2020
DOI: 10.1007/s11704-018-8048-2
|View full text |Cite
|
Sign up to set email alerts
|

Proactive eviction of flow entry for SDN based on hidden Markov model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Flowmaster [31] uses a learning predictor based on the Markov model to identify ow entries expected to become idle and evicts an existing ow entry based on the number of transitions and transition probability using the time-out mechanism. A proactive approach is proposed based on predicting the probability of matching entries using HMM [32]. The scheme in [33] employs HMM and fuzzy logic to select the victim entry proactively.…”
Section: A Flow Evictionmentioning
confidence: 99%
“…Flowmaster [31] uses a learning predictor based on the Markov model to identify ow entries expected to become idle and evicts an existing ow entry based on the number of transitions and transition probability using the time-out mechanism. A proactive approach is proposed based on predicting the probability of matching entries using HMM [32]. The scheme in [33] employs HMM and fuzzy logic to select the victim entry proactively.…”
Section: A Flow Evictionmentioning
confidence: 99%
“…Some of them use machine learning models as well to predict the rules for eviction. One of the first ever works that use historical data for eviction in SDN flow tables is discussed in Huang et al 19 Another earliest technique named Flow Master was proposed by Kannan and Banerjee 20 that uses Markov model‐based prediction to pro‐actively evict dead flows. A hardware prototype was implemented in the NetFPGA platform.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Because our network is softwarebased, switches cannot manipulate it in case of high overload which is the same as the aggregation, and they usually operate on broadcasting principles. The base paper used a tree pattern and on the switches in the ow tables, receiving, storing and sending messages used a hierarchical pattern [10], [11].…”
Section: Introductionmentioning
confidence: 99%