The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking is a new networking paradigm that has emerged recently as a promising solution for tackling the inflexibility of the classical IP networks. The centralized approach of SDN yields a broad area for intelligence to optimise the network at various levels. Fault tolerance is considered one of the most current research challenges that facing the SDN, hence, in this paper we introduce...
The continuous increase in data traffic, heterogeneous access networks, and the diversity in the Quality of Service (QoS) requirements of the applications is expected to significantly increase the management complexity of 5G networks. Software Defined Networking provides an effective management architecture enabling more efficient utilization of 5G network resources. In this paper, a novel failure...
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies...
Live Virtual machine (VM) migration is a promising solution for data center (DC) administrators to achieve a wide range of objectives - from load balancing to disaster evacuation. Ideally, live VM migration is seamless and the challenge is to minimize the downtime during which the VM is not responding to requests or providing the service. The duration of the downtime is mainly influenced by the migration...
The strict Quality of Service requirements of real-time services in communication networks necessitate the fast recovery from link/node failures by activating alternate paths which avoid the failed component. Multi Topology Routing (MTR) based IP Fast Re-Route (IPFRR) technologies rely on virtual topologies (VTs) to seamlessly forward the IP packets during network failures. In this paper, we implement...
Real-time services in IP networks require a fast switching of disrupted traffic to alternate paths in case of link/node failures to satisfy their stringent Quality of Service requirements. Multi Topology Routing (MTR) based IP Fast Re-route (IPFRR) technologies rely on virtual topologies to seamlessly forward the IP packets during network failures by activating the proactively computed alternate routes...
Packet forwarding anomaly is an abnormal network state where flows are forwarded along wrong paths. Current practice of forwarding anomaly detection in Software Defined Networks (SDN) is achieved by sending probing packets or analyzing flow statistics. However, these approaches are not effective and efficient. For example, the probing approaches cannot capture all attacks, and the statistics approaches...
Load balancing in data centers have been a common practice in the last couple of decades. This has been done statically in traditional networks with little or no feedback information from the underlying network state. With the current large cloud data centers and continuous changing traffic patterns, the drive for more interactive and dynamic solution to reduce the latency and improve the network...
This article proposes a novel approach to onthe- fly establishment of multihop wireless access networks (OEMAN) for disaster response. OEMAN extends Internet connectivity from surviving access points to disaster victims using their own mobile devices. OEMAN is set up on demand using wireless virtualization to create virtual access points on mobile devices. Virtual access points greedily form a tree-based...
Data center networks often use densely interconnected topologies to provide high bandwidth for internal data exchange. In such network, it is critical to employ effective load balancing schemes so that the bandwidth resources can be fully utilized. A simple and widely adopted scheme is equal-cost multi-path (ECMP) routing, which is generally supported by commodity switches and routers. However, research...
Nowadays, network is becoming more and more complicated. Topology discovery becomes a hot research point as it is of high importance to network management. Current topology discovery methods have been investigated in this paper, which can be classified as common-protocol-based method, router-protocol-based method and SNMP-protocol-based method, all of which are specifically discussed in the following...
We propose an approach to generate and execute tests of the conformance of a system to a given security policy. The method is rule-based: it generates test cases directly from a security policy expressed as a set of security requirements, using two relations: one between predicates appearing in the rules and elementary test cases, called tiles, used to test predicates in the system, and another one...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.