Optimization of Parameters at SDN Technologie Networks

Full Text (PDF, 609KB), PP.1-9

Views: 0 Downloads: 0

Author(s)

Oleg Barabash 1,* Yuri Kravchenko 2 Vadym Mukhin 3 Yaroslav Kornaga 3 Olga Leshchenko 2

1. State University of Telecommunications, Solomenskaya Street, 7, 03680, Kiev, Ukraine

2. Taras Shevchenko National University of Kiev, Volodymyrska Street, 64/13, 01601, Kiev, Ukraine

3. National Technical University of Ukraine “Kiev Polytechnic Institute”, Pr. Pobedy, 37, 03056, Kiev, Ukraine

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2017.09.01

Received: 30 Mar. 2017 / Revised: 1 May 2017 / Accepted: 15 May 2017 / Published: 8 Sep. 2017

Index Terms

Software-defined network, optimization, catastrophe theory

Abstract

A concept software-defined network is considered. Architecture of software-defined network is analyzed which, differently from traditional, foresee the separation of C-plane from a plane communication of data. The method of multicriterion optimization of multilevel networks is examined with determination of resulting objective function, which allows to carry out the synthesis of control system software-defined network (SDN) in the conditions of unforeseen changes of structure of the system.

Cite This Paper

Oleg Barabash, Yuri Kravchenko, Vadym Mukhin, Yaroslav Kornaga, Olga Leshchenko, "Optimization of Parameters at SDN Technologie Networks", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.9, pp.1-9, 2017. DOI:10.5815/ijisa.2017.09.01

Reference

[1]Efymushkyn V.A., Ledovskyh T.V., Korabelnykov D.M., Yazykov D.N. Overview of solutions of SDN / NFV foreign manufacturers // T-Comm: Telecommunications and transport. – 2015. – Volume 9. – №8. – P. 5 – 13.
[2]O.R. Laponina, V.A. Suhomlin, "Networks transformation methods to SDN-Architecture", International Journal of Open Information Technologies. Vol. 3, No. 4, 2015. pp. 8-17. ISSN: 2307-8162.
[3]Y. Levy, T.J. Ellis, “A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research”, Informing Science Journal, No. 9, 2006. pp. 181-212.
[4]Webster J, Watson RT. “Analyzing the past to prepare for the future: writing a literature review”, MIS Quarterly. No. 26(2). 2002.
[5]Gelberger A, Yemini N, Giladi R. “Performance Analysis of Software-Defined Networking (SDN)”. IEEE 21-st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2013. pp. 389-393.
[6]T. Limoncelli. OpenFlow: A Radical New Idea in Networking. Communications of the ACM: N.Y. – 2012. – Volume 55, № 8. – P. 42 – 47.
[7]Tolubko V.B., Berkman L.N., Komarova L.O., Orlov E.V. multi-objective optimization settings software-defined networking. Telecommunication and Information Technology. – 2014. – №4 – P. 5 – 11.
[8]I.F. Akyildiz, A. Lee, P. Wang, M. Luo, W. Chou. “A roadmap for traffic engineering in SDN-Open Flow networks”, Computer Networks, No. 71, 2014, pp. 1-30.
[9]A. Lara, A. Kolasani, B. Ramamurthy “Network Innovation using OpenFlow: A Survey”, IEEE Communications Surveys & Tutorials, No. 16 (1), 2014, pp. 493-512.
[10]ITU-T Recommendation E.800. Terms and definition related to Quality of Service and Network Performance including dependability. 08/1994.
[11]M.H. Raza, S.C. Sivakumar, A. Nafarieh, B. Robertson “A Comparison of Software Defined Network (SDN) Implementation Strategies” Procedia Computer Science, No 32, 2014, pp. 1050- 1055.
[12]Y. Jarraya, T. Madi, M. Debbabi “A Survey and a Layered Taxonomy of Software-Defined Networking”, IEEE Commun. Surv. Tutorials, No. 16 (4), 2014, pp. 1955- 1980.
[13]Leshchenko O. The choice of effective methods of forecasting information and communication network parameters. Modern information technologies in the field of security and defense. – 2013. – N 3 (18). – P. 46 – 49.
[14]V. Mashkov, J. Barilla, P. Simr "Applying Petri Nets to Modeling of Many-Core Processor Self-Testing when Tests are Performed Randomly". Journal of Electronic Testing Theory and Applications (JETTA), 2013, Volume 29, Issue 1, pp 25 – 34.
[15]Natarajan S, Ramaiah A, Mathen M. “A Software Defined Cloud-Gateway Automation System using OpenFlow”. IEEE 2nd International Conference on Cloud Networking (CloudNet), 2013, pp. 219-226.
[16]Z. Hu, V. Mukhin, Y. Kornaga, O. Barabash, O. Herasymenko. Analytical Assessment of Security Level of Distributed and Scalable Computer Systems. International Journal of Intelligent Systems and Applications. – Vol. 8. – № 12. – Hong Kong: MECS Publisher, 2016. – P. 57 – 64.
[17]Yu. Kravchenko, V. Vialkova "The problem of providing functional stability properties of information security systems" Proceedings of the XIIIth International Conference «Modern problems of radio engineering, telecommunications, and computer science» (TCSET’2016) Lviv-Slavsko, Ukraine February 23 – 26, 2016. – Р. 526 – 530.
[18]P. Dely, A. Kassler, L. Chow, N. Bambos, N. Bayer, H. Einsiedler, C. Peylo, D. Mellado, M. Sanchez “A software-defined networking approach for handover management with real-time video in WLANs” J. Mod. Transport., No. 21 (1), 2013, pp. 58-65.
[19]V. Mukhin, H. Loutskii, O. Barabash, Ya. Kornaga, V. Steshyn "Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems’ Characteristics" International Review on Computers and Software (IRECOS), 2015. – Vol. 10, N 12. – P. 1216 – 1224. ISSN 1828-6003.
[20]Musienko A.P., Serdyuk A.S. "Lebesgue-type inequalities for the de la Valée-Poussin sums on sets of analytic functions" Ukrainian Mathematical Journal September 2013, Volume 65, Issue 4, Р. 575 – 592.
[21]Musienko A.P., Serdyuk A.S. "Lebesgue-type inequalities for the de la Vallée poussin sums on sets of entire functions" Ukrainian Mathematical Journal October 2013, Volume 65, Issue 5, Р. 709 – 722.
[22]Arnold V.I. Catastrophe Theory, 3rd ed. Berlin: Springer-Verlag, 1992.
[23]Zh. Hu, V. Mukhin, Ya. Kornaga, Ya. Lavrenko, O. Herasymenko,"Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.7, pp.41-51, 2017. DOI: 10.5815/ijisa.2017.07.05
[24]S. Singh, S. Chand, B. Kumar, “Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks“, International Journal Computer Network and Information Security, 2015, Vol.7, No 1, pp. 38-45. DOI: 10.5815/ijcnis.2015.01.06
[25]E. Lule, T. E. Bulega, “A Scalable Wireless Sensor Network (WSN) Based Architecture for Fire Disaster Monitoring in the Developing World“, International Journal Computer Network and Information Security, 2015, Vol.7, No 2, pp. 40-49. DOI: 10.5815/ijcnis.2015.02.05
[26]Md. I. Abdullah, M. M. Rahman, M. Ch. Roy, “Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count“, International Journal Computer Network and Information Security, 2015, Vol.7, No 3, pp. 50-56. DOI: 10.5815/ijcnis.2015.03.07