Results 31 to 40 of about 4,562 (186)

Multi-domain service orchestration over networks and clouds: a unified approach [PDF]

open access: yes, 2015
End-to-end service delivery often includes transparently inserted Network Functions (NFs) in the path. Flexible service chaining will require dynamic instantiation of both NFs and traffic forwarding overlays.
Czentye, J   +7 more
core   +2 more sources

Study on SDN with Security Issues Using Mininet [PDF]

open access: yes, 2021
The internet is faced with many problems daily, one of them is decrement in network bandwidth because of Distributed Denial of Service (DDoS) attack on host server, which deplete host resources. Researchers has been invented many protection mechanisms such as detection, trace back, prevention, reaction, and characterization are in case of DDoS attacks,
Florance G, Anandhi, R.J
openaire   +1 more source

Software Defined Networks based Smart Grid Communication: A Comprehensive Survey [PDF]

open access: yes, 2019
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG).
Assi, Chadi   +3 more
core   +2 more sources

Global network modelling based on mininet approach. [PDF]

open access: yesProceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013
The problem of the Global network operation analysis has a variety of applications. In this paper we show an approach to this problem on example of malware propagation in the Global networks (Wide Area Network).It is very important to be able to make accurate prediction of the consequences of such propagation.
Vitaly Antonenko, Ruslan Smelyanskiy
openaire   +1 more source

Vulnerability analysis of an emulated SDN network by flooding HTTP and TCP packets

open access: yesVisión Electrónica, 2023
This article implements a topology of an SDN network in the Mininet emulator where a web server is implemented in one of the devices in order to execute a denial-of-service attack by sending mass packets with the aim of analyze what vulnerabilities can ...
Dairon Javier Ramos Suavita   +2 more
doaj  

Performance Test of Openflow Agent on Openflow Software-Based Mikrotik RB750 Switch

open access: yesScientific Journal of Informatics, 2016
A network is usually developed by several devices such as router, switch etc. Every device forwards data package manipulation with complicated protocol planted in its hardware.
Rikie Kartadie
doaj   +1 more source

BPFabric: Data Plane Programmability for Software Defined Networks [PDF]

open access: yes, 2017
In its current form, OpenFlow, the de facto implementation of SDN, separates the network’s control and data planes allowing a central controller to alter the matchaction pipeline using a limited set of fields and actions.
Jouet, Simon, Pezaros, Dimitrios P.
core   +1 more source

MIKROTIK RB750 ROUTERBOARD SEBAGAI ALTERNATIF SWITCH OPENFLOW SOFTWARE-BASE

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2016
Software-Defined Networking (SDN) merupakan cara untuk mengurangi kompleksitas konfigurasi jaringan dan manajemen jaringan. Solusi yang ditawarkan oleh SDN memberikan nuansa baru pada jaringan komputer.
Rikie Kartadie
doaj   +1 more source

Assessment of SDN Controllers in Wireless Environment Using a Multi-Criteria Technique

open access: yesInformation, 2023
Software-defined network (SDN) technology can offer wireless networks the advantages of simplified control and network management. This SDN subdomain technology is called the software-defined wireless network (SDWN).
Ioannis Koulouras   +4 more
doaj   +1 more source

Experimental Evaluation of SDN-Controlled, Joint Consolidation of Policies and Virtual Machines [PDF]

open access: yes, 2017
Middleboxes (MBs) are ubiquitous in modern data centre (DC) due to their crucial role in implementing network security, management and optimisation. In order to meet network policy's requirement on correct traversal of an ordered sequence of MBs, network
Cui, Lin   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy