Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN
<p>Necessity of forwarding rule updates in dynamic network. In a dynamic network, topology changes and link changes occur as nodes move around. Accordingly, forwarding rules for node-specific communication must be updated.</p> "> Figure 2
<p>Comparison between traditional communication and SDN methods. In a traditional network, a control plane is configured on each node. However, in an SDN environment, only the central controller has a control plane. In this case, the central controller provides the forwarding rules.</p> "> Figure 3
<p>LLDP transmission process for communication between SDN nodes. In an SDN, the SDN controller recognizes new switches through the process of packet-out, deliver LLDP, and packet-in to the switches it already knows.</p> "> Figure 4
<p>Representation of node link states using adjacency matrix. Graph data for each topology are represented as an adjacency matrix. Depending on the number of nodes (<span class="html-italic">n</span>), an <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>×</mo> <mi>n</mi> </mrow> </semantics></math> matrix is formed, where each row and column data represent the connection status between nodes.</p> "> Figure 5
<p>Confusion matrix. The confusion matrix calculates Precision, NPV, Specificity, and Recall using the TP, TN, FP, and FN metrics. This matrix is used to evaluate the performance of classification models.</p> "> Figure 6
<p>System model. This environment includes a GCS and multiple mobile unmanned nodes. The GCS and nodes transmit various types of communication, such as data collection, topology maintenance, and command control.</p> "> Figure 7
<p>CRIMSON flow. CRIMSON is composed of three main steps. The first is topology change detection and generation of the predicted node locations. The second is the creation of a predictive adjacency matrix. The third is caching the forwarding rules for the predicted link states. Through this process, CRIMSON prepares forwarding rules in advance, reflecting the predicted link states.</p> "> Figure 8
<p>CRIMSON flow chart. The analysis of time-series data calculates node movement trends, and if they exceed a threshold, the system predicts the node positions. The system calculates distances between nodes using the predicted positions and checks them against the communication range to generate an adjacency matrix. The matrix updates forwarding rules for both direct and alternative paths.</p> "> Figure 9
<p>Types of topologies used in the simulation. We use five topologies consisting of five nodes with UAV modeling applied. The topology shapes used, from left to right, are linear, v-shaped, trapezoid, star, and pentagon.</p> "> Figure 10
<p>Evaluation of confusion matrix metrics within the threshold range of 0.001 to 0.035. We assess the values of Precision, Recall, NPV, and Specificity throughout this threshold range. Afterward, we select the optimal threshold value that produces the highest average among these four metrics.</p> "> Figure 11
<p>Optimization process for finding the Shiftpoint. This process applies three optimization methods to the average value of the four confusion matrix metrics.</p> "> Figure 12
<p>Latency comparison of CRIMSON based on RTT tests. The comparison includes reactive mode and proactive mode. The simulation measured latency using rtt avg, rtt max, and rtt mdev.</p> "> Figure 13
<p>Evaluation of LLDP usage in CRIMSON. The proposed CRIMSON method indicates a lower LLDP count compared to the proactive mode. In an SDN system, LLDP packets are transmitted when packet processing is not handled. This indicates that CRIMSON performs packet processing effectively in dynamic networks.</p> "> Figure 14
<p>Network latency comparison of CRIMSON at various bandwidths. We conduct RTT tests at 0.5 Mbps, 1 Mbps, 5 Mbps, and 10 Mbps for the proposed CRIMSON algorithm. Simulation results confirm that CRIMSON achieves lower and more stable network latency.</p> ">
Abstract
:1. Introduction
- This paper proposes the CRIMSON algorithm, which is a caching technique for forwarding rules for predicted link states in SDN. The study aims to reduce latency and request traffic in dynamic networks compared to existing methods.
- This study analyzes the mobility of the swarm with UAV modeling to predict the link state. For this purpose, movement is detected through node position data. When the swarm’s movement exceeds a specific threshold, the predicted link state is generated. Then, the forwarding rules reflecting the predicted link state are cached. This process consists of three steps in the CRIMSON algorithm.
- This study evaluates the performance of CRIMSON in dynamic networks through simulation. In this result, the CRIMSON algorithm consistently reduces end-to-end latency by an average of 88.96% and 59.49% compared to conventional reactive and proactive modes, respectively.
2. Related Work
Limitations of Previous Work
- Scalability and Computational Overhead: Many reinforcement learning-based approaches, such as those described in [24], require substantial computational resources and extensive training data. This makes it challenging to apply them in real-time application in highly dynamic networks.
- Latency in Dynamic Environments: Machine learning-based methods, including [32], often involve exploration and learning phases, which can cause delays, especially in rapidly changing systems.
- Adaptability to node mobility: Approaches such as collaborative caching based on mobility prediction in [20] have been shown to effectively handle content delivery, but they lack adaptability in high mobility environments where link conditions change frequently.
3. Background
3.1. Software-Defined Networking (SDN)
3.2. Dynamic Network
3.3. Forwarding Rule Installation Method
3.3.1. Reactive Mode
3.3.2. Proactive Mode
3.4. Graph Form Representation
3.5. Shortest Path Algorithm
3.6. Caching
3.7. Confusion Matrix
4. System Model
5. The CRIMSON Algorithm
5.1. Link Change Detection and Node Prediction Location Calculation
Algorithm 1 Predict topology change and calculate node expected location |
|
5.2. Generating Adjacency Matrices and Processing Data
Algorithm 2 Implementing expected adjacency matrix and processing data |
|
5.3. Update Forwarding Rule Based on Predicted Link Status
Algorithm 3 Forwarding Rule Update |
|
6. Validation
6.1. Common Setup
6.1.1. Simulation Setup
6.1.2. UAV Modeling
6.2. Find the Shiftpoint
6.2.1. Simulation Setup
6.2.2. Simulation Results
6.3. Network Latency Analysis of CRIMSON
6.3.1. Simulation Setup
6.3.2. Simulation Results
6.4. LLDP Packet Analysis of CRIMSON
6.4.1. Simulation Setup
6.4.2. Simulation Results
6.5. Comparison of CRIMSON Network Latency at Various Bandwidths
6.5.1. Simulation Setup
6.5.2. Simulation Results
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Javaid, S.; Saeed, N.; Qadir, Z.; Fahim, H.; He, B.; Song, H.; Bilal, M. Communication and control in collaborative UAVs: Recent advances and future trends. IEEE Trans. Intell. Transp. Syst. 2023, 24, 5719–5739. [Google Scholar] [CrossRef]
- Lee, C.K. Development of an Industrial Internet of Things (IIoT) Based Smart Robotic Warehouse Management System. 2018. Available online: https://aisel.aisnet.org/confirm2018/43/ (accessed on 1 November 2024).
- Indri, M.; Lachello, L.; Lazzero, I.; Sibona, F.; Trapani, S. Smart sensors applications for a new paradigm of a production line. Sensors 2019, 19, 650. [Google Scholar] [CrossRef]
- Yang, X.; Gao, Z.; Niu, Q. Unmanned aerial vehicle–assisted node localization for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717749818. [Google Scholar] [CrossRef]
- Kim, S.; Kim, Y. Development of an MUM-T integrated simulation platform. IEEE Access 2023, 11, 21519–21533. [Google Scholar] [CrossRef]
- Lindner, S.; Schwerd, S.; Schulte, A. Defining generic tasks to guide UAVs in a MUM-T aerial combat environment. In Proceedings of the Intelligent Human Systems Integration 2019: In Proceedings of the 2nd International Conference on Intelligent Human Systems Integration (IHSI 2019): Integrating People and Intelligent Systems, San Diego, CA, USA, 7–10 February 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 777–782. [Google Scholar]
- Dudek, M.; Schulte, A. Effects of tasking modalities in manned-unmanned teaming missions. In Proceedings of the AIAA SCITECH 2022 Forum, San Diego, CA, USA, 3–7 January 2022; p. 2478. [Google Scholar]
- Perez, D.; Maza, I.; Caballero, F.; Scarlatti, D.; Casado, E.; Ollero, A. A ground control station for a multi-UAV surveillance system: Design and validation in field experiments. J. Intell. Robot. Syst. 2013, 69, 119–130. [Google Scholar] [CrossRef]
- Mansfield, K.; Eveleigh, T.; Holzer, T.H.; Sarkani, S. Unmanned aerial vehicle smart device ground control station cyber security threat model. In Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 2–14 November 2013; IEEE: Piscataway, NJ, USA; pp. 722–728. [Google Scholar]
- Hosseini, N.; Jamal, H.; Haque, J.; Magesacher, T.; Matolak, D.W. UAV command and control, navigation and surveillance: A review of potential 5G and satellite systems. In Proceedings of the 2019 IEEE Aerospace Conference, Big Sky, MT, USA, 2–9 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–10. [Google Scholar]
- Kim, H.; Feamster, N. Improving network management with software defined networking. IEEE Commun. Mag. 2013, 51, 114–119. [Google Scholar] [CrossRef]
- Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A survey on software-defined networking. IEEE Commun. Surv. Tutorials 2014, 17, 27–51. [Google Scholar] [CrossRef]
- Qin, Z.; Denker, G.; Giannelli, C.; Bellavista, P.; Venkatasubramanian, N. A software defined networking architecture for the internet-of-things. In Proceedings of the 2014 IEEE network operations and management symposium (NOMS), Krakow, Poland, 5–9 May 2014; IEEE: Pisacatway, NJ, USA, 2014; pp. 1–9. [Google Scholar]
- Macedo, D.F.; Guedes, D.; Vieira, L.F.; Vieira, M.A.; Nogueira, M. Programmable networks—From software-defined radio to software-defined networking. IEEE Commun. Surv. Tutorials 2015, 17, 1102–1125. [Google Scholar] [CrossRef]
- Kwon, Y.M.; Park, K.J. SDN-based controller switching for resilience of drones. In Proceedings of the The 23rd IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2017), Hsinchu, Taiwan, 16–18 August 2017. [Google Scholar]
- Ylitalo, J.; Jokikyyny, T.; Kauppinen, T.; Tuominen, A.J.; Laine, J. Dynamic network interface selection in multihomed mobile hosts. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA, 6–9 January 2003; IEEE: Piscataway, NJ, USA, 2003; p. 10. [Google Scholar]
- Rost, P.; Banchs, A.; Berberana, I.; Breitbach, M.; Doll, M.; Droste, H.; Mannweiler, C.; Puente, M.A.; Samdanis, K.; Sayadi, B. Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 2016, 54, 84–91. [Google Scholar] [CrossRef]
- Park, H.S.; Lee, S.; Park, K.J. Wireless sdn self-recovery for unmanned swarm cyber-physical systems. In Proceedings of the 2021 21st International Conference on Control, Automation and Systems (ICCAS), Jeju, Republic of Korea, 12–15 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 87–90. [Google Scholar]
- Sun, Z.; Chen, G. Enhancing Heterogeneous Network Performance: Advanced Content Popularity Prediction and Efficient Caching. Electronics 2024, 13, 794. [Google Scholar] [CrossRef]
- Yao, L.; Chen, A.; Deng, J.; Wang, J.; Wu, G. A cooperative caching scheme based on mobility prediction in vehicular content centric networks. IEEE Trans. Veh. Technol. 2017, 67, 5435–5444. [Google Scholar] [CrossRef]
- Paschos, G.S.; Iosifidis, G.; Tao, M.; Towsley, D.; Caire, G. The role of caching in future communication systems and networks. IEEE J. Sel. Areas Commun.s 2018, 36, 1111–1125. [Google Scholar] [CrossRef]
- Yu, G.; Wu, J. Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks. Peer -Peer Netw. Appl. 2020, 13, 1839–1852. [Google Scholar] [CrossRef]
- Evelin Zoraida, B.S.; Indumathi, G. A Comparative Study on Software-Defined Network with Traditional Networks. TEM J. 2024, 13, 167. [Google Scholar] [CrossRef]
- Godfrey, D.; Suh, B.; Lim, B.H.; Lee, K.C.; Kim, K.I. An energy-efficient routing protocol with reinforcement learning in software-defined wireless sensor networks. Sensors 2023, 23, 8435. [Google Scholar] [CrossRef] [PubMed]
- De Gante, A.; Aslan, M.; Matrawy, A. Smart wireless sensor network management based on software-defined networking. In Proceedings of the 2014 27th Biennial Symposium on Communications (QBSC), Kingston, ON, Canada, 1–3 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 71–75. [Google Scholar]
- Al-Tam, F.; Correia, N. On load balancing via switch migration in software-defined networking. IEEE Access 2019, 7, 95998–96010. [Google Scholar] [CrossRef]
- Gkioulos, V.; Gunleifsen, H.; Weldehawaryat, G.K. A systematic literature review on military software defined networks. Future Internet 2018, 10, 88. [Google Scholar] [CrossRef]
- Morgenthaler, S.; Braun, T.; Zhao, Z.; Staub, T.; Anwander, M. UAVNet: A mobile wireless mesh network using unmanned aerial vehicles. In Proceedings of the 2012 IEEE Globecom Workshops, Anaheim, CA, USA, 3–7 December 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1603–1608. [Google Scholar]
- Romeo, L.; Petitti, A.; Colella, R.; Valecce, G.; Boccadoro, P.; Milella, A.; Grieco, L.A. Automated deployment of IoT networks in outdoor scenarios using an unmanned ground vehicle. In Proceedings of the 2020 IEEE International Conference on Industrial Technology (ICIT), Buenos Aires, Argentina, 26–28 February 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 369–374. [Google Scholar]
- Zhou, D.; Sheng, M.; Li, J.; Han, Z. Aerospace integrated networks innovation for empowering 6G: A survey and future challenges. IEEE Commun. Surv. Tutorials 2023, 25, 975–1019. [Google Scholar] [CrossRef]
- Lu, H.; Zhang, Y.; Li, Y.; Jiang, C.; Abbas, H. User-oriented virtual mobile network resource management for vehicle communications. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3521–3532. [Google Scholar] [CrossRef]
- Nikravesh, A.Y.; Ajila, S.A.; Lung, C.H.; Ding, W. Mobile network traffic prediction using MLP, MLPWD, and SVM. In Proceedings of the 2016 IEEE International Congress on Big Data (BigData Congress), San Francisco, CA, USA, 27 June–2 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 402–409. [Google Scholar]
- Wang, S.; Li, J.; Pei, H. Efficient non-orthogonal multiple access for predicting arrival direction in multiple UAV-6G networks. Wirel. Netw. 2024, 30, 6929–6938. [Google Scholar] [CrossRef]
- Baghnoi, F.M.; Jamali, J.; Taghizadeh, M.; Fatehi, M.H. Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications. Wirel. Netw. 2024, 30, 2285–2296. [Google Scholar] [CrossRef]
- Li, S.; Xu, J.; Van Der Schaar, M.; Li, W. Popularity-driven content caching. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–9. [Google Scholar]
- Tang, B.; Kang, L. EICache: A learning-based intelligent caching strategy in mobile edge computing. Peer -Peer Netw. Appl. 2022, 15, 934–949. [Google Scholar] [CrossRef]
- Li, Q.; Wang, X.; Wang, D. Mobility-aware caching strategy in an SDN-based cooperative caching network. China Commun. 2023, 20, 196–214. [Google Scholar] [CrossRef]
- Jazaeri, S.S.; Asghari, P.; Jabbehdari, S.; Javadi, H.H.S. Toward caching techniques in edge computing over SDN-IoT architecture: A review of challenges, solutions, and open issues. Multimed. Tools Appl. 2024, 83, 1311–1377. [Google Scholar] [CrossRef]
- Berde, P.; Gerola, M.; Hart, J.; Higuchi, Y.; Kobayashi, M.; Koide, T.; Lantz, B.; O’Connor, B.; Radoslavov, P.; Snow, W.; et al. ONOS: Towards an open, distributed SDN OS. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, IL, USA, 22 August 2014; pp. 1–6. [Google Scholar]
- Mamushiane, L.; Shozi, T. A QoS-based evaluation of SDN controllers: ONOS and OpenDayLight. In Proceedings of the 2021 IST-Africa Conference (IST-Africa), Virtual, 10–14 May 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–10. [Google Scholar]
- Salman, O.; Elhajj, I.H.; Kayssi, A.; Chehab, A. SDN controllers: A comparative study. In Proceedings of the 2016 18th mediterranean electrotechnical conference (MELECON), Lemesos, Cyprus, 18–20 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar]
- Liao, L.; Leung, V.C. LLDP based link latency monitoring in software defined networks. In Proceedings of the 2016 12th International Conference on Network and Service Management (CNSM), Montreal, QC, Canada, 31 October–4 November 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 330–335. [Google Scholar]
- Wazirali, R.; Ahmad, R.; Alhiyari, S. SDN-openflow topology discovery: An overview of performance issues. Appl. Sci. 2021, 11, 6999. [Google Scholar] [CrossRef]
- Fernandez, M.P. Comparing openflow controller paradigms scalability: Reactive and proactive. In Proceedings of the 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, 25–28 March 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1009–1016. [Google Scholar]
- Khoobbakht, M.; Noei, M.; Parvizimosaed, M. Hybrid flow-rule placement method of proactive and reactive in SDNs. In Proceedings of the 2021 11th International Conference on Computer Engineering and Knowledge (ICCKE), Mashhad, Iran, 28–29 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 121–127. [Google Scholar]
- Chiaselotti, G.; Gentile, T.; Infusino, F.G.; Oliverio, P.A. The adjacency matrix of a graph as a data table: A geometric perspective. Ann. Mat. Pura Appl. 2017, 196, 1073–1112. [Google Scholar] [CrossRef]
- Magzhan, K.; Jani, H.M. A review and evaluations of shortest path algorithms. Int. J. Sci. Technol. Res 2013, 2, 99–104. [Google Scholar]
- Shu-Xi, W. The improved dijkstra’s shortest path algorithm and its application. Procedia Eng. 2012, 29, 1186–1190. [Google Scholar] [CrossRef]
- Goje, B.; Nayak, P.; Hanuman, A.S. An Optimal Route Finding on Road Networks Using A*, Dijkstra & Bidirectional Algorithms: A Brief Comparison. In Proceedings of the 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Virtual, 3–5 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–7. [Google Scholar]
- Zeng, G. On the confusion matrix in credit scoring and its analytical properties. Commun. -Stat.-Theory Methods 2020, 49, 2080–2093. [Google Scholar] [CrossRef]
- Arias-Duart, A.; Mariotti, E.; Garcia-Gasulla, D.; Alonso-Moral, J.M. A confusion matrix for evaluating feature attribution methods. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada, 17–24 June 2023; pp. 3709–3714. [Google Scholar]
Environment Setting | Detail |
---|---|
SDN controller tool | ONOS |
Nodes tool | Mininet-WiFi |
Node NUM | 5 |
Mobility model | UAV modeling |
Velocity of node | 1∼3 m/s |
Prediction cycle | 0.01 s |
Transmission range | 5.5 m |
Topology shape | linear, v-shaped, star, trapezoid, pentagon |
Simulation area | 50 × 50 |
Bandwidth | 0.5 Mbps, 1 Mbps, 5 Mbps, 10 Mbps |
Metrics of the Confusion Matrix | Precision | Recall | NPV | Specificity |
---|---|---|---|---|
Value | 0.979 | 0.952 | 0.945 | 0.976 |
rtt avg | rtt max | rtt mdev | |
---|---|---|---|
Improvement over Reactive Mode | 86.41% | 86.22% | 87.00% |
Improvement over Proactive Mode | 55.58% | 6.96% | 33.90% |
Bandwidth [Mbps] | Performance Improvement Compared to Reactive Mode | Performance Improvement Compared to Proactive Mode |
---|---|---|
0.5 | 90.09% | 55.21% |
1 | 89.98% | 62.37% |
5 | 87.75% | 55.54% |
10 | 88% | 64.84% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Um, D.; Park, H.-S.; Ryu, H.; Park, K.-J. Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN. Sensors 2025, 25, 155. https://doi.org/10.3390/s25010155
Um D, Park H-S, Ryu H, Park K-J. Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN. Sensors. 2025; 25(1):155. https://doi.org/10.3390/s25010155
Chicago/Turabian StyleUm, Doosik, Hyung-Seok Park, Hyunho Ryu, and Kyung-Joon Park. 2025. "Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN" Sensors 25, no. 1: 155. https://doi.org/10.3390/s25010155
APA StyleUm, D., Park, H. -S., Ryu, H., & Park, K. -J. (2025). Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN. Sensors, 25(1), 155. https://doi.org/10.3390/s25010155