Fault Tolerance Exploration and SDN Implementation for de Bruijn Topology based on betweenness Coefficient

Full Text (PDF, 829KB), PP.97-112

Views: 0 Downloads: 0


Artem Volokyta 1,* Heorhii Loutskii 1 Oleksandr Honcharenko 1 Oleksii Cherevatenko 1 Volodymyr Rusinov 1 Yurii Kulakov 1 Serhii Tsybulia 2

1. National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”/ Department of computer engineering, Kyiv, 03056, Ukraine

2. The National Defence University of Ukraine/ Scientific and methodological center for the organization of scientific and technical activities, Kyiv, 03049, Ukraine

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.01.08

Received: 1 Sep. 2023 / Revised: 27 Oct. 2023 / Accepted: 12 Dec. 2023 / Published: 8 Feb. 2024

Index Terms

De Bruijn Graph, betweenness, Fault Tolerance, SDN


This article considers the method of analyze potentially vulnerable places during development of topology for fault-tolerant systems based on using betweenness coefficient. Parameters of different topological organizations using De Bruijn code transformation are observed. This method, assessing the risk for possible faults, is proposed for other topological organizations that are analyzed for their fault tolerance and to predict the consequences of simultaneous faults on more significant fragments of this topology.

Cite This Paper

Artem Volokyta, Heorhii Loutskii, Oleksandr Honcharenko, Oleksii Cherevatenko, Volodymyr Rusinov, Yurii Kulakov, Serhii Tsybulia, "Fault Tolerance Exploration and SDN Implementation for de Bruijn Topology based on betweenness Coefficient", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.1, pp.97-112, 2024. DOI:10.5815/ijcnis.2024.01.08


[1]A. Dodonov and D. Lande, "Modeling the survivability of network structures," in CEUR Workshop Proceedings, vol. 2859, pp. 1-10, 2021.
[2]M. Y. Teh, J. J. Wilke, K. Bergman, and S. Rumley, "Design space exploration of the dragonfly topology," in High Performance Computing: ISC High Performance 2017 International Workshops, DRBSD, ExaComm, HCPM, HPC-IODC, IWOPH, IXPUG, P^ 3MA, VHPC, Visualization at Scale, WOPSSS, J. J. Wilke, Ed., pp. 57-74, 2017.
[3]V. Rusinov, O. Honcharenko, A. Volokyta, H. Loutskii, O. Pustovit, and A. Kyrianov, "Methods of Topological Organization Synthesis Based on Tree and Dragonfly Combinations," in Advances in Computer Science for Engineering and Education VI. ICCSEEA 2023, Z. Hu, I. Dychka, and M. He, Eds., pp. 43-55, Springer, 2023. [Online]. Available: https://doi.org/10.1007/978-3-031-36118-0_43
[4]M. A. Nugroho and A. Rakhmatsyah, "Simulation of Jellyfish Topology Link Failure Handling Using Floyd Warshall and Johnson Algorithm in Software Defined Network Architecture," in 2021 9th International Conference on Information and Communication Technology (ICoICT), Aug. 2021, pp. 144-148.
[5]Y. Ajima, "High-dimensional Interconnect Technology for the K Computer and the Supercomputer Fugaku," Fujitsu documentation, 2020. [Online]. Available: https://www.fujitsu.com/global/about/resources/publications/technicalreview/topics/article005.html
[6]Y. Ajima et al., "The tofu interconnect d," in 2018 IEEE International Conference on Cluster Computing (CLUSTER), Sep. 2018, pp. 646-654. [Online]. Available: https://ieeexplore.ieee.org/document/8515069
[7]O. Godspower and V. I. E. Anireh, "EVOLUTION OF SUPERCOMPUTER ARCHITECTURE: A SURVEY," International Journal of Computer Science and Mobile Applications, vol. 10, no. 7, pp. 16-26, 2022.
[8]Y. Kulakov, A. Kohan, and S. Kopychko, "Traffic Orchestration in Data Center network based on software-defined networking technology," in Advances in Computer Science for Engineering and Education II, pp. 228–237, 2019. [Online]. Available: https://doi.org/10.1007/978-3-030-16621-2_21
[9]S. Hossen, "Traffic Engineering in Software Defined Network (SDN)," East west university, Dhaka, 2022. [Online]. Available: https://doi.org/10.13140/RG.2.2.34595.32807
[10]Z. Zhang et al., "Joint computation offloading and coin loaning for blockchain-empowered mobile-edge computing," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9934-9950, Jun. 2019.
[11]E. F. Rohman, R. Ritzkal, and Y. Afrianto, "Fail Path Analysis on Openflow Network Using Floyd-Warshall Algorithm," Jurnal Mantik, vol. 4, no. 3, pp. 1546-1550, 2020.
[12]O. G. Rehida, P. Rehida, A. Volokyta, H. Loutskii, and V. D. Thinh, "Routing Method Based on the Excess Code for Fault Tolerant Clusters with InfiniBand," in Advances in Computer Science for Engineering and Education II. ICCSEEA 2019, pp. 228-237, Springer, 2020. [Online]. Available: https://doi.org/10.1007/978-3-030-16621-2_31
[13]H. Loutskii, A. Volokyta, P. Rehida, O. Goncharenko, "Using excess code to design fault-tolerant topologies," Technical sciences and technologies, vol. 1, no. 15, pp. 134–144, 2019. [Online]. Available: https://doi.org/10.25140/2411-5363-2019-1(15)-134-144
[14]H. Loutskii et al., "Increasing the fault tolerance of distributed systems for the Hyper de Bruijn topology with excess code," in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), pp. 1-6, Kyiv, Ukraine, 2019. [Online]. Available: https://doi.org/10.1109/ATIT49449.2019.9030487
[15]A. Ahmad et al., "A Review on Software Defined Network (SDN) Based Network Security Enhancements," International Journal of Computer Science and Mobile Applications, vol. 7, pp. 1-8, 2021.
[16]A. M. A. Alnaser, Y. Kulakov, and D. Korenko, "Modified Method of Traffic Engineering in DCN with a Ramified Topology," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 12, no. 12, 2021. [Online]. Available: http://dx.doi.org/10.14569/IJACSA.2021.0121258
[17]D. Korenko, O. Cherevatenko, V. Rusinov, and Y. Kulakov, "Creation of the method of multipath routing using known paths in software-defined networks," Technology Audit and Production Reserves, vol. 4, no. 2(66), pp. 19–24, 2022. [Online]. Available: https://doi.org/10.15587/2706-5448.2022.262787
[18]O. Cherevatenko and Y. Kulakov, "Modeling of the multipath routing using known paths with ONOS SDN controller," Problems of informatization and management, vol. 2(74), pp. 55-61, 2023. [Online]. Available: https://doi.org/10.18372/2073-4751.74.17882
[19]M. S. Farooq, S. Riaz, and A. Alvi, "Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review," Electronics, vol. 12, no. 14, p. 3077, Jul. 2023. [Online]. Available: https://doi.org/10.3390/electronics12143077