Results 81 to 90 of about 13,920 (234)

Traffic Engineering with Segment Routing: SDN-based Architectural Design and Open Source Implementation

open access: yes, 2015
Traffic Engineering (TE) in IP carrier networks is one of the functions that can benefit from the Software Defined Networking paradigm. By logically centralizing the control of the network, it is possible to "program" per-flow routing based on TE goals ...
Davoli, Luca   +4 more
core   +1 more source

Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 18, December 2024.
A centralized controller vulnerable to attacks is one of the security vulnerabilities and scalability issues faced by the Internet of Things (IoT)‐connected software‐defined network (SDN). Safeguard Authentication Dynamic Access Control (SANDMAC) tackles these issues by emphasizing secure access control and user and application authentication ...
Sahana D S, Brahmananda S H
wiley   +1 more source

Research on Realization of MSE Equipment Based on OpenFlow Protocol

open access: yesDianxin kexue, 2013
The theory of OpenFlow and MSE equipment were deeply and widely discussed. On the basis of the research, the MSE implementation with the extension of the OpenFlow protocol was proposed.
Yongqing Zhu, Huanan Chen, Hong Tang
doaj   +2 more sources

A SDN/OpenFlow Framework for Dynamic Resource Allocation based on Bandwidth Allocation Model [PDF]

open access: green, 2021
Eliseu Silva Torres   +3 more
openalex   +1 more source

Probabilistic models for evaluating network edge's resistance against scan and foothold attack

open access: yesIET Communications, Volume 18, Issue 20, Page 1983-1995, December 2024.
The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. According to the state‐of‐the‐art defense technologies, we illustrate three different defense strategies: no defense, address mutation, and fingerprint decoy. Subsequently, three
Shuo Wang   +6 more
wiley   +1 more source

OSDF: A Framework For Software Defined Network Programming

open access: yes, 2017
Using SDN to configure and control a multi-site network involves writing code that handles low-level details. We describe preliminary work on a framework that takes a network description and set of policies as input, and handles all the details of ...
Comer, Douglas, Rastegarnia, Adib
core   +1 more source

The beacon openflow controller [PDF]

open access: yesProceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013
Beacon is a Java-based open source OpenFlow controller created in 2010. It has been widely used for teaching, research, and as the basis of Floodlight. This paper describes the architectural decisions and implementation that achieves three of Beacon's goals: to improve developer productivity, to provide the runtime ability to start and stop existing ...
openaire   +1 more source

Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 14, Issue 6, November/December 2024.
A Generic Framework Fusing AI and Blockchain within Metaverse Abstract The Metaverse, distinguished by its capacity to integrate the physical and digital realms seamlessly, presents a dynamic virtual environment offering diverse opportunities for engagement across innovation, entertainment, socialization, and commercial endeavors.
Mueen Uddin   +6 more
wiley   +1 more source

A Web‐Based Architecture to Operationalize Geospatial Simulation Environments

open access: yesAdvanced Theory and Simulations, Volume 7, Issue 9, September 2024.
Large scale geospatial simulation projects require multidisciplinary efforts by actors with highly variable skills and domains of expertise. Subject matter experts, modelers, developers, analysts, and decision makers must collaborate closely to model a real‐world system, simulate it, analyze its results and disseminate them.
Gabriel Wainer, Bruno St‐Aubin
wiley   +1 more source

Implementation and Performance Analysis of Mobile Handoff Process on OpenFlow-based Wi-Fi Network

open access: yesInternational Journal of Technology, 2015
Research in communication network has the limit due to its problem of the supply frequency and equipment. To overcome this problem, open source can be the solution to build a helpful test bed for the research or academic purpose.
Ardiansyah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy