Detecting Heavy Flows in the SDN Match and Action Model
نویسندگان
چکیده
Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN matchand-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN match and action model, (b) how to detect large flows efficiently and in a scalable way, in the SDN model. Our large flow detection methods provide high accuracy and present a good and practical tradeoff between switch controller traffic, and the number of entries required in the switch flow table. Based on different parameters, we differentiate between heavy flows, elephant flows and bulky flows and present efficient algorithms to detect flows of the different types. Additionally, as part of our heavy flow detection scheme, we present sampling methods to sample packets with arbitrary probability p per packet or per byte that traverses an SDN switch. Finally, we show how our algorithms can be adapted to a distributed monitoring SDN setting with multiple switches, and easily scale with the number of monitoring switches.
منابع مشابه
LPM: Layered Policy Management for Software-Defined Networks
Software-Defined Networking (SDN) as an emerging paradigm in networking divides the network architecture into three distinct layers such as application, control, and data layers. The multi-layered network architecture in SDN tremendously helps manage and control network traffic flows but each layer heavily relies on complex network policies. Managing and enforcing these network policies require...
متن کاملType systems for SDN Controllers
Software-defined networking (SDN) offers unprecedented control over network operation, allowing network operators programmatic control over switches’ forwarding behavior. In the compass-rose metaphor for networks, an SDN controller sends commands that modify switches’ forwarding tables (so-called flowmods), queues, counters, etc., by means of the southbound API. Several different southbound API...
متن کاملCompact TCAM: Flow Entry Compaction in TCAM for Power Aware SDN
High throughput access to large data structures for lookup and classification have made Ternary Content Addressable Memory (TCAM) indispensable in today’s network switching devices. TCAMs offer single cycle lookup operation but at the expense of notoriously high power dissipation. While there is no suitable alternative to TCAM for maintaining line rate lookup, high power dissipation of TCAM hav...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملDamage identification of structures using second-order approximation of Neumann series expansion
In this paper, a novel approach proposed for structural damage detection from limited number of sensors using extreme learning machine (ELM). As the number of sensors used to measure modal data is normally limited and usually are less than the number of DOFs in the finite element model, the model reduction approach should be used to match with incomplete measured mode shapes. The second-order a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1702.08037 شماره
صفحات -
تاریخ انتشار 2017