Submit Search
Upload
Software Defined Network Based Internet on thing Eco System for Shopfloor
•
0 likes
•
35 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i8/IRJET-V4I885.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
Â
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Schneider Electric
Â
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Â
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
Schneider Electric
Â
ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
Vikram Nandini
Â
Networking project
Networking project
Md Selim Hossain
Â
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
Real-Time Innovations (RTI)
Â
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
domenico di mola
Â
Recommended
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
Â
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Schneider Electric
Â
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Â
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
Schneider Electric
Â
ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
Vikram Nandini
Â
Networking project
Networking project
Md Selim Hossain
Â
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
Real-Time Innovations (RTI)
Â
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
domenico di mola
Â
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu
Â
Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system
Mahesh Chandra Manav
Â
What Every It Professional Should Know
What Every It Professional Should Know
dinobusalachi
Â
IoT, M2M and IoT System Management
IoT, M2M and IoT System Management
Vikram Nandini
Â
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
iaemedu
Â
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Â
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
Â
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET Journal
Â
1678 1683
1678 1683
Editor IJARCET
Â
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Tripwire
Â
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Â
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
Real-Time Innovations (RTI)
Â
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
University of Southern California
Â
The network and on premise edge
The network and on premise edge
DESMOND YUEN
Â
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
Juniper Networks
Â
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Real-Time Innovations (RTI)
Â
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
CSCJournals
Â
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Â
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
Boston Global Forum
Â
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
Selena829218
Â
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
Â
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
Â
More Related Content
What's hot
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu
Â
Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system
Mahesh Chandra Manav
Â
What Every It Professional Should Know
What Every It Professional Should Know
dinobusalachi
Â
IoT, M2M and IoT System Management
IoT, M2M and IoT System Management
Vikram Nandini
Â
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
iaemedu
Â
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Â
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
Â
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET Journal
Â
1678 1683
1678 1683
Editor IJARCET
Â
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Tripwire
Â
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Â
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
Real-Time Innovations (RTI)
Â
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
University of Southern California
Â
The network and on premise edge
The network and on premise edge
DESMOND YUEN
Â
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
Juniper Networks
Â
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Real-Time Innovations (RTI)
Â
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
CSCJournals
Â
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Â
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
Boston Global Forum
Â
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
Selena829218
Â
What's hot
(20)
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Â
Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system
Â
What Every It Professional Should Know
What Every It Professional Should Know
Â
IoT, M2M and IoT System Management
IoT, M2M and IoT System Management
Â
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
Â
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Â
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
Â
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
Â
1678 1683
1678 1683
Â
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Â
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
Â
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
Â
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Â
The network and on premise edge
The network and on premise edge
Â
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
Â
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Â
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Â
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
Â
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
Â
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
Â
Similar to Software Defined Network Based Internet on thing Eco System for Shopfloor
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
Â
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
Â
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
Â
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
Â
What is SDN.pdf
What is SDN.pdf
Konverge Technologies Pvt. Ltd.
Â
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
Â
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
IRJET Journal
Â
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
IOSR Journals
Â
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
IRJET Journal
Â
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET Journal
Â
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
Â
1570272924-3
1570272924-3
Raluca Ciungu
Â
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
IRJET Journal
Â
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
Â
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
Â
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
George Wainblat
Â
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
IRJET Journal
Â
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...
IRJET Journal
Â
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
IRJET Journal
Â
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
Â
Similar to Software Defined Network Based Internet on thing Eco System for Shopfloor
(20)
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
Â
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Â
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
Â
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
Â
What is SDN.pdf
What is SDN.pdf
Â
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
Â
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
Â
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
Â
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
Â
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
Â
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
Â
1570272924-3
1570272924-3
Â
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
Â
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
Â
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
Â
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
Â
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
Â
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...
Â
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
Â
8. 9590 1-pb
8. 9590 1-pb
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Â
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Â
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Â
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Â
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Â
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
ugginaramesh
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Â
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Â
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Â
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Â
Recently uploaded
(20)
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Â
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Â
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Â
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Â
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Â
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Â
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Â
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Â
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Â
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Â
Software Defined Network Based Internet on thing Eco System for Shopfloor
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 475 Software Defined Network Based Internet on Thing Eco System For Shopfloor Avijit Deb Sarkar1 1TATA Consultancy Services & Saltlake Solution Architect ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Present day the manufacturing industries are looking for solutions to achieve high availability (HA) and secure platform for real-time data transfer process. The cost efficient solution for this HA platform is Cloud Server. The Software Defined Network (SDN) help cloud providers to manage and program their network efficiently in flexible manner. This type of network is agile andeasilyscalablebased on business requirement. In advance manufacturing unit the wireless sensors, actuators and mobile devices are integrated with machines as IoT devices. Duetounstructureddataformat the security implementation of IoT on SDN architecture is a challenging task. In this article has proposed a secured architecture for IoT devices in an SDN based network to address HA, Security and Real-Time data transfer process. Key Words: Software Define Network, Internet on Things, Cloud Computing, Manufacturing Execution System. 1. INTRODUCTION The next technological trends for manufacturing units are IoT, Mobile Computation, Big Data, Social Media Integration. This new computation techniques are leverage the computational features of sensor nodes. In recent daysmost of the sensors are connected with micro-computers. Those sensor connected micro-computer nodes are capable of transmitting data directly from machines to enterprise databases. These inter-connected devices are transmitting high definition multimedia, text files, audio, video etc. The volume, velocity and verity [1] of data hasbeengeneratedby the connected devices which requires high speed internet connection with low power and secure computational platform. Low power and efficient encryption methodology is a primary consideration for security while data is being transmitted across the devices. Additionally with the development of latest Internet technology multiple Sensor based devices are interfacing with other connected devices and servers. The IoT devices exposedata ininsecuremanner which leads to various potential threats.Anefficientsecurity architecture has to be worked out in this paper for the IoT platforms. In the conventional enterprise network different security tools like Firewall, IntrusionDetectionSystem(IDS) is deployed to increase the reliability of the entire network. The new systems administration would be, the SDN offers wide range of options to secure the system in a more productive and adaptable way [2]. SDN architecture separates the control plane from the data plane in the network. In legacy network as per the built in instructions of the switches, packets are moved to the same destination along the same path. In SDN packet forwarding rules are managed by the controller. This paper highlights the major security challenges of IoT Devices and propose a secure architecture for the IoT in the SDN platform. 2. SDN ARCHITECTURE SDN architecture supports wide range of cloud architectureandenablesscalable,automatedandon-demand Information Technology (IT) Infrastructure platform. SDN architecture defined based on open source software and commodity hardware. In traditional network thecontroland data plane elements are packaged together. In OpenFlow[3] standard created in 2008, recognized as first SDN architecture that separated the control plane and data plane elements and they use OpenFlow protocol for communication. The OpenFlow protocol is defined by Open Network Foundation (ONF). However, there are other standards and open-source organizations with SDN resources, so OpenFlow is not the only protocol that makes up SDN. The purpose of the SDN is to improve user experience with minimum cost. 2.1 SDN Stacks SDN make the network agile and flexible by separated the control plane and data plane of the networking stack. The working principle of SDN is to separation of responsibility. The SDN Stack broadly divided into three different tires and two types of interfaces: a. Application Encompasses solutions that focus on the expansion of network services. These layer contain mainly software applications that communicate with the controller. b. Control Plane Includes a logically-centralized SDN controller, which maintains a global view of thenetwork. It also takes requests through clearly defined APIs from application layer and performs consolidated management and monitoring of network devices via standard protocols. c. Data Plane Involves the physical networkequipment,includingEthernet switches and routers. It provides programmatically
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 476 configurable and high performance hardware and software, which is compliant with industry standards. d. Northbound Interface and Southbound Interface A northbound interfaces are used by a particular network component to communicate with a higher-level component, enable alarm notification, performance report, configuration, security log, network inventory details etc. Conversely, a southbound interface allows a particular network component to communicateand manage with a lower-level component. Fig 1: SDN Architecture [4] 2.2 Pros and Cons of SDN a. Advantages The benefits of SDN is centralized network provisioning capability. By abstracting the control plane and data plane SDN can achieve more agility on provisioning virtual and physical devices from central location. SDN controller provides centralized security control as a result the security policies are consistent across the enterprise. SDN controller can run on low cost commodity hardware. The IoT devices are the key driver for SDN. Given the complexity and scale, it is really difficult to manage network manually. SDN provides the cost-effective solutions to manage the sensor network and the data on it. SDN implementation help to optimize the bandwidth utilization and maximize the efficiency of the applications and analytics that use its data. b. Disadvantages In SDN the network device configuration is done using web interface hosted in controller. The location of the controller can be on premises or in physically distributed location. One area of concern is the connection between the controller and the communicated network devices. So all configuration relatedcommunications arebased on HTTP or HTTPS.Ifthat fails or becomes compromised, the entire network not only lose the connectiontothecontrolleralsogoesdown.SDNalso introduce new potential security called Distributed Denialof Services (DDoSing). 2.3 Security Consideration of SDN a. Single SDN Controller Approach In single controller SDN environment the Denial of Service (DoS) attack is a major threat. In this approach if the SDN controller compromised by any attacker then they can take full control over the network. Hence a single controller environment has always a major risk for entire network. Multiple controller approach is the solution for low risk and enhance reliability to the network system.Inmulticontroller environment for any failure of one controller, another physically separated SDNcontrollercantakeoverthecontrol to prevent the entire network failures. b. Multiple SDN Controller Approach It is observed that multiple controllers can increase availability of the system.Thedefaultfeatureofhigh availability(HA) is to make availableeitherofthetwosystem if there is any failure happen. In practice it has observed that multi controller SDN platform effects network performance. In multi controller environment each controller has primary responsibility to manage a particular network segment, so controller has to compute the route to collaborate with each other and exchange information which creates extra computation overhead. 3. IoT Implementation in SDN In present days most of the shopfloor machines are connected with multiple sensors, PLC and OPCs are capable to uploadand download machine data directlyfrommachine to enterprise system. Hence thisIoTenablemachinesrequire agile and cost effective network infrastructureandSDNisthe solution for that. The IoT sensor nodes connects with each other via IoT controller usingSDN capablenetworkasshown in Fig 2. In this propose architecture the IoT controller is responsible to establish the handshakingbetweenIoTsensor nodes and enterprise system.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 477 Fig 2: Connectivity of IoT in SDN Platform a. IoT Sensor Node It is responsible to sense, analyze and collect the information from the machinesas production feedbackforbusinessusers also downloads require data to machines based on response generated from IoT controller. All the IoT Sensor Nodeneeds to be registered in local IoT controller with the details like Device Id, IP Address, Public Key, and Communication Protocol. b. IoT Controller Node It takes the necessary decisionsbasedonthedataprovidedto it by the IoT Sensor Nodes. These data are route to the Cloud Servers using network devices via the SDN controller. IoT controller receive the data from sensor nodeand processthe same based on “IsProcessRequire” flag value. After processing controller responsibilitytodecidethedestination route of the data, if the processed data is require for other connected devices then controller send theprocesseddatato the intended devices else it transfer data to database hosted in Cloud Server. The entirecommunicationismanagedbythe SDN controller. c. SDN Capable Heterogeneous Network It has the responsibility to establish the communication path between connected sensors and cloud server and surrounding systems like Reporting System, SCM, and ERP etc. Some of the surrounded systems responsible to display production status in real-time based production feedback received from IoT devices. InMESenvironmentdatavelocity, verity, volume is always high because the sensor node continuously sends data to enterprise system. The SDN architecture is responsible to manage this high traffic heterogeneous network environment. The SDN controller also monitor the request and response data packets. It has responsibility to manage the security protocols for IoT network from different vulnerable attacks. In SDN platform OpenFlow switches [4] contains the security policies for the connected segment. 4. Proposed Security Framework IoT network be made up of different resource constrained sensor devices Android Mobile Phones, SoC board such as Raspberry pi, Arduino, ATMeg32 based controller etc. Each IoT devices are connected to local IoT Controller and it is connected to cloud server via SDN. The entire IoT network is segmented into multiple heterogeneous network. The local IoT controller has enough computation capability resources. The sensor node encrypt the data using its own private key and send that to IoT Controller. The IoT controller is responsible to process the data and forward to central database to store and process further for enterprise use. Whenever a new IoT based sensor node introduced then it updates the details to controller similarly controller updates that information to central server.Theflowchartisexplained in Fig 3. Fig 3: Flow Chart 5. DATA Structure for IoT Security Framework In this proposed security framework RSA has been used for data encryption. There are two sets of data structure has designed to implement this security protocol.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 478 5.1 Data Structure for Controller Node All connected IoT sensor node information will be stored in “DeviceInforMaster” table. When a new node introduced in the network then sensor node call REST service hosted in controller and updateitsowndeviceinformation.Thecentral server always scan this table for new information and based on that its updates itself. IoTcontroller always executes ajob in regular interval to read sensor data from device and save that into “DeviceData” table. Also if that data contains target machinedetails thencontrollerdecryptthatdataandencrypt using controller private key and send to target device for further processing. Fig 4: DeviceInfoMaster Entity Details Fig 5: DeviceData Entity Details Fig 6: ControllerInfoMaster Entity Details Fig 7: Data Structure of Key Management System in IoT Controller 5.2 Data Structure for Sensor Node Sensor node data structure consist of 4 tables one is for controller information and remaining three for device internal use. The controller table (“ControllerInfoDetails”) is populated by sensor based on the exposed controller information. REST protocol has used to expose the data. Sensor node save the device id, device code, public key and private key into local table “DeviceInfoLocal”. The operator can map other device using REST based web service. The mapping information kept in “DeviceMapping” table. All sensor information saved into local table called“DeviceData” and then send to controller for further processing. This table automatically purge after 72 hours, however this schedule is also configurable. Fig 8: DeviceData Entity Details Fig 9: ControllerInfoDetails Entity Description
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 479 Fig 10: DeviceInfoLocal Entity Description Fig 11: Data Structure of Key Management System in IoT Device 5.3 Key Management Logic & Application The relationship among the Cloud Server, IoT Controller and Sensor Node has been mentioned in section VII. This architecture is platform and technology independent. The Sensor Nodesare responsible to generate PrivateKey,Public Key and Device Codefor the first timewhenever itconnected to the network, similarly the IoT Controller is responsible to generate Public Key for Data/Application Server and Sensor Node. The sensor node expose key and device code using REST based web service.TheIoTcontrollernodeperiodicallycheck the REST web service and insert the device code and public key to “DeviceInfoMaster” table. Application administrator can set change the frequency by which the key will be updated by the sensor node. Using this functionality application administrator can modify only public keyorboth public and privatekey basedon securityneeds.MACAddress has considered as unique DeviceId. The entire communicationhasdonethroughRESTbasedwebservice,so that all types of device can consume that data. 5.4 Data Transfer Mechanism This paper has proposed push mechanism for data transfer activity from sensor node to IoT controller node and pull mechanism from IoT controller node to central server. The relationship among the cloud server, IoT controller and sensor node has been mentioned in section VII. The sensor nodes always encrypts data using its own private key and then controller public key. Once controller received the data form sensor node it checks the target device filed and if that field is blank then it decrypt the data usingitsprivatekeyand then upload the encrypted data to central server hosted in cloud. If the target device field non empty then it decrypt the data using its own private key and then source sensor public key and then perform required operation and finally before send that data to destination sensor node again it encrypt using its own private key and destination sensor public key and then send. This implementation has been done in Steel Manufacturing Industry for Material Transfer Module, Scrap Weighing Module and Production Feedback Module. The architecture in generic enough to implement in other manufacturing industries. Fig12: Architectural Diagram In above Architectural Diagram (Fig 12) different units is running in different network segment andeachsegmentsare connecting among themselves via SDN. Each segment has its own IoT controller which is connected to one or more IoT sensor node. This design is platform and technology independent. 6. Benefits and limitations 6.1 Benefits a. This design is platform independent, so it can implement with existing technology and no need to change the technology platform. b. The business continuity plan is addressed in this design, for example if there is any failure in SDN control plane or application plan then operationswill not effect because IoT Controller is working as abstraction betweenoperationsandexternal systems.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 480 c. All communicationsamongthesystemsareencrypted based on asymmetric key encryption. d. The push mechanism has been used to update the sensor data in sensor node and IoT Controller Node. This push mechanism is optimum solutions for resource constrain systems. e. Pull mechanism has beenusedinapplicationserverto fetch data from IoT Controller node for further processing at enterprise level. 6.2 Limitations a. The proposed architecture may not match with old legacy system because in practical scenario it is identified that the few old systems are incompatible to communicate with latest system. b. Old PLC and Machine controllerswereusingtheSerial port for upload and download machine data whereas latest PLCs and OPC systems are using TCP/IP protocol for the communication. So a separate data extraction and transfer code is required to integrate this architecture for oldlegacysystem.Sometimesitis noticed that this extra layer increases the complicity of the system which directly affect system performance. CONCLUSION This paper I have proposed an architectureforMESplatform for Steel Industry. This proposed architecture had been implemented in client place and it is working as expected without any glitch. Need to explore the scope and feasibility to implement this architecture for other type of manufacturing industries like car manufacturing, packet manufacturing etc. The major implementation challengeswastoimplementthis system to upstream furnace area because that is most hazardous environment. This implementation help client to get return of investment within two months by reducing human intervention at scrap weighing area. ACKNOWLEDGEMENT There have been many contributors for this to take shape and I am thankful to each of them. I specifically would like to thank my supervisors Mr. Sujan Das and Mr. Basudev Acharya. The work has been partially implemented for one of our customer’s manufacturing unit. REFERENCES [1] A Review Paper on Big Data and Hadoop : http://www.ijsrp.org/research-paper-1014/ijsrp- p34125.pdf [2] Sood, Manu. ”Software defined networkArchitectures.” Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on.IEEE, 2014. [3] Openflow : https://www.opennetworking.org/sdn- resources/openflow [4] SDN Architecture Image http://thenewstack.io/defining-software-defined- networking-part-1/
Download now