Computer Science ›› 2017, Vol. 44 ›› Issue (7): 25-30.doi: 10.11896/j.issn.1002-137X.2017.07.005

Previous Articles     Next Articles

Method of Software Defined Network Path Abnormity Monitoring

LI Yang, CAI Zhi-ping and XIA Jing   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In the SDN architecture,the controller has to master the operating state of network data transmission path segment,which is quite significant for controller to implement the network security monitoring and traffic load balancing.Based on the characteristics of SDN architecture,the paper proposed an approach which combines reactive mea-surement and passive measurement for monitoring the network path segment abnormity.The method analyzes the opera-ting state of network traversing path from two aspects of path’s latency and available bandwidth,which can also perform the detection and give an alarm for the abnormal network path segments.Our experiments show that the method can not only measure the latency and available bandwidth of path segment,but also can detect the abnormal path segment out timely and send out alarm signals.In network conditions of constant and variable network cross traffic,the approach can monitor the abnormal path segment and measure the path’s performance parameters efficiently.

Key words: SDN,Latency measurement,Available bandwidth measurement,Path abnormity monitoring

[1] KREUTZ D,RAMOS F M V,VERSSIMO P E,et al.Software-Defined Networking:A Comprehensive Survey[J].Proceedings of the IEEE,2014,103(1):10-13.
[2] OpenFlow Networking Foundation.
[3] YU C,LUMEZANU C,ZHANG Y,et al.FlowSense:Monito-ring Network Utilization with Zero Measurement Cost[C]∥International Conference on Passive and Active Measurement.2013:575-579.
[4] CHOWDHURY S R,BARI M F,AHMED R,et al.PayLess:A low cost network monitoring framework for Software Defined Networks[C]∥2014 IEEE/IFIP Network Operations and Mana-gement Symposium.2014:1-9.
[5] RAUMER D,SCHWAIGHOFER L,CARLE G.MonSamp:Adistributed SDN application for QoS monitoring[C]∥2014 Fede-rated Conference on Computer Science and Information Systems (FedCSIS).IEEE,2014:96 1-968.
[6] VAN ADRICHEM N L M,DOERR C,K UIPERS F A.OpenNetMon:Network monitoring in OpenFlow Software-Defined Networks[C]∥2014 IEEE/IFIP Network Operations and Ma-nagement Symposium.2014:1-8.
[7] BABIARZ J.A Two-Way Active Measurement Protocol (TW-AMP).
[8] DONNELLY S,MCGREGOR T.Design principles for accurate passive measurement[M]∥Passive and Active Measurement Workshop,2000.
[9] Floodlight Controller.
[10] BOTTA A,DAINOTTI A,PESCAP A.A tool for the generation of realistic network workload for emerging networking scenarios[J].Computer Networks (Elsevier),2012,56(15):3531-3547.
[11] CAI Z P.Study on network measurement technology, model and algorithm based on active and passive measurement [D].Changsha:National University of Defense Technology,2005.(in Chinese) 蔡志平.基于主动和被动测量的网络测量技术、模型和算法研究[D].长沙:国防科学技术大学,2005.
[12] CHENG G,WANG Y X,HU Y F,et al.Network Link Fault Diagnosis Based on OpenFlow[J].Journal of Beijing University of Posts and Telecommunications,2015,8(5):42-46.(in Chinese) 程光,王玉祥,胡一非,等.基于OpenFlow的链路故障诊断方法[J].北京邮电大学学报,2015,38(5):42-46.
[13] CAI Z P,LIU F,ZHAO W T,et al.Network measurement deployment model and its optimization algorithm[J].Journal of Software,2008,9(2):419-431.(in Chinese) 蔡志平,刘芳,赵文涛,等.网络测量部署模型及其优化算法[J].软件学报,2008,19(2):419-431.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .