20 resultados para software-defined networking (SDN)

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous attempts in addressing Access Point (AP) association at overlapping zone of IEEE 802.11 networks have shown some issues. They work passively and estimate load from different network metrics such as frame delay, packet loss, number of users etc. that may not always true. Further the user behaviour is selfish i.e. illegitimate user consume high network resources. This adversely affect existing or new users which in turn motivates them to change locations. To alleviate these issues, we propose the use of a Software Defined Networking (SDN) enabled client side (wireless end user) solution. In this paper, we start by proposing a dynamic AP selection algorithm/framework in wireless user device. The device receive network resource related statistics from SDN Controller and guide the client device to associate itself with the best selected AP. We justify that the use of SDN discourage users to act selfishly. Further, a mathematical modelling of the proposed scheme is derived using Fuzzy membership function and the simulation is carried out. Results obtained from simulation necessitates to implement SDN enabled client side methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the emergence of Internet-of-Things (IoT), there is now growing interest to simplify wireless network controls. This is a very challenging task, comprising information acquisition, information analysis, decision-making, and action implementation on large scale IoT networks. Resulting in research to explore the integration of software-defined networking (SDN) and IoT for a simpler, easier, and strain less network control. SDN is a promising novel paradigm shift which has the capability to enable a simplified and robust programmable wireless network serving an array of physical objects and applications. This paper starts with the emergence of SDN and then highlights recent significant developments in the wireless and optical domains with the aim of integrating SDN and IoT. Challenges in SDN and IoT integration are also discussed from both security and scalability perspectives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The telecommunication industry is entering a new era. The increased traffic demands imposed by the huge number of always-on connections require a quantum leap in the field of enabling techniques. Furthermore, subscribers expect ever increasing quality of experience with its joys and wonders, while network operators and service providers aim for cost-efficient networks. These requirements require a revolutionary change in the telecommunications industry, as shown by the success of virtualization in the IT industry, which is now driving the deployment and expansion of cloud computing. Telecommunications providers are currently rethinking their network architecture from one consisting of a multitude of black boxes with specialized network hardware and software to a new architecture consisting of “white box” hardware running a multitude of specialized network software. This network software may be data plane software providing network functions virtualization (NVF) or control plane software providing centralized network management — software defined networking (SDN). It is expected that these architectural changes will permeate networks as wide ranging in size as the Internet core networks, to metro networks, to enterprise networks and as wide ranging in functionality as converged packet-optical networks, to wireless core networks, to wireless radio access networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software-defined network (SDN) is the next generation of networking architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today's applications. In SDN, network management is facilitated through software rather than low-level device configurations. However, the centralized control plane introduced by SDN imposes a great challenge for the network security. In this paper, we present a secure SDN structure, in which each device is managed by multiple controllers rather than a single one as in a traditional manner. It can resist Byzantine attacks on controllers and the communication links between controllers and SDN switches. Furthermore, we design a cost-efficient controller assignment algorithm to minimize the number of required controllers for a given set of switches. Extensive simulations have been conducted to show that our proposed algorithm significantly outperforms random algorithms. © 2014 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software-Defined Network (SDN) is a promising network paradigm that separates the control plane and data plane in the network. It has shown great advantages in simplifying network management such that new functions can be easily supported without physical access to the network switches. However, Ternary Content Addressable Memory (TCAM), as a critical hardware storing rules for high-speed packet processing in SDN-enabled devices, can be supplied to each device with very limited quantity because it is expensive and energy-consuming. To efficiently use TCAM resources, we propose a rule multiplexing scheme, in which the same set of rules deployed on each node apply to the whole flow of a session going through but towards different paths. Based on this scheme, we study the rule placement problem with the objective of minimizing rule space occupation for multiple unicast sessions under QoS constraints. We formulate the optimization problem jointly considering routing engineering and rule placement under both existing and our rule multiplexing schemes. Via an extensive review of the state-of-the-art work, to the best of our knowledge, we are the first to study the non-routing-rule placement problem. Finally, extensive simulations are conducted to show that our proposals significantly outperform existing solutions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the first study on scheduling for cooperative data dissemination in a hybrid infrastructure-to-vehicle (I2V) and vehicle-to-vehicle (V2V) communication environment. We formulate the novel problem of cooperative data scheduling (CDS). Each vehicle informs the road-side unit (RSU) the list of its current neighboring vehicles and the identifiers of the retrieved and newly requested data. The RSU then selects sender and receiver vehicles and corresponding data for V2V communication, while it simultaneously broadcasts a data item to vehicles that are instructed to tune into the I2V channel. The goal is to maximize the number of vehicles that retrieve their requested data. We prove that CDS is NP-hard by constructing a polynomial-time reduction from the Maximum Weighted Independent Set (MWIS) problem. Scheduling decisions are made by transforming CDS to MWIS and using a greedy method to approximately solve MWIS. We build a simulation model based on realistic traffic and communication characteristics and demonstrate the superiority and scalability of the proposed solution. The proposed model and solution, which are based on the centralized scheduler at the RSU, represent the first known vehicular ad hoc network (VANET) implementation of software defined network (SDN) concept.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this letter is to propose an analytical model to study the performance of Software-Defined Network (SDN) switches. Here, SDN switch performance is defined as the time that an SDN switch needs to process packet without the interaction of controller. We exploit the capabilities of queueing theory based M/Geo/1 model to analyze the key factors, flowtable size, packet arrival rate, number of rules, and position of rules. The analytical model is validated using extensive simulations. Our study reveals that these factors have significant influence on the performance of an SDN switch.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software Defined Networking (SDN) and Internet of Things (IoT) integration has thrown many critical challenges. Specifically, in heterogeneous SDN-IoT ecosystem, optimized resources utilization and effective management at the control layer is very difficult. This mainly affects the application specific Quality of Service (QoS) and energy consumption of the IoT network. Motivated from this, we propose a new Resource Management (RM) method at the control layer, in distributed SDN-IoT networks. This paper starts with reasons that why at control layer RM is more complex in the SDN-IoT ecosystem. After-that, we highlight motivated examples that necessitate to investigate new RM methods in SDN-IoT context. Further, we propose a novel method to compute controller performance. Theoretical analysis is conducted to prove that the proposed method is better than the existing methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract—
After a decade of extensive research on application-specific wireless sensor networks (WSNs), the recent development of information and communication technologies makes it practical to realize the software-defined sensor networks (SDSNs), which are able to adapt to various application requirements and to fully explore the resources of WSNs. A sensor node in SDSN is able to conduct multiple tasks with different sensing targets simultaneously. A given sensing task usually involves multiple sensors to achieve a certain quality-of-sensing, e.g., coverage ratio. It is significant to design an energy-efficient sensor scheduling and management strategy with guaranteed quality-of-sensing for all tasks. To this end, three issues are investigated in this paper: 1) the subset of sensor nodes that shall be activated, i.e., sensor activation, 2) the task that each sensor node shall be assigned, i.e., task mapping, and 3) the sampling rate on a sensor for a target, i.e., sensing scheduling. They are jointly considered and formulated as a mixed-integer with quadratic constraints programming (MIQP) problem, which is then reformulated into a mixed-integer linear programming (MILP) formulation with low computation complexity via linearization. To deal with dynamic events such as sensor node participation and departure, during SDSN operations, an efficient online algorithm using local optimization is developed. Simulation results show that our proposed online algorithm approaches the globally optimized network energy efficiency with much lower rescheduling time and control overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cloud services to smart things face latency and intermittent connectivity issues. Fog devices are positioned between cloud and smart devices. Their high speed Internet connection to the cloud, and physical proximity to users, enable real time applications and location based services, and mobility support. Cisco promoted fog computing concept in the areas of smart grid, connected vehicles and wireless sensor and actuator networks. This survey article expands this concept to the decentralized smart building control, recognizes cloudlets as special case of fog computing, and relates it to the software defined networks (SDN) scenarios. Our literature review identifies a handful number of articles. Cooperative data scheduling and adaptive traffic light problems in SDN based vehicular networks, and demand response management in macro station and micro-grid based smart grids are discussed. Security, privacy and trust issues, control information overhead and network control policies do not seem to be studied so far within the fog computing concept.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. In this article, we elaborate the motivation and advantages of Fog computing, and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state-of-the-art of Fog computing and similar work under the same umbrella. Security and privacy issues are further disclosed according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Deakin University piloted social networking software in order to complement and add a new dimension to its online learning and teaching efforts. In the first semester of 2007 eight teaching academics adopted three software applications. Six were used with students for learning while the other two were used by staff for professional development and research. This paper reports on the first attempt at providing institutional support for Web 2.0 and what was learned through the experience of these eight teaching academics which is essential to the ongoing development and decisions related to the future take up of these software applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents an assessment of system effectiveness in automatic requirements refinement by comparing results obtained from experts and novices with those achieved by the system. As the investigated system was a combination of a tightly inter-connected methods and a tool, the evaluation framework melded together a number of distinct methodological approaches structured into three empirical studies, which aimed at the construction of a case problem domain, calibrating the system using this defined domain elements and finally using the calibrated system to assess its effectiveness. In consequence, it was concluded that the evaluated methods and tools were effective in supporting requirements refinement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic networking ('computer-mediated communication1), considered to be ‘unique domain for educational activity’ (Harasim, 1989:50) and ‘new educational paradigm’ (Mason & Kaye, 1989:23), has been widely used and researched in K-12 schooling, place-based undergraduate subjects and distance education courses. However, only a limited number of reports of usage with experienced teachers (professional development), beginning teachers (induction support) and trainee teachers (initial training) have been published. Hence, little is known about the ways in which this new medium might contribute to the acquisition and maintenance of professional knowledge in the field of teacher education. The purpose of this study was to document an application of electronic networking in an initial 'school-based1 teacher education course. Three factors which were considered to be important in the adoption of electronic networking were specifically addressed: (a) the potential of the medium to attract and maintain a representative and comprehensive audience', (b) the willingness of participants to use the medium for the notation of ideas about teaching; and, (c) the extent to which reflection on practice was evident in network messages. This study also identified and investigated other effects which emerged as participants attempted to negotiate personal relationships with new technology. A case study was selected to investigate audience, notation, reflection, and other effects, in a particular application. Data were collected using participant observation, software-generated statistics, printed documentation, university records, questionnaires, interviews and content analysis of messages. These data were used to describe and analyse network participation by trainee teachers, classroom teachers and university staff. The data revealed that an audience did exist on the electronic network but that this was not comprehensive. Teachers had difficulty accessing the network because of other school commitments, access to equipment and personal competence with microcomputers. These difficulties indicated that developing and maintaining the teacher audience may be a major problem with electronic networking in initial teacher education. This case study revealed that deeply held concerns about notation of ideas by trainee teachers and classroom teachers can be powerful reasons for limited network participation. For trainee teachers, recording ideas publicly presented special difficulties associated with written communication. They were concerned about writing for an audience; about what to write about and how to write it. The loss of visual and verbal cues which form part of face-to-face communication was also a problem leading to concerns about how messages would be received by others. However, the overwhelming concern of almost all trainee teachers about presenting their own ideas was Tear of criticism' from peers (in particular), and other participants on the network. Trainee teachers expressed concerns about the 'dangers' of putting their thoughts in writing, the scrutiny their messages might have received from others, and the public 'criticism' about what they wrote which might have appeared on the network. Knowing that messages were stored on the network, and could be retrieved at some later date, heightened anxiety about the vulnerability of written communication; what was written on one occasion may have to be defended at some later date when the views expressed initially were no longer held. Classroom teachers were also unsure about recording their own ideas in an electronic form. Like trainee teachers, they were concerned about the scrutiny their contributions might receive from other users, and the lack of visual and verbal cues which they had learnt to use in face-to-face communication. Notating ideas in text-based messages which were archived (by the software), and retrievable by others later, was also daunting to many teachers. Another major 'danger' for teachers was the possible repercussions of 'public comment' about curriculum policy and initiatives which they thought might get them into 'trouble' with their employer. Since very few messages were contributed to conferences, there was little evidence of reflection in network communication. In the main, the network was not used to share information and ideas about curriculum and teaching. Public examples of collaboration between participants were not evident, and the 'special knowledge' held by members in each distinct group of users was not elaborated and discussed. Messages were not used to request information or clarification about issues, to outline the processes by which decisions about teaching were reached, or to synthesis ideas from different sources. The potential of the medium to operationalise reflective practice was not realised. Among the effects observed, the use of an anonymous account to access the network, and the impact this had on participation (in one conference) was considered to be a particularly significant finding. While the opportunity to systematically investigate the effects of anonymity on network participation and message contributions was not realised (by the author) while the research was in progress, the effects observed and discussed are considered to be important and worthy of further investigation. In this case study, the anonymous account helped trainee teachers mask concerns about personal writing skills and fear of criticism from others, indicating that anonymity may alter communication patterns, particularly in the early stages of network use. Given the data collected in this case study, and the interpretations placed on it by the author, a pessimistic assessment of the place of electronic networking in initial teacher education courses was presented. For this situation to change - that is, for electronic discussions to become more fully integrated into course activities - four issues which need to be addressed were identified and discussed. These included clarification of the role of collaboration amongst participants in initial teacher education, the ways in which collaboration can be facilitated using electronic networking, the problems of notation - such as the difficulty of expressing ideas about teaching in written form, and the concerns about permanently archived messages - for teachers and trainee teachers, and the lack of skills which many trainee teachers bring to electronic discussions. In the context of initial teacher education, it was suggested that these four aspects require clarification and development before the potential advantages of electronic networking can be realised. Some specific suggestions about how these issues might be resolved were presented.