Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
in this work, SDN has been utilized to alleviate and eliminate the problem of ARP poisoning attack. This attack is the underlying infrastructure for many other network attacks, such as, man in the middle, denial of service and session hijacking. In this paper we propose a new algorithm to resolve the problem of ARP spoofing. The algorithm can be applied in two different scenarios. The two scenarios...
In the social Internet of Things (SIoT), devices are often divided into groups with different relationships in social networks. The radio access network (RAN), which is often used to connect IoT devices to the IoT cloud service, doesn't adequately support SIoT groups. Thus, to distinguish SIoT groups in a RAN, network virtualization with a software-defined network (SDN) structure is preferable because...
Nowadays the use of enterprise VPN services is integrated in every larger company. SOHO and SMB also use VPN for connection with internet providers, VoIP, banking transactions. Our approach suggests to automatize building and using multicomponent VPN topologies. We also proposed the cloud to build full-mesh dynamic multipoint VPNs based on routers using scripts.
In this paper an architecture for High-Availability Cyber-Physical Production Systems with sub-microsecond synchronization capabilities is presented. The proposed CPPS nodes are based on cost-affordable components. These CPPS can deal with most of the challenges set by Industry for a massive adoption of the distributed computing philosophy in critical systems like Smart-Grids or Advanced Manufacturing...
In software defined networks, a centralized control is commonly used to provide a global view of the network and to simplify the network operation as well as network programmability. However, in the centralized model, the control path between the network devices and the controller can be a single point of failure or a potential bottleneck. Therefore, in this paper, the traditional SDN controller has...
High Availability (HA) is an ability of the system to operate continuously in desired amount of time. Telephony system, for example, should operate 99.999%, that means the system should have only 5.26 maximum downtime for a year. Provide high available IP based service such as Voice over IP for telephony is difficult since IP is not designed for reliable connection. A lot of research has been conducted...
In this article, it has implemented a module of network traffic balance, using defined networks by software (SDN), distributing the flow of network information, according to physical external variables which come from electronic sensors. The architecture of proposed network works with the Floodlight controller, which executes the module of load balance, modified to be employed at dependency on the...
New services such as network virtualization, service chaining, and application-centric traffic steering bring new opportunities for network providers and service providers. While Software Defined Network is poised to support new services, it is still in development stage. Mechanisms supporting new services are still missing. In this paper, we propose a new application driven mechanism called Service...
With the popularity of network equipment, existing infrastructure network has been unable to meet the current demands on the network and standard high-speed link has been popular in the backbone network. Therefore, it put forward higher requirements for high-performance network. In addition, using reliable tools to generate high speed traffic loads has become the key task of high performance network...
Software-Defined Networking (SDN) has become a promising network architecture in which network devices are controlled by a SDN Controller. Employing SDN offers an attractive solution for network security. However the attack prediction and Prevention, especially for Distributed Denial of Service (DDoS) attacks is a challenge in SDN environments. This paper, analyzes the characteristics of traffic flows...
This paper presents implementation of a reactive base station selection scheme for millimeter-wave (mmWave) communications. In mmWave communications, the frame loss rate increases and the throughput sharply decreases when a pedestrian blocks a line-of-sight (LOS) path. To alleviate this human blockage problem, base stations can be selected so as to maintain LOS paths on the basis of communication...
This paper presents techniques for high-voltage isolated converters to achieve high power efficiency at high switching frequencies. To minimize the converter switching loss, an isolated quasi-square-wave zero-voltage switching three-level half-bridge architecture is adopted. An integrated synchronous three-level gate driver is proposed to ensure reliability of all eGaN power FETs and provide fast...
This paper presents a software defined networking (SDN) based semi-distributed mobility management system. By both using an SDN approach and leveraging layer 2 technology, i.e., carrier grade Ethernet and the 802.1ad standard, it is possible to simplify the network architecture by removing the need for the relatively complex GPRS tunneling protocol currently in use in the user plane. An analytical...
Reliability is a significant indicator measuring the communication IP nets' performance. When communication failure occurs in the net, net devices should make a quick detection of the status between contiguous devices, which leads to timely solutions to ensure the communication service. According to the real environment of remote terminal in command information net, under the premise that the two...
The production network at Arizona State University uses a commercial load balancer for \texttt{syslog} messages from the firewalls at the data center perimeter. The logs are carried in UDP packets and the load balancer divides the load among servers based on the source IP address. This may cause a server to be overwhelmed due to the high incoming data rate, and create log files unequal in size. These...
There is an increasing demand for secure communication services that can dynamically reflect user needs. Conventional dedicated services such as an Internet VPN or IPVPN using IPsec and MPLS have inherent shortcomings, making it difficult for them to dynamically reflect user requirements when faced with limited network resources. It is also quite important for communication services to deal effectively...
Virtual Machines (VMs) and network virtualization technologies have been widely used for cloud computing. Active VMs can move to other execution environments, an action called "live migration." VMs must have the same IP address before and after migration. Therefore, live migration must be in the same segment. For this reason, network virtualization technologies are used to make a wide area...
This paper deals with a method to measure the quality of Giga Internet service. The existing method needs both remote servers and a client application when measuring Internet quality such as throughput(speed), delay and loss. On the other hand, the proposed method only needs a single-sided application which is installed in a personal computer(PC). The key technique is to use traffic loopback algorithm...
An SDN enabled mobile access network is a future network with great potential to support scalable and flexible network applications. To support various network applications, the SDN-enabled mobile access network usually uses forwarding rules in SDN devices. With a limited rule space in existing SDN devices, a rule caching mechanism is an efficient way to improve network performance. In this article...
Pub/Sub communication model becomes a basis of various applications, e.g. IoT/M2M, SNS. These application domains require new properties of the Pub/Sub infrastructure, for example, supporting a large number of devices with widely distributed manner, handling emergency messaging with priority control and so on. In order to meet the demands, we proposed Software Defined Network Aware Pub/Sub (SAPS)...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.