Figure 1.
Necessity of forwarding rule updates in dynamic network. In a dynamic network, topology changes and link changes occur as nodes move around. Accordingly, forwarding rules for node-specific communication must be updated.
Figure 1.
Necessity of forwarding rule updates in dynamic network. In a dynamic network, topology changes and link changes occur as nodes move around. Accordingly, forwarding rules for node-specific communication must be updated.
Figure 2.
Comparison between traditional communication and SDN methods. In a traditional network, a control plane is configured on each node. However, in an SDN environment, only the central controller has a control plane. In this case, the central controller provides the forwarding rules.
Figure 2.
Comparison between traditional communication and SDN methods. In a traditional network, a control plane is configured on each node. However, in an SDN environment, only the central controller has a control plane. In this case, the central controller provides the forwarding rules.
Figure 3.
LLDP transmission process for communication between SDN nodes. In an SDN, the SDN controller recognizes new switches through the process of packet-out, deliver LLDP, and packet-in to the switches it already knows.
Figure 3.
LLDP transmission process for communication between SDN nodes. In an SDN, the SDN controller recognizes new switches through the process of packet-out, deliver LLDP, and packet-in to the switches it already knows.
Figure 4.
Representation of node link states using adjacency matrix. Graph data for each topology are represented as an adjacency matrix. Depending on the number of nodes (n), an matrix is formed, where each row and column data represent the connection status between nodes.
Figure 4.
Representation of node link states using adjacency matrix. Graph data for each topology are represented as an adjacency matrix. Depending on the number of nodes (n), an matrix is formed, where each row and column data represent the connection status between nodes.
Figure 5.
Confusion matrix. The confusion matrix calculates Precision, NPV, Specificity, and Recall using the TP, TN, FP, and FN metrics. This matrix is used to evaluate the performance of classification models.
Figure 5.
Confusion matrix. The confusion matrix calculates Precision, NPV, Specificity, and Recall using the TP, TN, FP, and FN metrics. This matrix is used to evaluate the performance of classification models.
Figure 6.
System model. This environment includes a GCS and multiple mobile unmanned nodes. The GCS and nodes transmit various types of communication, such as data collection, topology maintenance, and command control.
Figure 6.
System model. This environment includes a GCS and multiple mobile unmanned nodes. The GCS and nodes transmit various types of communication, such as data collection, topology maintenance, and command control.
Figure 7.
CRIMSON flow. CRIMSON is composed of three main steps. The first is topology change detection and generation of the predicted node locations. The second is the creation of a predictive adjacency matrix. The third is caching the forwarding rules for the predicted link states. Through this process, CRIMSON prepares forwarding rules in advance, reflecting the predicted link states.
Figure 7.
CRIMSON flow. CRIMSON is composed of three main steps. The first is topology change detection and generation of the predicted node locations. The second is the creation of a predictive adjacency matrix. The third is caching the forwarding rules for the predicted link states. Through this process, CRIMSON prepares forwarding rules in advance, reflecting the predicted link states.
Figure 8.
CRIMSON flow chart. The analysis of time-series data calculates node movement trends, and if they exceed a threshold, the system predicts the node positions. The system calculates distances between nodes using the predicted positions and checks them against the communication range to generate an adjacency matrix. The matrix updates forwarding rules for both direct and alternative paths.
Figure 8.
CRIMSON flow chart. The analysis of time-series data calculates node movement trends, and if they exceed a threshold, the system predicts the node positions. The system calculates distances between nodes using the predicted positions and checks them against the communication range to generate an adjacency matrix. The matrix updates forwarding rules for both direct and alternative paths.
Figure 9.
Types of topologies used in the simulation. We use five topologies consisting of five nodes with UAV modeling applied. The topology shapes used, from left to right, are linear, v-shaped, trapezoid, star, and pentagon.
Figure 9.
Types of topologies used in the simulation. We use five topologies consisting of five nodes with UAV modeling applied. The topology shapes used, from left to right, are linear, v-shaped, trapezoid, star, and pentagon.
Figure 10.
Evaluation of confusion matrix metrics within the threshold range of 0.001 to 0.035. We assess the values of Precision, Recall, NPV, and Specificity throughout this threshold range. Afterward, we select the optimal threshold value that produces the highest average among these four metrics.
Figure 10.
Evaluation of confusion matrix metrics within the threshold range of 0.001 to 0.035. We assess the values of Precision, Recall, NPV, and Specificity throughout this threshold range. Afterward, we select the optimal threshold value that produces the highest average among these four metrics.
Figure 11.
Optimization process for finding the Shiftpoint. This process applies three optimization methods to the average value of the four confusion matrix metrics.
Figure 11.
Optimization process for finding the Shiftpoint. This process applies three optimization methods to the average value of the four confusion matrix metrics.
Figure 12.
Latency comparison of CRIMSON based on RTT tests. The comparison includes reactive mode and proactive mode. The simulation measured latency using rtt avg, rtt max, and rtt mdev.
Figure 12.
Latency comparison of CRIMSON based on RTT tests. The comparison includes reactive mode and proactive mode. The simulation measured latency using rtt avg, rtt max, and rtt mdev.
Figure 13.
Evaluation of LLDP usage in CRIMSON. The proposed CRIMSON method indicates a lower LLDP count compared to the proactive mode. In an SDN system, LLDP packets are transmitted when packet processing is not handled. This indicates that CRIMSON performs packet processing effectively in dynamic networks.
Figure 13.
Evaluation of LLDP usage in CRIMSON. The proposed CRIMSON method indicates a lower LLDP count compared to the proactive mode. In an SDN system, LLDP packets are transmitted when packet processing is not handled. This indicates that CRIMSON performs packet processing effectively in dynamic networks.
Figure 14.
Network latency comparison of CRIMSON at various bandwidths. We conduct RTT tests at 0.5 Mbps, 1 Mbps, 5 Mbps, and 10 Mbps for the proposed CRIMSON algorithm. Simulation results confirm that CRIMSON achieves lower and more stable network latency.
Figure 14.
Network latency comparison of CRIMSON at various bandwidths. We conduct RTT tests at 0.5 Mbps, 1 Mbps, 5 Mbps, and 10 Mbps for the proposed CRIMSON algorithm. Simulation results confirm that CRIMSON achieves lower and more stable network latency.
Table 1.
Simulation settings.
Table 1.
Simulation settings.
Environment Setting | Detail |
---|
SDN controller tool | ONOS |
Nodes tool | Mininet-WiFi |
Node NUM | 5 |
Mobility model | UAV modeling |
Velocity of node | 1∼3 m/s |
Prediction cycle | 0.01 s |
Transmission range | 5.5 m |
Topology shape | linear, v-shaped, star, trapezoid, pentagon |
Simulation area | 50 × 50 |
Bandwidth | 0.5 Mbps, 1 Mbps, 5 Mbps, 10 Mbps |
Table 2.
Confusion matrix indicator value at threshold 0.0015.
Table 2.
Confusion matrix indicator value at threshold 0.0015.
Metrics of the Confusion Matrix | Precision | Recall | NPV | Specificity |
---|
Value | 0.979 | 0.952 | 0.945 | 0.976 |
Table 3.
Performance improvement of the CRIMSON compared to other forwarding rule setup methods.
Table 3.
Performance improvement of the CRIMSON compared to other forwarding rule setup methods.
| rtt avg | rtt max | rtt mdev |
---|
Improvement over Reactive Mode | 86.41% | 86.22% | 87.00% |
Improvement over Proactive Mode | 55.58% | 6.96% | 33.90% |
Table 4.
Performance improvement with bandwidth adjustment of CRIMSON compared to other forwarding rule setup methods.
Table 4.
Performance improvement with bandwidth adjustment of CRIMSON compared to other forwarding rule setup methods.
Bandwidth [Mbps] | Performance Improvement Compared to Reactive Mode | Performance Improvement Compared to Proactive Mode |
---|
0.5 | 90.09% | 55.21% |
1 | 89.98% | 62.37% |
5 | 87.75% | 55.54% |
10 | 88% | 64.84% |