Browse > Article
http://dx.doi.org/10.7840/kics.2017.42.3.612

Real-Time Classification, Visualization, and QoS Control of Elephant Flows in SDN  

Muhammad, Afaq (Jeju National University Department of Computer Engineering)
Song, Wang-Cheol (Jeju National University Department of Computer Engineering)
Abstract
Long-lived flowed termed as elephant flows in data center networks have a tendency to consume a lot of bandwidth, leaving delay-sensitive short-lived flows referred to as mice flows choked behind them. This results in non-trivial delays for mice flows, eventually degrading application performance running on the network. Therefore, a datacenter network should be able to classify, detect, and visualize elephant flows as well as provide QoS guarantees in real-time. In this paper we aim to focus on: 1) a proposed framework for real-time detection and visualization of elephant flows in SDN using sFlow. This allows to examine elephant flows traversing a switch by double-clicking the switch node in the topology visualization UI; 2) an approach to guarantee QoS that is defined and administered by a SDN controller and specifications offered by OpenFlow. In the scope of this paper, we will focus on the use of rate-limiting (traffic-shaping) classification technique within an SDN network.
Keywords
Elephant Flows; Classification; Detection; Visualization; Floodlight; sFlow; Avior; QoS; Rate-limiting; SDN; Mininet;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 R. Wallner and R. Cannistra, "An SDN approach: Quality of service using big switchs floodlight open-source controller," in Proc. Asia-Pacific Advanced Network, vol. 35, pp. 14-19, Jun. 2013.
2 J. S. Marron, Felix Hernandez-Campos, and F. D. Smith, "Mice and elephants visualization of internet traffic," in Compstat, pp. 47-54, Physica-Verlag HD, 2002.
3 J. Liu, J. Li, G. Shou, Y. Hu, Z. Guo, and W. Dai, "SDN based load balancing mechanism for elephant flow in data center networks," in IEEE 2014 Int. Symp. Wirel. Pers. Multimedia Commun. (WPMC), pp. 486-490, 2014.
4 M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat, "Hedera: Dynamic flow scheduling for data center networks," in NSDI, vol. 10, pp. 19-19, San Jose, California, Apr. 2010.
5 A. R. Curtis, W. Kim, and P. Yalagandula, "Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection," in Proc. IEEE INFOCOM, pp. 1629-1637, 2011.
6 P. Phaal, S. Panchen, and N. McKee, InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks, 2001, Retrieved Nov. 15, 2016, from https://tools.ietf.org/html/rfc3176
7 A. Islam, et al., "Robust software-defined scheme for image sensor network," J. KICS, vol. 41, no. 2, pp. 215-221, Feb. 2016.   DOI
8 inMon sFlow-RT, Retrieved Nov. 13, 2016, from http://www.inmon.com/products/sFlow-RT.php
9 Ian F. Akyildiz, et al., "A roadmap for traffic engineering in SDN-OpenFlow networks," Computer Networks, vol. 71, pp. 1-30, 2014.   DOI
10 M. Chiesa, G. Kindler, and M. Schapira, "Traffic engineering with equal-cost-multipath: An algorithmic perspective," in IEEE INFOCOM 2014-IEEE Conf. Computer Commun., pp. 1590-1598, 2014.
11 Floodlight Is an Open SDN Controller (2013), Retrieved Nov. 22, 2016, from http://www.projectfloodlight.org
12 S. Liu, H. Xu, and Z. Cai, "Low latency datacenter networking: A short survey," arXiv preprint arXiv:1312.3455, 2013.
13 S. U. Rehman, et al., "Network-wide traffic visibility in OF@TEIN SDN testbed using sFlow," IEEE APNOMS, pp. 1-6, Sept. 2014.
14 C. Marist, What is Avior? (2012), Retrieved Nov. 13, 2016, from http://openflow.marist.edu/avior.html
15 P. Ferguson and D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, 1997, Retrieved Dec. 02, 2016 from https://www.ietf.org/rfc/rfc2827.txt
16 S. Tomovic, N. Prasad, and I. Radusinovic, "SDN control framework for QoS provisioning," IEEE TELFOR, pp. 111-114, 2014.
17 J. W. Seo and S. J. Lee, "A study on the detection of DDoS attack using the IP Spoofing," J. Korea Inst. Inf. Secur. and Cryptol., vol. 25, no. 1, pp. 147-153, Feb. 2015.   DOI
18 Mininet (2013, Mar), An Instant Virtual Network on your Laptop (or other PC), Retrieved Oct. 25, 2016, from http://www.mininet.org
19 Iperf: The TCP/UDP Bandwidth Management Tool, Retrieved Nov. 18, 2016, from https://iperf.fr/
20 G. Bang, et al., "A protection method using destination address packet sampling for SYN flooding attack in SDN," J. Korea Multimedia Soc., vol. 18, no. 1, pp. 35-41, Jan. 2015.   DOI