Skip to main content
Log in

CEOF: Enhanced Clustering-based Entries Optimization scheme to prevent Flow table overflow

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Software-Defined Networking is an advanced networking architecture that decouples the control and data plane for efficient and flexible network administration. The packets are forwarded based on the rules existing in the flow table that resides in the Ternary Content Addressable Memory (TCAM) and plays a key role in packet forwarding. TCAM is prominent for wire-speed processing with certain limitations such as high power consumption, expensive, and limited storage. It creates a serious challenge in terms of scalability where the limited sized flow tables are over-utilized and are easily overflowed during a high traffic rate. The flow table overflow creates blocking of new incoming flows or eviction of existing entries that are accessed by active flows. To overcome these challenges and to provide Quality of Service to the current network design, an entry reduction scheme is proposed using machine learning algorithms. It consists of two phases (1) Detection of overflow by estimating the cardinality of entries in each snapshot of the flow table which is carried out using HyperLogLog. (2) When overflow is detected, immediately the mitigation is carried out by evicting the extravagant entries using Hierarchical Agglomerative Clustering followed by entries optimization of each cluster using Pareto Optimizer. The simulation results proved that the proposed work reduces 99.99% of redundant entries and, 99.98% of increased network throughput with reduced controller overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys and Tutorials, 16(3), 1617–1634.

    Article  Google Scholar 

  2. Kirkpatrick, K. (2013). Software-defined networking. Communications of the ACM, 56(9), 16–19.

    Article  Google Scholar 

  3. Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14–76.

    Article  Google Scholar 

  4. McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., & Turner, J. (2008). OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2), 69–74.

    Article  Google Scholar 

  5. Doria, A., Salim, J. H., Haas, R., Khosravi, H. M., Wang, W., Dong, L., & Halpern, J. M. (2010). Forwarding and Control Element Separation (ForCES) Protocol Specification. RFC, 5810, 1–124.

    Google Scholar 

  6. Enns, R., Bjorklund, M., Schoenwaelder, J., & Bierman, A. (2011). Network configuration protocol (NETCONF).

  7. Open Networking Foundation, “OpenFlow Switch Specification, version 1.5.1”, https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf.

  8. Zimmermann, H. (1980). OSI reference model-the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications, 28(4), 425–432.

    Article  Google Scholar 

  9. Kannan, K., & Banerjee, S. (2013). Compact TCAM: Flow entry compaction in TCAM for power aware SDN. In International conference on distributed computing and networking (pp. 439–444). Berlin, Heidelberg:Springer.

  10. Benson, T., Akella, A., & Maltz, D. A. (2010). Network traffic characteristics of data centers in the wild. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement (pp. 267–280)

  11. Curtis, A. R., Mogul, J. C., Tourrilhes, J., Yalagandula, P., Sharma, P., & Banerjee, S. (2011). DevoFlow: Scaling flow management for high-performance networks. In Proceedings of the ACM SIGCOMM 2011 conference (pp. 254–265).

  12. Kandula, S., Sengupta, S., Greenberg, A., Patel, P., & Chaiken, R. (2009). The nature of data center traffic: measurements and analysis. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement (pp. 202–208).

  13. Vishnoi, A., Poddar, R., Mann, V., & Bhattacharya, S. (2014). Effective switch memory management in OpenFlow networks. In Proceedings of the 8th ACM international conference on distributed event-based systems (pp. 177–188).

  14. Qiao, S., Hu, C., Guan, X., & Zou, J. (2016). Taming the flow table overflow in openflow switch. In Proceedings of the 2016 ACM SIGCOMM Conference (pp. 591–592).

  15. Challa, R., Lee, Y., & Choo, H. (2016). Intelligent eviction strategy for efficient flow table management in openflow switches. In 2016 IEEE NetSoft Conference and Workshops (NetSoft) (pp. 312–318). IEEE.

  16. Guo, Z., Liu, R., Xu, Y., Gushchin, A., Walid, A., & Chao, H. J. (2017). STAR: Preventing flow-table overflow in software-defined networks. Computer Networks, 125, 15–25.

    Article  Google Scholar 

  17. Zhu, H., Fan, H., Luo, X., & Jin, Y. (2015). Intelligent timeout master: Dynamic timeout for SDN-based data centers. In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) (pp. 734–737). IEEE.

  18. Lu, M., Deng, W., & Shi, Y. (2016). TF-IdleTimeout: Improving efficiency of TCAM in SDN by dynamically adjusting flow entry lifecycle. In 2016 IEEE international conference on Systems, Man, and Cybernetics (SMC) (pp. 002681–002686). IEEE.

  19. Leng, J., Zhou, Y., Zhang, J., & Hu, C. (2015). An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network. arXiv preprint arXiv:1504.03095.

  20. Phan, T. V., Hajizadeh, M., Kh\(\grave{a}\)i, N. T., & Bauschert, T. (2019). Destination-aware adaptive traffic flow rule aggregation in software-defined networks. In 2019 international conference on Networked Systems (NetSys) (pp. 1–6). IEEE.

  21. Chao, T. Y., Wang, K., Wang, L., & Lee, C. W. (2017). In-switch dynamic flow aggregation in software defined networks. In 2017 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE.

  22. Leng, B., Huang, L., Qiao, C., Xu, H., & Wang, X. (2017). FTRS: A mechanism for reducing flow table entries in software defined networks. Computer Networks, 122, 1–15.

    Article  Google Scholar 

  23. Luo, S., & Yu, H. (2014). Fast incremental flow table aggregation in SDN. In 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (pp. 1–8). IEEE.

  24. Rifai, M., Huin, N., Caillouet, C., Giroire, F., Moulierac, J., Pacheco, D. L., & Urvoy-Keller, G. (2017). Minnie: An SDN world with few compressed forwarding rules. Computer Networks, 121, 185–207.

    Article  Google Scholar 

  25. Zhao, G., Xu, H., Chen, S., Huang, L., & Wang, P. (2018). Joint optimization of flow table and group table for default paths in SDNs. IEEE/ACM Transactions on Networking, 26(4), 1837–1850.

    Article  Google Scholar 

  26. Nakagawa, Y., Hyoudou, K., Lee, C., Kobayashi, S., Shiraki, O., & Shimizu, T. (2013). Domainflow: Practical flow management method using multiple flow tables in commodity switches. In Proceedings of the ninth ACM conference on Emerging networking experiments and technologies (pp. 399–404).

  27. Wang, C., & Youn, H. Y. (2019). Entry aggregation and early match using hidden Markov model of flow table in SDN. Sensors, 19(10), 2341.

    Article  Google Scholar 

  28. Flajolet, P., Fusy, É., Gandouet, O., & Meunier, F. (2007). Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm.

  29. Rokach, L., & Maimon, O. (2005). Clustering methods. In Data mining and knowledge discovery handbook (pp. 321–352). Boston:Springer

  30. Kochenderfer, M. J., & Wheeler, T. A. (2019). Algorithms for optimization. Cambridge: MIT Press.

    MATH  Google Scholar 

  31. Zhou, Y., Chen, K., Zhang, J., Leng, J., & Tang, Y. (2018). Exploiting the vulnerability of flow table overflow in software-defined network: Attack model, evaluation, and defense. Security and Communication Networks. https://doi.org/10.1155/2018/4760632

    Article  Google Scholar 

  32. Heule, S., Nunkesser, M., & Hall, A. (2013). HyperLogLog in practice: Algorithmic engineering of a state of the art cardinality estimation algorithm. In Proceedings of the 16th international conference on extending database technology (pp. 683–692).

  33. Rivest, R., & Dusse, S. (1992). The MD5 message-digest algorithm

  34. Ibe, O. (2014). Fundamentals of applied probability and random processes. Cambridge: Academic Press.

    MATH  Google Scholar 

  35. Swinscow, T. D. V. (1997). Statistics at square one. Revised by M J Campbell. John Mark Ockerbloom, Southampton.

  36. Zhang, Z., Murtagh, F., Van Poucke, S., Lin, S., & Lan, P. (2017). Hierarchical cluster analysis in clinical research with heterogeneous study population: Highlighting its visualization with R. Annals of Translational Medicine, 5(4), 75.

    Article  Google Scholar 

  37. Zhang, Y., Wu, L., Wang, S., & Huo, Y. (2011). Chaotic artificial bee colony used for cluster analysis. In International conference on intelligent computing and information science (pp. 205–211). Berlin, Heidelberg:Springer.

  38. Zhang, Y., & Li, D. (2013). Cluster analysis by variance ratio criterion and firefly algorithm. International Journal of Digital Content Technology and its Applications, 7(3), 689.

    Article  Google Scholar 

  39. Nallusamy, P., Saravanen, S., & Krishnan, M. (2021). Decision Tree-Based Entries Reduction scheme using multi-match attributes to prevent flow table overflow in SDN environment. International Journal of Network Management, 31(4), e2141. https://doi.org/10.1002/nem.2141

    Article  Google Scholar 

  40. Ryu, S. D. N. (2015). Framework community: Ryu SDN framework. Online. http://osrg.github.io/ryu

  41. Lantz, B., Heller, B., & McKeown, N. (2010). A network in a laptop: rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM workshop on hot topics in networks (pp. 19:1–19:6). ACM.

  42. Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J., et al. (2015). The design and implementation of open vswitch. In 12th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 15) (pp. 117–130).

  43. Petrini, F., & Vanneschi, M. (1997). k-ary n-trees: High performance networks for massively parallel architectures. In Proceedings 11th international parallel pro-cessing symposium. (pp. 87–93).

  44. Dunn, J. C. (1973). A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters. Milton Park: Taylor & Francis.

    Book  Google Scholar 

  45. Poynton, C. (2012). Digital video and HD: Algorithms and interfaces. Amsterdam: Elsevier.

    Google Scholar 

  46. https://www.caida.org/home/

  47. http://mawi.wide.ad.jp/mawi/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Priyanka.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Priyanka, N., Reshmi, T.R. & Murugan, K. CEOF: Enhanced Clustering-based Entries Optimization scheme to prevent Flow table overflow. Wireless Netw 28, 69–83 (2022). https://doi.org/10.1007/s11276-021-02823-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02823-8

Keywords

Navigation