You are on page 1of 29

Design of an Energy Efficient and Secure Service

Framework for Software Defined Networks


A SYNOPSIS REPORT SUBMITTED IN PARTIAL FULFILMENT
FOR THE AWARD OF
DOCTOR OF PHILOSOPHY
IN
COMPUTER SCIENCE AND ENGINEERING

SUBMITTED BY:
NAME: LOKESH PAWAR
UID: 21YCS1004

SUPERVISED BY: CO-SUPERVISED BY:


NAME: DR. GAURAV BATHLA NAME: DR. ROHIT BAJAJ
PROFESSOR ASSOCIATE PROFESSOR
CSE DEPARTMENT CSE DEPARTMENT

COMPUTER SCIENCE AND ENGINEERING


CHANDIGARH UNIVERSITY
JUNE, 2022
CERTIFICATE

This is to certify that the Synopsis titled “Design of an Energy Efficient and Secure
Service Framework for Software Defined Networks” is submitted by Mr. Lokesh Pawar
UID: 21YCS1004 pursuing Doctor of Philosophy in Computer Science and Engineering
Department of Chandigarh University.

Dated: Signature of the Applicant

Name: Lokesh Pawar


UID: 21YCS1004

ii
DECLARATION

I, Lokesh Pawar declare that I have not been registered with any other University or
institution for Ph.D. other than the Chandigarh University.

Dated: Signature of the Applicant

Name: Lokesh Pawar


UID: 21YCS1004

I recommend that synopsis has been drafted according to the approved format of the
university. It is also certified that the applicant has not been registered as Ph.D. student in
any other University or Institution. The submitted Synopsis entitled has not been
submitted else for consideration.

Signature of the Supervisor/s: ________________________________________________

Signature Signature& Stamp of


Ph.D. Coordinator Director/Chairperson of the
School/College/Institute
Centre/Departmental Research
Committee

iii
ACKNOWLEDGEMENT

Firstly, I would like to express my sincere gratitude to my supervisor(s) Dr. Gaurav Bathla
and Dr. Rohit Bajaj for the continuous support of my Ph.D. study and related research, for
their patience, motivation, and immense knowledge. Their guidance helped me in all the time
of research and writing of this synopsis. I could not have imagined having a better advisor
and mentor for my Ph.D. study

Besides my advisor, I would like to thank the rest of my Synopsis committee: Dr. Navneet
Kaur, Dr. Jaspreet Singh, Dr. Urvashi Garg and Dr. Navpreet Kaur Walia for their
insightful comments and encouragement, but also for the hard question which incented me to
widen my research from various perspectives.

My sincere thanks also go to Dr. Ganesh Gupta, my parents and my friends, for their
continuous support and guidance to meet my targets well before deadlines.

Dated: Signature of the Applicant

Name: Lokesh Pawar


UID: 21YCS1004

iv
INDEX
Certificate……..………………………………………………………………………………ii
Declaration……...…………………………………………………………………………....iii
Acknowledgement………...…………………………………………………………………iv
List of Figures.…….………………………………………………………………………...vi
List of Tables……………………………………………………………………………….vii
List of Abbreviations………………………………………………………………………viii

1. Introduction……………………………………………………………………….........1

1.1 Introduction…………………………………………………………………...............1

1.2 Application of Software Defined Networks……………………………………..........3

2. Literature Review……………………………………………………………………....5

2.1 Resource-Allocation Management……………………………………………………5

2.2 Load-Balancing in Software Defined Networks…………………………………......6

2.3 Adaptive Security Mechanism: Single and Multi-Controller System………………..7

2.4 Automation of Software Defined Edge Computing Networks……………………….8

3. Research Gaps………………………………………………………………………...11

3.1 Research Gaps/Challenges…………………………………………………………..11

3.2 Problem Formulation………………………………………………………………...13

4. Objectives…………………………………………………………………………......14

5. Methodologies………………………………………………………………………...15

5.1 Methodology for Objective 1……………………………………………………......15

5.2 Methodology for Objective 2……………………………………………………......15

5.3 Methodology for Objective 3…………………………………………………...…...17

6. Work Plan………………………………………………………………………….....18

Bibliography

v
List of Figures

Figure 1.1: Component View of SDEC……………………………………………………….1

Figure 1.2: Architecture of SDN………………………………………………………………2

Figure 5.1 Taxonomy for SDEC……………………………………………………………..15

Figure 5.2 Multi-Controller Oriented Model………………………………………………...16

Figure 5.3 A Multi-Controller Pbad Model………………………………………………….16

vi
List of Tables

Table 2.1: Summarization of different techniques/tools/terminologies in SDN…..…………10

Table 6.1: Work Plan………………………………………………………….…..…………18

vii
List of Abbreviations

SDN Software Defined Networks


NFV Network Function Virtualizations
NAT Network Address Translation
SDEC Software Defined Edge Computing
SDECR Software Defined Edge Computing Resources
EE Energy Efficiency
LB Load Balancing
NQP Network Quality Performance
ST Stable
RB Robust
EC Edge Computing
SDNC Software Defined Network Controller
Pbad Policy based attack detection

viii
1. Introduction

With the advent of 5G networks the user demand got exponentially increased for the services
from the server. The increasing rate of number of android, window and Mac users is growing day
by day. The traditional network infrastructure is not capable enough to provide high processing,
ubiquitous access and a dynamic management, due to which it immersed itself into congestion,
and service request failures. To avoid congestion and service request failures several
infrastructure based solutions, architectural and algorithmic solutions were proposed and
implemented for better results [1].

1.1 Introduction

Software Defined Networks and Edge computing are newly touted ways for solving the
challenges occurred in the network for giving services to the end users. Software Defined Edge
Controller (SDEC) works on the concept of defining the fundamental definition of the terminal
devices and other resources along with doing virtualizations for the same resources. SDEC has
decoupled itself into Software-Defined Edge Devices (SDED), Software-Defined Edge Storage
(SDEStr), Software-Defined Edge Computing Resources (SDECR) and Software Defined Edge
Service (SDES) where all of these decoupled divisions works in-line with the each other in order
to cultivate the network for better yield [2].

Figure 1.1: Component View of SDEC [2]

1
Taking SDEC in consideration few challenges or issues can be mitigated in Edge ecosystems.
Load Balancing, energy efficiency and resource allocation are a few challenges which can
completely resolved or partially optimized, depending upon the severity of the problem. The
traditional network suffers from dynamic and automatic management and its reconfiguration,
also the present network conditions urges for optimization of network performance such as
network device performance and quality assurance for user experiences. The current network
deals with the local information and has no exposure to global information of the network. The
Software Defined Network with the help of its unified approach which includes Load Balancers,
Routers, Switches, Firewall and Network Address Translation (NAT), which are automatically
managed and controlled through programming.

Figure 1.2: Architecture of SDN [1]

2
The SDN also provides an opportunistic environment for enhancing the network performance. In
SDN, different layers can share the required information and can also give feedback with the
help of global view of the network. As SDN has a fundamental architectural representation of
the three separate planes as data plane which is also known as Southbound Interface of the
architecture, Application Plane which is also known as Northbound Interface of the architecture
and in the middle is the Control Plane where all sort of implementations for network efficacy and
optimization takes place, this plane is installed with Software defined controllers. Data Plane is
responsible for data collection, data storage, Data routing and data fusion from the devices at the
lower layer of the network. This plane is responsible for all sort of data collection it may be from
smart city, smart houses, mobile, IoT devices, vehicular networks and data from ocean etc. Data
Plane collects the data and sends it to the Edge Cloudlets as depicted in the Figure 2. The data
reaches to the edge cloudlets with the help of Base Station. A seamless connectivity is provided
to base station and edge cloudlet. The edge cloudlet can be connected to Software Defined Edge
Services, where Software Defined Edge Controller, manages Software Defined Edge Devices,
Software Defined Edge Storage and Software Defined Edge Computing Resources. The next
plane encountered is the Control Plane: It is set responsible for Control Synchronization, Control
Decision and Resource Management [3]. Control Plane is also connected with the Edge Servers
and Cloud Servers for managing the services of resource management and service orchestration.
The control plane can be stated as the mind of the whole Software Defined Networks. It is also
responsible for making the routing tables and setting packet handling policies. These controllers
are programmable and with the help of soft interventions they can tout good and efficient results.
SDN does not require any separate infrastructure for optimizing the network, it can be easily
achieved by programming.

1.2 Application of Software Defined Networks

SDN is becoming a promising technology in the field of networking, few applications of SDN
are:

 Network Monitoring: With the help of global view of the network SDN encompasses its
services to become more vigilant in taking routing decisions and in detecting route

3
failures. This global view will also privilege the entire network to become more efficient
and optimized [1].
 High Performance: With the help of built in functions like robust quality of service
policies, Distributing hefty traffic, generating alerts for adverse bottlenecks Software
defined networks enhances the performance with the help of virtualizations.
 Smart Homes: The solutions for the smart homes can be provided to the end user within
a stipulated amount of time. But at the same time if this application brings in better
services it also provokes the application to malfunction [1]. The controllers in this
scenario become an easy target and synchronization issues spike, which in turn causes
life threatening issues.
 Enhancing Configuration: The traditional network is not capable of doing automatic
and dynamic reconfiguration of the network. But the SDN is capable of doing such a
reconfiguration of the whole network programmatically. And all of this task can be
completed from a single point with the help of software controlling [4].
 Security: By using policy based security, identity oriented authentication and role based
security management for the networks, by Software Defined Network will ensure security
to the end users [5].

4
2. Literature Review

In recent years, high service provisioning (HSP) and user demand for more efficient and secure
services has grown in the world. With the advent of this many challenges evolved up in Software
Defined Edge Computing environment. The user’s service requests are increasing day by day
with an exponential speed and posing extra burden on the existing cloud and edge infrastructure.
The service requests can be handled by a Software Defined Single controller or with the help of
Software Defined Multi Controller. The approach of using Single Controller or Multi Controller
brings in a lot of challenges which can be traced out as: efficiency, reliability, energy
consumption, resource allocation and security. The following literature is reviewed in the field of
Software Defined Edge Computing.

2.1 Resource-Allocation Management


Gebremariam A. et al. proposed an algorithm for efficient resource slicing which allows first
respondents to share their activities. They have built a model using stochastic geometry tool.
Using the algorithm and model users can send messages with a low latency in emergency
services. The parameters on which the results are analyzed are time, frequency, reliability, low-
latency. The tool used for experimental setup is NS-3 [6].
Li. H. et al. given two algorithms for minimizing the cloud delay and using distributed services
rather than using centralized managed services. There were two single objective algorithms
which are hybridized as joint optimization. By using deep programmability with the help of
Software Defined Network the author was able to reconfigure the hosting and routing services.
The proposed algorithm by the author can be utilized in future to improve the security [7].
Hu Y. et al. considered congestion as key factor for hampering stability and robustness of the
network. The author has given an algorithm for congestion control on IP network. They have
also proposed a new method for judging node congestion using the algorithm so proposed the
author achieved optimized utilization of the link [8].
Qureshi M. et al. surveyed resource allocation schemes in high performance computing systems.
The authors considered resource allocation in grid computing, multi-core systems, edge
computing and fog computing. Also they have compared all the resource allocation schemes on
common parameters [9].

5
Neves P. et al. considers that due to heavy and heterogeneous traffic may induce challenging
performance environments for the 5G systems. Due to semi-automatic management of the
network systems. The author proposed a novel framework based on cutting-edge technology, like
software defined networks and network function virtualizations [10].
Moshref M. et al. described a new framework which dynamically balances the resources and
allocates them in such a manner which itself increases the accuracy. The proposed algorithm is
not using a priori approach where task types parameters and associates characteristics
considered. The algorithm dynamically searches for sufficient resource which can provide
accuracy of desired level [11].
Sarbazi M. et al. proposed a new approach of resource allocation where the authors have utilized
the advanced version of K-Mean algorithm for creating the clusters of the network. The highly
required/demanded data is kept on the higher quality clusters where number of hubs and delay is
very low. The authors have increased the number of groups/clusters in the network to increase
the memory [12].
2.2 Load-Balancing in Software Defined Edge Computing
Semong T. et al. surveyed certain intelligent load balancing strategies. Authors have studied and
summarized the importance of providing intelligent load balancing services using the software
defined networks (SDN) and Network Function Virtualizations (NFV). The authors have also
discussed about the tools used by the several researchers for implementing and testing the
strategies and algorithms. Mininet was identifies as the best emulator for SDN devices [13].
Babbar H. et al. acknowledges that single controller cannot manage the heavy traffic due to
restricted capability. The authors suggested that if multiple controllers will be implemented on
the control plane it may become easier to achieve high network quality performance and a robust
communication system. With this authors proposed a scalable load balancing algorithm which is
based on migrating switches [14].
Zhong H. et al. an efficient software defined network (SDN) load balancing scheme based on
variance analysis for massive mobile users authors analyzed and proposed a probabilistic method
for managing the load on the network on the basis of variance analysis. They have used Open
Flow Switching technology. Authors have utilized a single SDN Controller for monitoring the
data traffic. The results so obtained have low cost, increased reliability and it is scalable [15].

6
Hosny W. et al. proposed an algorithm for controlling and adaptive load balancing (GCALB) for
load balancing in SDN. The algorithm proposed by author when compared with the present
reference algorithm finds the (GCALB) more efficient on the basis of throughput and response
time. The tool used for the experimental setup mininet and floodlight. The properties analyzed
and taken into the considerations are throughput and response time [16].
Babbar H. et al. proposed an algorithm multiple distributed controller load balancing and
analyzed the proposed algorithm with present algorithms for load balancing. The parameter for
comparing the performance was considered as CPU utilization. The tool used is mininet for
experimental setup and the controller used is Ryu. The algorithms compared are Nash
bargaining, efficient switch migration load balancing algorithm, efficiency aware load balancing
algorithms [17].
Chen J. et al. designed an automatic load-balancing architecture which is based on reinforcement
learning. The proposed design balances the traffic load at peak times and uses deep deterministic
policy gradient it finds the optimal path. They have used a mathematical model and
reinforcement learning for load balancing. The tools used for experimental setup are Mininet
simulations and the controller used is Ryu controller and Open Flow. Pytorch is used for
implementing reinforcement learning. The authors have compared OSPF, RSIR, EARS, ALBRL
where the ALBRL is the proposed algorithm from the authors and AlBRL outperformed the
other algorithm on the basis of better performance, stability and faster convergence rate [18].
Chen J. et al. analyzed the concept of load balancing on the basis of transmission delay between
controllers and software defined networks (SDN) switches when network is experiencing heavy-
traffic. They proposed an algorithm for load-balancing which is based on Link State prediction.
The tool used for experimental setup is Mininet and the algorithms compared with the proposed
algorithm are OSPF, RMBQL. The controller used for implementation are Open VSwitch and
Ryu. They have used GEANT topology at the time of implementation where 23 switches 37
links , 3 different bandwidth 10 Gbps,2-5 gbps and 155 mbps were used [19].
2.3 Adaptive Security Mechanism: Single and Multi- Controller Systems
Lee S. et al. believes that the present studies are not converging to an automated or rigorous test
for security ambiguities in Software Defined Networks (SDN). The authors were inspired by this
necessity of software defined networks SDN that the network must be disclosed with the

7
vulnerabilities in the heterogeneous SDN operational scenarios. The authors proposed a tool
which uses fuzzing module to discover unidentified or unknown security issue in SDN [20].
Varadharajan V. et al. proposed an architecture which provides end to end security to multiple
SDN domains. They have used a language based approach which provides security to the SDN
services. Authors have lso discussed about dynamic security which again policy based and
providing security at service layer which makes the approach more robust in providing
protection to the available network devices [21].
Eom T. et al. considers that many measures are developed to counter the threat in SDN, but the
effectiveness is a must to be evaluated on certain parameters. The authors also believe that it will
become difficult to secure SDN without using a systematic approach. The author proposed a new
graphical security model which is a systematic approach for evaluating attacks, threats and
counter measures [22].
Hayajneh A. et al. proposed a scheme for establishing security in SDN. The authors in this
research paper has presented a system model for effective usage of SDN and Internet of Things
(IoT) and also drawn the attention on mitigating the masquerading attacks in SDN-IoT
environment [23].
Ahmad I. et.al. surveys security threat and challenges in Software Defined Networks (SDN). The
SDN increases the visibility of the network. Security challenges can be easily mitigated by
securing each plane separately. The author have focused on future and present challenges in
security [24].
2.4 Automation of Software Defined Edge Computing Networks
Hu P. et al. proposed an approach for software defined edge computing considering it on the
basis of cyber space. The goal is to reach to an automatic ecosystem. They have built
dynamically reconfigurable software defined edge services. With the help of decoupling property
of lower layer and upper layer it is capable of providing automated and scalable framework for
improving the overall services of the edge ecosystem. They have also discussed about Software
Defined Edge Devices, Software Defined Edge Controllers, Software Defined Edge Storage and
Software Defined Edge Computing Resources then identified that these techniques also require
automation for better performance [2].
Mevromatis A. et.al. designed and implemented a framework Software Defined Internet of
Things Management (SDIN) which is based on SDN managed architecture. The designed

8
framework employs SDN for infrastructure management and that too on every instance. In the
framework there is a master controller which is deployed at cloud and there is 1:1 deployment of
SDN Controller on every domain and each edge location. This framework gets rid of single point
failure and improved the resiliency scalability and flexibility of deployment [25].
Munoz R. et al. implemented a mechanism which also provides automation for the services
which uses SDN. Basically SDN improves the automatic services. The author also considered
cloud services which can be easily utilized with Software Defined Network. They have given a
scalable solution at network level and cloud level [26].
Simoes R. et al. used network function virtualization technique to reach to an optimal solution.
This technique focused on energy efficiency, load balancing, security, network quality and it is
robust as well. The authors have also used Multi access Edge Computing for making the
proposed to be a kind of system which can balance the load and it is scalable and can be easily
used for Edge Computing [27].
Ali J. et al. have used a clustering technology is used for managing the network. A multi Criteria
Decision Making technique was also used along with the clustering technique. The technique
used by authors fall short in managing the energy and load balancing but the technology has
evolved up with a solution to latency problem with scaling properties [28].
Nsaif M. et al. the authors used a technique named as Integer Programming Model, and the
technique successfully managed the energy in an efficient manner, the technique also drawn the
attention towards load balancing and network quality performance [29].

Table 2.1 Summarization of different techniques/tools/terminologies in SDN

9
Author Technique Used E L NQ L S S S R H Io E
E B P L T C E B G T C
Simoes R. et Multi Access Edge           
al.[27] Computing
H. Babbar et Multi Controllers           
al.[14]
Zhong et al.[15] Switching Technology           

J. Chen et al.[18] Reinforcement           


Learning
A.Gebremariam Stochastic Geometric           
et al.[6] Tool
Simoes R. et Network Function           
al.[27] Virtualization
Ali J. et al.[28] Clustering (Multi           
Criteria Decision
Nsaif M. et Integer Programming           
al.[29] Model
N. Pedro et al. Virtualized           
[10] Network(SELFNET)
L Hongming et Deep Programmability           
al. [7]
Y Hu et al. [8] Centralized Control           

L Seungsoo et al. SDN Penetration Tool           


[20]
EE: Energy Efficiency LB: Load Balancing NQP: Network Quality Performance LL: Low
Latency ST: Stable SC: Scalable SE: Security RB: Robust HG: Heterogeneity IoT: Internet of
Things EC: Edge Computing

3. Research Gaps
10
Traditional service provisioning to the IoT devices from the cloud can provide super powerful
resources for high computational tasks, but at the same time these devices must be ready to be
tolerant for latency and cost for getting the services at the destination. SDN service orchestration
is continuously gaining interest of researcher’s for enhancing the services at Edge level and
leveraging the central cloud services. With the advent of this novel paradigm there are a lot of
scattered opportunities for efficiently deploying the resources in the network, inter and intra
operational services for the resources and their management. Guiding force from the literature
survey leads us to some of the challenges which are summarized in this section as:

3.1. Research Gaps/Challenges :

 Efficient Management of Limited Resources: The number of limited resources in Edge


SDN network brings in the requirement of efficient management of the available
resources. The different requirements of communication protocols and network
procedures pose challenge to improve the existing resource management protocols. The
available resources if brought closer to the SDN devices it can be envisioned as a solution
for optimized usage of resources by bringing in the concept of offloading [1]. Intelligent
decision making for allocation of resources is required at the resource management level
with a deadlock avoiding strategy.
 Traffic Forwarding for Definitive Service Delivery: Due to heterogeneous traffic
environment of communication and scalable growth in IoT devices yields in the need of
strategies for traffic forwarding and end to end delivery. IoT traffic forwarding and
control along with the congestion avoidance techniques are required to provide a solution
where time consumption in traffic forwarding is under the throughput value. Several
solutions as customized development of application has been provided where centralized
services or service management using Software Defined Networks is utilized which has
deadened the traffic forwarding challenge, but it still stands tall as a challenge in service
delivery.
 Combating the Network Delays: Interoperability pulls in the issue of network delays,
due to the passage of the data through multiple different infrastructures. The lower-
latency compute intensive tasks can be pre-processed at the cloudlets of edge and the rest
of the part of computational task is transferred to the centralized cloud, which brings in

11
communication heterogeneity and there is scarcity of protocols which provides a solution
protocol suite for seamless communication. This imposes excessive load on the network
and raises the demand for balancing the load.
 Latency Management for Request and Response: The changes in the communication
network due to the movement of the user provoke the service based challenges and
causes impact on latency-critical applications. The recent growth of the IoT devices
yields a challenge of latency management in the real time application, they can be
augmented reality, self-driven vehicles and online games they induce soaring data and
low latency requirement. Traditionally available offloading procedures add on the service
delay in the whole process of service orchestration and a requirement for an efficient and
optimized solution is created for latency management [1].
 Seamless Mobility of Devices and Fault Tolerance: Mobility is the most important
feature of Software Defined Internet of Things, because the user moves in the network
cluster or outside the network cluster and has an expectation of getting a seamless service
throughout the life time of the device. When the user distance from the server increases
the service experience of the user dilapidate. This yields a challenge for migrating the
Virtual machines over the edge based infrastructures when the service is in execution.
 Energy Consumption in Data Processing and Classification: Massive heterogeneous
data generation by the smart devices brings in the challenge for effective management of
the data. The data is so scattered and distributed where processing and classification
becomes very difficult to handle, and decision making is ruined due to poor classification
and processing of the data at the backend. Aggregate decision making can be performed
for diminishing the challenge but it induces lower accuracy and huge computational cost
along with the energy dissipation of the local cloudlets.
 Privacy of Data and Security: There are multiple users with multiple devices and there
are multiple vendors who participate on one platform and create a heterogeneous
environment, and pulls in a challenge of privacy and security. The interaction via the data
at distributed platforms soars the privacy challenges. Every device has their own policy to
access or not to access the data which again enhances the privacy and security issues. A
lightweight algorithm for authentication purposes is required which can deal with privacy
and security challenges in the IoT environment.

12
3.2. Problem Formulation:
After the identification of Research challenges/gaps, the research questions have been identified
which leads us to formulate the objectives. The research questions are:
 Resource Allocation: Allocation of the available resources to the requesting nodes using
a resource allocation strategy which never ends up in to a starvation of service or delay
in the service to the application layer devices (considering the limit of resources
practically cannot be increased epidemically).
 Service Delivery: Quality of service enhancement for application layer devices where
lower-latency and high data rate is required by the devices.(limiting to processing,
storage and energy).
 Load Balancing and Processing Strategy: For maintaining the traffic flow and
balancing the load of the network at the time of huge traffic generation data classification
and processing strategies could be effectively used and strategies for managing the
energy of the edge cloudlets can also be designed.
 Security: The authentication challenges soars up in heterogeneous communication
environment and thus needs sound security for the users to process the data.

13
4. Objectives
After analysing the literature, the research gaps and questions have been framed in the previous
part. Based on the observation of the previous part, the objectives have been formulated to
overcome the challenges of the existing frameworks:

1. To study and analyse the existing schemes for energy efficient and secure Software
Defined Networks.
2. To design and implement an energy efficient and secure framework for Software Defined
Networks.
3. To evaluate and validate the performance of the proposed framework.

5. Methodologies

14
The methodologies which will be followed to achieve the proposed objectives are discussed one
by one for every objective.

5.1 Methodology for Objective 1:

This objective aims towards a thorough analysis on the service and resource allocation schemes.
Resource allocation in Software Defined Edge Computing ecosystem is the main focus area of
this study. To achieve the same, the following taxonomy is proposed:

Figure 5.1: Taxonomy for SDEC

5.2 Methodology for Objective 2:

An optimized load balancing scheme will be introduced for providing effective services in
software defined edge computing. The incoming data packets to the switch are sent to the
distributed SDN controllers, these controllers have an access to the state of the art lower layers
and upper layers to take the forwarding decisions. The global viewing capacity of the whole
network by the SDN controller gives an advantage to make a decision for optimized load
balancing.

15
Figure 5.2 : Multi-Controller Oriented Model

The increase in the data packets due to the increase in the number of users and the number of
request sent by each user the network traffic requires a framework for load balancing. The major
challenge to achieve this objective will be heterogeneity management and uninterrupted quality

Figure 5.3 : A Multi Controller Pbad Model

of services to the users. To achieve this objective, a multi-controller Software Defined Network
(SDN) framework will be created. A policy based attack detection (Pbad) mechanism will be ran
on the top of each Software Defined Network Controller (SDNC). This policy based attack
detection mechanism will be implemented in the northbound interface of Software Defined

16
Network Controller (SDNC). Every Autonomous System will be managed and controlled by
SDN Controller. With the help of policy based attack detection (Pbad) the attacks can be traced
and actions can be taken to mitigate the potential attacks.

5.3 Methodology for Objective 3:

To achieve this objective the proposed scheme and framework will be tested for accuracy and
efficiency using realistic parameters. The scheme comprises of SDN and edge nodes so the
proposed scheme can be simulated on:

 Mininet
 Network Simulator (NS-3)

Finally the proposed scheme will be tested on the various performance metrics in different
scenarios using the below mentioned parameters but not limited to:

 Complexity
 Congestion Control
 Latency
 QoS
 Energy Consumption

6. Work Plan

17
The proposed work is planned phase wise and kept in an activity representational form with the
help of an activity chart.

Table 6.1: Work Plan

A: Literature Review and Final Synopsis Submission.

B: Designing of Algorithms/Framework.

C: Drafting the real requirement of all the objectives.

D: Real-Time testing and validation of the proposed algorithms/framework.

E: Drafting the Thesis.

F: Research Paper Publication.

Bibliography

18
[1]. Rafique W. et al. “Complementing IoT Services Through Software Defined Networking
and Edge Computing: A Comprehensive Survey”, IEEE Communications Surveys &
Tutorials, Vol. 22, No. 3, pp. 1761-1800, 2020.

[2]. Hu P. et al. “Software-Defined Edge Computing (SDEC): Principle, Open IoT System
Architecture, Applications, and Challenges”, IEEE Internet of Things Journal, Vol. 7, No. 7,
pp. 5934-5945, 2020.

[3]. Dai M. et al. “A Software-Defined-Networking-Enabled Approach for Edge-Cloud


Computing in the Internet of Things”, IEEE Network, IEEE, pp. 66-73, 2021.

[4]. Xia W. et al. “A survey on Software-Defined Networking”, IEEE Communications


Surveys & Tutorials, Vol. 17, No. 1, pp. 27-51, 2015.

[5]. Li Y. et al. “Enhancing the Internet of Things with Knowledge-Driven Software-Defined


Networking Technology: Future Perspectives”, Sensors, MDPI, pp. 1-20, 2020.

[6]. Gebremariam A. et al. “SoftPSN: Software-Defined Resource Slicing for Low-Latency


Reliable Public Safety Networks”, Wireless Communications and Mobile Computing, Wiley
| Hindawi, Vol. 2018, pp. 1-7, 2018.

[7]. Li H. et al. “A Software-Defined Networking Roadside Unit Cloud Resource


Management Framework for Vehicle Ad Hoc Networks”, Journal of Advanced
Transportation, Wiley | Hindawi, Vol. 2022, pp. 1-13, 2022.

[8]. Hu Y. et al. “Software-Defined Congestion Control Algorithm for IP Networks”,


Scientific Programming, Wiley | Hindawi, Vol. 2017, pp. 1-8, 2017.

[9]. Qureshi M. et al. “A comparative analysis of resource allocation schemes for real-time
services in high-performance computing systems”, IJDSN, SAGE, Vol. 16 (8), pp 1-35,
2020.

[10]. Neves P. et al. “The SELFNET Approach for Autonomic Management in an NFV/SDN
Networking Paradigm”, IJDSN, Hindawi, Vol. 2016, pp. 1-17, 2016.

19
[11]. Moshref M. et.al. “DREAM: Dynamic Resource Allocation for Software-defined
Measurement”, SIGCOMM’14, ACM, pp. 419-430, 2014.

[12]. Sarbazi M. et al. “Improving resource allocation in software-defined networks using


clustering”, Cluster Computing 23, Springer, pp. 1199-1210, 2020.

[13]. Semong T. et al. “Intelligent Load Balancing Techniques in Software Defined


Networks: A Survey”, Electronics, MDPI, 9, 1091, 2020.

[14]. Babbar H. et al. “Load Balancing Algorithm on the Immense Scale of Internet of
Things in SDN for Smart Cities”, Sustainability, MDPI, 13, 9587, 2021.

[15]. Zhong H. et al. “An Efficient SDN Load Balancing Scheme Based on Variance
Analysis for Massive Mobile Users”, Mobile Information Systems, Hindawi, Vol. 2015,pp.
1-9, 2015.

[16]. Hosny W. et al. “Generic Controller Adaptive Load Balancing (GCALB) for SDN
Networks”, Journal of Computer Networks and Communication, Hindawi, Vol. 2019,pp.
2019.

[17]. Babbar H. et al. “Load Balancing Algorithm for Migrating Switches in Software-
Defined Vehicular Networks”, Computers, Materials & Continua, Tech Press Science, Vol.
67 No. 1, pp. 1301-1316, 2021.

[18]. Chen J. et al. “ALBRL: Automatic Load-Balancing Architecture Based on


Reinforcement Learning in Software-Defined Networking”, Wireless Communications and
Mobile Computing, Hindawi, Vol. 2022, pp. 1-17, 2022.

[19]. Chen J. et al. “ALBLP: Adaptive Load-Balancing Architecture Based on Link-State


Prediction in Software-Defined Networking”, Wireless Communications and Mobile
Computing, Wiley | Hindawi, Vol. 2022. Pp. 1-16, 2022.

[20]. Lee S. et al. “A Comprehensive Security Assessment Framework for Software-Defined


Networks”, Computers & Security, Elsevier, pp.1-20, 2020.

20
[21]. Varadharajan V. et al. “A Policy-Based Security Architecture for Software-Defined
Networks”, IEEE Transactions On Information Forensics And Security, Vol. 14,No. 4, pp.
897-912, 2019.

[22]. Eom T. “A Systematic Approach to Threat Modeling and Security Analysis for
Software Defined Networking”, IEEE Access, Vol. 7 2019, pp. 137432-137445, 2019.

[23]. Hayjneh A. et.al. “Improving Internet of Things (IoT) Security with Software-Defined
Networking (SDN)”, Computers 2020, MDPI,9,8, pp. 1-14, 2020.

[24]. Ahmad I. et al. “Security in Software Defined Networks: A Survey”, IEEE


Communication Surveys & Tutorials, Vol. 17, No. 4, pp. 2317-2346, 2015.

[25]. Mavromatis A. et.al. “A Software-Defined IoT Device Management Framework for


Edge and Cloud Computing”, IEEE Internet of Things Journal, Vol. 7, No. 3, pp. 1718-1735,
2020.

[26]. Munoz R. et al. “Integration of IoT, Transport SDN, and Edge/Cloud Computing for
Dynamic Distribution of IoT Analytics and Efficient Use of Network Resources”, Journal of
Lightwave Technology, Vol. 36, No. 7, pp. 1420-1428, 2018.

[27]. Simoes R. et al. “Dynamic Allocation of SDN Controllers in NFV-Based MEC for the
Internet of Vehicles”, Future Internet, MDPI, pp. 1-24, 2021.

[28]. Ali J. et al. “An Effective Approach for Controller Placement in Software-Defined
Internet-of-Things (SD-IoT)”, Sensors, MDPI, pp. 1-16, 2022.

[29]. Nsaif M. et al. “An Adaptive Routing Framework for Efficient Power Consumption in
Software-Defined Datacenter Networks”, Electronics, MDPI, pp. 1-18, 2021.

21

You might also like