution. Similar To Cellular Systems, Coordinated MANET Protocols Need Specialized Spatial Reuse And Channel Borrowing Mechanisms That Address The Unique Characteristics Of Manets In Order To Provide As High Bandwidth Efficiency As Their Uncoordinated Counterparts. We Incorporate These Two Algorithms For Managing Non-Uniform Load Distribution In Manets Into The MH-TRACE Framework. Although MH-TRACE Incorporates Spatial Reuse, It Does Not Provide Any Channel Borrowing Or Load Balancing Mechanisms And Thus Does Not Provide Optimal Support To Dynamically Changing Conditions And Non-Uniform Loads. Hence, We Apply The Dynamic Channel Allocation And Cooperative Load Balancing Algorithms To MH-TRACE, Creating The New Protocols Of DCA-TRACE, CMH-TRACE And The Combined CDCA-TRACE. CDCA-TRACE Is A Novel MANET Protocol That Maintains The Same Energy Efficiency And Channel Regulation Principles Of MH-TRACE While Enabling Dynamic And Scalable Channel Assignment In Addition To Cooperative Load Balancing. Instead Of Message Exchanges Between The Channel Regulators (Chs), CDCA-TRACE Utilizes Spectrum Sensing To Keep Track Of Channel Usage In Nearby Clusters. This Feature Minimizes The Overhead Found In Dynamic Channel Allocation Schemes For Cellular Networks And Makes CDCA-TRACE Suitable For Manets. CDCA-TRACE Also Incorporates Cooperation Among The Member Nodes To Improve The Distribution Of The Load Among The Chs And Complements Dynamic Channel Allocation To Enhance The Service Rate. The Contributions Of The Chapter Are: I) We Propose A Light Weight Dynamic Channel Allocation Scheme For Cluster-Based Mobile Ad Hoc Networks; Ii) We Propose A Cooperative Load Balancing Algorithm; Iii) We Incorporate These Two Algorithms Into Our The TRACE Framework Leading To DCA-TRACE And CMH-TRACE; And Iv) We Combine Both Algorithms Leading To CDCA-TRACE That Provides Better Support For Non-Uniform Load Distributions. 3.2 Bandwidth Efficiency Techniques For Coordinated MANET Protocol The First Mechanism That We Propose Is A Dynamic Channel Allocation (DCA) Algorithm Similar To The Ones That Exist In Cellular Systems. Under Non-Uniform Loads, It Is Crucial For The MANET Protocol To Be Flexible Enough To Let The Unused Bandwidth Be Allocated To The Controllers In The Heavily Loaded Region(S). Cellular Systems Usually Handle Channel Allocation Through Message Exchanges Between The Cell Towers. However, These Messages Would Be Too Costly For A MANET System Due To The Highly Dynamic Behavior Of The Network. Instead, We Adopt A Dynamic Channel Borrowing Scheme That Utilizes Spectrum Sensing. In This Algorithm, The Channel Controllers Continuously Monitor The Power Level In All The Available Channels In The Network And Assess The Availability Of The Channels By Comparing The Measured Power Levels With A Threshold. If Local Load Increases Beyond Local Capacity, Provided That The 5 Page

Measured Power Level Is Low Enough, The Channel Coordinator Starts Using The Channel With The Lowest Power Level Measurement. Once The Channel Coordinator Starts Using The Channel, Its Transmission Increases The Power Level Measurement Of That Channel For Nearby Controllers, Which In Turn Prevents Them From Accessing The Same Channel. Similarly, As The Local Network Load Decreases, Controllers That Do Not Need Some Channels Stop The Transmissions In That Channel, Making It Available For Other Controllers. In This Dynamic Channel Allocation Algorithm, Channel Coordinators React To The Increasing Local Network Load By Increasing Their Share Of Bandwidth. Although Being Effective In Providing Support For Non-Uniform Network Loads, The Reactive Response Taken By The Channel Coordinators Increases The Interference In The Entire. IV. System Design Analysis 4.1 System Architecture 4.2 Data Flow Diagram 4.3 Sequence Diagram A Sequence Diagram Is An Interaction Diagram That Shows How Processes Operate With One Another And In What Order. It Is A Construct Of A Message Sequence Chart. A Sequence Diagram Shows Object Interactions Arranged In Time Sequence. It Depicts The Objects And Classes Involved In The Scenario And The Sequence Of Messages Exchanged Between The Objects Needed To Carry Out The Functionality Of The Scenario. Sequence Diagrams Are Typically Associated With Use Case Realizations In The Logical View Of The System Under Development. Sequence Diagrams Are Sometimes Called Event Diagrams Or Eventscenarios. sender Router Receiver 1: send data 2: Allocate the channel and check the any overload occure or not 3: overload occured channel is to be dynamicaly changed 4: after send data to receiver 5: send data 6 Page

V. Physical Security Technologies 5.1 Cluster Formation Nodes Cooperate To Form Clusters, And Each Cluster Consists Of A CH Along With Some Cluster Members (Cms) Located Within The Transmission Range Of Their CH. While A Node Takes Part In The Network, It Is Allowed To Declare Itself As A CH. In This Model, If A Node Proclaims Itself As A CH, It Propagates A CH Hello Packet (CHP) To Notify Neighboring Nodes Periodically. The Nodes That Are In This CH s Transmission Range Can Accept The Packet To Participate In This Cluster As Cluster Members. On The Other Hand, When A Node Is Deemed To Be A CM, It Has To Wait For CHP. Upon Receiving CHP, The CM Replies With A CM Hello Packet (CMP) To Set Up Connection With The CH. Afterward, The CM Will Join This Cluster; Meanwhile, CH And CM Keep In Touch With Each Other By Sending CHP And CMP. 5.2 Certification Authority Before Nodes Can Join The Network, They Have To Acquire Valid Certificates From The CA, Which Is Responsible For Distributing And Managing Certificates Of All Nodes, So That Nodes Can Communicate With Each Other Unrestrainedly In A MANET. The CA Is Also In Charge Of Updating Two Lists, WL And Blacklist, Which Are Used To Hold The Accusing And Accused Nodes Information, Respectively. Concretely, The BL Is Responsible For Holding The Node Accused As An Attacker, While The WL Is Used To Hold The Corresponding Accusing Node. The CA Updates Each List According To Received Control Packets. Note That Each Neighbor Is Allowed To Accuse A Given Node Only Once. 5.3 Certificate Revocation To Revoke A Malicious Attacker s Certificate, We Need To Consider Three Stages, The Revocation Procedure Begins At Detecting The Presence Of Attacks From The Attacker Node. Then, The Neighboring Node Checks The Local List BL To Match Whether This Attacker Has Been Found Or Not. If Not, The Neighboring Node Casts The Accusation Packet (AP) To The CA. After That, Once Receiving The First Arrived Accusation Packet, The CA Verifies The Certificate Validation Of The Accusing Node: If Valid, The Accused Node Is Deemed As A Malicious Attacker To Be Put Into The BL. Meanwhile, The Accusing Node Is Held In The WL. Finally, By Broadcasting The Revocation Message Including The WL And BL Through The Whole Network By The CA, Nodes That Are In The BL Are Successfully Revoked From The Network. VI. Conclusion In This Project We Have Not Investigated The Effects Of Upper Layers Such As The Routing Layer, And Instead Focused On The MANET Layer Capability And Local Broadcasting Service. Packet Routing Has A Significant Impact On The Load Distribution. Local Link Layer Broadcasting Service Is Directly Used By Some Routing Algorithms Such As Network Flooding. Moreover, It Can Be Used Alongside With Network Coding And Simultaneous Transmission Techniques For Cooperative Diversity.In General, Joint Optimization Of The MANET And Routing Layers May Enable Even More Efficient Solutions. Investigation Of The Effects Of Routing Is Left As Future Work. REFERENCES [1]. Bora Karaoglu, Tolga Numanoglu, And Wendi Heinzelman. Analytical Performance Of Soft Clustering Protocols. Ad Hoc Networks, 9(4):635 651, 2011. [2]. H. Liu, X. Chu, Y.-W. Leung, And R. Du, Minimum-Cost Sensor Placement For Required Lifetime In Wireless Sensor-Target Surveillance Networks, IEEE Trans. Parallel Distrib. Syst., Vol. 24, No. 9, Pp. 1783 1796, Sep. 2012. 7 Page

[3]. D. Yang, S. Misra, X. Fang, G. Xue, And J. Zhang, Two-Tiered Constrained Relay Node Placement In Wireless Sensor Networks: Computational Complexity And Efficient Approximations, IEEE Trans. Mobile Comput., Vol. 11, No. 8, Pp. 1399 1411, Aug. 2012. [4]. T. Numanoglu, B. Tavli, And W. B. Heinzelman. The Effects Of Channel Errors On Coordinated And Non-Coordinated Medium Access Control Protocols. In Proceedings Of IEEE International Conference On Wireless And Mobile Computing, Volume 1, Pages 58 65, Aug 2014. 261. 8 Page