Submit Search
Upload
Performance Analysis of Wireless Trusted Software Defined Networks
âą
0 likes
âą
33 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i8/IRJET-V4I8403.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
Â
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Â
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
Â
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
Â
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
Â
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
Â
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
Â
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Â
Recommended
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
Â
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Â
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
Â
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
Â
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
Â
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
Â
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
Â
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Â
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Â
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
Â
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
Â
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
Â
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
Â
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
Â
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
Â
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
Â
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
Â
SEDRP
SEDRP
Manoj Mithun
Â
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
Â
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
Â
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
Â
Improvement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
Â
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Â
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
Â
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
Â
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
Â
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Â
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
Â
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Â
More Related Content
What's hot
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Â
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
Â
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
Â
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
Â
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
Â
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
Â
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
Â
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
Â
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
Â
SEDRP
SEDRP
Manoj Mithun
Â
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
Â
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
Â
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
Â
Improvement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
Â
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Â
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
Â
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
Â
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
Â
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Â
What's hot
(19)
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Â
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Â
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
Â
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
Â
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
Â
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
Â
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
Â
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
Â
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
Â
SEDRP
SEDRP
Â
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
Â
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
Â
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
Â
Improvement of quality of service parameters using
Improvement of quality of service parameters using
Â
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Â
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Â
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
Â
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
Â
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
Â
Similar to Performance Analysis of Wireless Trusted Software Defined Networks
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
Â
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Â
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
Â
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET Journal
Â
Security sdn
Security sdn
Priya Singh
Â
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET Journal
Â
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
Â
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
rosemariebrayshaw
Â
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
IJCNCJournal
Â
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
IJCNCJournal
Â
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
Â
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
IRJET Journal
Â
Software Defined Networking â Virtualization of Traffic Engineering
Software Defined Networking â Virtualization of Traffic Engineering
QuEST Global (erstwhile NeST Software)
Â
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
IRJET Journal
Â
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
Â
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
Â
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
Â
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
Â
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
Â
Similar to Performance Analysis of Wireless Trusted Software Defined Networks
(20)
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
Â
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Â
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
Â
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Â
Security sdn
Security sdn
Â
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
Â
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Â
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
Â
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
Â
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Â
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
Â
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Â
Software Defined Networking â Virtualization of Traffic Engineering
Software Defined Networking â Virtualization of Traffic Engineering
Â
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
Â
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
Â
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
Â
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Â
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Â
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
young call girls in Green Parkđ 9953056974 đ escort Service
young call girls in Green Parkđ 9953056974 đ escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Â
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Â
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Â
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Â
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Â
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Â
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Â
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Â
Recently uploaded
(20)
young call girls in Green Parkđ 9953056974 đ escort Service
young call girls in Green Parkđ 9953056974 đ escort Service
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Â
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Â
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Â
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Â
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Â
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Â
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Â
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Â
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Â
Performance Analysis of Wireless Trusted Software Defined Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2231 PERFORMANCE ANALYSIS OF WIRELESS TRUSTED SOFTWARE DEFINED NETWORKS Angel Antonette Keziah .J 1, Rajarajeshwari.K.C2, M.Kirubha3 1 ,2,3 Assistant Professor, Dept. of Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Software defined network (SDN) provides a centralized intelligence andcontrolmodelbytheseparationof the data plane and the control plane that is well suited to provide much needed flexibility to network security deployments. Secured networks are critical to all businesses, especially with their increased migration to the cloud and the wave of innovation being unleashed by SDN. This paper focuses on performance analysis of wireless trusted software defined networks by considering performance matrices like energy consumption, throughput, end-to-end delay, packet delivery ratio for a particular topology model. Results show that the performance of SDN networks is better than the conventional networks which operate without SDN. Furthermore, comparison of energy consumptionfordifferent topology models which uses SDN is done. Key wordsâ Authentication, End-To-End Delay, Packet Delivery Ratio, Throughput, SDN-Software Defined Network 1. INTRODUCTION Recently, Data centres have received significant attention as a very important infrastructure for its ability to store large amount of data and hosting large-scale service applications. Today large companies use data centres for their large scalecomputationsandITbusinesses.SDNoffersa dynamicapproach to networking byseparating(decoupling) the control plane and data forwarding plane of network devices. The data plane is responsible for the actual forwarding of the datapacketsthroughthenetworkusingthe paths chosen by the control plane. The control plane realizes the intelligence of a network. By decoupling the data and control planes routing decisions can becentralizedandmade by software, rather than decentralized decisions at every router within the network. As SDN has better featuresthanconventionalnetworks more research and development study are being done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects. This project began with a literaturestudy to provide relevant background information about the SDN networks and their security issues. SDN architectures were developed to provide improved routing and networking performance, however it changes the networkâs communication patterns, allowing new types of attacks, and necessitating a new approach to securing the network .The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secureSDN Networks remains an open problem Fig -1: The SDN Stack. As seen from the Fig 1, SDN architectureis dividedinto three layers: application layer, control layer, and infrastructurelayer.Thisarchitectureprovidesthepossibility to centralize the stateof the networkandtheintelligenceinto one part of the network. This, enhances the property of network programmability, the network industry can start to innovateandenabledifferentiationinthedevelopingprocess. Therefore, SDN can make networks become more scalable, flexible and proactive. SDN architecture stack abstracts and decouples hardware from software, control plane from forwarding plane, and physical from logical configuration. 2. SDN BENEFITS AND CHALLENGES SDN, with its inherent decoupling of control plane from data plane, offers a greater control of a network through programming. This combined feature would bring potential benefits of enhanced configuration, improved performance, and encouraged innovation in network architecture and operations, as summarized in Table 1. Moreover, with an ability to acquire instantaneous network status, SDN permits a real-time centralized control of a network based on both instantaneous network status and user defined policies. This further leads to benefits in
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2232 optimizing network configurations and improving network performance. The potential benefit of SDN is further evidenced by the fact that SDN offers a convenient platform for experimentationsofnew techniquesandencourages new network designs, attributed to its network programmability and the ability to define isolated virtual networks via the control plane. In the subsection, we dwell on these afore mentioned benefits of SDN TABLE -1: Comparison Between SDN And Conventional Networks CHARACTERISTICS SDN CONVENTIONAL NETWORKING Features Decoupled data and control plane and programmability A new protocol per problem, complex network control Configuration Automated configuration with centralized validation Error prone manual configuration Performance Dynamic global control with cross layer information Limited information and relatively static configuration Innovation Easy software implementation for new ideas, sufficient test environment with isolation, and quick deployment using software upgrade. Difficult hardware implementation for new ideas, limited testing environment, long standardization process. In comparison from table 1, SDN encourages innovation by providing a programmable network platform to implement, experiment, and deploy new ideas, new applications, and new revenue earningservicesconveniently and flexibly. High configurability of SDN offers clear separation among virtual networks permitting experimentation on a real environment. Progressive deployment of new ideas can be performed through a seamless transition from an experimental phase to an operational phase. Given the promises of enhancedconfiguration,improved performance, and encouraged innovation, SDN is still in its infancy. Many fundamental issues still remain not fully solved, among which security is the most urgent ones. Common concerns include SDN interoperability with legacy network devices, performance and privacy concerns of centralized control, and lackof experts for technical support. 3. Performance Metrics The following are the metrics that are used for performance analyses. ï· End-to-end delay is the average time it takes a data packet to reach the destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue. This metric is calculated by subtracting time at which first packet was transmitted by source from time at which first data packetarrived to destination. Mathematically, it can be defined as: Avg.EED=S/N Where S is thesumof the time spent to deliver packets for each destination, and N is the number of packets received by the all destination nodes. ï· Packet delivery ratio is defined as the total number of packets delivered over the total simulation time.Packet delivery ratio Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. Mathematically, it can be defined as: PDR= S1Ă· S2 Where, S1 is the sum of data packets received by the each destination and S2 is the sum of data packets generated by the each source. ï· Throughput is a measure of how many units of information a system can process in a given amount of time. Throughput is usually measured in bits per second (and sometimes in data packets per second or data packets per time slot. 4. Security Analyses Of SDN The basic properties of a secure communications network are: confidentiality, integrity, availability of information, authentication and non-repudiation. Inorderto provide a network protected from malicious attack or unintentionaldamage,securityprofessionalsmustsecurethe data, the network assets (e.g. devices) and the communication transactions across the network. The alterations to the network architecture introduced by SDN must be assessed to ensure that network security is sustained. Systems are becoming increasingly complex. This complexity in turn has led to increased risk and severity of bugs and errors in implementations. This complexity increases with virtualization within networks, as increasing numbers of traditional hardware functions are realized by software. This puts a large amount of pressure upon programmers to deliver flawless software solutions. Additionally, this pressure is increasing due to the business trend towards cloud computing. The aim is to ensure that networks are protected from attack by malicious intruders. Networks that are built according to SDN architecture principles need to protect a number of key security assets: ï· Availability â the network should remain operational even under attack. ï· Performance â the network should be able to guarantee a baseline bandwidth and latency in the event of an attack ï· Integrityand confidentialityâcontrolplaneanddata plane integrity and isolation should be upheld between tenants. To assure protection of these assets, a number of processes need to be in place. They are authentication and authorization, resiliency, multi-domain isolation and repudiation. Authentication and authorization are the processes used to identify an unknown source and then determine its access privileges.Implementedcorrectly,these processes can protect networks from certain types of attack,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2233 such as Provision of false (statistical) feedback to thesystem, Modification of a valid on-path request, Forwarding Traffic that is not meant to be forwarded or not forwarding, Gaining control access to any component. The critical nature of the SDNC dictates that additional security measures need to be taken to protect it.And so, all communication within the control plane must be mutually authenticated. Security protocols like TLS and IPSEC provide a means for mutual authentication as well as for replay attack protection, confidentiality, and integrity protection. Encryption and integrity protection without mutual authentication are less useful from a security point of view. The problem with mutual authentication is that it requires previousknowledge of the remotecommunicating endpoint â unless a commonly trusted third party exists. The major security threats are denial of service attack, vulnerability attack, connection flooding and bandwidth flooding. Due to these security threats thereisanurgingneed to focus on the security issues of SDN as SDN is the current emerging technology. 5. Proposed Methodology The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secure SDN Networks remains an open problem. The need of the hour is to develop a secured SDN to overcome the security issues by providing a secure networking architecture that secures the data within each layer of communication packet utilizing SDN centralized controller for secure routing and performance management. While advantage of the SDN framework has been recognized, solutions to tackle the challenges of securing the SDN network are fewer in number. SDNs provide us with the ability to easily program the network and to allow for the creation of dynamic flow policies. It is, in fact, this advantage that may also lead to security vulnerabilities. Within this dynamic environment, it is vital that network security policy is enforced. The promises of agility, simplified control, and real-time programmability offered by software-defined networking (SDN) are attractive incentives for operators to keep networkevolutionapacewithadvancesinvirtualization technologies. But thecapabilitiesthatunderminethesecurity is a question to be answered. The aim is to ensure that networks are protected from attack by malicious intruders. The proposed methodology is a secured SDN which focuses on the one of the three assets of security; Authentication which secures the communication between nodes. Various wireless topologies likegrid,randomandtree are developed based on theSDNconcepts.Inthesetopologies the data plane and control plane are separated and one node is made to act as SDN controller which controls the entire network. This approach provides us with the ability to easily program the network. AODV is used for authentication .One distinguishing feature of AODV is its use of a destination sequence number for each route entry. The destination sequence number is created by the destination to be included along with any route information it sends to requesting nodes. Given the choice between two routes to a destination, a requesting node is required to select the one with the greatest sequence number. Requests (RREQs), Route Replies (RREPs), and Route Errors (RERRs) are the message types defined by AODV. When a route to a new destination is needed, thenode broadcasts a RREQ to find a route to the destination. A route can be determined when the RREQ reaches the SDN controller. The route is madeavailable by unicasting a RREP back to the origination of the RREQ. Each node receiving the request caches a route back to the originator of the request, so that the RREP can be unicast from the destination along a path to that originator, or likewise from any intermediate node (SDN controller) that is able to satisfy the request. When a link break in an active route is detected, a RERR message is used to notify other nodes that thelossofthatlink has occurred. The RERR message indicates those destinations which are no longer reachable by way of the broken link. The Fig 2 gives a flow graph of the proposed work. The topologies withSDNcontrollerareauthenticatedbyusingthe above mentioned process and various analyses are considered based on the energy consumption, packet delivery, throughput and the time delay. Of which SDN out beats the conventional network in terms of energy consumption and the time taken
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2234 Fig- 2: Flow Chart for Authentication Process 6. EXPERIMENTAL RESULTS In this project the SDN concept is considered especially from the perspective of network authentication and the Data Plane and Control plane is separated in three wireless topologies and the performance metrics are calculated. Fig 3 illustrate wireless Grid Topology based on SDN concept wherein separation of Data Plane and Control plane is done by using one of the nodes as SDN Controller. The other nodes that wish to send their data have to obtain authentication from the SDN controller Fig-3: Grid Topology Random Topology is elaborated in Fig 4 by separating Data and Control Planes. In fig 5 Packet Drop is seen at times when more number of nodes send request to the controller at the same time. This Topology is less preferred owing to the packet drop. Fig 4: Random Topology Fig -5: Packet Drop In Random Topology
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2235 In the Tree Topology is shown in Fig 6. The Root Node is considered as SDN. Nodes C1, C2 and C3 are nodes which initiate transmission. C1first seeksauthenticationfromSDN, followed by C2 and C3 Fig -6: Tree Topology The following graph in Fig 7 illustrates energy consumption against time taken in grid topology .It elaborates that energy consumption in SDN networks is much lesser compared to the conventional networks Values varied to evaluate energy consumption by using upto 50 nodes. Fig -7: Energy Consumption With and Without SDN The below figure illustrates packet delivery ratio versus time in grid topology. The Packet delivery Ratio in network with SDN is higher in the given time compared to without SDN according to the graph obtained in Fig.8 Fig -8: Packet Delivery Ratio With and Without SDN The Fig 9 shows graph against end-to end delay and time with and without SDN using grid topology. The End-To-End Delay is observed to be less in SDN compared to traditional network without SDN Fig -9: End-To-End Delay with SDN and Without SDN In fig 10 throughputs versus time is plotted and as seen in the figure throughput in SDN is high when compared to without SDN. Fig 10: Throughput With and Without SDN
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2236 The below Fig 11 shows comparison of three topologies with SDN against energy consumption and number of nodes by varying up to 50 nodes. Comparatively Random Topology has seen to consume highest energy followed by Tree and then Grid. As a result it has been observed that only Grid topology consumes less energy. Fig 11: Energy Consumption of Different Topologies With SDN Fig -12: Energy Consumption of Different Topologies with SDN against Time The graph in Fig 12 elucidated, compares energy consumption versus time taken in random, grid and tree topology. The graph elucidates that in the given time, Random Topology consumes more energy while there is a slight variation in the Grid and tree topologies. 7. Conclusion And Future Work Software-defined networking is a new concept to manage and configure computer networks. The main idea of the SDN concept is to separate the controlling layer of the computer network fromthenetwork switchesandcentralize it to the SDN controller. The centralized managementbrings a new way to control network functionality with one single application instead of configuring hundreds and thousands of devices independently. In this paper the SDN concept is addressed especially from the perspective of network security. The security improvements are explored and solutions are proposed for an enhanced security. But, still more research needs to be done to obtain highly secured network.NS2 software is used to study the parameters involved and to develop the proposed solution. Authentication mechanism is provided which secures the communication between nodes, thereby providing security. Different wireless topologies like grid, tree and random has been created with SDN controller and performance metrics like energy consumptionVsnumberof nodes, energy Vs time, throughput, end to end delay and packet delivery ratio are analyzed for the same. Energy consumption and the time taken is analyzed and compared with SDN and without SDN .Wherein, without SDN, consumes less energy than the normal conventional networks which is a great advantage for SDN and another advantage is the lesser time consumed. Although this paper gives out some advantages based on the project work, still security can be enhanced to provide a highly secured network. The SDN will be the leadingnetworkingtechnology in the future but it still needs a little more time to evolve. However the future perspectiveofusageofSDN isvery high. As SDN has better featuresthanconventional networks more research and development study shall be done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects 8. BIBLIOGRAPHY 1. Diogo Menezes Ferrazani Mattos, Lyno Henrique Goncžalves Ferraz,Otto Carlos Muniz Bandeira Duarte, âAuthFlow: Authentication and Access Control Mechanism for Software Defined Networking,âIEEE International conference on computer networks,2013. 2. Feliksas Kuliesius, and Vainius Dangovas, âSDN Enhanced Campus Network Authentication andAccess Control Systemâ,IEEE International Conference on Computer Science and Network Technology, 2015. 3. Ruikang Zhou,Yingxu Lai,ZenghuiLiu,JingLiu,âStudyon authentication protocol of SDN trusted domainâ, IEEE Twelfth International Symposium on Autonomous Decentralized Systems, 2015. 4. Caraguay ALV, Lopez LIB, Villalba LJG,âEvolution and Challenges of Software Defined Networkingâ, IEEE Communications Magazine,2012. 5. Patouni E, Merentitis A, Panagiotopoulos P, Glentis A, Alonistioti N, âNetwork VirtualisationTrends:Virtually
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2237 Anything Is Possible by Connecting the Unconnectedâ, IEEE SDN for Future Networks and Services (SDN4FNS),2013. 6. CasadoM, Koponen T, Shenker S, Tootoonchian A, âFabric: A retrospectiveon evolvingSDNâ,International journal on SDN, 2012. 7. Monteleone G, Paglierani P,âSession Border Controller Virtualization Towards Service-Defined Networks Based on NFV and SDNâ,IEEE SDN for Future Networks and Services (SDN4FNS), 2013. 8. Gelberger A, Yemini N, Giladi R, âPerformance Analysis of Software-Defined Networking (SDN)â,IEEE 21st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS),2013 9. Lara A, Kolasani A, Ramamurthy B, âNetwork Innovation using OpenFlow: A Surveyâ, IEEE Communications Surveys & Tutorials,2014 10. Akyildiz IF, Lee A, Wang P, Luo M, Chou W, âA roadmap for traffic engineering in SDN-OpenFlow networksâ,International conference on Computer Networks,2014 11. Jin D, Nicol DM, âsimulation of software defined networksâ,springer,2013 12. Raghavan B, Koponen T, Ghodsi A, Casado M, Ratnasamy S, Shenker S,âSoftware-defined internet architecture: decoupling architecture from infrastructureâ,ACM Hotnets â12,2012 13. Bhattacharya B, Das D,âSDNbasedArchitectureforQOS Enabled Services across Networks with Dynamic Service Level Agreementâ,IEEE ANTS, 2013. 14. Kobayashi M, Seetharaman S, Parulkar G, Appenzeller G, Little J, van Reijendam J, Weissmann P, McKeown N,âMaturing of Open Flow and Software-defined Networking through deploymentsâ,IEEEConferenceon Computer Networks,2014 15. Galis A, Clayman S, Mamatas L, Rubio Loyola J, Manzalini A, Kuklinski S, Serrat J, Zahariadis T,âSoftwarization of Future Networks and Services - Programmable Enabled Networks as Next Generation Software Defined Networksâ, IEEE SDN for Future Networks and Services(SDN4FNS),2013. 16. Caraguay ALV, Lopez LIB, Villalba LJG,âEvolution and Challenges of Software Defined Networkingâ, IEEE Communications Magazine,2012. 17. Cahn A, Hoyos J, Hulse M, Keller E,âSoftware-Defined Energy Communication Networks: From Substation Automation to Future Smart Gridsâ,IEEE Smart Grid Communication 2013 Symposium - Smart Grid Services and Management Models,2013 18. Wang J, Wang Y, Hu H, Sun Q, Shi H, Zeng L,âTowards a Security-Enhanced Firewall Application for OpenFlow Networksâ,Springer LNCS CSS,2013.
Download now