MoRule: Optimized rule placement for mobile users in SDN-enabled access networks

He Li, Peng Li, Song Guo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

26 Citations (Scopus)

Abstract

With the surging popularity of smartphones and tablets, mobile network traffic has dramatically increased in recent years. Software defined network (SDN) provides a scalable and flexible structure to simplify network traffic management. It has been shown that rule placement plays an important role in the performance of SDN. However, since most existing work considers static network topologies of wired networks, it cannot be directly applied for mobile networks. In this paper, we propose MoRule, an efficient rule management scheme to optimize the rule placement for mobile users. To deal with the challenges of user mobility and rule capacity constraints of switches, we design a heuristic algorithm with low-complexity to minimize the rule space occupation while guaranteeing that the mobile traffic processed by local switches is no less than a threshold. By conducting extensive simulations, we demonstrate that our proposed algorithm significantly outperforms random solutions under various network settings.
Original languageEnglish
Title of host publication2014 IEEE Global Communications Conference, GLOBECOM 2014
PublisherIEEE
Pages4953-4958
Number of pages6
ISBN (Electronic)9781479935116
DOIs
Publication statusPublished - 9 Feb 2014
Externally publishedYes
Event2014 IEEE Global Communications Conference, GLOBECOM 2014 - Austin, United States
Duration: 8 Dec 201412 Dec 2014

Conference

Conference2014 IEEE Global Communications Conference, GLOBECOM 2014
Country/TerritoryUnited States
CityAustin
Period8/12/1412/12/14

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'MoRule: Optimized rule placement for mobile users in SDN-enabled access networks'. Together they form a unique fingerprint.

Cite this