Abstract

Software defined WiFi network (SD-WiFi) is a new paradigm that addresses issues such as mobility management, load management, route policies, link discovery, and access selection in traditional WiFi networks. Due to the rapid growth of wireless devices, uneven load distribution among the network resources still remains a challenging issue in SD-WiFi. In this paper, we design a novel four-tier software defined WiFi edge architecture (FT-SDWE) to manage load imbalance through an improved handover mechanism, enhanced authentication technique, and upgraded migration approach. In the first tier, the handover mechanism is improved by using a simple AND operator and by shifting the association control to WAPs. Unauthorized user load is mitigated in the second tier, with the help of base stations (BSs) which act as edge nodes (ENs), using elliptic ElGamal digital signature algorithm (EEDSA). In the third tier, the load is balanced in the data plane among the OpenFlow enabled switches by using the whale optimization algorithm (WOA). Moreover, the load in the fourth tier is balanced among the multiple controllers. The global controller (GC) predicts the load states of local controllers (LCs) from the Markov chain model (MCM) and allocates packets to LCs for processing through a binary search tree (BST). The performance evaluation of FT-SDWE is demonstrated using extensive OMNeT++ simulations. The proposed framework shows effectiveness in terms of bandwidth, jitter, response time, throughput, and migration time in comparison to SD-WiFi, EASM, GAME-SM, and load information strategy schemes.

1. Introduction

WiFi networks have increased rapidly in the past decade due to their simple technical implementation and low costs [1, 2]. WiFi networks are optimized by formulating an explicit expression for the request-to-send (RTS) threshold using all key system parameters such as the number of nodes, window size, cutoff phase, and transmission rates [3]. Software defined network (SDN) is introduced to eliminate the traditional network problems which do not meet all the user requirements, such as routing policies, load balancing, and scalability [4]. Flexible and adaptive functionalities of SDN support various developments in the past. In SDN the limitations of a single controller architecture are overcome by a multiple SDN controllers design [5, 6]. Potentials of these multiple SDN controllers include management efficiency, scalability, minimized latency, and robustness. Load balancing in multiple SDN controllers achieves scalability, delay reduction, and robustness.

The recent focus of research for the computer network community is on cloud computing, Internet of Things (IoT), vehicular ad hoc network (VoAH), wireless body area networks (WBANs), and software defined networks [710]. Intelligent software defined WiFi solution (ISD-WiFi) provides end-to-end control and mobility management. The devices are linked via WAP, which manages load balancing and mobility [11]. The traffic pattern is predicted at WAP and decisions are made according to the movement of traffic. Switch migration in SDN is a promising approach to address the issue of load imbalance among the network resources. Increased traffic in the data plane is tolerated by switch migration [12]. Many decision--making algorithms are studied for switch migration. SD-WiFi monitors the traffic to maintain a certain threshold of load at WAP that is presented as RFlow+ [13]. Network monitoring is required on WAP, switches, and controllers to manage the incoming traffic. Workload at controllers is managed by incorporating a lightweight flow stealer approach that proceeds with an immediate action over the traffic [14]. Queues of data packets are maintained at each individual controller to detect load imbalance among the controllers. The load is balanced by shifting the data packets from the overloaded controller to the underloaded controller.

SDN is integrated with emerging technologies such as fog computing and Internet of things (IoT) to support a wide range of applications [15]. This integration enables connectivity with the edge devices supporting 3G, 4G, and WiFi. SDN based edge computing presents an adaptive transmission architecture which categorizes the data streams into normal and emergent classes for packet processing [16]. Optimal routing of packets enhances the network resource utilization. Signal-to-noise ratio (SNR) is used to identify the optimal path for routing [17]. Different streams of data flows are applicable in the SDN based edge computing architecture. SDN dependent solutions are developed in recent years enhancing the intelligence growth of decision-making criteria in wireless networks. The provisioning and adaptability of SDN introduce several advancements for load balancing.

Scalability in the control plane is achieved by performing load balancing based on the idea of hybrid switching [18]. It makes use of both SDN switches and traditional network switches. Each switch is enabled to measure the arrival of traffic loads. A controller is responsible for rerouting the traffic if any switch gets overloaded. Load balancing, that is, flow control of traffic arrival tends to maximize throughput and QoS [19]. The arrived packets are forwarded in accordance with their priority. The priority depends on the type of packets. Edge computing also supports the design of the load balancer [20]. The load balancer is executed on data plane which operates in a two-level structure.

However, the previous research works for load balancing have been discussed on core SDN, SDN with edge computing, and SDN with WiFi (SD-WiFi). Factors such as security, traffic priorities, load balancing in data and control plane, and optimal route policies are not studied in a hybrid software defined WiFi edge architecture. To tackle the aforementioned shortcomings, we develop a novel load balancing architecture that integrates WiFi, SDN, and edge computing to manage and balance load at each tier. The proposed FT-SDWE has the following contributions:(i)The handover mechanism is improved in the first tier by using a simple AND operator. Handover decisions are made by WAPs themselves.(ii)Unauthorized devices that enter into the network and contribute towards unnecessary load are mitigated in the second tier. Edge nodes are responsible for authenticating devices using the elliptic ElGamal digital signature algorithm.(iii)Load at data plane is balanced among the OpenFlow enabled switches using a whale optimization algorithm, which migrates packets from overloaded switch to an optimal switch. Switches are equipped to route real and non-real-time traffic patterns according to their port numbers.(iv)Markov chain model is applied to estimate load information of local controller. The fourth tier maintains a binary search tree in the global controller to allocate packets to a least loaded local controller. The global controller prioritizes packets according to packet types.

The rest of the paper is organized as follows: Section 2 describes the recent research works on SDN and SD-WiFi for load balancing. The section also illustrates the issues and limitations of previous research works. Problem definition is dealt with in Section 3. Section 4 explains the proposed system and the solution derived for the current issue. Section 5 discusses the simulation setup, FT-SDWE evaluation, and comparative results to report the performance evaluation of the proposed scheme. Finally, we conclude this paper and present the future research directions in Section 6. Table 1 shows the list of abbreviations used in this study.

2.1. Load Balancing in SDN

A load balancing scheme based on server response time (LBBSRT) is presented in order to achieve higher scalability [21]. A single server is selected based on the minimum response time. The Packet_In messages from the users reach the controllers via switches. The user requests are then forwarded to servers from controllers via switches. Response time is estimated with respect to the difference between arrival time to that of the transmitted time of the data packets. Switches receive the packets from controllers and users at the same time and hence it increases the load dynamically.

The load information strategy method is used to balance the load among the multiple controllers in SDN [22]. Load at controllers is determined from the average message arrival rate. The switches are sorted in descending order with respect to the message arrival rate for migration. The overloaded controllers trigger the request to perform switch migration. However, the migration procedure is lengthier, leading to delayed decisions in switch migration. Switch migration is performed to mitigate unnecessary resource utilization. GAME-switch migration is presented on the idea of a game model [23]. A switch for migration is chosen in accordance with the utilization ratio of switches. The game-theoretic approach gives the best decision for migration, whereas it involves multiple complex mathematical computations and allows the arrival of numerous malicious requests into the network.

Efficiency aware switch migration (EASM) is presented for load balancing in SDN [24]. EASM operates to provide fairness in load balancing by switch migration. Load at the controller is determined from routing overhead, state synchronization, and data interaction overhead. Load at the controllers is balanced using the trigger factor. The probability distribution is significant to decide the migration of a particular switch. Multiple mathematical formulations are used in this work which leads to complexity in the system.

2.2. Load Balancing in SD-WiFi

SD-WiFi requires mobility management support to balance the load among the IEEE 802.11 users. The seamless mobility of devices forces to use handover mechanisms. A scheme is proposed which uses the logical access points for providing continuous connectivity [25]. The received signal strength indicator (RSSI) is the only significant parameter estimated for making handover decisions. Traffic load at APs is determined and balanced. Single metric based handover decision is not efficient as it creates crowded hotspots [26]. Load balancing in SD-WiFi is achieved by flow prioritization and clustering of local controllers [27]. The packets are prioritized by an analytical hierarchical process and the high priority packets are processed first by the local controllers.

The two-tier architecture is presented to balance the load in SD-WiFi [28]. The controller computes the fairness index to identify the underloaded and overloaded access points. The status reports of the access points enable the controller to estimate the fairness index, load level, and control level. The fairness index is estimated from the load which includes CPU utilization, memory utilization, and average packet error rate. Load level is predicted from the maximum load with respect to the number of base stations. System-oriented parameters are given more consideration whereas the user-oriented parameters are neglected. Type-2 fuzzy particle swarm optimization along with support vector machine (SVM) techniques are used to balance the load among multicontrollers in SD-WiFi [29]. The SVM differentiates between the high priority packets and low priority packets and forwards these packets to the control plane where the Markov chain model (MCM) predicts the future states of the local controllers and in case of any overloaded controllers, the packets are transferred to an underloaded controller, chosen by the fuzzy and particle swarm optimization techniques. Complex and long mathematical formulation contributes to the latency factor.

A load balancing scheme is proposed in SD-WiFi to optimize the load among the WAPs [30, 31]. An adaptive connection and hand-off (ACH) load balancing algorithm is used to bring fairness of load among the WAPs. Load is introduced by the network parameters, which are not discussed. Load balancing and traffic prioritization are achieved for SD-WiFi in healthcare [32]. Probability distribution is used to categorize healthcare traffic into emergency traffic, administrative traffic, and normal Internet traffic. Load among the OpenFlow enabled APs is optimized using SDN through a testbed [33]. The quality of service (QoS) is enhanced for access selection through throughput, packet loss rate, and received signal strength indicator (RSSI) values. The scalability of the control plane is not taken into account.

3. Problem Definition

Dynamic and adaptive load balancing (DALB) in SDN controllers is proposed over a distributed architecture [34]. DALB estimates the load using the number of flow table entries, average message arrival rate at each switch, and round trip time between the switch and the controller. Self-decisions are made by any of the controllers deployed. The absence of a centralized controller leads to a high load in the data plane. The artificial intelligence algorithm and optimization algorithm are also used to address the load imbalance issues in SDN [35, 36]. Backpropagation based artificial neural network (BP-ANN) is presented for load balancing. Features such as bandwidth utilization ratio, packet loss rate, transmission latency, and transmission hop are taken into account for preferring a switch to balance the load. Only the link-based parameters are considered to mitigate load at the switches.

Ant colony optimization algorithm is used to perform dynamic load balancing. Link bandwidth is considered as the only perimeter for load balancing. Load status and dynamic weight coefficients are used which lead to the construction of an additional load balancing plane [37]. Packets are prioritized and first-in-first-out (FIFO) procedure is followed for prioritizing similar packets resulting in higher processing time. Multiple SDN controller design is developed on the basis of hierarchical structure, which detects the loaded controllers and rearranges the controllers and switches every time after the allocation of packets [38]. SD-WiFi also focuses on minimizing the load at the APs in the data plane [39]. The controller is responsible for making decisions on handover which contribute towards significant jitter as unnecessary messages are exchanged between the controller and the OpenFlow enabled APs.

The major problems defined in previous research works considered SDN focusing on only a specific tier. Packet priorities, traffic patterns, flow table size, and routing methods are not utilized efficiently. Link and system parameters are considered separately. There is still a need for research to be conducted on load balancing at each tier considering the data plane and the control plane in SD-WiFi using the edge architecture.

4. Proposed System Model

The proposed FT-SDWE is developed in this paper to overwhelm the problem of load imbalance in each tier. FT-SDWE is a combination of SDN, WiFi network, and edge computing which is split into a four-tier architecture as shown in Figure 1. Load balancing is the major focus in each tier designed in FT-SDWE. Tier 1 is a WiFi network in which the wireless devices get access via WAPs. Tier 2 comprises edge nodes that are base stations (BSs) which authenticate devices to mitigate load from unauthorized devices. Tier 3 is a data plane with OpenFlow switches and tier 4 consists of multiple SDN controllers. FT-SDWE is comprised of dynamic mobile devices , WAPs, that is, , edge nodes , switches as , and controllers .

Table 2 depicts the major contributions of the proposed FT-SDWE for load balancing in the SDN designed environment. Load at each tier is significantly focused and minimized effectively. Figure 1 illustrates the proposed FT-SDWE design comprised of four tiers for load balancing. In tier 1, AND operator based handover decision is made to balance the number of wireless devices connected to each WAP, tier 2 reduces the load of unauthorized devices by authenticating authorized devices using EEDSA, tier 3 involves selecting an optimal switch using WOA subjected to overloading of flow entries. In tier 3, the packets are also classified into real-time (RT) and non-real-time (NRT) classes. The packets classified by switches in the data plane reach GC where they are placed into corresponding queues for further processing by LCs in the control plane. Finally, in tier 4, the GC monitors the load of each LC by MCM and allocates the packets to a least loaded controller using the binary search tree algorithm. GC manages two queues for serving both RT and NRT packets from mobile devices. The RT packets are given higher priority as compared to NRT packets. Load balancing in individual tier exhibits better performance for different significant metrics.

4.1. Tier 1: Handover

Load is optimized among the WAPs by efficient handover in tier 1. An AND operator based handover is performed in tier 1. The handover decisions depend upon the received signal strength indicator (RSSI), distance, and mobility.

The association between WAPs and mobile devices takes place through probe messages or beacons. The mobile devices send the probe request message while in a scanning phase and the active WAPs already in the association phase reply with a probe response message. The connection takes place after a series of successful handshakes. At this point, the WAP may get overloaded as a large number of mobile devices connect to it. At this point, even the IEEE 802.11 standards do not include any mechanism to instruct the mobile device to make a handover under this loaded condition. In the proposed FT-SDWE, the inconvenience is overcome by an AND operator based handover algorithm. Each WAP maintains a logical truth table for a handover decision to be made. The RSSI, distance, and mobility values are updated periodically.

The truth table contains all the possible combinations of RSSI, distance, and mobility. Table 3 shows the parameters with the possible combinations leading to the corresponding handover decision.

AND operator based handover for mobile device is mathematically expressed as

denotes the handover decision at for based on RSSI as , distance as , and mobility as provided from AND operator . The binary high for handover means that the handover must take place and vice versa.

The binary values for each parameter specify low and high as 0 and 1, respectively. RSSI values are detected by the mobile devices and the WAP with the highest RSSI value is selected for association. The values of RSSI in the range of result to be poor values which are given 0 binary value, whereas the RSSI values ranging have higher efficiency hence classified with the binary value of 1.

The distance metric is defined between and the . Distance is estimated using Euclidean distance formulation expressed as

The and are defined into coordinates such as and , respectively. The measured distance between is provided high binary value as 1 and distance more than is associated with a low binary value of 0.

Mobility of the device is important in determining the decision for handover. Slow-moving devices are given low binary values such as 0 and fast-moving devices are given high binary values of 1. Mobility plays a key role in WiFi networks since the devices are wireless and are enabled to connect to different WAPs.

Using equation (1), the handover time is reduced so that the load is optimized quickly among the WAPs. In the phase of active scanning, the mobile device sends a probe request frame to all available WAPs, and hence the WAPs reply with the probe response frame saving the MAC address of the mobile device which sent the probe request frame, for future communication. Let us suppose the mobile device connects to . Through the periodic update of the truth table in all WAPs, a handover decision is made. The dissociates and hands it over to any nearby when the RSSI value of detected by is low and the is far away from . The proposed FT-SDWE focuses mainly on dynamic mobile devices which have a mobility rate from 1 m/s to 20 m/s.

4.2. Tier 2: Authentication

Tier 2 comprises edge devices, that is, BSs which are responsible for authenticating the incoming packets from a particular mobile device. EEDSA is utilized for authentication. Tier 2 is constructed as a bridge between the WiFi network and SDN to minimize the load which is caused by the participation of unauthorized devices in the network. The digital signature is provided to authenticate the mobile devices. Most of the unauthorized mobile devices enter into the network as freeloaders for degrading the network performance.

ElGamal’s method of key distribution consists of three phases including the setup phase, the encryption phase, and the decryption phase. The setup phase is responsible for public key sharing and the remaining two phases help in the successful delivery of information between two entities making it difficult for the intruders to play their role. Digital signature algorithms have been widely employed in the cryptographic research areas as they ensure data integrity, nonrepudiation, and data origin authentication. Elliptic curve cryptography is a very powerful mathematical tool used for encryption and decryption services. It uses a shorter encryption key which means less storage and faster computation. Reverse engineering is also impossible with large values involved due to the computational complexity of logarithm problems. Tier 2 uses the power of ElGamal digital signature and elliptic curve techniques for authentication of authorized mobile devices. EEDSA has three basic phases for its successful operation which are: 1) key generation; 2) signature generation, and signature verification.

Keys are generated for the signing and verification of a particular device. A user using a mobile device chooses a random number , where ranges and is the order of the curve. , where is the private key. The public key is generated from the multiplication of and a point on the elliptic curve. A point doubling method is used to find the required point. Let be the two points present on the elliptic curve . Assume that , where . The value of is expressed as , so does the point doubling method yield expressed as which is algebraically expressed into

The term denotes a prime number and is the integer obtained from the curve equation . The public key curve point is therefore .

Signatures are generated when first selects the digest value for the request it is willing to make. The digest value must be of the same bit size as . then uses a random number u between 1 and . To find the point on the curve, is multiplied by the generator point . The point results in two coordinate values where the coordinate of represents the first half of the signature represented as and serves as a reference value used to verify the signature. then finds the other half of the signature value using equation (6). The signature generated is denoted as , where

If is not equal to 0, that is, , then cryptographic hash function for device is given as

The ENs are responsible for verifying the signature generated through equations (5) and (6) and also ensure that the range for and is between 1 and ; otherwise, the signature remains invalid. is calculated using the same HASH function used in signature generation. The value is calculated as . Two multipliers and are calculated where and . Finally is multiplied by and is multiplied by . Summing up these values, we calculate having the same x coordinates as .

If the generated signature for device is and signature at is similar, then the authentication is successful; otherwise, access will be denied. In the proposed FT-SDWE, the ENs are assumed to maintain the signatures of each legitimate mobile device and hence it matches the signature in accordance with the user identity. The procedure of EEDSA is presented in Algorithm 1.

(1)Begin
(2)Generate
(3)Compute from equations (3) and (4)
(4)Estimate r
(5)ifthen
(6) go to step 1
(7)else
(8) Compute and from equations (6) and (7);
(9)end if
(10) to // Signature sent to EN
(11)verifies
(12)if // Verifying the signature then
(13) Access granted
(14)else
(15) Access denied
(16)end if
(17)End.

In tier 2, authentication is performed to minimize the unnecessary load from unauthorized devices. ENs are assumed to be trusted and hence are deployed to mitigate the load from illegitimate devices.

4.3. Tier 3: Packet Migration

Tier 3 is the data plane which is comprised of OpenFlow switches. The switches can become overloaded anytime due to the increased amount of packets arrival. The loaded and underloaded switches are enabled to classify the incoming traffic into two categories such as real-time traffic and non-real-time traffic. Each packet is verified with respect to data type, deadline, protocol, and port numbers. A legitimate packet should match all the fields and only after this, the packets are forwarded to the next tier. Once the fields are matched, the packets are classified and directed to the control plane.

OpenFlow switches have the capability of pushing the packets towards the controllers and they can also discard the packets if the flow rules are not matched. Each individual packet entering into the data plane is supposed to have matching fields, flow priorities, counters, and processing instructions. Switches only have limited flow entries; hence, intolerable packet flows lead towards an overloaded switch causing an immediate packet migration to take place to an optimal switch. Table 4 depicts the properties of traffic used and the processing done by the switches. The incoming packet information is matched with the fields stored in the OpenFlow switch. If the information matches and the packet verification is confirmed, the desired action is taken by the switch. The proposed FT-SDWE is capable of supporting both real-time traffic such as voice over IP (VoIP) and non-real-time traffic such as file transfer protocol (FTP).

If the OpenFlow switch is filled with flow entries, then the WOA comes into play for selecting an optimal switch to migrate the packets. The selected optimal switch either is underloaded or has a partially filled flow table. WOA defines the current best solution as optimal or nearly optimal. [40]. The following equations represent the behavior of whales, that is, packets,

From equations (8) and (9), and are computed from the following formulation:

The terms and denote the coefficient vectors, is the position, is the best solution, and the value of in equation (10) decreases gradually, whereas denotes a random vector value ranging . For updating the positions, spiral updating is performed, which is cabable of updating the positions of the surrounding switches. Spiral updating is handled by estimation of distance metric between the current switch and its neighboring switch. Let and be the position of the currently overloaded switch and neighboring switch, respectively. The spiral equation for distance estimation is expressed as

From equation (12), is a constant that defines the logarithmic spiral, is a random number ranging . The fitness value of each neighboring switch is predicted from the following significant parameters as the number of packets in buffer, packet loss rate, latency, number of flow entries, and number of packets processed in history. All the parameters considered for the evaluation of fitness function are significant, based on which the switch load is effectively identified. Data plane in SDN is one of the major areas that causes load imbalance due to several technical reasons including malicious packets involvement.

The number of packets in buffers is defined as the remaining number of packets that are yet to be processed and are still in the waiting state. Packet loss rate at switch is determined from the number of packets transmitted and cumulative packets received. Mathematically, is expressed as

Packet loss is determined from the number of packets transmitted by the switch and the number of packets received by the switch. Here, is the cumulative packets received by the switch. is expressed as

The cumulative number of received packets is estimated from that denotes the total number of packets received from devices such as edge nodes and denotes the total number of packets received from overloaded switches. The latency of individual switch is formulated as follows:

Latency at switch is estimated from the ratio of the number of bytes transmitted and the transmission rate . The total number of flow entries is represented as , which defines the packets arrived and considered for processing. The number of packets processed in history is the packets processed and transmitted to the control plane. The fitness value is dependent on the aforementioned parameters such as , , , , and .

The value of the fitness function determines the optimal switch for migration. WOA is used due to the power of the spiral position updating mechanism. The immediate migration of packets minimizes the latency and ensures quick load balancing in the data plane.

Figure 2 illustrates the working flow of the proposed WOA in tier 3 for load balancing among the switches. Population refers to the number of switches participating. The process is repeated until an optimal switch is determined depending on the fitness value. Tier 3 is supported to prefer the best switch for migration. The migration process is performed only if the switch is occupied with more numbers of flow entries.

4.4. Tier 4: Monitoring and Flow Allocation

Tier 4 is comprised of GCs and LCs. The GC plays a major role in monitoring LCs load based on MCM. By the load information of LCs, the GC generates a binary search tree which is used to assign packets to LCs that arrive from the mobile devices. The GC maintains two queues one for real-time traffic and one for non-real-time traffic. Real-time traffic (VoIP) is given priority in processing as compared to non-real-time traffic (FTP). MCM is used to identify the states of LCs. States are defined as the load at the individual controller. LCs are categorized as underloaded LC and overloaded LC. The incoming packets from the data plane are allocated to the underloaded LC based on the decision of GC which maintains the current state of each individual LC present in the controller plane. Figure 3 demonstrates the MCM used in the proposed FT-SDWE, to determine the current states of the LCs.

MCM is enabled to detect all the possible states based on the identification of LCs transitions. MCM is also applicable to detecting future load states. In this work, four transitions are possible as represented in Table 5.

In MCM, the arrived requests, that is, packets from the data plane are modeled using the Bernoulli distribution, where represents the state of a particular LC after completion of number of transitions. Initially, the LC is in the state at time . The transition probability is expressed as

represents the initial state of the controller and denotes the final state, that is, either underloaded or overloaded. The single transition probability is given as

If the transition probability of the controller stays in the same state after a certain time period, then its state is expressed as

On periodical updating of load states in GC, it is efficient to support load management in the control plane. Using the load states of the LCs, the GC creates a BST. An incoming packet is analyzed in GC and is assigned to the available least loaded LC for further processing.

The probability values range [0-1], which lead to the construction of the BST. The BST is initiated with the root node, that is, parent and followed by left and right child nodes. The MCM results show that the load values below 0.5 represent an underloaded LC and the load values above 0.5 represent an overloaded LC. For instance, a set of sample values is considered as and a BST is constructed in Figure 4. The BST follows in-order traversal in which the minimum loaded LC is assigned with packets first followed by the ascending order of load values as shown by the dotted arrow lines in Figure 4. The least loaded LC having a load value of 0.1 is assigned for packet processing first, next comes the LC with a load value of 0.2, and so on. BST aims to direct the packets towards an underloaded LC first and simultaneously the load at an overloaded LC is processed.

FT-SDWE is supported to balance load at each tier and finally attains better performance than the previous research works.

5. Performance Evaluation

This section is composed of three subsections as simulation setup, FT-SDWE evaluation, and comparative results. The sections discuss the effective achievements of the proposed FT-SDWE after being tested on simulation software.

5.1. Simulation Setup

FT-SDWE is developed in OMNeT++ 4.6 simulator and JDK 1.8 that is installed on Windows 10 (64-bit). The proposed scheme is designed with OpenFlow switches, global controller, local controllers, wireless access points, edge nodes, and mobile devices. INET is employed in OMNeT++ supporting the OpenFlow standards. POX controller is used to performs load balancing in the control plane and data plane.

The significant parameters involved to develop FT-SDWE are listed in Table 6. The proposed scheme is not limited to only these parameters.

The simulation topology of FT-SDWE designed in OMNeT++ is depicted in Figure 5. The data packets from 80 mobile devices are aggregated and processed at WAPs. Using OMNeT++, a four-tier setup is made and load balancing is applied over each tier as discussed in Section 4. Based on the simulation topology, the performance of FT-SDWE is evaluated in the next section.

5.2. FT-SDWE Evaluation

In this section, we report the balanced load at controllers for three time periods , , and . Table 7 illustrates the controller ID and its corresponding load which is obtained from MCM. The following entities are managed by the global controller for constructing a binary tree to balance the incoming data packets.

The load of each LC is initially calculated using its CPU, memory, and disk values. While these entities are being used by the LC during the packet processing and according to the number of packets being processed, the load values of LCs vary. The capacity of each LC is defined as

Let be the total number of controllers; , are the CPU, memory, and disk capacity of controller , respectively. In this evaluation, the number of incoming packets is varied in each time period such that, in , nearly 2000 packets arrive per second; in , 4000 packets arrive per second; and deals with 6000 packets per second. However, in FT-SDWE, if the controllers are overloaded initially, they are still capable enough of processing the packets. The overloaded controllers are taken into consideration by BST which helps in load balancing among all LCs in the control plane.

5.3. Comparative Results

This section discusses the comparative analysis of the proposed FT-SDWE to the software defined WiFi networks (SD-WiFi) load balancing method [39], efficiency aware switch migration (EASM) [24], GAME-switch migration [23], and load information strategy [22]. Better performance is achieved due to the impact of the proposed algorithms in each tier. The major parameters that are studied to show the superiority of the proposed scheme are bandwidth, jitter, migration time, response time, and throughput.

5.3.1. Bandwidth

Bandwidth plays a major role in wireless communication. In the proposed FT-SDWE, the wireless mobile devices connecting to WAPs have an impact on bandwidth, as they have to perform handover in order to balance the load. Higher bandwidth leads to quicker transfer of higher amount of data between two entities. Bandwidth also depends upon the capacity of the link.

In SD-WiFi, the handover was performed only after the controller decision was made. Multiple messages were exchanged before performing the handover. Handover decisions lead to higher delays which caused higher bandwidth consumption. Figure 6 demonstrates the comparison of bandwidth for two cases which are after handover and before handover. In both cases, FT-SDWE performs better than SD-WiFi as the association decisions are made by the WAPs, hence reducing the extra overheads caused by unnecessary message exchange between switches and the controller. The bandwidth before handover is approximately 20–30% higher in FT-SDWE, whereas the bandwidth after the handover is 10–15% higher than SD-WiFi. SD-WiFi is tested with only 4 mobile devices whereas 80 mobile devices are used in FT-SDWE and still the FT-SDWE performance supersedes SD-WiFi in terms of high-density networks.

5.3.2. Jitter

Jitter is defined as the variation of the time delay occurring between the reception of the packets. For instance, assume a sequence of packets being transmitted over a channel, jitter will be caused due to some disruption delay between the two continuous packets. Heavy jitter in a network tends to increase the degradation of network parameters. Jitter is a significant parameter that is used to analyze the handover algorithm. Measurement of jitter is essential during handover, as the packets being forwarded from one WAP to another will be altered.

The best handover algorithm guarantees minimum occurrence of jitter during the handover. In FT-SDWE, handover is performed for load balancing at tier 1.

Jitter parameter is measured in two cases, that is, before handover and after handover as shown in Figure 7. This metric is plotted with respect to simulation time, in which the jitter in FT-SDWE is minimum as compared to SD-WiFi. In SD-WiFi, the longer time taken for handover decision increases jitter, whereas in FT-SDWE, the WAPs perform simple AND operation for handover decisions. Before and after the handover, FT-SDWE shows reduced jitter for 80 devices.

5.3.3. Migration Time

This metric is measured to analyze the amount of time consumed to transfer the packets from an overloaded switch to an underloaded switch. EASM was proposed to balance the load in SDN by performing switch migration. In EASM, migration time increases due to the use of multiple mathematical formulations. Table 8 presents the migration time for FT-SDWE compared to two previous research works which are EASM and GAME-SM.

FT-SDWE is specially designed to solve the issue of load balancing. In this work, tier 3 concentrates on load balancing via packet migration. Migration time is minimized by selecting an optimal switch to which the packets are migrated. Without selecting an optimal switch it is complex to migrate packets and higher time is consumed for migration. FT-SDWE reduces the migration time by using WOA, which ensures the selection of an optimal switch for packet migration. This algorithm is enabled to tolerate a huge number of packets.

5.3.4. Response Time

The response time for the proposed FT-SDWE is compared to EASM and load information strategy as shown in Figure 8. The reduction of response time intimates the better performance of the proposed method.

Response time should be minimized as much as possible to enhance the network performance. Response time depends on the performances of the algorithms involved in the network. FT-SDWE exhibits less response time as compared to EASM and load information strategy methods. Increased mathematical computations consume higher time and resources which tend to increase the response time. As the number of controllers increases, the number of packets also increases gradually as 1000 packets per second, 2000 packets per second, 4000 packets per second, and 6000 packets per second. From the result, it is clear that approximately 10–15% of response time is minimized in the proposed FT-SDWE as compared to EASM and load information strategy method.

5.3.5. Throughput

The comparative analysis includes the parameter throughput which is one of the most significant metrics to be discussed in any type of network evaluation. Throughput is defined as the measure of the total number of packets received in accordance with the total number of packets transmitted. Figure 9 demonstrates the comparative analysis for throughput which compares FT-SDWE with EASM and load information strategy methods.

Due to higher mathematical computations and improper load balancing methods, throughput decreases, intimating the degradation of the network performance in EASM and load information strategy methods. On increasing the number of controllers, the throughput changes. As the number of controllers increases, the throughput is also enhanced due to the arrival of increased numbers of packets. Load balancing at each tier is supported to achieve higher throughput, due to the quick processing of packets arriving into the network.

6. Conclusion

In this paper, a novel FT-SDWE is proposed for effective load balancing. FT-SDWE is comprised of four tiers with WAPs, edge nodes, switches, and controllers. Many previous research works have been studied, leading to the issue that load balancing is only focused on any tier and plane. However, in the proposed scheme, the load is balanced on all planes and tiers resulting in better performance attributes. Individual tiers in the proposed FT-SDWE use algorithms such as AND operator based handover, elliptic ElGamal digital signature algorithm, Whale optimization algorithm, Markov chain model, and binary tree search algorithm. Tier 1 balances the load by improving the handover process, tier 2 authenticates the devices to mitigate unnecessary load from unauthorized devices, tier 3 migrates the packets among switches to manage load imbalance, and tier 4 maintains the list of load of all LCs and provides efficient packet allocation. Load balancing in each tier tends to achieve higher performance when compared with previous research works. The proposed method outperforms SD-WiFi, EASM by, GAME-SM, and load information strategy methods in bandwidth, jitter, migration time, response time, and throughput.

In future, FT-SDWE performance is planned to be evaluated in a large-scale environment through a software/hardware codesign. Further, the execution time will be measured on an individual tier using hybrid algorithms to increase the SD-WiFi efficiency in high-density environments.

Data Availability

The data that support the findings of this study are openly available in Achieving Load Balancing in High Density Software Defined Wi at http://cloud.eic.hust.edu.cn:8084/∼sohaib/.

Conflicts of Interest

The authors declare that they have no conflicts of interest.