• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Kernel Search-Framework for Dynamic Controller Placement in Software-Defined Network

    2021-12-14 06:05:04AliAbdiSeyedkolaeiSeyedAminHosseiniSenoandRahmatBudiarto
    Computers Materials&Continua 2021年9期

    Ali Abdi Seyedkolaei,Seyed Amin Hosseini Seno,*and Rahmat Budiarto

    1Faculty of Engineering,Ferdowsi University of Mashhad,Mashhad,Iran

    2Department of Informatics,Faculty of Science and Technology,Universitas Alazhar Indonesia,Jakarta,Indonesia

    Abstract:In software-defined networking(SDN)networks,unlike traditional networks,the control plane is located separately in a device or program.One of the most critical problems in these networks is a controller placement problem,which has a significant impact on the network’s overall performance.This paper attempts to provide a solution to this problem aiming to reduce the operationalcost of the network and improve their survivability and load balancing.The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem.It demonstrates through careful computational studies that the formulations can design networks with much less installationcost while accepting a general connected topology among controllers and user-defined survivability parameters.The researchers used the proposed framework on six different topologies then analyzed and compared with Iterated Local Search(ILS)and Expansion model for the controller placement problem(EMCPP)along with considering several evaluation criteria.The results show that the proposed framework outperforms the ILS and EMCPP.Thus,the proposed framework has a 38.53%and 38.02%improvement in reducing network implementation costs than EMCPP and ILS,respectively.

    Keywords:Software-defined network;controller placement;kernel search;integer programming;survivability;cost

    1 Introduction

    Traditional networks are not cost-effective and suitable to fully support the current Internet’s needs due to their lack of flexibility.This limitation triggers the emergence of the SDN network,a newly proposed network generation that meets the needs and has a high packet routing flexibility.Unlike traditional networks,an SDN network has a separate plane of control on a device or program.With this feature,the SDN network can change the route of sending traffic to different locations through automation decisions using program interfaces [1,2].

    The controller is responsible for propagating any flows in the network [3].Thus,the controller plays an essential role in network management [4].The controller deployment can be centralized,decentralized,or distributed,as illustrated in Fig.1.Some studies on the controller placement problem have shown that using one controller is enough [5].However,multiple controllers are used due to problems with one controller,including controller failure,which leads to a necessity to consider aspects such as scalability,fault tolerance,and network latency [6].

    Figure 1:Types of controller deployment [5]

    When the controllers are distributed,a switch can easily send data through connecting to multiple controllers.It also balances the traffic loads transmitted to the controllers with several controllers’help [7].However,in the distributed architecture,adding network controllers does not increase network reliability because sending data between the controllers needs to be connected more.As a result,network management becomes difficult.Moreover,improper controllers’placement hurts load balance [8-10].Therefore,the controllers’ placement plays a significant role in network performance.For this reason,it is vital to think through the location of the controllers [11].

    Controller placement significantly impacts network metrics,such as delay,survivability,and cost [12].Controller failure for any reason,including increasing the traffic load over the capacity of the controller,has a significant effect on the controller communications.Also,link failure can cause some paths to be lost.As a result,some switches are disconnected from their controller.Therefore,to select the best location of the controllers must take into account the survivability of the network.The main contributions of this paper are as follows:

    · We introduce a mixed-integer nonlinear programming formulation of the survivable controller placement problem to impose a general connected topology among controllers.Then,we reduce the formulation to a mixed-integer linear program to be solved more efficiently.

    · We show how to incorporate user-defined survivability requirements into our mixed-integer programming formulation.

    · We demonstrate through careful computational studies that our formulation can design networks of much less installation cost while accepting a general connected topology among controllers and user-defined survivability parameters.

    · Using kernel search framework to solve the controller placement problem and considering network dynamics and different network failure states.

    · Load balancing and reducing average delay with optimal allocation of switches and solving the controller placement problem by considering heterogeneous controllers.

    The following sections focus on the following points in the paper:Section 2 examines previous work.Section 3 explains the kernel search framework.The analysis of the experiments performed by the proposed framework on the six topologies is described in Section 4.Finally,conclusions are presented in Section 5.

    2 Related Works

    Work in [13]considers a switching on the controllers and between the controller’s delays and the controllers’ capacity.The researchers propose a clique-based algorithm to find highquality solutions to the network’s controller placement problem.Research in [14]focused on the community recognition method to deploy controllers.The researchers used a network consisting of several communities as the topology of controllers.The Louvain algorithm was used in each community.The researchers in [15]have proposed a new method that uses the bipartite graph to balance the controllers’load.The researchers used the Kuhn-Munkres algorithm to assign switches to controllers optimally,and then used genetic algorithms to locate the controllers.

    The hierarchical K-means algorithm and segmentation method in large-scale networks were used to solve the controller placement problem [16].Furthermore,an evolutionary algorithm was used to solve the multi-objective problem in large-scale networks [17].The algorithm is greedily used to generate initial population and intelligent mechanisms for diversity.Researchers in [18]have used an optimization model to achieve complete flexibility against pre-defined failures.In the study,the goal is to reduce costs so that each switch can be connected to several controllers.Besides,another optimization model was used to minimize the controllers’backup capacity.

    Researchers in [19]consider the quality of services (QoS) in terms of latency and access control paths as a criterion in determining the controller’s appropriate location.A set of connections has been selected to ensure network availability,and an exact method is used along with a heuristic method.In [20],the Varna optimization method was used for reliable placement to minimize the network’s average total latency.Researchers in [21]use the Garter Snake optimization method,a meta-heuristic algorithm that solves new iterations and temperate mating conditions.The algorithm calculates the minimum delays at the appropriate time.Research in [22]introduces a parameter optimization algorithm and model,which solves the controller placement problem with the help of optimized parameters.The researchers use heuristic algorithms,including bat optimization algorithm,firefly,Verna-based optimization algorithm,and particle swarm optimization algorithm.

    Research in [23]proposes a Density-Based Controller Placement (DBCP) that uses a clusterbased switch clustering algorithm to segment the network.The installed controllers’ capacity determines each section’s size,and a controller is placed in each area.Researchers in [24]demonstrate the dynamic placement of controllers,including locating controller modules and determining the number of controllers in each module.For this purpose,the researchers use an algorithm called LiDy+,which has a time order ofO(n2).Research in [25]examines the controller’s location to minimize the propagation delay.A modified sample-based clustering method based on affinity propagation is used for learning the optimal number and place of controllers according to the network topology.The concept of network partitioning was introduced to reduce end-to-end latency and controller queue latency [26].For network segmentation,a cluster-based partitioning algorithm was proposed to ensure that each partition can reduce latency.Several controllers are placed in each subnet to minimize the queue delay.

    Researchers in [27]ranked the SDN controllers based on their supporting characteristics using the network analysis process.The highly-rated controllers form a hierarchical cluster.Research in [28]used a hierarchical control plane to ensure the quality of service in the end-to-end paths.They used the TOPSIS method to select the path with the most appropriate quality of service

    Research in [29]utilizes an integer linear programming method.The objective function is to minimize the cost of changing the topology to find a suitable solution.The researchers considered network’s cost and survivability to solve the problem through an iterated local search algorithm because the network is dynamic [30].Besides,network failure events were taken into account.Tab.1 summarizes the existing research on controller placement in SDN networks regarding objective aspects of latency,scalability,reliability,cost,and dynamic network.

    Table 1:Comparison related works

    (Continued)

    Table 1(Continued)Ref.Methods Objectives Latency Scalability Reliability Cost Dynamic network[27]Hierarchical clustering***--[28]TOPSI S me line thod *-* *-[29]Integerar programming*--* *[30]Using iterated local search algorithm and dynamic switch allocation algorithm**** *-Using kernel search algorithm and dynamic switch allocation algorithm**** *

    Tab.1 shows that most of the works focus on latency,reliability,and scalability.Fewer research have focused on cost and network dynamics.Only research work in [30]and latency,reliability,and scalability criteria also focus on cost and network dynamics.Research in this paper extends and improves the work in [30].Extensive experiments show the significance of the improvement.

    3 The Proposed Framework

    In this work,we consider the SDN network as a graph.The objective function is multiobjective that also takes into account the cost and survivability.One way to solve multi-objective problems is to turn the objective function into a constraint with multi-objective decision-making techniques.The cost is considered an objective function,and survivability is considered as a constraint in the problem’s mathematical model.We used the kernel search algorithm for the state when the network is in the static state.Then,in the network dynamics state,the dynamic allocation algorithm has been implemented.The scenario used in this paper is as follows:

    The graph consists of the locations of the controllers and switches.The switches must be connected to the controllers,and at the controller installation locations,locations are selected as candidates for the controller installation.Graph nodes may form clusters so that there are several controllers in each cluster.From the controllers,one is the cluster head managed by a central controller.The connection of switches and controllers is in-band or out-band.The Controllers,switches,and links each have limitations,including resource constraints,bandwidth constraints,and the amount of data sent,respectively.Each controller processes the load sent by the switches according to its resources.We use the backup controller when the central controller fails.Besides,for link failure,we use disjoint paths.

    3.1 The Mathematical Expression of the Problem

    Referring to Fig.2,the network graph consists of nodesVand edgesE.Vcontains switch nodesSand controller nodesP.In other words,V=S∩PandS∩P=?.

    Figure 2:Network graph with G=(V,E)

    SetEalso contains two sets ofEPandESsuch that:

    Other sets includeO,andC.Orepresents ordered pairs of possible locations to install the controller.Cindicates the type of controller.In mathematical form:

    Due to the controller port’s limitations,one controller and the other switches can connect several switches.Also,each controller can communicate with other controllers.Tab.2 shows the symbols used in the model.

    Table 2:Symbols used in the model

    Decision variables:

    Finally,the mathematical model of the problem:

    The objective function represents the minimum costs of connecting network components(switch and controller) and deploying the controller.Constraint (5) indicates the communication between the two controllers.Constraints (6) and (7) indicate that each switch is connected to a controller.Constraint (8) indicates the deployment of only one controller in each location.Constraints (9)-(11) express the controller’s limitations,including the available number,port,and processing capacity.

    Or equivalently:

    As a result,we have:

    3.2 The Kernel Search Algorithm

    This algorithm [31]is a heuristic used to solve 0-1 program problems,and also used for each Binary Integer Linear Programming (BILP) problem,which ispromisingbinary variables if it equals to 1.All promising variables make up thekernel,and is divided into two types:theprivate kerneland thepublic kernel.The former consists of promising variables,and the latter consists of the union of private kernels.Both the private kernel and the public kernel are different.

    In the kernel search algorithm [32,33],the original problem’s linear relaxation is first solved.Then theinitial private kernelsare formed for each variable set.The union of the initial private kernels acquires theinitial public kernel.The variables do not contain the initial private kernel,which is categorized into ordered categories,calledprivate buckets.In Algorithm 1,a pseudo-code of the Kernel Search solves the controller placement problem.

    Algorithm 1:Kernel Search for CPP Input:A set P of positions and a set S of switches.Output:A feasible solution (ZLP,XLP,VLP) and the corresponding objective function value zH or failure=TRUE./*Initialization phase:Build the initial kernel K and the sequence of buckets {Bh}h=1,...,NB*/1.Set failure:=FALSE.2.Get the linear relaxat ion of t ilure:=he problem LP (Z,X,V) and store its solution (ZLP,XLP,VLP),if any.Otherwise,set faTRUE and STOP.3.if (ZLP,XLP,VLP) is integer then STOP end if 4.Sort the positions in set P and add them to list L.5.For each position in L sort the switches in set S and select a subset of them.6.Consider list L and· Build the initial kernel K is composed of the first m positions in L.· Consider the last |P|-m positions in L and build a sequence {Bh}h=1,...,NB.· Let NB be the number of buckets generated.7.Solve the restricted problem BILP(K).If problem BILP(K) has feasible solutions then let(ZLP,XLP,VLP) be its optimal solution and zH the corresponding optimal value.Otherwise,set failure:=TRUE./*Solution phase:Solve a sequence of restricted BILP problems*/1.for h=1 to NB do 2.Create set K′=(K U Bh).3.Solve BILP(K′) adding the following two constraints 3-1.zH as upper bound to the objective function value;3-2.images/BZ_546_400_2338_419_2383.pngimages/BZ_546_419_2304_466_2349.pngi∈Bh Zi≥1.4.if BILP(K′) is feasible,(Z,X,V) is its optimal solution and z is its optimal value then 5.if failure=TRUE then set failure:=FALSE end if;6.set ZLP:=Z,XLP:=X,VLP:=V and zH:=z;7.let B+h ?Bh be the set of positions belonging to bucket Bh selected in solution (Z,X,V);8.let B-h(huán) ?Bh be the set of positions belonging to the kernel that have not been selected p times since they have been introduced in set K;9.Set K=K UB+h$B-h(huán) .10.end if 11.end for 12.STOP

    In this algorithm,the initial private kernel is based on the answer to the first step.Buckets are made from the smallest to the largest using the reduced cost coefficients.The current private kernel update is as follows.A member variable of the private bucket becomes the current private kernel,which is not considered a promising variable.

    BILP (Z,X,V) contains the set of variables representing the controller installation at the locationi,the switch and the controller connection,and communication of controllers with each other,respectively.In other words,mathematically:

    The linear relaxation of BILP (Z,X,V) is denoted as LP (Z,X,V).In the kernel search algorithm,the private kernel for the set ofX-variables andV-variables should be consistent with the private kernel set of variablesZ.The same argument is also used for private buckets.

    The private kernel for variablesZ,X,andVare represented asK(Z),K(X),andK(V),respectively.EachZcainK(Z)serves a subset of switches.IfZcavalues do not exist inK(Z),the variableXabdoes not exist inK(X)andK(V).Thepublic kernelis represented byK,obtained from the union private kernelsK(Z),K(X),andK(V).

    The kernel search algorithm functions in two phases.In the first phase,LP (Z,X,V) is solved.(ZLP,XLP,VLP) indicates the solution to solve the LP problem.If (ZLP,XLP,VLP)is an integer,this value is considered the best solution to the problem,and the algorithm ends.Otherwise,the LP value is considered the lower bound of the objective function,which is used to detect promising variables.Then,the algorithm sorts the setP.For this purpose,the variableZcareduced cost is obtained from LP,which is indicated by c’(Zca).The positions are then sorted in descending order based on the number of connected switches used in LP (Z,X,V).Places not selected in LP solution,i.e.,Zca=0,sorted by ascending order of c’(Zca) values.These sorted values are placed in a list calledL.In this list,places to have a controller are first,and the other positions are the last part of the list.

    After sorting positions,the switches should be connected to these positions.Therefore,the reduced cost of the variableXabobtained from the LP solution displayed the symbol c’(Xab).Then,a subset of the switches is connected to the selected positions,with the condition that the value of c’(Xab) for each pair (S,P) must not exceed the threshold valueγ.i.e.,C′(Xab)≤γ.The value of the parameterγ,obtained from the median of the reduced costs of the variablesXabrelated to members of the initial private kernelK(Z).i.e.,:γ=median

    The created public kernel is calledK.The setK(Z)containsmof the variableZcafrom the first listLthat the value ofmis given as the parameter to the algorithm.TheK(X)for each member position ofK(Z)also contains a subset of the switches associated with that position.The remaining |P|-mpositions are classified intoNBsets;each set represents asB(Z)h.htakes a value between1andNB.B(Z)h=1,...,NBis denoted as private buckets.Each setB(Z)hexcept for the last set,i.e.,h=NB,has the number oflbuckmembers whoselbuckis equal to the parameterm.The last set has the number of(|P|-m)-((NB-1)*m)members.Thus,according to the contents expressed,the number of buckets can also be calculated with this formula,NB=Likewise,theNBprivate bucket creates the variableX,represented asB(X)h=1...,NB.The run algorithm’s maximum number can be consideredNBto determine the stopping condition for implementing the kernel search algorithm.Therefore,theNBparameter determines the number of times to run the algorithm.

    In this algorithm,the variablezHis used as the upper bound of the BILP problem.Before solving the BILP problem,check that each switch connects at least one setK(Z)position.If the switch is not connected,setK(X)is corrected;through the way,the corresponding switch is connected to all the positions inK(Z)and setK(X)is updated.

    In the second phase,the BILP problem along withNBis solved.In each iterationh,where ish=1,NB,the current public kernelKis updated by adding the member variables of the current private bucketsB(Z)handB(X)h.The BILP problem is solved based on the updated kernel and the definition of two new constraints aiming to reduce computing times.One of these constraints is changing the optimal solution’s upper bound,and another is to select at least one position from the current private buckets to solve the problem.If the BILP problem is feasible,the best solution will be provided according to the ontained optimal solution.In this case,at least one position from its current private bucket is selected in the optimal solution,and the current private KernelK(Z)updates these variables.The set includes these positions are shown asB(Z)+h.

    Conversely,if a position in the current private kernel has not been selected and the number of timest,the variable is not promising,then it is removed from its private kernel.The value of the parametertin this algorithm is equal to 2.The set,including these positions,is shown asB(Z)-h(huán).Thus,at the end of the iterationh,the current kernelK(Z)at the beginning of iterationh+1 consists of the members of the setB(Z)+h,and minus the members of the setB(Z)-h(huán).The same procedure is performed for the current private kernelK(X).If a new position is added to theK(Z),the switches associated with the new position are added to the current private kernelK(X).Conversely,when a position is removed fromK(Z),the switches associated with that position are removed from the current private kernelK(X).When the last bucket has been evaluated,the algorithm ends.

    Fig.3 shows an iteration of the kernel search algorithm.The black and gray circles represent the initial kernel and buckets at the beginning and end of the first phase,which is BILP (K).At the beginning of the second phase,BILP (KUB1) is considered as a problem.If an optimal solution is obtained,the kernel is updated,i.e.,promising variables (empty circles) are added,and variables that are not promising for a long time are deleted from the kernel (cross-references).The second phase continues with solving the BILP (KUB2) that kernelKhas been updated.

    Figure 3:An iteration of the kernel search algorithm [32]

    The algorithm does not work properly in both cases.The first case occurs when there is no feasible solution for LP.The second case occurs when no feasible solution is found for each BILP problem.The latter case occurs while the positions’capacity to connect the switches associated with it,is not enough.The implementation of the kernel search algorithm depends on the exact determination of the parameters.

    In order to examine the complexity of the kernel search algorithm,we consider its execution time.Algorithm execution time is an essential criterion in any algorithm that shows us how long the algorithm takes to complete a given input.One standard method for analyzing the complexity of algorithms is asymptotic analysis.In this method,execution time is calculated according to the size of the input.Since the controller placement problem is to determine the controllers’number and location and the number of possible locations,P,to install the controller as input to the algorithm is given.Therefore,the complexity of the algorithm depends on the value ofP.

    As we follow and extend the work in [30],we consider all the conditions mentioned there regarding the events causing the network’s dynamics and failures.Hence,we refrain from stating them again in this section.

    4 Experiment and Analysis

    In this section,we have presented the results of the simulation of the proposed framework,which refers to the comprehensive model for controller placement (Section 3.1) and the proposed algorithm (Section 3.2).The is reason is that unlike previous research,the comprehensive model is,to deal with the controller placement problem in more detail and with realistic assumptions.This model comes with the proposed algorithm that can be implemented on any network type,with any size and topology.In order to evaluate our proposed framework,we performed experiments.In these experiments,we compare the proposed framework’s results with EMCPP [29]ILS [30].To perform these experiments,we select topologies from the Internet Topology Zoo [34].Tab.3 shows the information of these topologies.

    Table 3:Information of experimented topologies

    The experiments were carried out in three steps.First,we evaluated the proposed framework in terms of network cost;then,we examined the network’s survivability.For this purpose,we used formulation (4) defined in [30].Finally,in the third step,we examined the framework based on connection failure probability and the average delay.

    These experiments were performed using a system with Intel Core-i5 processor with 8 GB of RAM.CPLEX and MATLAB software were used to implement the comparison methods.CPLEX is commercial software package and a well-known Branch and Bound solvers of mixed-integer programming problems.Indeed,extensive studies in mathematical programming literature would suggest CPLEX as the most powerful commercial.The parameters used in these experiments are shown in Tab.4.

    Table 4:Experiment parameters

    Each experiment was repeated ten times to achieve more accurate results.Tabs.5 and 6 show the results of these experiments.

    Table 5:Comparison of the proposed framework with EMCPP and ILS methods

    Table 6:Results of the proposed framework

    In Tab.5,the first to third columns show information about the topologies.Columns 4 to 6 show the best cost of the proposed framework and the EMCPP and ILS.The last two columns also express the percentage of improvement of the proposed method compared to EMCPP and ILS,which are calculated by (23) of this percentage.

    According to the results shown in Tab.5,it can be concluded that the proposed framework performs better than its counterparts in most of the experimented topologies.This advantage is even more noticeable when the topology size is more extensive.The reason is the proper design of the control plane architecture.The proposed framework designs the control plane in such a way as to reduce the cost of links.Also,survivability remains at a desirable level.However,the methods compared,and used the full mesh topology to connect the controllers.This topology requires many links to connect each controller.Hence,connections impose a high cost on the network.According to the experiments results analysis,at least 67% of the network cost is related to connecting the switch to the controller and the controller to the controller.

    The reduction of some topology improvement percentages is related to the topology structure and switches and controllers’arrangement.For this reason,the controller placement is critical,as the deployment of the switches is random.

    The first to third columns in Tab.6 show information about the experimented topologies form whichZ*indicates the best solution for each topology,and the fifth column focuses on the proposed framework for a solution.The Gap expresses the deviation of the best solution,which is calculated by (24).

    The average column is the mean of the best solution with ten times runs.The eighth column shows the deviation of this average.The time column expresses the average execution time of the algorithm.

    The results related to the network’s survivability are shown in Figs.4 and 5.In these Figures,Rindicates the degree of survivability.The proposed framework is more cost-effective in terms of network survivability in the event of a failure.Thus,the proposed framework receives a higher degree of survivability than the methods compared.The EMCPP does not provide any flexibility in selecting the required survivability.At the same time,the proposed framework receives the required survivability as input.Therefore,a different amount of survivability can be imposed on different network based on user observations.According to these experiments’results,the proposed framework imposes a lower cost on the network both in terms of implementation and survivability.Also,the proposed framework includes the proper use of ports.Despite applying a complete graph to the installed controllers,each controller needs to connect to other controllers in the full mesh topology,a port occupation.Experiments show that using such a topology imposes a high cost on connecting controllers to the network.This does not show a balance between the various costs of the objective function.

    In contrast,the proposed framework usually finds the best balance between the objective function’s different costs.Even the EMCPP cannot guarantee a high degree of survivability for cases where a small number of controllers are installed.For example,when only two controllers are installed,there is only one connecting link between the two controllers,and there is no guarantee that the link does not fail.Therefore,paying attention to the control plane architecture is essential to solve the controller placement problem.

    As shown in Fig.4,the proposed framework costs less for differentRvalues than the EMCPP and ILS for the Claranet topology.In Fig.4c,there is no answer forR=3 because,in topology Claranet-C,|P|=3.Hence,forR=3,we need |P|=4.

    Figure 4:Comparison of experiment results on Claranet topology (a) Claranet-A (b) Claranet-B(c) Claranet-C

    Fig.5a shows that the proposed framework’s cost withR=2 andR=3 costs less than EMCPP and ILS withR=1.Also,in Fig.5b,the proposed framework’s cost withR=2 andR=3 is lower than EMCPP and ILS withR=1 andR=2,respectively.i.e.,the cost of the proposed framework forR=2 is 1063660,while the cost of EMCPP and ILS forR=1 is 1190300 and 1182300,respectively.This means that the proposed framework,compared to the EMCPP and ILS,can design a network that increases survivability while reducing cost.Finally,it can be concluded that the proposed framework is more cost-effective for large-scale networks than the EMCPP and ILS,even when the degree of survivability increases compared to the EMCPP and ILS.

    One of the proposed framework’s main advantages is that the network’s survivability can change dynamically depending on the network’s environment,and affecting the cost of network implementation.For example,networks with secure environments do not require a high degree of survivability.Hence,the cost can also be reduced if a full-mesh topology in the control plane architecture design for secure environments incurs additional costs.The proposed framework focuses on network dynamics such as increasing or decreasing switches and controllers,making it stand out.Another advantage of the proposed framework is using a kernel search algorithm to find the best solution in the shortest time.

    Figure 5:Comparison of experiment results on Digex topology (a) Digex-A (b) Digex-B(c) Digex-C

    4.1 Connection Failure Probability

    The connection failure probability includes the probability of controller failure and the probability of the link failure.To compute the link failure probability,we considered link disruption probability (PLD) and link congestion probability (PLC).Eqs.(25) and (26) were used for this calculation:

    e,l,h,p,andr,respectively,indicate the probability of environmental,link,hardware,power failure,and the installed controller’s reliability index.PLD(eab) andPLC(eab) calculated using(27) and (28).The variablekindicates the number of subdomains.The subdomains were obtained according to the segmentation of the network.

    In (27),PLD(eab) indicates the probability of link disruption betweenaandb.dabandyabindicate the distance betweenaandband the connection link between these two nodes,respectively.pulalso indicates the probability of link failure per unit length.In these experiments,the value ofpulwas obtained for every 1 km.

    In (28),thePLC(eab) indicates the probability of link congestion betweenaandb.χabandωabindicate the traffic direction and link bandwidth,respectively.If the traffic direction is fromatob,thenχab=1;otherwise,χab=0.λashows the flow request rate of the switcha.

    Now,in particular,by selecting two topologies Claranet-A and Digex-A,we examined the probability of connection failure.The result of this experiment is shown in Fig.6.

    Figure 6:The probability of connection failure (a) Claranet-A (b) Digex-A

    For this reason,in the case of failure in the communication link,the probability of connection failure is maximized.EMCPP and ILS consider the shortest path between nodes,thus preventing disconnection of some connections.Given that the reliability rate is considered in the proposed method,it can reduce connection failure.

    4.2 The Average Delay

    This delay consists of the propagationdprop,the processingdproc,and the transmissiondtrandelays.In this experiment,the values ofdproc=0.01 ms anddtran=0.05 ms are considered.Also,the value ofdpropincreases by 0.1 milliseconds for every 1 km.Accordingly,by changing the number of controllers,we calculate each method’s average delay for the two topologies Claranet-A and Digex-A.The results of this experiment are shown in Figs.7a and 7b.

    Figure 7:The average delay (a) Claranet-A (b) Digex-A

    As shown in Figs.7a and 7b,adding a controller in all three frameworks causes to decrease the average latency.The proposed method performs better in reducing latency compared to the other two methods.This reduction is due to the reliable controller placement,proper distribution of switches,and the delay when allocating the switch to the controllers.Therefore,the average delay has significant decrease.When the number of controllers reaches higher than 8,the delay is relatively stable.

    5 Conclusion

    Two metrics of cost and survivability as factors affecting the control plane’s efficiency and the network’s overall efficiency were examined in this paper,as in the related works,these criteria have not received adequate attention from researchers.Since minimizing the cost is one of the influential factors in network implementation,it is essential to consider this criterion in solving the controller placement problem.As shown in the simulation results,67% of the costs are related to connecting network elements to each other.Therefore,improper location of controllers can increase the cost of network implementation.As for the survivability criterion,since networks are at risk in real environments,solutions must be considered for the network’s stability in these events.Therefore,paying attention to this criterion also has a significant effect on solving the controller placement problem.Then,the mathematical model of the problem was presented to take into account the stated criteria in which the cost was considered as an objective function and survivability as a constraint.As the controller placement problem space becomes larger as the network size increases,an algorithm is needed to get the best solution in the shortest time.For this purpose,the kernel search algorithm was used in the controller placement problem.Then,to check the accuracy of the proposed mathematical model and the proper performance of the proposed algorithm,by performing simulations,a comparison was made with the EMCPP and ILS based on cost and survival criteria.In this simulation,six different topologies of the Internet topology Zoo were selected to evaluate the proposed framework’s performance.The state of the network was also examined in terms of dynamics and events that cause network failure.The results obtained in the network’s dynamic state showed that the proposed framework has a better performance in reducing costs and increasing the network’s survivability.Thus,the proposed framework has a 38.53% and 38.02% improvement in reducing network implementation costs than EMCPP and ILS,respectively.Therefore,the summary of these results indicates that the proposed framework,using a suitable mathematical model close to the actual network conditions and an algorithm with the best speed of action to find the best solution,can solve the controller placement problem.

    We will try to solve the controller placement problem with traffic forecasting based on machine learning in future work.We also plan to expand our work in the future by addressing the dynamic controller placement to meet the needs of 5G networks,such as reliable low-latency communications.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费观看的影片在线观看| 这个男人来自地球电影免费观看 | 又大又黄又爽视频免费| 熟女av电影| 日韩 亚洲 欧美在线| 日本猛色少妇xxxxx猛交久久| 日本午夜av视频| 男人操女人黄网站| 日韩成人伦理影院| 免费日韩欧美在线观看| 少妇被粗大猛烈的视频| 亚洲av二区三区四区| av线在线观看网站| 国产高清有码在线观看视频| 婷婷色麻豆天堂久久| 国产一区二区三区综合在线观看 | 精品一区在线观看国产| 久久久亚洲精品成人影院| 人妻 亚洲 视频| 日韩成人av中文字幕在线观看| 亚洲欧美精品自产自拍| 99热全是精品| 在线观看三级黄色| 精品少妇黑人巨大在线播放| 在现免费观看毛片| 美女国产视频在线观看| 免费观看av网站的网址| 亚洲第一av免费看| 精品一区二区三区视频在线| 亚洲综合色网址| 日本免费在线观看一区| 久久久久久人妻| 亚洲欧洲日产国产| 欧美日韩综合久久久久久| 国产亚洲精品第一综合不卡 | 多毛熟女@视频| 精品人妻偷拍中文字幕| 伦精品一区二区三区| 亚洲精品456在线播放app| 午夜91福利影院| 亚洲综合色网址| 亚洲av国产av综合av卡| 在线精品无人区一区二区三| 中文字幕免费在线视频6| 亚洲高清免费不卡视频| 黑人高潮一二区| 亚洲精品日韩在线中文字幕| 99re6热这里在线精品视频| 午夜福利视频在线观看免费| 国产成人aa在线观看| 精品少妇久久久久久888优播| 国产 一区精品| 亚洲成色77777| videos熟女内射| 大片免费播放器 马上看| 国产成人精品婷婷| 亚洲人成77777在线视频| 菩萨蛮人人尽说江南好唐韦庄| 免费日韩欧美在线观看| 久久久久久久久久久久大奶| 一边摸一边做爽爽视频免费| 91久久精品国产一区二区成人| 成人黄色视频免费在线看| 欧美日本中文国产一区发布| 久热久热在线精品观看| 亚洲成人手机| 亚洲综合色惰| 免费高清在线观看视频在线观看| 国产欧美亚洲国产| 97在线人人人人妻| 建设人人有责人人尽责人人享有的| 久久99热这里只频精品6学生| 哪个播放器可以免费观看大片| videos熟女内射| 久久久久国产精品人妻一区二区| 天堂8中文在线网| 成人手机av| 亚洲在久久综合| a级毛色黄片| 人妻人人澡人人爽人人| 日日撸夜夜添| 国产精品一国产av| 女性生殖器流出的白浆| 大陆偷拍与自拍| 国产成人freesex在线| 能在线免费看毛片的网站| 多毛熟女@视频| 一本色道久久久久久精品综合| 只有这里有精品99| 日本免费在线观看一区| 日韩,欧美,国产一区二区三区| 免费人成在线观看视频色| av在线app专区| 日韩 亚洲 欧美在线| 美女内射精品一级片tv| 午夜激情久久久久久久| 国产一区二区在线观看日韩| 久久久亚洲精品成人影院| 99国产综合亚洲精品| 夜夜爽夜夜爽视频| 午夜精品国产一区二区电影| 91精品国产国语对白视频| 一级a做视频免费观看| 国产精品成人在线| 成年人免费黄色播放视频| 中文字幕亚洲精品专区| 下体分泌物呈黄色| 大片免费播放器 马上看| 一边亲一边摸免费视频| 人人妻人人澡人人爽人人夜夜| 国产日韩欧美视频二区| 国模一区二区三区四区视频| 国产男人的电影天堂91| 亚洲av日韩在线播放| 日韩在线高清观看一区二区三区| 18禁动态无遮挡网站| 久久久国产一区二区| 日本黄色日本黄色录像| 丝袜喷水一区| 天堂8中文在线网| 欧美精品一区二区大全| 一个人免费看片子| 久久久久国产精品人妻一区二区| 亚洲国产精品一区三区| 久久久久精品久久久久真实原创| 欧美精品一区二区大全| 午夜免费男女啪啪视频观看| 婷婷色av中文字幕| 亚洲综合精品二区| 国产日韩一区二区三区精品不卡 | 欧美精品一区二区免费开放| 人妻一区二区av| 在线观看www视频免费| 国产免费一区二区三区四区乱码| 国产精品一区二区在线不卡| 少妇的逼好多水| 国产永久视频网站| 免费看不卡的av| 日韩一区二区三区影片| 高清欧美精品videossex| 高清不卡的av网站| 一本色道久久久久久精品综合| 街头女战士在线观看网站| 亚洲高清免费不卡视频| 亚洲av国产av综合av卡| 日韩,欧美,国产一区二区三区| 精品人妻在线不人妻| 婷婷色av中文字幕| 99久国产av精品国产电影| 青春草亚洲视频在线观看| 美女国产视频在线观看| 国产精品偷伦视频观看了| 午夜福利,免费看| 免费少妇av软件| 成人二区视频| 久久97久久精品| 久久ye,这里只有精品| 国产一区二区在线观看日韩| 午夜福利在线观看免费完整高清在| 色94色欧美一区二区| 免费少妇av软件| 在线亚洲精品国产二区图片欧美 | 人妻制服诱惑在线中文字幕| 另类亚洲欧美激情| 日本91视频免费播放| 中文字幕制服av| 国产无遮挡羞羞视频在线观看| 午夜激情av网站| 纯流量卡能插随身wifi吗| 亚洲丝袜综合中文字幕| 日本黄色片子视频| 中文乱码字字幕精品一区二区三区| 亚洲综合精品二区| av卡一久久| 亚洲高清免费不卡视频| 人人妻人人添人人爽欧美一区卜| 国产高清国产精品国产三级| 午夜激情久久久久久久| 又粗又硬又长又爽又黄的视频| 成人国语在线视频| 人人妻人人澡人人看| 制服诱惑二区| 日本与韩国留学比较| 国产有黄有色有爽视频| 久久狼人影院| 五月天丁香电影| 久久久国产一区二区| 边亲边吃奶的免费视频| 亚洲第一av免费看| 精品卡一卡二卡四卡免费| 高清av免费在线| 伊人亚洲综合成人网| 久久这里有精品视频免费| 麻豆乱淫一区二区| 在线观看国产h片| 欧美精品一区二区大全| 日韩成人伦理影院| 国产精品久久久久久精品古装| 日日爽夜夜爽网站| 亚洲一级一片aⅴ在线观看| 亚洲av成人精品一二三区| 日韩精品有码人妻一区| 又大又黄又爽视频免费| 国产成人91sexporn| 一本色道久久久久久精品综合| 又粗又硬又长又爽又黄的视频| 男女边吃奶边做爰视频| 在线观看三级黄色| 日韩强制内射视频| 欧美日韩视频高清一区二区三区二| 精品一区在线观看国产| 中国国产av一级| 日日爽夜夜爽网站| 成人无遮挡网站| 国模一区二区三区四区视频| av女优亚洲男人天堂| 国内精品宾馆在线| 在线 av 中文字幕| 免费黄色在线免费观看| 国产精品久久久久久久久免| 国产在线一区二区三区精| 久久久久久人妻| 一级爰片在线观看| 精品亚洲成a人片在线观看| 天天影视国产精品| 青春草视频在线免费观看| 日本91视频免费播放| 考比视频在线观看| 亚洲国产毛片av蜜桃av| 亚洲三级黄色毛片| 少妇的逼水好多| 两个人免费观看高清视频| 色5月婷婷丁香| 久久鲁丝午夜福利片| 久久久久久久久久久免费av| 夜夜看夜夜爽夜夜摸| 两个人的视频大全免费| 老司机影院成人| 亚洲国产精品成人久久小说| 夜夜骑夜夜射夜夜干| 下体分泌物呈黄色| 天堂俺去俺来也www色官网| 亚洲av在线观看美女高潮| 又黄又爽又刺激的免费视频.| 十八禁高潮呻吟视频| 三上悠亚av全集在线观看| 18禁观看日本| 中文字幕人妻熟人妻熟丝袜美| 久久婷婷青草| 99re6热这里在线精品视频| 欧美最新免费一区二区三区| 免费观看在线日韩| 一区二区三区精品91| 制服诱惑二区| 亚洲怡红院男人天堂| 桃花免费在线播放| 日韩三级伦理在线观看| 高清av免费在线| 精品久久国产蜜桃| 国产国拍精品亚洲av在线观看| 18禁裸乳无遮挡动漫免费视频| 人人妻人人澡人人看| 中文欧美无线码| av免费观看日本| 免费播放大片免费观看视频在线观看| 精品国产一区二区久久| xxx大片免费视频| 在现免费观看毛片| 久久精品国产鲁丝片午夜精品| 亚洲精品第二区| 丰满饥渴人妻一区二区三| 中文字幕亚洲精品专区| 亚洲国产精品国产精品| 国产精品麻豆人妻色哟哟久久| 精品一品国产午夜福利视频| 午夜免费男女啪啪视频观看| 女性生殖器流出的白浆| 国产精品久久久久久久电影| 满18在线观看网站| freevideosex欧美| 国产熟女午夜一区二区三区 | 下体分泌物呈黄色| 天美传媒精品一区二区| 免费大片黄手机在线观看| 国产成人免费无遮挡视频| videos熟女内射| 我的女老师完整版在线观看| 国产有黄有色有爽视频| 永久网站在线| 亚洲av欧美aⅴ国产| 女人久久www免费人成看片| 美女脱内裤让男人舔精品视频| 91精品一卡2卡3卡4卡| 久久精品国产亚洲av涩爱| 九九在线视频观看精品| 永久免费av网站大全| 成人黄色视频免费在线看| xxx大片免费视频| 午夜免费鲁丝| 人妻人人澡人人爽人人| 99热6这里只有精品| 精品亚洲成a人片在线观看| 97超碰精品成人国产| 狠狠婷婷综合久久久久久88av| 午夜av观看不卡| 日日撸夜夜添| 日本av手机在线免费观看| 在线 av 中文字幕| 久久精品国产亚洲av天美| 91精品三级在线观看| 亚洲精品亚洲一区二区| 99久久中文字幕三级久久日本| 黄色毛片三级朝国网站| 亚洲国产精品成人久久小说| 狠狠精品人妻久久久久久综合| h视频一区二区三区| 不卡视频在线观看欧美| 两个人的视频大全免费| 我的女老师完整版在线观看| 久久99热这里只频精品6学生| 午夜激情av网站| 国产成人精品一,二区| 日韩熟女老妇一区二区性免费视频| 18在线观看网站| 免费久久久久久久精品成人欧美视频 | av在线播放精品| 丰满饥渴人妻一区二区三| 精品一品国产午夜福利视频| 夫妻性生交免费视频一级片| 精品久久久久久久久亚洲| 亚洲欧洲日产国产| 国产 精品1| 大又大粗又爽又黄少妇毛片口| 国产成人精品在线电影| 亚洲天堂av无毛| 高清av免费在线| 18禁在线无遮挡免费观看视频| 免费看av在线观看网站| 考比视频在线观看| 欧美精品一区二区大全| 国产亚洲欧美精品永久| 99久久精品国产国产毛片| 极品少妇高潮喷水抽搐| 国产免费一区二区三区四区乱码| 黄色视频在线播放观看不卡| 午夜影院在线不卡| 久久国产精品大桥未久av| 视频区图区小说| 一级毛片电影观看| 综合色丁香网| 啦啦啦啦在线视频资源| 中文字幕久久专区| 人体艺术视频欧美日本| 久久精品国产自在天天线| 国产黄片视频在线免费观看| 麻豆乱淫一区二区| 欧美97在线视频| 一级毛片黄色毛片免费观看视频| 日韩精品有码人妻一区| 国产成人av激情在线播放 | 欧美亚洲日本最大视频资源| 久久精品国产a三级三级三级| av视频免费观看在线观看| 色94色欧美一区二区| 免费观看a级毛片全部| 国产精品三级大全| 春色校园在线视频观看| 国产爽快片一区二区三区| 麻豆成人av视频| 国产永久视频网站| 日韩中文字幕视频在线看片| 午夜91福利影院| 欧美日韩亚洲高清精品| 亚洲无线观看免费| 这个男人来自地球电影免费观看 | 久久久久视频综合| 国产亚洲午夜精品一区二区久久| 亚洲国产最新在线播放| 飞空精品影院首页| 亚洲性久久影院| 亚洲欧洲国产日韩| 精品国产国语对白av| 国产爽快片一区二区三区| 黄色一级大片看看| 欧美人与性动交α欧美精品济南到 | 美女主播在线视频| 国产综合精华液| 亚洲国产色片| 大又大粗又爽又黄少妇毛片口| 日本黄大片高清| 国产成人免费观看mmmm| 丝袜美足系列| 亚洲精品一区蜜桃| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 只有这里有精品99| 精品少妇久久久久久888优播| av卡一久久| 国产精品国产三级国产专区5o| 在线观看一区二区三区激情| 国产成人一区二区在线| 午夜av观看不卡| 日韩成人av中文字幕在线观看| 久热久热在线精品观看| 国产高清不卡午夜福利| 精品久久久久久电影网| 一本久久精品| 国产色婷婷99| 天天躁夜夜躁狠狠久久av| 国产高清国产精品国产三级| 另类精品久久| 久久国产精品大桥未久av| xxx大片免费视频| 一区二区三区乱码不卡18| 亚洲国产毛片av蜜桃av| 99视频精品全部免费 在线| 欧美日韩精品成人综合77777| 午夜免费鲁丝| 欧美亚洲日本最大视频资源| 国产在线免费精品| 91aial.com中文字幕在线观看| 天美传媒精品一区二区| 国产乱来视频区| 国产毛片在线视频| 欧美日韩成人在线一区二区| 在线观看美女被高潮喷水网站| 特大巨黑吊av在线直播| 五月开心婷婷网| 精品一区二区免费观看| 亚洲精品国产av成人精品| 高清毛片免费看| 午夜福利在线观看免费完整高清在| 日本猛色少妇xxxxx猛交久久| 99热6这里只有精品| 高清视频免费观看一区二区| 亚洲精品日韩av片在线观看| 精品国产国语对白av| 国产色爽女视频免费观看| 天天躁夜夜躁狠狠久久av| 国产精品一区二区在线不卡| 嘟嘟电影网在线观看| 精品国产一区二区三区久久久樱花| www.色视频.com| 五月天丁香电影| 另类亚洲欧美激情| 观看av在线不卡| 老司机亚洲免费影院| 日韩电影二区| av在线观看视频网站免费| 亚洲欧美日韩卡通动漫| 精品人妻一区二区三区麻豆| 日本黄大片高清| 一级二级三级毛片免费看| 高清毛片免费看| 人妻夜夜爽99麻豆av| 免费大片18禁| 一个人免费看片子| 又大又黄又爽视频免费| 亚洲精品视频女| 国产精品久久久久久av不卡| 久久久a久久爽久久v久久| 久久99蜜桃精品久久| 亚洲欧美清纯卡通| 国产毛片在线视频| 国产精品秋霞免费鲁丝片| 亚洲国产精品成人久久小说| 九草在线视频观看| 午夜久久久在线观看| 熟妇人妻不卡中文字幕| 午夜日本视频在线| 丰满少妇做爰视频| 日韩电影二区| 99热国产这里只有精品6| 一区二区三区免费毛片| 亚洲人成网站在线观看播放| 国产精品秋霞免费鲁丝片| 国产精品熟女久久久久浪| 99国产精品免费福利视频| 美女国产视频在线观看| 亚洲人与动物交配视频| 黄色一级大片看看| 午夜久久久在线观看| 九九爱精品视频在线观看| 人成视频在线观看免费观看| 久久97久久精品| 免费人成在线观看视频色| 看非洲黑人一级黄片| 人妻系列 视频| 女的被弄到高潮叫床怎么办| 亚洲精品日韩av片在线观看| 三级国产精品片| 国产av精品麻豆| 久久人人爽av亚洲精品天堂| 十八禁高潮呻吟视频| 成人手机av| 久久午夜福利片| 在线播放无遮挡| 欧美bdsm另类| 久久人人爽人人片av| 国产精品一区二区三区四区免费观看| 日韩av免费高清视频| 蜜桃久久精品国产亚洲av| 欧美精品人与动牲交sv欧美| 91精品伊人久久大香线蕉| 午夜福利视频在线观看免费| freevideosex欧美| 高清欧美精品videossex| 在线精品无人区一区二区三| 精品久久蜜臀av无| 中文字幕亚洲精品专区| 视频在线观看一区二区三区| av电影中文网址| 国产在线视频一区二区| 色哟哟·www| 国产在线一区二区三区精| 国产精品国产三级专区第一集| 一级毛片我不卡| 不卡视频在线观看欧美| 一本色道久久久久久精品综合| 蜜桃国产av成人99| 伊人亚洲综合成人网| 热99国产精品久久久久久7| 日韩熟女老妇一区二区性免费视频| 久久综合国产亚洲精品| 久久婷婷青草| 日韩三级伦理在线观看| 99热这里只有精品一区| 免费观看a级毛片全部| 国产亚洲一区二区精品| 久久免费观看电影| 亚洲精品日本国产第一区| 国产精品久久久久久久电影| 丝袜美足系列| 国产成人精品福利久久| 视频中文字幕在线观看| 日韩在线高清观看一区二区三区| √禁漫天堂资源中文www| 亚洲三级黄色毛片| 我的女老师完整版在线观看| 黑人巨大精品欧美一区二区蜜桃 | 中文字幕人妻丝袜制服| 18禁在线无遮挡免费观看视频| 黄色配什么色好看| 天堂8中文在线网| 色5月婷婷丁香| 日韩强制内射视频| 午夜免费男女啪啪视频观看| 日韩av免费高清视频| 青春草视频在线免费观看| 黑人高潮一二区| 日本91视频免费播放| 精品一区二区免费观看| 丝瓜视频免费看黄片| 日韩精品有码人妻一区| 在线亚洲精品国产二区图片欧美 | a级毛色黄片| 久久久亚洲精品成人影院| 水蜜桃什么品种好| 美女大奶头黄色视频| 我要看黄色一级片免费的| 最近中文字幕2019免费版| 美女内射精品一级片tv| 免费av不卡在线播放| 91精品国产国语对白视频| 女人久久www免费人成看片| 黄色毛片三级朝国网站| 伦理电影大哥的女人| 黄色毛片三级朝国网站| 看十八女毛片水多多多| 美女福利国产在线| 色94色欧美一区二区| 亚洲高清免费不卡视频| 欧美日韩综合久久久久久| 亚洲高清免费不卡视频| 伦理电影大哥的女人| 亚洲色图综合在线观看| 国产精品不卡视频一区二区| 国产亚洲欧美精品永久| 蜜桃久久精品国产亚洲av| 91午夜精品亚洲一区二区三区| av卡一久久| 大又大粗又爽又黄少妇毛片口| 一区在线观看完整版| 99久久精品国产国产毛片| 欧美激情国产日韩精品一区| 亚洲精品色激情综合| 中文字幕亚洲精品专区| 亚洲欧洲国产日韩| 自线自在国产av| 国产一区二区在线观看日韩| 国产精品蜜桃在线观看| 一区在线观看完整版| 国产精品久久久久久精品古装| 欧美日韩在线观看h| 飞空精品影院首页| 又大又黄又爽视频免费| 黑人巨大精品欧美一区二区蜜桃 | 观看av在线不卡| 精品99又大又爽又粗少妇毛片| 亚洲欧美成人综合另类久久久| 亚洲不卡免费看| 亚洲av男天堂| 欧美精品高潮呻吟av久久| 五月玫瑰六月丁香| 成年女人在线观看亚洲视频| 欧美国产精品一级二级三级| 国产不卡av网站在线观看| 亚洲情色 制服丝袜| 99re6热这里在线精品视频| 免费观看性生交大片5| 精品人妻熟女毛片av久久网站| 日韩成人av中文字幕在线观看| www.av在线官网国产| 99久久综合免费| 高清毛片免费看| www.色视频.com|