• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zuo Qingyun, Chen Ming, Ding Ke, Xing Changyou, Zhang Guomin, Xu Bo. Eliminating Redundant Control Messages in OpenFlow Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2448-2457. DOI: 10.7544/issn1000-1239.2014.20130852
Citation: Zuo Qingyun, Chen Ming, Ding Ke, Xing Changyou, Zhang Guomin, Xu Bo. Eliminating Redundant Control Messages in OpenFlow Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2448-2457. DOI: 10.7544/issn1000-1239.2014.20130852

Eliminating Redundant Control Messages in OpenFlow Networks

More Information
  • Published Date: October 31, 2014
  • The data plane of OpenFlow networks sends packets which don’t match any flow entry to the controller, and in such case connectionless burst traffic is encapsulated as control messages, until the data plane receives a response message from the controller. This process produce redundant control messages for both the control and data planes, which influences the performance of the entire network. However, current OpenFlow protocol doesn’t give definite explanation or handle this problem. In this paper, we propose two approaches of eliminating redundant control messages on the control plane (referred as ERCMC) and on the data plane (referred as ERCMD). ERCMC constructs latest packet-in message view (referred as LPMV) on the controller to mark the latest packet-in messages, so as to eliminate redundant control messages on the control plane. ERCMD adds marks directly on the data plane, so that the burst packets are directly buffered and never encapsulated as control messages. We implement these two approaches in NOX and Open vSwitch respectively, and evaluate the performance of the two approaches. The results of our experiments show that ERCMC can eliminate redundant control messages, but it will add extra processing overheads; ERCMD can not only eliminate redundant control messages, but also alleviate the load of the controller and OpenFlow switches.
  • Related Articles

    [1]Zhang Wenjun, Jiang Liangxiao, Zhang Huan, Chen Long. A Two-Layer Bayes Model: Random Forest Naive Bayes[J]. Journal of Computer Research and Development, 2021, 58(9): 2040-2051. DOI: 10.7544/issn1000-1239.2021.20200521
    [2]Wang Fei, Yue Kun, Sun Zhengbao, Wu Hao, Feng Hui. Analyzing Rating Data and Modeling Dynamic Behaviors of Users Based on the Bayesian Network[J]. Journal of Computer Research and Development, 2017, 54(7): 1488-1499. DOI: 10.7544/issn1000-1239.2017.20160556
    [3]Zhu Kenan, Yin Baolin, Mao Yaming, Hu Yingnan. Malware Classification Approach Based on Valid Window and Naive Bayes[J]. Journal of Computer Research and Development, 2014, 51(2): 373-381.
    [4]Wang Mei, Liao Shizhong. Three-Step Bayesian Combination of SVM on Regularization Path[J]. Journal of Computer Research and Development, 2013, 50(9): 1855-1864.
    [5]Si Guannan, Ren Yuhan, Xu Jing, and Yang Jufeng. A Dependability Evaluation Model for Internetware Based on Bayesian Network[J]. Journal of Computer Research and Development, 2012, 49(5): 1028-1038.
    [6]Tian Junfeng and Tian Rui. A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System[J]. Journal of Computer Research and Development, 2011, 48(6): 974-982.
    [7]Zhu Mingfang, Tang Changjie, Dai Shucheng, Chen Yu, Qiao Shaojie, Xiang Yong. Nave Gene Expression Programming Based on Genetic Neutrality[J]. Journal of Computer Research and Development, 2010, 47(2): 292-299.
    [8]Qian Ning, Wu Guoxin, and Zhao Shenghui. A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2009, 46(6): 889-897.
    [9]Miao Duoqian, Wang Ruizhi, and Ran Wei. A Dynamic Bayesian Network Based Framework for Continuous Speech Recognition and its Token Passing Model[J]. Journal of Computer Research and Development, 2008, 45(11): 1882-1891.
    [10]Xu Junming, Jiang Yuan, and Zhou Zhihua. Bayesian Classifier Based on Frequent Item Sets Mining[J]. Journal of Computer Research and Development, 2007, 44(8): 1293-1300.

Catalog

    Article views (1211) PDF downloads (745) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return