Beruflich Dokumente
Kultur Dokumente
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
Abstract—This paper proposes a scheme to reduce the number A conventional database and software system are diffi-
of flow entries permanently stored in an OpenFlow switch and cult to process the gigantic amount of both structured and
the number of configuration messages from a controller in a unstructured data set. Big data is a topic to meet those
software-defined network (SDN). In SDN, a flow table in an
OpenFlow switch is used to instruct packets. The flow table requirements. Three definitions are classified for the big data
consists of flow entries decided by the controller. A flow request is [4]. (i) “Volume”: the size of data is in several petabytes
sent from the OpenFlow switch to the controller if the incoming since it is collected from several sources, such as machine-
packet does not match any flow entry in the flow table. The to-machine data and social media. (ii) “Velocity”: operation
controller’s central processing unit (CPU) may be overloaded to in an almost real-time manner is required. (iii) “Variety”: the
handle user requests since the user requests for different data
types have been rapidly increasing. As a result, flow configuration format of the data is in several types. Not only the social media
in switches is delayed. Moreover, the control plane may be uses the big data, but also banking, Internet of things (IoT),
flooded by configuration messages of those requests. A scheme to online shopping, etc. [5] - [7]. Applications of big data cannot
permanently keep the flow entries in the switch can reduce the be accomplished without an accurate network control due to
number of requests. However, a large number of permanent flow an enormous data and complicated computation.
entries is required. Other switch features may be degraded since
not enough memory in the flow table to implement those features. Software-defined networking (SDN) allows all network
In the proposed scheme, switches in the network are divided components to be controlled by a centralized control platform
into multiple regions. In order to guide packets from sources to and intelligent management capabilities in network program-
destinations, the flow table incorporating with the concept of two ming to dynamically and flexibly control the routing [8].
multiprotocol label switching (MPLS) tags is re-designed. One OpenFlow is a well-known protocol for SDN, allowing the
tag directs a packet from a source switch to an edge switch in
the destination region. The other tag directs the packet from that controller to interact with the data plane of the switch and to
edge switch to another switch in the same region. A mathematical adjust the network [9]. The forwarding instruction is based on
model for the proposed scheme is formulated as an integer linear a flow entry defined by a set of specific parameters.
programming to determine a set of switches in each region so By combining SDN and big data topics, the performance of
that the total number of permanent flow entries in the network the network may be improved [10] - [12]. SDN has advantages
can be minimized. The performance of the proposed scheme is
analyzed. Moreover, the proposed scheme is implemented and from the global perspective of the network. It can extremely
demonstrated via Japanese Science Information Network 5. facilitate big data transmission, storage, and processing. For
instance, dynamic resource allocation to big data applications
to meet service level agreements can improve the performance
I. I NTRODUCTION of SDN-based data centers, compared to traditional data cen-
ters. On the other hand, the central controller can acquire
Recently, the use of social media is dramatically increasing
information from multiple layers, share them among different
because smart devices are easy to get. The people produce the
layers so that the network performance can be improved.
information of their daily activities from their devices from
However, network design becomes complicated. Using big
anyplace and anytime. In addition, a few organizations utilize
data analytics can help the design and operation in SDN.
the social media to connect with their clients. The information
There are some problems with joining big data and SDN,
in the network becomes plainly tremendous. For instance,
such as controller management and scalability of intelligent
Facebook has 1.038 billion active users per day [2]. 40,000
flow table/rule management [13]. The performance of the
queries are executed in every second to the operational data
network may be degraded since flow entries are frequently
store. 100 queries peak throughput and 100 billion rows scan-
updated, and huge transmission requests are needed to be
ning with the most response times in a second in Facebook’s
processed. More processing is needed in the network controller
fast slice-and-dice data store is operated [3].
when the network size is enlarged. Switches in the SDN
Manuscript received Jun 29, 2017; revised xxxxxxx. network do not have a control plane. Incoming packets are
∗ The authors are with the Department of Computer and Network Engineer- forwarded as decisions from the controller. A packet is sent
ing, University of Electro-Communications, Chofugaoka 1-5-1 Tokyo 182- to ask the instruction to the controller if the packet does not
8585 Japan.
† Kyoto University, Kyoto, Japan match any flow in the flow table. Hereafter, this packet is called
‡ The authors are with National Institute of Informatics 2-1-2 Hitotsubashi, a request. If the design of the flow table in the forwarding plane
Chiyoda-ku, Tokyo 101-8430 Japan. is not appropriate, a huge number of requests may be received
Parts of this paper were partially presented at IEEE Conference on
Standards for Communications and Networking (CSCN2016) [1]. by the controller. Therefore, in order to reduce the flooding of
Email:kitsuwan@uec.ac.jp the request, it is necessary to design an appropriate flow table.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
SW A SW E
has an individual region ID number, which is specified in the
Match Action Match Action
outer tag to indicate the destination region. A switch in the
IP_dst=10.2.2.1 Output=5 IP_dst=10.2.2.1 Output=4
IP_dst=10.1.3.1 Output=3 IP_dst=10.1.3.1 Output=5
same region has an individual switch ID number, which is
IP_dst=10.2.1.1 Output=5 IP_dst=10.2.1.1 Output=1 specified in the inner tag to indicate the destination switch.
IP_dst=10.1.2.1 Output=2 IP_dst=10.1.2.1 Output=5 Switches are able to have the same switch ID number if they
SW B SW F
Match Action Match Action are in the different region. At least one of the switches in
IP_dst=10.2.1.1 Output=4 IP_dst=10.1.3.1 Output=2
each region functions as an inter-region switch to connect the
IP_dst=10.1.2.1 Output=1 IP_dst=10.2.2.1 Output=1
region with other regions. This switch is called an edge switch.
SW C SW G A switch that is not connected to another region is called a
Match Action Match Action
non-edge switch. An outer MPLS tag guides packets from a
IP_dst=10.2.2.1 Output=3 IP_dst=10.2.3.1 Output=1
source switch to an edge switch of the destination region. An
IP_dst=10.1.3.1 Output=1 IP_dst=10.2.4.1 Output=4
SW D SW H inner MPLS tag guides the packets from the edge switch of
Match Action Match Action the destination region to the destination switch. The outer and
IP_dst=10.2.3.1 Output=2 inner tags are statically predefined for each pair of source and
Total number of permanent flow entries = 0 flow. IP_dst=10.2.4.1 Output=1 destination. They are kept in the database of the controller.
Total number of configuration messages = 18 messages.
Figure 5 illustrates an operation of two tags utilization. Once a
packet arrives at the switch S in the region RA and no any flow
Fig. 4. Example of flow entries for NPF scheme. entry matches the packet, the switch S sends a packet in to
the controller. The controller obtains and an outer tag 501, an
Inner Outer inner tag 102, and an output port from the database. It replies
102 501
this information as a configuration message to the switch S.
102 501 102 The switch S translates the configuration message into a flow
501 102 entry to add two MPLS tags in the packet header. After the
packet is forwarded to the output port of the switch S, the
S Edge Edge D outer tag 501 is used to route the packets from the switch S
to an edge switch in the region RB . The edge switch of the
Region RA Region RB region RB pop the outer tag 501, and forwards the packet to
an output port using as an instruction of a permanent flow in
the switch. The inner tag 102 is used to route the packets from
Fig. 5. Concept of utilizing two MPLS tags.
the edge switch of the region RB to the destination switch,
D, in the same region. The switch D pop the inner tag 102
zero. Configuration messages that are sent from the controller and forwards the packet to an output port. It should be noted
to switches along the path include a destination IP address as that the same inner tag can be reused to route the packets in
match field and an output port as action field. One configura- the different region.
tion message is converted into a flow entry by a switch. Two Let us consider the network scalability using the MPLS
flow entries are required for bidirectional transmission in each tags. An MPLS packet format contains a 20-bit label value.
switch for each pair of source and destination. For example, This number supports up to 1,0488,576 pairs of source and
the first two flow entries in switch A are for H1 ↔ H2, and destination. In the proposed HPF scheme, the maximum
the last two flow entries are for H3 ↔ H4. The total number number of regions where the edge nodes are connected as a
of configuration messages from the controller is 18 messages full mesh topology, for the worst case, is 3,239. The number
in this scenario. of hosts in each region where they are connected as a full
mesh topology is also 3,239. The HPF scheme supports more
number of regions and hosts in other topologies.
IV. P ROPOSED HYBRID PERMANENT FLOW SCHEME Both non-permanent and permanent flow entries are used
The proposed scheme, called a hybrid permanent flow in the HPF scheme. For a new request, a non-permanent flow
(HPF) scheme, adopts a concept of two MPLS tags, outer and entry, obtained from the controller, is installed at only the
inner tags, and employs both permanent and non-permanent first switch on the path. Match field of the non-permanent
flow entries. The permanent flow entries are permanently flow entry specifies the destination IP address. Action field
installed in every switch before starting a network operation. pushes two MPLS tags and specifies an output port of the
If a packet does not match any flow entry, the switch requests switch. A permanent flow entry is classified into three cate-
a configuration message, as a non-permanent flow entry, from gories. The first category is a flow entry for the local switch
the controller. A flow table is redesigned to support two MPLS communication. The local switch communication refers to a
tags. The number of configuration messages required for a communication between a switch and a host who has a direct
new request for a pair of source and destination is reduced, link to the switch. Three permanent flow entries are needed
compared to the NPF scheme. In addition, the number of for this category. (i) match field specifies IP address of a
permanent flow entries is reduced, compared to the PF scheme. destination host, and action field indicates an output port. (ii)
The HPF scheme divides switches in the network into match field specifies its own switch ID number as an inner
multiple groups. Each group is called a region. Each region tag, and action field pop the inner tag and resubmit the flow
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
H6
10.1.4.1
H4 10.2.4.1 the other matches a destination IP address. The total number
#1 10.2.1.1 #1
H1 104 104 of permanent flow entries for all the non-edge switches is 12.
10.1.3.1 #4 D #2 #4 H
#2 #3 #4 #1 #2 #3 #2 Therefore, the number of permanent flows in the network is
#1 103 #3 #3 101 #5 #5 101 #3 #4 103
C #4 A E #3 G 26. Six configuration messages are required for three requests
#3 #2 #1 #4 #2 #1
#2 102 #4 10.1.1.1
#3
#2 102 #4
H5
in this scenario.
Region ID B F 10.2.3.1
#1 #1
501
Region ID
H3
10.1.2.1
Edge switch H2
10.2.2.1
502 A. Mathematical formulation
Non-edge switch
We formulate the optimization problem that minimizes the
a) Example of network topology
SW A SW E
number of permanent flow entries in the hybrid permanent
Match Action Match Action flow (HPF) scheme as an integer linear programming (ILP)
MPLS=501 Strip_MPLS,resubmit(,0) MPLS=501 Output=5
MPLS=502 Strip_MPLS,resubmit(,0)
problem to determine the set of switches in each region. The
MPLS=502 Output=5
IP_dst=10.1.1.1 Output=1 IP_dst=10.2.1.1 Output=1 given inputs are the set of switches S and the set of edges
(,0) (,0) connecting them E. The preset routing paths are also given
MPLS=102 Output=2 MPLS=102 Output=4 i
MPLS=103 Output=3 MPLS=103 Output=3
with rsd equal to 1 if the path from source s to destination
MPLS=104 Output=4 MPLS=104 Output=2 d passes through node i, and 0 otherwise. For the purpose of
SW B From controller
IP_dst=10.1.2.1 Push_MPLS=102,
SW F the formulation, we consider the maximum number of regions
Match Action Match Action
MPLS=102 Strip_MPLS,
Push_MPLS=501,
MPLS=102 Strip_MPLS, as given, and define K = 1, · · · , |K| as the set of possible
Output=5
resubmit(,0) resubmit(,0)
IP_dst=10.2.1.1 Push_MPLS=101,
regions.
IP_dst=10.1.2.1 Output=1 IP_dst=10.2.2.1 Output=1
SW C
Push_MPLS=502,
SW G
The used decision variables are described as follows. Binary
Output=4
Match Action Match Action variable fik defines the region k in which switch i is in. It is set
MPLS=103 Strip_MPLS, IP_dst=10.1.3.1 Push_MPLS=103,
MPLS=103 Strip_MPLS,
resubmit(,0) Push_MPLS=501,
resubmit(,0) to 1 if switch i is in region k, and 0 otherwise. Binary variable
pji identifies the flow for local region communication. It is set
Output=2
IP_dst=10.1.3.1 Output=1 IP_dst=10.2.3.1 Output=1
SW D IP_dst=10.2.2.1 Push_MPLS=102,
SW H
Match Action
Push_MPLS=502,
Match Action
to 1 if switch i registers a flow destined to switch j within the
Output=3
MPLS=104 Strip_MPLS, MPLS=104 Strip_MPLS, same region, and 0 otherwise. Binary variable hki is defined to
resubmit(,0) IP_dst=10.2.4.1 Push_MPLS=104, resubmit(,0)
IP_dst=10.1.4.1 Output=1 Output=4
IP_dst=10.2.4.1 Output=1
identify the inter-region flows. It is set to 1 if switch i register
IP_dst=10.2.3.1 Push_MPLS=103, a flow destined to a region k, which does not include i, and
Output=2 Inter-region
is located in the local switch. One flow entry defines an The sum of entries for local switch over all switches is given
output port for inter-region. 14 number of permanent flows by ∑
are required at all the edge switches. Each non-edge switch ei + v + u, (3)
consists of two flow entries. One matches an inner tag, and i∈S
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
∑
where i∈S ei adds a flow entry to each edge switch to pop
the outer tags destined within its region. v adds a flow entry Host 1 …
…
to each edge switch to pop the inner tags destined within its
switch, where v = |S|. u adds flow entries to each switch to
Host H
forward the packet to its hosts, where u = H × |S|.
The overall number of permanent flow entries is given by …
∑∑ j ∑ ∑ ∑
pi + hki + ei + v + u. (4) Region i
i∈S j∈S i∈S k∈K i∈S
…
We formulate the HPF problem to minimize the number of
permanent flow entries as follows:
…
∑∑ ∑∑ ∑
min pji + hki + ei (5a)
i∈S j∈S i∈S k∈K i∈S Edge switch …
Subject to Non-edge switch Host (SR2)H Host (SR2)H–H+1
∑
fik = 1, ∀ i ∈ S (5b)
k∈K Fig. 7. Network topology for analysis.
fsk + fdk − fik < 2, ∀ k ∈ K, s, d, i ∈ S, rsd
i
= 1 (5c)
fik + fjl ≤ 1 + ei , ∀ (i, j) ∈ E, k ̸= l ∈ K (5d)
are both in region k (fik = 1 and fjk = ∑ 1). Eq. (5g) forces qk to
xdi ≥ 1, ∀ s, d, i ∈ S (5e) 1 if region k includes atleast a switch ( i∈S fik > 0). Eq. (5h)
fik + fjk j
≤ 1 + yi , ∀ i, j ∈ S, k ∈ K (5f) forces zik to 1 if switch i is not in region k (1 − fik = 1) and
∑ region k is not empty (qk = 1).
fik ≤ (|S| + 1) × qk , ∀ k ∈ K (5g)
Eqs. (5i) and (5j) defines the decision variables pji and hki .
i∈S
Eq. (5i) ensures that pji is forced to 1 if switches i and j are in
qk − fik ≤ zik , ∀ i ∈ S, k ∈ K (5h)
j j j
the same region (yij = 1) and switch i needs to register flow
xi + yi ≤ 1 + pi , ∀ (i, j) ∈ E (5i) for traffic destined to switch j passing through it (xji = 1).
xji + zik ≤ 1 + hki , ∀ (i, j) ∈ E, k ∈ K (5j) Eq. (5j) ensures that hki is forced to 1 if switch i is needed to
pji , xji , yij = {0, 1}, ∀ i, j ∈ S (5k) register flow for traffic destined to an outer region k which is
not empty (xji = 1 and zik = 1). pji and hki are minimized to
fik , hki , zik = {0, 1}, ∀ i ∈ S, k ∈ K (5l) 0 by objective function in the cases they are not forced to 1.
ei = {0, 1}, ∀ i ∈ S (5m)
qk = {0, 1}, ∀ k ∈ K. (5n)
V. N UMBER OF FLOW ENTRIES AND CONFIGURATION
MESSAGES ANALYSIS
The constraints to the HPF formulation are that (i) each The purpose of this work is to reduce the number of
switch is in one and only one region, (ii) switches that share permanent flow entries and configuration messages required
the same region connect to each other through paths within the for source and destination pairs when there is a communication
region, and (iii) switches which have at least a link leading request between the source and the destination. Comparisons
to another region are edge switches. These constraints are of those numbers of the PF, NPF, and HPF schemes are
formulated with Eqs. (5b), (5c) and (5d), respectively. Eq. (5b) reported. A topology in Fig. 7 is used for the analysis since it is
ensures that a switch fik is set to 1 for each switch i in one easy to conduct the analytical study. The topology consists of
and only one region k. Eq. (5c) ensures that if source and R × R regions connected as a grid topology. In each region,
destination switches s and d share a region, then any node in S switches are connected as a mesh topology. Each switch
their path should be in the same region. Eq. (5c) forces fik to connects to H hosts.
1 if fsk and fdk are equal to 1. Eq. (5d) identifies edges (i, j)
that have one end i in a region k (fik = 1 and the other end
j on a another region l (fjl = 1), and denotes switch i as an A. PF scheme analysis
edge switch by forcing ei to 1. Eq. (5d) ensures that if fik = 1 The total number of flow entries required for the network
and fjl = 1 then ei = 1, ei is set to 0 otherwise due to the is the sum of the flow entries required for all pairs of source
minimize objective function. and destination. Let TnP F , TeP F , and TrP F be the number of
Eqs. (5e)-(5h) set the binary variable which are used to permanent flow entries per non-edge switch, edge switch, and
linearize our formulation. Eq. (5e) forces xdi to 1 if switch i is region, respectively, in the PF scheme. Let F P F be the total
on a path to switch d. Eq. (5f) forces yij to 1 if switches i and j number of required permanent flow entries in the network for
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
− 1)
0 6
TrP F = TeP F + TnP F (S (7) 4
12
TeP F = (R − 1) + (S − 1) + H
2
(8) 2
5
150
7
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
Controller HOST_Hokkaido
192.168.0.35
OpenFlow switch OVS_Hokkaido
ID 101
Connection between regions
Connection in the same region
OVS_Osaka OVS_Tokyo
HOST_Osaka ID 102 ID 101
192.169.0.9 HOST_Tokyo
192.168.0.14
Fig. 11. Dependency of number of hosts per switch in term of total number Region 502
of flows (R = 4, S = 4). CTRL
Fukuoka
considered. Parameters R = S = H = 4 are always assumed, Fig. 13. Topology and requests for experiment.
unless otherwise stated.
We firstly evaluate the performance of all schemes in terms
of the total number of permanent flows, which is counted after schemes increases with H. In the case of H = 2, the number
initial flow configuration is completed. It should be noted that of permanent flows of the HPF scheme is 62% lower than that
the total number of permanent flows in the network of the of the PF scheme. It is reduced by 48%, approximately, when
NPF scheme is zero for every H, R, and S. Therefore, only H = 8.
the performance of the PF and HPF schemes will be explained. Second, we investigate the number of configuration mes-
Figure 9 shows the dependency of R in term of the number sages when there are requests for source and destination pairs.
of permanent flows in the network. The number of permanent 10,000 pairs of source and destination are randomly generated
flows of the HPF scheme is less than that of the PF scheme. In for the simulation. The number of configuration messages is
the case of R = 2, the HPF scheme has 35% of the number counted every 1,000 pairs for each scheme. It should be noted
of permanent flows lower than the PF scheme. The number that the performance of the PF scheme in this investigation
of permanent flows in the HPF scheme is reduced up to 70% will not be discussed because no configuratioin message is
when R = 8. needed in the PF scheme. Figure 12 shows the dependency
The dependency of S in term of the number of permanent of the number of requests in term of the number of con-
flows is shown in Fig. 10. The number of permanent flows figuration messages. The number of configuration messages
of the HPF scheme is lower than that of the PF scheme. of the HPF scheme is 81% lower than that of the NPF
It increases with the growth of S. In the case of S = 2, scheme. The result shows that the HPF scheme maintains
the number of permanent flows of the HPF scheme is 35% more number of requests than the NPF scheme in case of the
lower than that of the PF scheme. It is reduced by 70%, same number of configuration messages. For instance, the NPF
approximately, when S = 8. The result indicates that lesser scheme maintains only 2,000 requests, while the proposed
than 50% of the number of permanent flows is achieved when HPF scheme maintains 10,000 requests with the same number
S ≥ 3. of configuration messages.
Figure 11 shows the dependency of H in term of the number
of permanent flows in the network. The number of permanent VII. D EMONSTRATION
flows of the PF scheme is higher than that of the proposed HPF The implemented HPF scheme is demonstrated via Science
scheme. The number of permanent flows of both PF and HPF Information Network 5 (SINET5) [15], [16], which is provided
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
TABLE I
I NFORMATION OF VM S FOR DEMONSTRATION .
Machine name Location IP address
HOST Hokkaido Hokkaido 192.168.0.35
HOST Tokyo Tokyo 192.168.0.14
HOST Osaka Osaka 192.168.0.9
OVS Hokkaido Hokkaido 10.0.0.34
OVS Tokyo Tokyo 10.0.0.15
Fig. 14. Database structure. OVS Osaka Osaka 10.0.0.7
CTRL Fukuoka 10.0.0.24
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
10
Match field
In_port
IP protocol
Destination IP
Instruction Fig. 18. Ping request packets from HOST Tokyo to HOST Osaka.
PUSH MPLS
MPLS Label
Output port
Fig. 19. Packet in from HOST Hokkaido to HOST Osaka.
Fig. 17. Configuration message for HOST Tokyo to HOST Osaka. [5] H. M. Chen, R. Schütz, R. Kazman, and F. Matthes, “Amazon in the
Air: Innovating with Big Data at Lufthansa, ” in Proc. 49th Hawaii
International Conference on System Sciences (HICSS), pp. 5096-5105,
2016.
The NSF topology and a sample topology was used as the [6] N. Mishra, C.C. Lin, and H.T. Chang, “A Cognitive Oriented Framework
examples. In the NSF topology, the switches are grouped into for IoT Big-data Management Prospective,” in Proc. IEEE Inter. Conf.
three regions. The analysis of the number of flow entries for a Commun. Problem-solving (ICCP), pp. 124-127, 2014.
sample topology was introduced. The performance of the HPF [7] H. Hu, Y. Wen, Y. Gao, T. S. Chua, and X. Li, “Toward an SDN-enabled
big data platform for social TV analytics,” IEEE Network, vol. 29, iss.
scheme was analyzed. Results from the analysis indicated that 5, pp. 43-49, 2015.
70% of the number of permanent flow entries and 80% of the [8] N. McKeown, “Software-defined networking,” INFOCOM keynote talk,
number of configuration messages are reduced, compared to pp. 3032, 2009.
[9] OpenFlow Switch Specification Version 1.3.0, June 2012 [Online]. Avail-
the conventional schemes. These reductions require a lower able: https://www.opennetworking.org/.
bandwidth in the control plane, a lower process of CPU in the [10] Y. Cui, J. Song, M. Li, Q. Ren, Y. Zhang, and X. Cai, “SDN-based Big
controller, and a smaller TCAM memory size in each switch. Data Caching in ISP Networks,” IEEE Transactions on Big Data, vol. PP,
iss. 99, pp. 1-1, 2017.
We demonstrated the proposed scheme via Japanese Science [11] L.W. Cheng and S.Y. Wang, “Application-Aware SDN Routing for Big
Information Network 5. Data Networking,” in Proc. IEEE Global Communications Conference
(GLOBECOM), pp. 1-6, 2015.
[12] P. Qin, B. Dai, B. Huang, and G. Xu, “Bandwidth-Aware Scheduling
R EFERENCES With SDN in Hadoop: A New Trend for Big Data,” IEEE Systems Journal,
vol. PP, iss. 99, pp. 1-8, 2017.
[1] N. Kitsuwan and E. Oki, “Analysis of Flows Reduction Scheme by [13] L. Cui, F. R. Yu, Q. Yan, “When big data meets software-defined
Adopting Two MPLS Tags in Software-Defined Network,” in Proc IEEE networking: SDN for big data and big data for SDN,” IEEE Network,
Conference on Standards for Communications and Networking (CSCN), pp. 58-65, 2016.
pp. 1-6, 2016. [14] N. Kitsuwan, S. McGettrick, F. Slyne, D.B. Payne, and M. Ruffini,
[2] Facebook Q4 2015 Results. [Online]. Available: “Independent transient plane design for protection in OpenFlow-based
http://investor.fb.com/results.cfm networks,” IEEE/OSA J. Optic. Commun. Netw., vol. 7, iss. 4, pp. 264-
[3] Facebook’s Top Open Data Problems. [online]. 275, 2015.
https://research.facebook.com/blog/facebook-s-top-open-data-problems/ [15] “Science Information NETwork 5,” [Online]
[4] Z. Han, M. Bennis, D. Wang, T. Kwon, and S. Cui, “Special issue on Available: https://www.sinet.ad.jp/en/top-en, Oct. 2016.
big data networking-challenges and applications,” IEEE/OSA J. Commun. [16] “National Institute of Informatics,” [Online]
Netw., vol. 17, iss. 6, pp. 545-548, 2015. Available: http://www.nii.ac.jp/en/, Oct. 2016.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2725139, IEEE Access
11
Seydou Ba received the M.E. and Ph.D. degrees in information and commu-
nication engineering from the University of Electro-Communications, Tokyo,
Japan, in 2014 and 2017, respectively. He is currently with the NEC-
Match field AIST AI cooperative research laboratory, the national institute of advanced
industrial science and technology (AIST). His research interests include
artificial intelligence, reinforcement learning, elastic optical networks, and
software defined networks.
In_port
IP protocol Eiji Oki is a Professor at Kyoto University, Japan. He received the B.E. and
M.E. degrees in instrumentation engineering and a Ph.D. degree in electrical
engineering from Keio University, Yokohama, Japan, in 1991, 1993, and 1999,
respectively. In 1993, he joined Nippon Telegraph and Telephone Corporation
Destination IP
(NTT) Communication Switching Laboratories, Tokyo, Japan. He has been
researching network design and control, traffic-control methods, and high-
Instruction speed switching systems. From 2000 to 2001, he was a Visiting Scholar at
the Polytechnic Institute of New York University, Brooklyn, New York, where
PUSH MPLS he was involved in designing terabit switch/router systems. He was engaged
in researching and developing high-speed optical IP backbone networks with
NTT Laboratories. He was with The University of Electro-Communications,
Tokyo, Japan from July 2008 to February 2017. He joined Kyoto University,
Japan, in March 2017. He has been active in the standardization of the
path computation element (PCE) and GMPLS in the IETF. He wrote more
than ten IETF RFCs. Prof. Oki was the recipient of several prestigious
awards, including the 1998 Switching System Research Award and the 1999
MPLS Label Excellent Paper Award presented by IEICE, the 2001 Asia-Pacific Outstanding
(inner tag) Young Researcher Award presented by IEEE Communications Society for
his contributions to broadband network, ATM, and optical IP technologies,
the 2010 Telecom System Technology Prize by the Telecommunications
Advanced Foundation, IEEE HPSR 2012 Outstanding Paper Award, and IEEE
HPSR 2014 Best Paper Award Finalist, First Runner Up. He has authored/co-
authored four books, Broadband Packet Switching Technologies, published
by John Wiley, New York, in 2001, GMPLS Technologies, published by
CRC Press, Boca Raton, FL, in 2005, Advanced Internet Protocols, Services,
and Applications, published by Wiley, New York, in 2012, and Linear
MPLS Label Programming and Algorithms for Communica- tion Networks, CRC Press,
(outer tag) Boca Raton, FL, in 2012. He is a Fellow of IEEE.
Output port
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.