A meter band rate mechanism to improve the native QoS capability of OpenFlow and OpenDaylight

Conference paper


Al Breiki, M., Zhou, S. and Luo, Y. 2019. A meter band rate mechanism to improve the native QoS capability of OpenFlow and OpenDaylight. 2019 International Conference on Advanced Communication Technologies and Networking (CommNet). Rabat, Morocco, Morocco 12 - 14 Apr 2019 IEEE. https://doi.org/10.1109/COMMNET.2019.8742360
TypeConference paper
TitleA meter band rate mechanism to improve the native QoS capability of OpenFlow and OpenDaylight
AuthorsAl Breiki, M., Zhou, S. and Luo, Y.
Abstract

The exponential growth of mobile connected devices with advanced multimedia features imposes a requirement to enhance quality of service (QoS) from heterogeneous systems and networks. In order to satisfy mission-critical multimedia QoS requirements new generation mobile networks must present content-optimized mechanisms in order to use valuable network resources efficiently and provide QoS requirements for each application. This research explores a novel solution for quality of service performance for streaming mission-critical video data in OpenFlow SDN networks. A Meter Band Rate Evaluator (MBE) Mechanism is proposed based on a new band rate description language to improve the native QoS capability of OpenFlow and OpenDaylight. Its design and development are presented and the mechanism is verified through a simulated experiment in an SDN testbed. The results revealed a significant percentage increase in QoS performance when the MBE was enabled. These findings provide support and validation for the effectiveness of the MBE to enhance the native capability of OpenFlow and OpenDaylight for efficient QoS provision.

Conference2019 International Conference on Advanced Communication Technologies and Networking (CommNet)
ISBN
Hardcover9781538683170
PublisherIEEE
Publication dates
Print01 Apr 2019
Online20 Jun 2019
Publication process dates
Deposited24 Jun 2019
Accepted19 Mar 2019
Output statusPublished
Accepted author manuscript
Copyright Statement

© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Digital Object Identifier (DOI)https://doi.org/10.1109/COMMNET.2019.8742360
LanguageEnglish
Book title2019 International Conference on Advanced Communication Technologies and Networking (CommNet)
Permalink -

https://repository.mdx.ac.uk/item/8856z

Download files


Accepted author manuscript
  • 71
    total views
  • 32
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Development of OpenFlow Native Capabilities to optimize QoS
Breiki, M., Zhou, S. and Luo, Y. 2020. Development of OpenFlow Native Capabilities to optimize QoS. 2020 Seventh International Conference on Software Defined Systems (SDS). Paris, France 20 - 23 Apr 2020 IEEE. pp. 67-74 https://doi.org/10.1109/SDS49854.2020.9143890
An explainable AI-based intrusion detection system for DNS over HTTPS (DoH) attacks
Zebin, T., Rezvy, S. and Luo, Y. 2022. An explainable AI-based intrusion detection system for DNS over HTTPS (DoH) attacks. IEEE Transactions on Information Forensics and Security. 17, pp. 2339-2349. https://doi.org/10.1109/TIFS.2022.3183390
Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS
Breiki, M., Zhou, S. and Luo, Y. 2020. Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS. Advances in Science, Technology and Engineering Systems Journal. 5 (2), pp. 35-43. https://doi.org/10.25046/aj050205
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059
The impacts of internal threats towards routing protocol for low power and lossy network performance
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2013. The impacts of internal threats towards routing protocol for low power and lossy network performance. 2013 IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2013.6755045
Software systems for data-centric smart city applications
Chen, D., Wang, L. and Zhou, S. 2017. Software systems for data-centric smart city applications. Software: Practice and Experience. 47 (8), pp. 1043-1044. https://doi.org/10.1002/spe.2508
RA2: predicting simulation execution time for cloud-based design space explorations
Duong, T., Zhong, J., Cai, W., Li, Z. and Zhou, S. 2016. RA2: predicting simulation execution time for cloud-based design space explorations. 2016 IEEE/ACM 20th International Symposium on Distributed Simulation and Real Time Applications. London 21 - 23 Sep 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 120-127 https://doi.org/10.1109/DS-RT.2016.9
Modeling gap seeking behaviors for agent-based crowd simulation
Luo, L., Chai, C., Zhou, S. and Ma, J. 2016. Modeling gap seeking behaviors for agent-based crowd simulation. The 29th International Conference on Computer Animation and Social Agents. Geneva, Switzerland 23 - 25 May 2016 Association for Computing Machinery (ACM). pp. 37-43 https://doi.org/10.1145/2915926.2915944
ProactiveCrowd: modeling proactive steering behaviours for agent-based crowd simulation
Luo, L., Chai, C., Ma, J., Zhou, S. and Cai, W. 2018. ProactiveCrowd: modeling proactive steering behaviours for agent-based crowd simulation. Computer Graphics Forum. 37 (1), pp. 375-388. https://doi.org/10.1111/cgf.13303
Guide them through: an automatic crowd control framework using multi-objective genetic programming
Hu, N., Zhong, J., Zhou, J., Zhou, S., Cai, W. and Monterola, C. 2018. Guide them through: an automatic crowd control framework using multi-objective genetic programming. Applied Soft Computing. 66, pp. 90-103. https://doi.org/10.1016/j.asoc.2018.01.037
Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network
Zhao, Y. and Zhou, S. 2017. Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network. Sensors. 17 (3), pp. 1-20. https://doi.org/10.3390/s17030478
A review of interactive narrative systems and technologies: a training perspective
Luo, L., Cai, W., Zhou, S., Lees, M. and Yin, H. 2015. A review of interactive narrative systems and technologies: a training perspective. Simulation: Transactions of The Society for Modeling and Computer Simulation International. 91 (2), pp. 126-147. https://doi.org/10.1177/0037549714566722
Algorithms for balanced graph bi-partitioning
Wu, J., Jiang, G., Zheng, L. and Zhou, S. 2014. Algorithms for balanced graph bi-partitioning. 2014 IEEEInternational Conference on High Performance Computing and Communications (HPCC). Paris, France 20 - 22 Aug 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 185-188 https://doi.org/10.1109/HPCC.2014.35
Towards a data-driven approach to scenario generation for serious games
Luo, L., Yin, H., Cai, W., Lees, M., Othman, N. and Zhou, S. 2014. Towards a data-driven approach to scenario generation for serious games. Computer Animation and Virtual Worlds. 25 (3-4), pp. 393-402. https://doi.org/10.1002/cav.1588
Probabilistic classifiers with a generalized Gaussian scale mixture prior
Liu, G., Wu, J. and Zhou, S. 2013. Probabilistic classifiers with a generalized Gaussian scale mixture prior. Pattern Recognition. 46 (1), pp. 332-345. https://doi.org/10.1016/j.patcog.2012.07.016
Update scheduling for improving consistency in distributed virtual environments
Tang, X. and Zhou, S. 2010. Update scheduling for improving consistency in distributed virtual environments. IEEE Transactions on Parallel and Distributed Systems. 21 (6), pp. 765-777. https://doi.org/10.1109/TPDS.2009.113
Modeling and simulation of pedestrian behaviors in crowded places
Koh, W. and Zhou, S. 2011. Modeling and simulation of pedestrian behaviors in crowded places. ACM Transactions on Modeling and Computer Simulation. 21 (3), pp. 1-23. https://doi.org/10.1145/1921598.1921604
Interactivity-constrained server provisioning in large-scale distributed virtual environments
Duong, N., Nguyen, T., Zhou, S., Tang, X., Cai, W. and Ayani, R. 2012. Interactivity-constrained server provisioning in large-scale distributed virtual environments. IEEE Transactions on Parallel and Distributed Systems. 23 (2), pp. 304-312. https://doi.org/10.1109/TPDS.2011.107
Analysis of an efficient rule-based motion planning system for simulating human crowds
Xiong, M., Lees, M., Cai, W., Zhou, S. and Low, M. 2010. Analysis of an efficient rule-based motion planning system for simulating human crowds. The Visual Computer. 26 (5), pp. 367-383. https://doi.org/10.1007/s00371-010-0421-6
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
Specification-based IDS for securing RPL from topology attacks
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2011. Specification-based IDS for securing RPL from topology attacks. Wireless Days (WD), 2011 IFIP. https://doi.org/10.1109/WD.2011.6098218
Exchange routing information between new neighbor nodes to improve AODV performance
Le, A. and Luo, Y. 2009. Exchange routing information between new neighbor nodes to improve AODV performance. in: 6th international conference on Information Technology: New Generations, 2009. Proceedings IEEE Computer Society. pp. 1661-1662
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
Fuzzy CMAC with incremental Bayesian Ying–Yang learning and dynamic rule construction
Shi, D., Nguyen, M., Zhou, S. and Yin, G. 2010. Fuzzy CMAC with incremental Bayesian Ying–Yang learning and dynamic rule construction. IEEE Transactions on Systems, Man and Cybernetics, Part B. 40 (2), pp. 548-552. https://doi.org/10.1109/TSMCB.2009.2030333
Using unified process to develop an online survey application.
Luo, Y. and Zhao, H. 2005. Using unified process to develop an online survey application. in: Proceedings of the IADIS international conference WWW/Internet 2005. IADIS.
A multi-agent decision support system for stock trading
Luo, Y., Liu, K. and Davis, D. 2002. A multi-agent decision support system for stock trading. IEEE network. 16 (1), pp. 20-27.
Using KADS to design a multi-agent framework for stock trading.
Luo, Y., Liu, K. and Davis, D. 2001. Using KADS to design a multi-agent framework for stock trading. in: Arabnia, H. (ed.) Proceedings of International Conference on Artificial Intelligence(IC-AI'2001). CSREA Press. pp. 1149-1156
Information and knowledge exchange in a multi-agent system for stock trading.
Luo, Y., Davis, D. and Liu, K. 2001. Information and knowledge exchange in a multi-agent system for stock trading. in: Jakobson, G. and Ray, P. (ed.) 2001 enterprise networking, applications and services conference proceedings: entnet@supercomm2001. IEEE. pp. 47-55
A new distributed Java-based agents environment
Luo, Y. and Zhou, Z. 2000. A new distributed Java-based agents environment. Mini-micro systems. 21 (11), pp. 1227-1230.
A multi-agent framework for stock trading.
Luo, Y., Liu, K. and Davis, D. 2000. A multi-agent framework for stock trading. in: Shi, Z., Faltings, B. and Musen, M. (ed.) Proceedings of conference on intelligent information processing. Beijing Publishing House of Electronics Industry of China. pp. 470-477
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Combining KADS with Zeus to develop a multi-agent e-commerce application.
Luo, Y., Davis, D. and Liu, K. 2003. Combining KADS with Zeus to develop a multi-agent e-commerce application. Electronic commerce research. 3 (3-4), pp. 315-335. https://doi.org/10.1023/A:1023483208268
Computing migration through context awareness and context transmission.
Luo, Y., Cheng, Z. and Chin, K. 2003. Computing migration through context awareness and context transmission. in: Proceedings of the IADIS international conference WWW/Internet 2003. IADIS. pp. 386-394