Rapid restoration techniques for software-defined networks

Ali Malik, Ruairí de Fréin, Benjamin Aziz

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)

Abstract

There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in the harshest of environments. Software-Defined Networking (SDN) is gaining traction as a promising approach for designing network architectures which are robust and flexible. One reason for this is that separating the data plane from the control plane, increases the controller's ability to configure the network rapidly. When network failure events occur, the network manager may trade-off the optimality of the achieved network reconfiguration with the responsivenss of the reconfiguration process. Responsiveness may be favoured when the network resources are under stress and the failure rate is high. We contribute SDN recovery methods that leverage information about the structure of the network to expedite network restoration when a link failure occurs. They operate by detecting community-like structures in the network topology and then they find alternative paths which have low operation and installation costs using this information. Extensive simulations are conducted to evaluate the proposed SDN recovery methods using open-source simulation tools. They provide evidence that the proposed approaches lead to performance gains when an alternative path is required among a set of candidate paths.

Original languageEnglish
Article number3411
JournalApplied Sciences (Switzerland)
Volume10
Issue number10
DOIs
Publication statusPublished - 1 May 2020

Keywords

  • Failure recovery
  • Failure restoration
  • Fault management
  • Link failure
  • Openflow
  • Software-defined networking

Fingerprint

Dive into the research topics of 'Rapid restoration techniques for software-defined networks'. Together they form a unique fingerprint.

Cite this