Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

schemes (OWL-API and Jena) linearly increases with increase in the ow table size.

For the HTCD algorithm: 1) The hash search time is constant, 2) The radix trie search and the Intersection Matrix evaluation time increases linearly with the ow table size and hence the total search time also increases linearly as shown in Figure 8. For larger ow table sizes, the query time for HTCD algorithm performs better than the ontology based techniques. On the average case, the OWLAPI based technique is 8.5% faster than the HTCD technique and 4% faster than the Jena based model in determining the ow conicts. 2) Memory: The memory requirement for the three techniques were evaluated and is shown in Figure 9. The total memory required for all the three techniques (HTCD, OWLAPI and Jena) linearly increases with increase in the ow table size. The results prove our analysis in Section IV-A2. On the average case, the HTCD has 6.5% less memory requirement than the OWL-API scheme and 4.5% less memory requirement than the Jena scheme. From the above analysis and our experimentation results we see that for efcient search time requirements, the OWL-API based ontology model performs the best and for limited memory constraints, the HTCD based algorithm performs better. V. R ELATED W ORK Future Internet architectures are being actively explored in the networking research community [10]. Network virtualization is at the core of many proposed solutions [1] and prototypes that are being developed [11]. OpenFlow is a potential substrate for such a future Internet [3]. The problem of managing ows within OpenFlow has received attention in related work [12]. Reference [13] addresses the requirement of ow-based policy languages and policy representations. [14] shows the exibility of decoupling policy and conguration using OpenFlow. Such solutions dene ow-based policies and emphasize the requirement of expressive policy specication languages to maintain consistency. FlowChecker [15] proposes a verication tool to determine OpenFlow ow table miscongurations using a Binary Decision Diagram. Improved ow matching schemes have been proposed using FPGAbased techniques [16]. A conict detection technique for multidimensional rule sets have been explored for packet classication in general [17]. However, the fundamental problem of avoiding hidden, conicting ow entries due to wildcard elds in a single ow table has not yet been addressed in the context of ow-based virtualized networks. Our work provides a practical solution to this problem. VI. C ONCLUSION To support future Internet architectures, control over routing of individual ows or ow aggregates is essential. OpenFlow provides a useful substrate for managing network trafc at the ow-level. With a move toward network virtualization, it is important that parallel OpenFlow controllers do not introduce conicts into the ow tables of OpenFlow switches. In our work, we have identied this problem of hidden conicts. We

present multiple methodologies for identifying and resolving the conicts. We observe a performance trade-off between the proposed techniques. The ontology based technique (OWLAPI) performs better in the initialization time, while the hash-trie algorithm performs better in the query time. The performance evaluation of our mechanisms show that we can effectively determine ow conicts with low time and space complexities. Thus, our work can solve a key management problem in any ow-based virtualized network and ensure correct network-level operation of a virtualized network infrastructure. R EFERENCES
[1] T. Anderson, L. Peterson, S. Shenker, and J. Turner, Overcoming the Internet impasse through virtualization, Computer, vol. 38, no. 4, pp. 3441, Apr. 2005. [2] T. Wolf, In-network services for customization in next-generation networks, IEEE Network, vol. 24, no. 4, pp. 612, Jul. 2010. [3] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, OpenFlow: enabling innovation in campus networks, SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 6974, Apr. 2008. [4] OpenFlow Switch Specication Version 1.0, OpenFlow Switch Consortium, Dec. 2010. [5] R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar, Flowvisor: A network virtualization layer, Department of Computer Science, Stanford University, Technical Report, 2009. [6] P. Gupta and N. McKeown, Algorithms for packet classication, IEEE Network, vol. 15, no. 2, pp. 2432, Mar. 2001. [7] F. Baader, Description logic terminology, in The Description Logic Handbook: Theory, Implementation, and Applications, F. Baader, D. Calvanese, D. McGuinness, D. Nardi, and P. F. Patel-Schneider, Eds. Cambridge University Press, 2003, pp. 485495. [8] S. Kumar and P. Crowley, Segmented hash: an efcient hash table implementation for high performance networking subsystems, in Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), Princeton, NJ, Oct. 2005. [9] D. E. Taylor and J. S. Turner, Classbench: A packet classication benchmark, IEEE/ACM Transactions on Networking, vol. 15, no. 3, pp. 499511, Sep. 2007. [10] A. Feldmann, Internet clean-slate design: what and why? SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 5964, Jul. 2007. [11] Global Environment for Network Innovation, National Science Foundation, http://www.geni.net/. [12] J. C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, A. R. Curtis, and S. Banerjee, Devoow: Cost-effective ow management for high performance enterprise networks, in Proc. of The Ninth ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), Montreal, CA, Oct. 2010. [13] T. L. Hinrichs, N. Gude, M. Casado, J. C. Mitchell, and S. Shenker, Expressing and enforcing ow-based network security policies, Department of Computer Science, University of Chicago, Technical Report, 2008. [14] N. Feamster, A. Nayak, H. Kim, R. Clark, Y. Mundada, A. Ramachandran, and M. bin Tariq, Decoupling policy from conguration in campus and enterprise networks, in Proc. of the 17th IEEE Workshop on Local and Metropoliton Area Networks (LANMAN), Long Branch, NJ, May 2010, pp. 16. [15] E. Al-Shaer and S. Al-Haj, Flowchecker: conguration analysis and verication of federated openow infrastructures, in Proc. of the 3rd ACM workshop on Assurable and usable security conguration (SafeCong), Chicago, IL, Oct. 2010. [16] W. Jiang, V. Prasanna, and N. Yamagaki, Decision forest: A scalable architecture for exible ow matching on fpga, in Proc. of the 20th IEEE International Conference on Field Programmable Logic and Applications (FPL), Milano, Italy, Aug. 2010. [17] F. Baboescu and G. Varghese, Fast and scalable conict detection for packet classiers, in Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, nov. 2002, pp. 270 279.

You might also like