The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Networks (SDN) is an emerging area that promises to change the way we design, build, and operate network architecture. It tends to shift from traditional network architecture of proprietary based to open and programmable network architecture. However, this new innovative and improved technology also brings another security burden into the network architecture, with existing and emerging...
Software Defined Networking (SDN) is a promising solution for addressing challenges of future networks. Despite its advantages such as flexibility, simplification and low costs, it has several drawbacks that are largely induced by the centralized control paradigm. Security is one of the most significant challenges related to centralization. In that regard, Distributed Denial of Service (DDoS) attacks...
This paper describes the software architecture and the implementation of a fully operational testbed that demonstrates the benefits of flexible, dynamic resource allocation with virtualized LTE-A nodes. The testbed embodies and specializes the general software architecture devised within the Flex5Gware EU project, and focuses on two intelligent programs: the first one is a Global Scheduler, that coordinates...
The maintenance and management for the current Fourth Generation (4G) networks are still in a manual and semi-automatic manner, which are costly and time-consuming. This imposes a great challenge on the network management of heterogeneous, software-defined and virtualized Fifth Generation (5G) systems. With the advent of network intelligence, a possibility on intelligent management is opened for the...
With the advent of multiple radio interfaces on modern smart phones, simultaneous transmission and reception of data through via both mobile networks and WiFi networks has gained a considerable attention as a cost-effective means for mobile data offloading. In this paper, we present a practical SDN-based data offloading framework based on a Femto-WiFi Integrated network. The proposed framework take...
Flow-based inspection is playing an important role in network security monitoring systems such as intrusion detection, attacks detection and so on. Traditional flow scheduling strategies are usually based on calculated hash values of input flows which is fixed for a long time. As the bandwidth grows dramatically these years, it is observed that servers handling flow inspections may be crashed due...
Network resource virtualization emerged as the future of communication technology recently, and the advent of Software Define Network (SDN) and Network Function Virtualization (NFV) enables the realization of network resource virtualization. NFV virtualizes traditional physical middle-boxes that implement specific network functions. Since multiple network functions can be virtualized in a single server...
This paper aims to explain the design and implementation procedure of embedded Smart Systems. The idea is supported by four different Smart Systems, as Smart Home, Smart Agriculture, Smart Campus, and Seat and Study Module of Smart Library. All designs and implementations contains technological components of embedded systems, mobile application development, cloud based services and client side graphical...
In this present day Embedded field most of research focused is on Embedded Linux. Our focus in this paper is Sensor Networking and Automation used for domestic and industrial applications. Using Rassberry Pi 2 developing on python editor & cortex processor presents a design and prototype implementation of new home ill automation system that uses WiFi technology as a network infrastructure connecting...
In this article, the most essential aims on information protection of data processing centers in more flexible way to provide the necessary level of security of the existing environment of development and dissemination of cyber-attacks, which should be easily scaled to support any of its changes in the future, also in this paper Formation of competitive information security of data processing center...
We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim...
In this article, the most essential aims on information protection of data processing centers in more flexible way to provide the necessary level of security of the existing environment of development and dissemination of cyber-attacks, which should be easily scaled to support any of its changes in the future, also in this paper Formation of competitive information security of data processing center...
In the past, street lamps were turned on or off by a simple Timer or switch. When a street lamp did not light due to fault or electric leakage, it would not be found until it was reported by somebody or found by patrol men. In addition, sometimes the wires for street lamps were stolen, and because the street lamps were extensively distributed, they could not be completely protected by laborers. Street...
Software-Defined Networking (SDN) is an emerging networking technology that has attracted intense interest from both the industry and research communities. Thus far, it is primarily applied to datacenters and research network environments. Despite meticulous effort in planning and equipment selection prior to deployment, there remain unknowns that can affect the network's performance after equipment...
In most existing cloud services, a centralized controller is used for resource management and coordination. However, such infrastructure is gradually not sufficient to meet the rapid growth of mega data centers. In recent literature, a new approach named devolved controller was proposed for scalability concern. This approach splits the whole network into several regions, each with one controller to...
The rapid evolution of technologies makes it possible to create remote laboratory for research and educational purposes. This paper presents a testbed that can conduct experiments following commands from a remote client. It is a small-scaled intelligent transportation system (ITS) testbed which can collect data, perform configuration and control the radio-controlled (RC) car. The remote client can...
A modern virtualized data center is highly multifarious environment shared among hundreds of co-located tenants hosting heterogeneous applications. The tenants' virtual machines generate a subset of elephants or mice flows (different in terms of rate, size, duration, and burstiness) based on the type of application they are running. Virtual traffic generated from the tenant's virtual machines traverses...
The paper describes a software application running on Android mobile devices, used to help the neuromotor disabled patients to communicate with the clinicians or caretakers. The proposed application also include a telemonitoring (remote monitoring) component used to collect and process few physiological parameters of the patient. The application is part of a more complex communication and monitoring...
The network monitoring system (NMS) monitors network service and system, resource capacity plan, statistics and accounting, fault management and performance; such as throughput, latency and round trip time. Audit log is a importance data source that are used for network behaviour analysis. There are a terabyte of traffic and event log that needed any database system to store and reply any query. This...
In this paper we address the problem of network contention between the migration traffic and the VM application traffic for the live migration of co-located Virtual Machines (VMs). When VMs are migrated with pre-copy, they run at the source host during the migration. Therefore the VM applications with predominantly outbound traffic contend with the outgoing migration traffic at the source host. Similarly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.