2016 IEEE NetSoft Conference and Workshops (NetSoft) 2016
DOI: 10.1109/netsoft.2016.7502427
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent eviction strategy for efficient flow table management in OpenFlow Switches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 10 publications
0
18
0
2
Order By: Relevance
“…Both types are used to drive the parameter tuning in our emulations to decide on the proper actions needed at each state in order to maximize the long-term accumulated rewards. Our emulation results show an improvement of around 60% in reducing the long-term control overhead, and around 14% increase in the table-hit ratio compared to the Multiple Bloom Filters (MBF) method [9] given a fixed size flow table of 4KB.…”
Section: Introductionmentioning
confidence: 93%
“…Both types are used to drive the parameter tuning in our emulations to decide on the proper actions needed at each state in order to maximize the long-term accumulated rewards. Our emulation results show an improvement of around 60% in reducing the long-term control overhead, and around 14% increase in the table-hit ratio compared to the Multiple Bloom Filters (MBF) method [9] given a fixed size flow table of 4KB.…”
Section: Introductionmentioning
confidence: 93%
“…Similarly, exchanges of messages between switches lack the authentication/encryption mechanism in the SDN data plane [44]. Toward addressing the aforementioned security challenges, efforts were made lately to address several SDN security attacks [46][47][48].…”
Section: Sdn Security Threat and Vulnerabilitiesmentioning
confidence: 99%
“…This is necessary to avoid removing an entry that may be needed in the near future. Alternatively, instead of relying entirely on the flow expiry period, Challa et al [48] proposed to efficiently manage the flow entries in the flow table through intelligent eviction mechanism based on data logging using multiple bloom filters (MBF) data structure to decide flow entry removal. Although the approach made a step further to remove the unused entries.…”
Section: Timeout and Eviction Mechanismsmentioning
confidence: 99%
“…Practically, the size of TCAM-based flow-table in an SDN switch is restricted to a few hundred or at most thousand [11] [12] [13] of entries due to manufacturing cost and high-power consumption. The limited size of the TCAM-based flowtable is not sufficient to manage the massive data flows in a large-scale network, which may result in the flow-table overflow problem [9] [11], and decreases the feasibility to implement a large-scale SDN [14] [15]. But the SDN controller might need to install at least one flow-entry per flow in each switch along the end-to-end path used by the flow to realize per-flow based fine-grained traffic control.…”
Section: Introductionmentioning
confidence: 99%
“…But the SDN controller might need to install at least one flow-entry per flow in each switch along the end-to-end path used by the flow to realize per-flow based fine-grained traffic control. This mechanism will consume the available TCAM space on SDN switches quickly under heavy traffic load conditions [15] [16]. Therefore, as the network scale increases, the available TCAM space will be consumed quickly by all the flow-entries generated during the operation of the SDN network, which will further restrict the network scale and application diversity.…”
Section: Introductionmentioning
confidence: 99%