SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
DOI: 10.5121/ijcsit.2019.11208 89
REDUCTIONOFMONITORINGREGISTERSON
SOFTWARE DEFINED NETWORKS
Luz Angela Aristizábal Q.1 and Nicolás Toro G.2
1
Department of Computation, Faculty of Management, Universidad Nacional de
Colombia.
2
Department of Electrical and Electronic Engineering, Universidad Nacional de
Colombia.
ABSTRACT
Characterization of data network monitoring registers allows for reductions in the number of data, which
is essential when the information flow is high, and implementation of processes with short response times,
such as interchange of control information between devices and anomaly detection is required. The present
investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a
software-defined network. Its main contribution lies in the obtention of a record that, although reduced,
retains detailed, essential information for the correct application of anomaly detectors.
KEYWORDS
Characterization, wavelet transform, network monitoring, anomaly detectors, Software-defined Networking
(SDN).
1. INTRODUCTION
Monitoring the activity of a data network involves the verification of operation limits, such as
changes in bandwidth that ensure Quality of Service (QoS), server and interconnection device
congestion levels, safety conditions, etc. Said verification is a perpetual activity that requires the
analysis of large volumes of information, as well as short response times, and must compensate
the overhead in both measurement and accuracy [1].
Traffic measurement approaches may be either active or passive. Passive methods take their
measurements from traffic that passes through network devices without introducing overhead.
Active methods, on the other hand, add traffic to a network by sending packets that are used to
obtain network parameters, for example, the latency of a link or a given device [2].
With the emergence of software-defined networks in 2008, a new prospect for the implementation
of network monitors was visualized. In this operation model, each switch connected to a
controller also includes the generation of statistics associated with the flows of data circulating
through its ports [3] [4]. This makes the implementation of passive monitoring simpler, although
it causes difficulty in the analysis of large volumes of information [5]. Subsampling techniques
have been used in passive monitoring, in order to reduce the amount of data in analysis processes
[6][8]. However, in order for an abnormality detector to achieve high accuracy, it is necessary to
consider all of the statistics that the network can provide, which can be achieved by considering
all statistical information that the software defined network switches can send to the controller.
Data reduction or compression applications generally involve two processes: data
characterization and coding. The objective of data characterization is to extract the most relevant
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
90
information from the original data. Examples include transformations, such as the Wavelet and
Fourier transforms. Coding reduces the number of bits necessary to represent data. Coding
methods include Shannon-Fano, arithmetic coding, and the Huffman method, which generate
probability distributions in order to assign the smallest code to the symbol with the greatest
probability of occurrence in the data, and the code with the highest number of bits to the signal
data with the lowest probability of occurrence [9].
Wavelet transform has been widely used for the characterization of different types of data, which
encompass: biological data [10][11], images, and sound and network traffic measurements [12].
However, its effectiveness in data network anomaly detection has not been explicitly proven.
There are several investigations regarding software defined networks that have utilized
algorithms such as the K-SVD and Orthogonal Matching Pursuit (OMP) methods[13] for traffic
parameter reduction, but these emphasize the compression of control plane information.
The interest of the present study was to consider wavelet transform a characterization method that
could reduce the statistical data number generated in the network, thus retaining the level of detail
that a detector necessitates the evaluation of anomalous behaviours. Given that anomaly detectors
use traffic monitor output data as input for their processes, it must be ensured that anomaly
detectors generate the same output, both when fed with original data and when fed with
transformed data.
Results were evaluated through consideration of the data reduction percentage and contrasting the
reliability of the anomaly detector with original vs. reduced data.
This article begins by illustrating the structure of software-defined networks and the statistics
obtained by network switches. It continues with the application of the wavelet transform in the
characterization process. The method implemented for anomaly detection follows, and
experimental results conclude the content of the present document.
2. SOFTWARE-DEFINED NETWORKS
2.1 STRUCTURE
A Software-defined Networks (SDN) consist of at least two parts: controllers and interconnection
devices, such as switches and routers, as shown in Figure 1.
Figure 1. Software-defined Network
The switches, essentially, forward data in accordance with the forwarding policies employed by
the controller. A controller is a centralized software that directs the switch’s activities with
incoming data flows, determines which port will forward data, and whether it is necessary to
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
91
ψ
duplicate or drop said data. This decision is made with each data flow that arrives to the switch.
Communication between switches and controllers is established by the "OpenFlow" protocol [4].
An OpenFlow switch has a flow table, and each entry consists of header fields that identify the
incoming flow, flow action, and statistical information (see Figure 1, table on theright).
When a packet enters the switch, its fields are compared to the table header. If they match, the
corresponding actions occur.
Unlike traditional networks, software-defined networks allow: [3][14]
1. The controller to update the switch’s flow table with execution time rules
2. The controller to request switch traffic statistics
3. Flow data paths to change at runtime
These characteristics make the data network more flexible, thus facilitating the implementation of
those strategies which make it safer and more dynamic[15].
2.2 STATISTICAL INFORMATION
OpenFlow switches send statistical information to the controller when required: by interface,
flow, queue, and table. Interface statistics are chosen, so as to illustrate the effectivity of the
wavelet transform. The information that the OpenFlow switch sends to the controller includes
received and transmitted packets, received and transmitted bytes, received and transmitted drops,
and received and transmitted errors.
The information exchange between the OpenFlow switch and controller occurs with two
messages: statistics requests are used by the controller to request statistical information be sent to
the switch, and statistics reply is sent by the switch to the controller, in response to a request. The
algorithm obtains statistical information from the switches, at 10s-time intervals. The controller
sends a request message to all connected switches each time that the temporizer changes. After
the controller receives answers from the switches, it chooses the ports associated with the servers,
and sends that information to the anomaly detector.
3. MONITORING REGISTER CHARACTHERIZATION
Based on the hypothesis that the performance register of a node on a data network, under normal
conditions, presents little variation (low frequencies), and that a relatively abrupt or atypical
change in the behavior of a node would result in the appearance of high frequencies, it was
decided to implement wavelet transform, which would provide information about spatiality and
frequency, and be proportional to the wavelet changes in the transform (the k factor in
Equation 1). Depending of this factor, the wavelet (( t)) either shrinks or dilates [7]. When the
analyzed register has low frequencies, a dilated wavelet will allow for the obtention of
coefficients of high value, thus indicating the presence of low frequencies. When the register has
high frequencies, a contracted wavelet allows for the obtention of high-value coefficients,
indicating the presence of high frequencies. The more similar the wavelet to the network activity
register form, the higher the wavelet coefficients at a given time [1].
(1)
Equation 1. Wavelet transform.
At the discrete level, the transform is implemented using a bank of filters, low-pass filters
perform a process similar to that performed in the continuous transform, in which having a high
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
92
scaling factor (low frequency extraction) and high pass filters have the same effect as calculating
the transform with a small-scale factor (high frequency extraction). Since the goal was to reduce
the number of values in the register, the “wavelet packet” method, illustrated in Figure 2, was
employed.
The implementation consists of the application of a bank of filters, one step low (LP) and another
step high (HP), whose coefficients are determined by the base wavelet. In this case, the register
(i) was filtered by performing the convolution operation, thus obtaining a register (i + 1) with a
larger number of samples, compared to the signal of the transformation tree’s upper level. This
necessitated subsampling, in order to reduce the number of samples by half, each time that the
filters were applied. Thus, in the third level of the tree, a signal of 256 samples is obtained, when
the original signal initiated the process with 1,024 samples. The decision to continue applying
the discrete transform was determined by the energy level of the filtered signal.
Figure 3 shows the expansion of the tree, via the LP branch, which implies that the energy of the
LP register (i + 1) signal is greater than that of the HP (i + 1).
Figure 2. Descompositon tree. Discrete wavelet transform.
4. ANOMALY DETECTION METHOD
The detector was implemented in order to determine the degree of reliability of the reduction
process. A correct reduction must keep detailed information that permits the performance of all
control actions which correspond to data networks.
A Gaussian model was utilized to detect anomalous conditions. The features considered for the
model were received and transmitted bytes, which were obtained from the statistical information
that the switch sent to the controller. Initially, under normal conditions, an unlabeled dataset
was formed:{x(1)
,x(2)
}, the first vector, the received bytes, and the second vector, and
transmitted bytes.
A Gaussian distribution was fitted into said dataset, and the values with very low probability were
considered to be anomalies.
The Gaussian distribution is given by:
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
93
(2)
Equation 2. Gaussian distribution.
σ is the variance and µ is the mean. Where the mean and variance are given by:
(3)
Equation 3. Gaussian distribution mean and variance.
The algorithm took the initial dataset, and calculated a threshold, so as to determine the lowest
probability that should be considered by the anomaly detector to be the limit probability, with
which to decide the normality or anomaly of input data.
5. EXPERIMENTAL RESULTS
As the basic objective of this investigation was to determine the reliability of the application of
wavelet transform, in order to reduce the size of the statistical records obtained by the controller
in a software-defined network. This was implemented in a network in the “mininet” simulation
environment [11] with controllers programmed in Python. The simulation began with the
transmission of a video. “OpenFlow” switches sent statistical information, every 10 seconds, to
the controller. Information associated with server interfaces was stored in a file. The parameters
selected for performance of the compression process were as follows: bytes transmitted and
received during a simulation time of 42 minutes. The filter bank “wavelet” was applied to the
256-byte sequences transmitted (see Figure 3).
Figure 3. Register reduction with wavelet transform.
The upper graph represents the original register, and shows 256 values of transmitted bytes. The
lower graph represents the reduced register, with 128 values, and shows an adequate
approximation to the waveform, as well as a reduction of 50% of the original register.
The synthesis process was implemented in order to determine the effectiveness of the application
of wavelet transform for this type of data. The inverse wavelet transform was applied to the filter
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
94
bank output. Figure 4 shows the similarities between the tworegisters.
Figure 4. Comparison between the original register (blue) and the wavelet synthesized
register (red).
A Gaussian anomaly detector was applied to both the original and synthesized registers, so as to
determine the effectiveness of the wavelet transform in the conservation of atypical data see
Figure 5. Atypical values are marked with red circles.
Figure 5. Anomaly detector result. Left, original data. Right, synthetized register.
The conservation of atypical behavior may be observed in Figure. 6.
Figure 6. Relationships between atypical points in the reduced register.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
95
This final result verified that the detection of anomalies is possible with a shorter register than the
original. This generates lower costs for computing processes and data storage.
5. CONCLUSIONS
The reduction algorithm has a compression factor of at least a 50%. It retains the atypical
behavior of statistical data generated by the OpenFlow switch, which reduces the execution time
of the anomaly detector.
The results of this study open the door for analysis of the effectiveness of other wavelet bases in
the reduction of the length of statistical parameters in Software-defined Networks. Given that this
investigation only used the "daubechies" wavelet, the evaluation of other base wavelets might
lead to improved reduction rates.
REFERENCES
[1] Ibidunmoye, Olumuyiwa, Hernandez R Francisco, Elmroth Erick .(2015) “Performance Anomaly
Detection and Bottleneck Identification”. ACM Computing Surveys, Vol. 48, No. 1, Article 4.
[2] M, Jammal, T. Singh, A. Shami, R.l Asal, Y. Li, (2014) "Software defined networking: State of the
art and research challenges", Computer Networks.
[3] Dabbagh, B.Hamdaoui, M. Guizani, and A. Rayes,(2015) "Software-Defined Networking Security:
Pros and Cons", IEEE Communications Magazine.
[4] N, S. Bailey, Deepak Bansal, Linda Dunbar, Dave Hood, Zoltán Lajos Kis, (2012) "SDN
Architecture Overview”. Open Network Foundation.
(https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical- reports/SDN-
architecture-overview-1.0.pdf)
[5] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, (2014) "Combining
OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on
SDN environments”, Computer pag. 122–136
[6] L. Jose, M. Yu, and J. Rexford, (2011) “Online measurement of large traffic aggregates on
commodity switches”, in Proc. of the USENIX workshop.
[7] Stéphane. Mallat, (2008) “A wavelet tour of signal processing”. Academic Press, USA.
[8] L. Kalinichemko, I. Shanin, I. Taraban,(2014) "Methods for Anormaly Detection: a Survey",
Advanced Methodos and Technologies, digital collections. Pag. 20-25.
[9] J. Uthayakumar, T.Vengattaraman, P. Dhavachelvan (2018) “A survey on data compression
techniques: From the perspective of data quality, coding schemes, data type and applications”
Journal of King Saud University – Computer and Information Sciences. Pags. 1-22
[10] L.A. Aristizábal (2009). “Paralell implementation for Generalized Method 1-D Biosignal
Compession” World Academic of Science, Engineering and Technology.
[11] L.A. Aristizábal, C. Cortes, R, Flórez (2008).”ECG signal noise reduction and compression for
remote diagnosis systems”. INTER-NOISE Congress Proceedings. Pags 4130-4135.
[12] K. Kyriakopoulos, D.J. Parish (2009). “Using Wavelets for Compression and Detecting Events in
Anomalous Network Traffic”. Fourth International Conference on Systems and Networks
Communications. IEEE Xplore.
[13] A. Al-Jawad, P. Shah, O. Gemikonakli, R. Trestian.(2016). “Compression-based technique for SDN
using sparse-representation dictionary”. IEEE/IFIF Network Operations and Management
Symposium.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
96
[14 ]A. Cortes. (2018) “Simulation of Software Define Networks with Open Network Operating System
and Mininet”. International Journal of Computer Science and Information Technology. (IJCSIT).
Vol 10. Nro. 5. Pags 21-32.
[15] M. Dabagh, B. Handaoul, M. Guizani, A. Rayes, (2015) "Software-Defined Networking Security:
Pro and Cons”, IEEE Communications Magazine. pags. 73-79.
[16] L. Seunghyeon, K. Jinwoo, S. Seungwon, P. Porras, (2017). “Athena: A framework for scalable
Anormaly Detection in Software Defined Networks”,47th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks. Pags 249-260.
AUTHORS
Luz A. Aristizábal Q. is a professor in the Department of Computing in the Faculty of
Management at the Universidad Nacional de Colombia. She received her Meng. in Physical
Instrumentation from the Universidad Tecnológica de Pereira in 2009, her degree in Data
Network Specialization from la Universidad del Valle in 1991, and her degree in
Engineering Systems from la Universidad Autónoma in 1989. Her research focuses on
aspects of computer and data networks, including network simulators, signal processing, and
network paradigms.
Nicolás Toro G. is a professor in the Department of Electricity, Electronics, and
Computing. He received his PhD in Engineering-Automation and a bachelor’s degree in
Electrical Engineering from the Universidad Nacional de Colombia in 2013 and 1983,
respectively, and his master’s degree in Automated Production Systems from the
Universidad Tecnológica de Pereira in 1992. His research focuses on many aspects of
industrial automation, including network design, measurement, and analysis.

More Related Content

What's hot

Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
 
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...rameraja
 
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...CSCJournals
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
 
A performance of radio frequency and signal strength of LoRa with BME280 sensor
A performance of radio frequency and signal strength of LoRa with BME280 sensorA performance of radio frequency and signal strength of LoRa with BME280 sensor
A performance of radio frequency and signal strength of LoRa with BME280 sensorTELKOMNIKA JOURNAL
 
Configurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksConfigurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksIJMER
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoringIJCNCJournal
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSvtunotesbysree
 
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANImprovement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANijeei-iaes
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...csandit
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationAlexander Decker
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
 

What's hot (19)

Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
 
A performance of radio frequency and signal strength of LoRa with BME280 sensor
A performance of radio frequency and signal strength of LoRa with BME280 sensorA performance of radio frequency and signal strength of LoRa with BME280 sensor
A performance of radio frequency and signal strength of LoRa with BME280 sensor
 
Configurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksConfigurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain Networks
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoring
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANImprovement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
 

Similar to REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS

OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...ijdpsjournal
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...ijdpsjournal
 
Distributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkDistributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkTELKOMNIKA JOURNAL
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411IJRAT
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...ijcsit
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...AIRCC Publishing Corporation
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...eSAT Publishing House
 
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Ericsson
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...IOSR Journals
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...ijgca
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
 

Similar to REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS (20)

OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
 
Distributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkDistributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined network
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
1605.01126
1605.011261605.01126
1605.01126
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
 
29
2929
29
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
 

More from AIRCC Publishing Corporation

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...AIRCC Publishing Corporation
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Big Data and Machine Learning in Defence
Big Data and Machine Learning in DefenceBig Data and Machine Learning in Defence
Big Data and Machine Learning in Defence
 
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 

Recently uploaded

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfKartik Tiwari
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 

Recently uploaded (20)

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 DOI: 10.5121/ijcsit.2019.11208 89 REDUCTIONOFMONITORINGREGISTERSON SOFTWARE DEFINED NETWORKS Luz Angela Aristizábal Q.1 and Nicolás Toro G.2 1 Department of Computation, Faculty of Management, Universidad Nacional de Colombia. 2 Department of Electrical and Electronic Engineering, Universidad Nacional de Colombia. ABSTRACT Characterization of data network monitoring registers allows for reductions in the number of data, which is essential when the information flow is high, and implementation of processes with short response times, such as interchange of control information between devices and anomaly detection is required. The present investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a software-defined network. Its main contribution lies in the obtention of a record that, although reduced, retains detailed, essential information for the correct application of anomaly detectors. KEYWORDS Characterization, wavelet transform, network monitoring, anomaly detectors, Software-defined Networking (SDN). 1. INTRODUCTION Monitoring the activity of a data network involves the verification of operation limits, such as changes in bandwidth that ensure Quality of Service (QoS), server and interconnection device congestion levels, safety conditions, etc. Said verification is a perpetual activity that requires the analysis of large volumes of information, as well as short response times, and must compensate the overhead in both measurement and accuracy [1]. Traffic measurement approaches may be either active or passive. Passive methods take their measurements from traffic that passes through network devices without introducing overhead. Active methods, on the other hand, add traffic to a network by sending packets that are used to obtain network parameters, for example, the latency of a link or a given device [2]. With the emergence of software-defined networks in 2008, a new prospect for the implementation of network monitors was visualized. In this operation model, each switch connected to a controller also includes the generation of statistics associated with the flows of data circulating through its ports [3] [4]. This makes the implementation of passive monitoring simpler, although it causes difficulty in the analysis of large volumes of information [5]. Subsampling techniques have been used in passive monitoring, in order to reduce the amount of data in analysis processes [6][8]. However, in order for an abnormality detector to achieve high accuracy, it is necessary to consider all of the statistics that the network can provide, which can be achieved by considering all statistical information that the software defined network switches can send to the controller. Data reduction or compression applications generally involve two processes: data characterization and coding. The objective of data characterization is to extract the most relevant
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 90 information from the original data. Examples include transformations, such as the Wavelet and Fourier transforms. Coding reduces the number of bits necessary to represent data. Coding methods include Shannon-Fano, arithmetic coding, and the Huffman method, which generate probability distributions in order to assign the smallest code to the symbol with the greatest probability of occurrence in the data, and the code with the highest number of bits to the signal data with the lowest probability of occurrence [9]. Wavelet transform has been widely used for the characterization of different types of data, which encompass: biological data [10][11], images, and sound and network traffic measurements [12]. However, its effectiveness in data network anomaly detection has not been explicitly proven. There are several investigations regarding software defined networks that have utilized algorithms such as the K-SVD and Orthogonal Matching Pursuit (OMP) methods[13] for traffic parameter reduction, but these emphasize the compression of control plane information. The interest of the present study was to consider wavelet transform a characterization method that could reduce the statistical data number generated in the network, thus retaining the level of detail that a detector necessitates the evaluation of anomalous behaviours. Given that anomaly detectors use traffic monitor output data as input for their processes, it must be ensured that anomaly detectors generate the same output, both when fed with original data and when fed with transformed data. Results were evaluated through consideration of the data reduction percentage and contrasting the reliability of the anomaly detector with original vs. reduced data. This article begins by illustrating the structure of software-defined networks and the statistics obtained by network switches. It continues with the application of the wavelet transform in the characterization process. The method implemented for anomaly detection follows, and experimental results conclude the content of the present document. 2. SOFTWARE-DEFINED NETWORKS 2.1 STRUCTURE A Software-defined Networks (SDN) consist of at least two parts: controllers and interconnection devices, such as switches and routers, as shown in Figure 1. Figure 1. Software-defined Network The switches, essentially, forward data in accordance with the forwarding policies employed by the controller. A controller is a centralized software that directs the switch’s activities with incoming data flows, determines which port will forward data, and whether it is necessary to
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 91 ψ duplicate or drop said data. This decision is made with each data flow that arrives to the switch. Communication between switches and controllers is established by the "OpenFlow" protocol [4]. An OpenFlow switch has a flow table, and each entry consists of header fields that identify the incoming flow, flow action, and statistical information (see Figure 1, table on theright). When a packet enters the switch, its fields are compared to the table header. If they match, the corresponding actions occur. Unlike traditional networks, software-defined networks allow: [3][14] 1. The controller to update the switch’s flow table with execution time rules 2. The controller to request switch traffic statistics 3. Flow data paths to change at runtime These characteristics make the data network more flexible, thus facilitating the implementation of those strategies which make it safer and more dynamic[15]. 2.2 STATISTICAL INFORMATION OpenFlow switches send statistical information to the controller when required: by interface, flow, queue, and table. Interface statistics are chosen, so as to illustrate the effectivity of the wavelet transform. The information that the OpenFlow switch sends to the controller includes received and transmitted packets, received and transmitted bytes, received and transmitted drops, and received and transmitted errors. The information exchange between the OpenFlow switch and controller occurs with two messages: statistics requests are used by the controller to request statistical information be sent to the switch, and statistics reply is sent by the switch to the controller, in response to a request. The algorithm obtains statistical information from the switches, at 10s-time intervals. The controller sends a request message to all connected switches each time that the temporizer changes. After the controller receives answers from the switches, it chooses the ports associated with the servers, and sends that information to the anomaly detector. 3. MONITORING REGISTER CHARACTHERIZATION Based on the hypothesis that the performance register of a node on a data network, under normal conditions, presents little variation (low frequencies), and that a relatively abrupt or atypical change in the behavior of a node would result in the appearance of high frequencies, it was decided to implement wavelet transform, which would provide information about spatiality and frequency, and be proportional to the wavelet changes in the transform (the k factor in Equation 1). Depending of this factor, the wavelet (( t)) either shrinks or dilates [7]. When the analyzed register has low frequencies, a dilated wavelet will allow for the obtention of coefficients of high value, thus indicating the presence of low frequencies. When the register has high frequencies, a contracted wavelet allows for the obtention of high-value coefficients, indicating the presence of high frequencies. The more similar the wavelet to the network activity register form, the higher the wavelet coefficients at a given time [1]. (1) Equation 1. Wavelet transform. At the discrete level, the transform is implemented using a bank of filters, low-pass filters perform a process similar to that performed in the continuous transform, in which having a high
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 92 scaling factor (low frequency extraction) and high pass filters have the same effect as calculating the transform with a small-scale factor (high frequency extraction). Since the goal was to reduce the number of values in the register, the “wavelet packet” method, illustrated in Figure 2, was employed. The implementation consists of the application of a bank of filters, one step low (LP) and another step high (HP), whose coefficients are determined by the base wavelet. In this case, the register (i) was filtered by performing the convolution operation, thus obtaining a register (i + 1) with a larger number of samples, compared to the signal of the transformation tree’s upper level. This necessitated subsampling, in order to reduce the number of samples by half, each time that the filters were applied. Thus, in the third level of the tree, a signal of 256 samples is obtained, when the original signal initiated the process with 1,024 samples. The decision to continue applying the discrete transform was determined by the energy level of the filtered signal. Figure 3 shows the expansion of the tree, via the LP branch, which implies that the energy of the LP register (i + 1) signal is greater than that of the HP (i + 1). Figure 2. Descompositon tree. Discrete wavelet transform. 4. ANOMALY DETECTION METHOD The detector was implemented in order to determine the degree of reliability of the reduction process. A correct reduction must keep detailed information that permits the performance of all control actions which correspond to data networks. A Gaussian model was utilized to detect anomalous conditions. The features considered for the model were received and transmitted bytes, which were obtained from the statistical information that the switch sent to the controller. Initially, under normal conditions, an unlabeled dataset was formed:{x(1) ,x(2) }, the first vector, the received bytes, and the second vector, and transmitted bytes. A Gaussian distribution was fitted into said dataset, and the values with very low probability were considered to be anomalies. The Gaussian distribution is given by:
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 93 (2) Equation 2. Gaussian distribution. σ is the variance and µ is the mean. Where the mean and variance are given by: (3) Equation 3. Gaussian distribution mean and variance. The algorithm took the initial dataset, and calculated a threshold, so as to determine the lowest probability that should be considered by the anomaly detector to be the limit probability, with which to decide the normality or anomaly of input data. 5. EXPERIMENTAL RESULTS As the basic objective of this investigation was to determine the reliability of the application of wavelet transform, in order to reduce the size of the statistical records obtained by the controller in a software-defined network. This was implemented in a network in the “mininet” simulation environment [11] with controllers programmed in Python. The simulation began with the transmission of a video. “OpenFlow” switches sent statistical information, every 10 seconds, to the controller. Information associated with server interfaces was stored in a file. The parameters selected for performance of the compression process were as follows: bytes transmitted and received during a simulation time of 42 minutes. The filter bank “wavelet” was applied to the 256-byte sequences transmitted (see Figure 3). Figure 3. Register reduction with wavelet transform. The upper graph represents the original register, and shows 256 values of transmitted bytes. The lower graph represents the reduced register, with 128 values, and shows an adequate approximation to the waveform, as well as a reduction of 50% of the original register. The synthesis process was implemented in order to determine the effectiveness of the application of wavelet transform for this type of data. The inverse wavelet transform was applied to the filter
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 94 bank output. Figure 4 shows the similarities between the tworegisters. Figure 4. Comparison between the original register (blue) and the wavelet synthesized register (red). A Gaussian anomaly detector was applied to both the original and synthesized registers, so as to determine the effectiveness of the wavelet transform in the conservation of atypical data see Figure 5. Atypical values are marked with red circles. Figure 5. Anomaly detector result. Left, original data. Right, synthetized register. The conservation of atypical behavior may be observed in Figure. 6. Figure 6. Relationships between atypical points in the reduced register.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 95 This final result verified that the detection of anomalies is possible with a shorter register than the original. This generates lower costs for computing processes and data storage. 5. CONCLUSIONS The reduction algorithm has a compression factor of at least a 50%. It retains the atypical behavior of statistical data generated by the OpenFlow switch, which reduces the execution time of the anomaly detector. The results of this study open the door for analysis of the effectiveness of other wavelet bases in the reduction of the length of statistical parameters in Software-defined Networks. Given that this investigation only used the "daubechies" wavelet, the evaluation of other base wavelets might lead to improved reduction rates. REFERENCES [1] Ibidunmoye, Olumuyiwa, Hernandez R Francisco, Elmroth Erick .(2015) “Performance Anomaly Detection and Bottleneck Identification”. ACM Computing Surveys, Vol. 48, No. 1, Article 4. [2] M, Jammal, T. Singh, A. Shami, R.l Asal, Y. Li, (2014) "Software defined networking: State of the art and research challenges", Computer Networks. [3] Dabbagh, B.Hamdaoui, M. Guizani, and A. Rayes,(2015) "Software-Defined Networking Security: Pros and Cons", IEEE Communications Magazine. [4] N, S. Bailey, Deepak Bansal, Linda Dunbar, Dave Hood, Zoltán Lajos Kis, (2012) "SDN Architecture Overview”. Open Network Foundation. (https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical- reports/SDN- architecture-overview-1.0.pdf) [5] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, (2014) "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments”, Computer pag. 122–136 [6] L. Jose, M. Yu, and J. Rexford, (2011) “Online measurement of large traffic aggregates on commodity switches”, in Proc. of the USENIX workshop. [7] Stéphane. Mallat, (2008) “A wavelet tour of signal processing”. Academic Press, USA. [8] L. Kalinichemko, I. Shanin, I. Taraban,(2014) "Methods for Anormaly Detection: a Survey", Advanced Methodos and Technologies, digital collections. Pag. 20-25. [9] J. Uthayakumar, T.Vengattaraman, P. Dhavachelvan (2018) “A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications” Journal of King Saud University – Computer and Information Sciences. Pags. 1-22 [10] L.A. Aristizábal (2009). “Paralell implementation for Generalized Method 1-D Biosignal Compession” World Academic of Science, Engineering and Technology. [11] L.A. Aristizábal, C. Cortes, R, Flórez (2008).”ECG signal noise reduction and compression for remote diagnosis systems”. INTER-NOISE Congress Proceedings. Pags 4130-4135. [12] K. Kyriakopoulos, D.J. Parish (2009). “Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic”. Fourth International Conference on Systems and Networks Communications. IEEE Xplore. [13] A. Al-Jawad, P. Shah, O. Gemikonakli, R. Trestian.(2016). “Compression-based technique for SDN using sparse-representation dictionary”. IEEE/IFIF Network Operations and Management Symposium.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019 96 [14 ]A. Cortes. (2018) “Simulation of Software Define Networks with Open Network Operating System and Mininet”. International Journal of Computer Science and Information Technology. (IJCSIT). Vol 10. Nro. 5. Pags 21-32. [15] M. Dabagh, B. Handaoul, M. Guizani, A. Rayes, (2015) "Software-Defined Networking Security: Pro and Cons”, IEEE Communications Magazine. pags. 73-79. [16] L. Seunghyeon, K. Jinwoo, S. Seungwon, P. Porras, (2017). “Athena: A framework for scalable Anormaly Detection in Software Defined Networks”,47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Pags 249-260. AUTHORS Luz A. Aristizábal Q. is a professor in the Department of Computing in the Faculty of Management at the Universidad Nacional de Colombia. She received her Meng. in Physical Instrumentation from the Universidad Tecnológica de Pereira in 2009, her degree in Data Network Specialization from la Universidad del Valle in 1991, and her degree in Engineering Systems from la Universidad Autónoma in 1989. Her research focuses on aspects of computer and data networks, including network simulators, signal processing, and network paradigms. Nicolás Toro G. is a professor in the Department of Electricity, Electronics, and Computing. He received his PhD in Engineering-Automation and a bachelor’s degree in Electrical Engineering from the Universidad Nacional de Colombia in 2013 and 1983, respectively, and his master’s degree in Automated Production Systems from the Universidad Tecnológica de Pereira in 1992. His research focuses on many aspects of industrial automation, including network design, measurement, and analysis.