The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional DDoS anti-spoofing scrubbers require dedicated middleboxes thus adding CAPEX, latency and complexity in the network. This paper starts by showing that the current SDN match-and-action model is rich enough to implement a collection of anti-spoofing methods. Secondly we develop and utilize advance methods for dynamic resource sharing to distribute the required mitigation resources over a...
It is shown that virtual laboratory complexes identical to real physical stands may provide an alternative in laboratory workshop for students of technical specialties of higher educational establishments. The basic requirements for virtual complexes are formulated and graphic programming medium LabVIEW is proposed as a platform for their creation. An example of a virtual laboratory complex for the...
In this paper we present a correctness proof for Infosoft e-Detailing 1.0 presentation software using Isabelle proof assistant. This work illustrates a method of proving correctness of parallel software using proof assistants. Here we concentrate on the state-based approach for proving a safety property. We also give a comparison of this approach with the correctness proof method that was applied...
The statistical technique for detecting outliers in multivariate non-Gaussian data on the basis of normalizing transformations and the Mahalanobis squared distance (MSD) is proposed. Application of the technique is considered for detecting outliers in the data of four-variate measurements.
With the flexibility and programmability levels offered by Network Functions Virtualization (NFV), it is expected to catalyze the upcoming “softwarization” of the network through software implementation of networking functionalities on virtual machines (VMs). While looking into the different issues thrown at NFV, numerous works have demonstrated how performance, power consumption and, consequently,...
Integrated GPS receivers have become a basic module in location based services, such as position sharing, wild animal monitoring, and location tracking. However, GPS modules have a serious battery drain problem due to their high computation load. This paper aims to reveal the impact of key software parameters on GPS energy consumption, by establishing an energy model for a standard GPS receiver architecture...
Software Defined Networking (SDN) technology enables us to configure switches in a network flexibly. Previously, distributed SDN control methods have been discussed to improve their scalability and robustness. Distributed placement of controllers reduces computation load of each controller and backing up each other enhances robustness. However, these techniques do not include an emergency measure...
Due to the expensive hardware and complex management of the traditional middlebox, a concerted effort towards the virtualized middlebox has been launched in both academia and industry. In this paper, we propose a unified middlebox model, MBBrick, which is composed of three operation modules (classifier, rewriter, forwarder) and a control module (the mcontroller). We then design a language, MG, to...
Software Defined Networks (SDN) enables flexible flow control by installing policy rules into switches. However, one of the challenges is the dependencies between rules, which is generated due to the rules overlapping in filed space with different priorities. To keep the forwarding correctness and avoid complicated scenarios caused by the asynchronous removal, controllers usually adopt a hard timeout...
The OpenFlow-based SDN is widely studied to better network performance through providing flexible routing paths. However, being designed to configure path hop-by-hop, it faces the scalability issue — both the flow table overhead and path setup delay are unacceptable for large-scale networks. In this paper, we propose PACO, a framework based on Source Routing (SR) to address that problem through quickly...
Researchers from almost all academic disciplines — who now rely on large data sets for their work — are increasingly facing “middlebox” bottlenecks (e.g., firewalls, NAT, IDS/IDP) that limit performance when transferring data sets across the campus network. To address this problem, we are exploring Software Defined Networking (SDN) campus network designs that allow researchers to “bypass” rate-limiting...
Software Defined Networks (SDNs) are a promising network architecture for future computer networks because they enable more dynamic, fine-grained control over network traffic. OpenFlow is an open standard network protocol that provides specifications for managing network traffic. Permissible (and impermissible) network flows are defined by OpenFlow policies that are translated into network switch...
In this demo we illustrate the usage of PopperCI [1], a continous integration (CI) service for experiments hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper [2], a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently.
Software Defined Networking (SDN) enables network innovation and brings flexibility by separation of the control and data planes and logically centralized control. However, this network paradigm complicates flow rule management. Current approaches generally install rules reactively after table misses or pre-installs them by flow prediction. Such approaches consume nontrivial network resources during...
This experience paper presents how a globally distributed software engineering team was able to deliver usable software at the end of each takt, why this was important, and the benefits derived. We also describe the approach taken, the challenges faced and the steps to overcome them.
Context: Conducting a Grounded Theory study is rigorous, demanding, and challenging. Misperceptions exist within the software engineering community. Objective: The purpose of this paper is to describe one extended participant observation Grounded Theory study for aiding new empirical researchers wanting to run similar research studies. Method: Following Constructivist Grounded Theory, we conducted...
Formal approaches to software development have traditionally aimed at guaranteeing software correctness, through the use of notations, analysis mechanisms and other elements founded on solid mathematical grounds. Since the seminal works of Hoare, Floyd and others, formal methods have used logical notations to capture intended software behavior, and proposed techniques for reasoning about software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.