• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xie Shengxu, Xing Changyou, Zhang Guomin, Song Lihua, Hu Guyu. Survey of OpenFlow Switch Flow Table Overflow Mitigation Techniques[J]. Journal of Computer Research and Development, 2021, 58(7): 1544-1562. DOI: 10.7544/issn1000-1239.2021.20200480
Citation: Xie Shengxu, Xing Changyou, Zhang Guomin, Song Lihua, Hu Guyu. Survey of OpenFlow Switch Flow Table Overflow Mitigation Techniques[J]. Journal of Computer Research and Development, 2021, 58(7): 1544-1562. DOI: 10.7544/issn1000-1239.2021.20200480

Survey of OpenFlow Switch Flow Table Overflow Mitigation Techniques

Funds: This work was supported by the National Natural Science Foundation of China (61379149, 61772271) and the China Postdoctoral Science Foundation (2017M610286).
More Information
  • Published Date: June 30, 2021
  • The features of software defined networking (SDN) such as forwarding and control separation, centralized control, and open interfaces make the network flexible and controllable, and its architecture has been fully developed. Due to the good combination with various cloud services, SDN has received a large number of commercial deployments in recent years. In OpenFlow-based SDN architecture, ternary content addressable memory (TCAM) is mostly used on hardware switches to store flow entries installed by the controller in order to achieve such goals as fast lookup of flow entries and mask matching. However, limited by the capacity and price of TCAM, the current commercial OpenFlow switches can store at most tens of thousands of flow entries, which leads to the problem of flow table overflow caused by burst traffic or flow table overflow attacks, which seriously affects the network performance. How to establish an efficient flow table overflow mitigation mechanism has attracted extensive attention from researchers. Firstly, the causes and effects of flow table overflow problem in OpenFlow switch are discussed. On this basis, the current research status of flow table overflow mitigation technology is summarized and compared according to the two situations of burst traffic and attack behavior. Finally, the existing research problems are summarized and analyzed, and the future development direction and challenges are forecasted.
  • Related Articles

    [1]Zu Jiachen, Hu Guyu, Yan Jiajie, Li Shiji. Resource Management of Service Function Chain in NFV Enabled Network: A Survey[J]. Journal of Computer Research and Development, 2021, 58(1): 137-152. DOI: 10.7544/issn1000-1239.2021.20190823
    [2]Zhang Liqing, Guo Dong, Wu Shaoling, Cui Haibo, Wang Wei. An Ultra Lightweight Container that Maximizes Memory Sharing and Minimizes the Runtime Environment[J]. Journal of Computer Research and Development, 2019, 56(7): 1545-1555. DOI: 10.7544/issn1000-1239.2019.20180511
    [3]Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong. Delay-Aware Resource Scheduling Optimization in Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926
    [4]Hao Tingyi, Wu Heng, Wu Guoquan, Zhang Wenbo. Elastic Resource Provisioning Approach for Container in Micro-Service Architecture[J]. Journal of Computer Research and Development, 2017, 54(3): 597-608. DOI: 10.7544/issn1000-1239.2017.20151043
    [5]Yu Ling, Xie Yi, Chen Bihuan, Peng Xin, Zhao Wenyun. Towards Runtime Dynamic Provision of Virtual Resources Using Feedforward and Feedback Control[J]. Journal of Computer Research and Development, 2015, 52(4): 889-897. DOI: 10.7544/issn1000-1239.2015.20131908
    [6]Wang Zhan, Cao Zheng, Liu Xiaoli, Su Yong, Li Qiang, An Xuejun, Sun Ninghui. A Multi-Root I/O Resource Pooling Method Based on Single-Root I/O Virtualization[J]. Journal of Computer Research and Development, 2015, 52(1): 83-93. DOI: 10.7544/issn1000-1239.2015.20131182
    [7]Jin Hai, Deng Li, Wu Song, Shi Xuanhua, and Zhou Like. Automatic Power-Aware Reconfiguration of Processor Resource in Virtualized Clusters[J]. Journal of Computer Research and Development, 2011, 48(7): 1123-1133.
    [8]Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.
    [9]Li Yang, Chen Ningjiang, Jin Beihong, Zuo Lin, Huang Tao. A Self-Management Unit-Based and Differentiated Service-Enable Web Container[J]. Journal of Computer Research and Development, 2007, 44(8): 1418-1428.
    [10]Huang Hua, Zhang Jiangang, Xu Lu. Distributed Layered Resource Management Model in Blue Whale Distributed File System[J]. Journal of Computer Research and Development, 2005, 42(6): 1034-1038.

Catalog

    Article views (879) PDF downloads (470) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return