This document provides an overview of a proposed research project on designing an energy efficient and secure service framework for software defined networks. It begins with an introduction and background on software defined networks and edge computing. It then discusses the proposed research questions, objectives, methodologies, and work plan. The literature review identifies gaps in existing research related to resource management, traffic forwarding, delays, latency, mobility, energy consumption, and data privacy in SDNs. The proposed methodologies include designing algorithms and frameworks, testing and validation, and publishing research papers.
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This presentation of mine gives basic idea about SDN, use of SDN in different fields, cause of evolution of a new network architecture, openFlow standard and Architectural components.
The document discusses consistency issues that can arise in distributed SDN environments. It provides an introduction to SDN and discusses how distributed controllers can be either strongly or eventually consistent. The literature survey section summarizes several papers that propose methods for enhancing consistency, including adaptive consistency and fault-tolerant designs. The adaptive consistency approach is highlighted as being more efficient as it allows the controller to dynamically tune its configuration based on metrics and requirements. In conclusion, adaptive consistency is identified as the most adoptable method for balancing consistency and availability in distributed SDN environments.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
Software defined networking (SDN) separates the control plane that directs data traffic from the underlying hardware switching infrastructure. This allows network control to become directly programmable and the infrastructure to be abstracted from applications and network services. SDN uses the OpenFlow protocol to define instructions for how switches should forward traffic, with the control logic residing separately in software-based controllers. This architecture provides benefits like centralized management, automation through APIs, and the ability to apply policies at the user and application level.
Performance ananlysis of the effect of load balancer in sdn based cloudRinki Sharma
This presentation discusses the implementation for
integration of cloud infrastructure with SDN using OpenStack
and OpenDaylight (ODL). After integration, network services
such as load balancer (LB) and web server (WS) are
implemented on the cloud. Performance analysis of the effect of load balancer in SDN based cloud is discussed.
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This presentation of mine gives basic idea about SDN, use of SDN in different fields, cause of evolution of a new network architecture, openFlow standard and Architectural components.
The document discusses consistency issues that can arise in distributed SDN environments. It provides an introduction to SDN and discusses how distributed controllers can be either strongly or eventually consistent. The literature survey section summarizes several papers that propose methods for enhancing consistency, including adaptive consistency and fault-tolerant designs. The adaptive consistency approach is highlighted as being more efficient as it allows the controller to dynamically tune its configuration based on metrics and requirements. In conclusion, adaptive consistency is identified as the most adoptable method for balancing consistency and availability in distributed SDN environments.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
Software defined networking (SDN) separates the control plane that directs data traffic from the underlying hardware switching infrastructure. This allows network control to become directly programmable and the infrastructure to be abstracted from applications and network services. SDN uses the OpenFlow protocol to define instructions for how switches should forward traffic, with the control logic residing separately in software-based controllers. This architecture provides benefits like centralized management, automation through APIs, and the ability to apply policies at the user and application level.
Performance ananlysis of the effect of load balancer in sdn based cloudRinki Sharma
This presentation discusses the implementation for
integration of cloud infrastructure with SDN using OpenStack
and OpenDaylight (ODL). After integration, network services
such as load balancer (LB) and web server (WS) are
implemented on the cloud. Performance analysis of the effect of load balancer in SDN based cloud is discussed.
The document discusses security issues in software-defined networking (SDN). It outlines how SDN architectures separate the control plane from the data plane and use centralized controllers. However, this introduces new security threats, such as attacks on controllers, control plane communication, and applications. The document analyzes threats across the different SDN layers and proposes some mitigation approaches, concluding that while SDN was not initially designed with security in mind, it could potentially improve network security when properly implemented.
The main scope of up-gradation to the advanced computer networks is to make the technical advancement in the network management and so managing the traffic control (that is the control plane and data or forwarding plane) while abridging it in the Multi-Controller Domain. SDN refers to the isolation of the network control plane from the forwarding plane, with a control plane overseeing many networking systems. This paper investigates how new improvements in SDN and the programmability of networks can be helpful to abridge tasks, improve dexterity, and encounter new task necessities within the U.S. Department of Defense (DoD) and open networks. These improvised network services across the digital network entail a multi-controller domain. This paper represents the research in SDN and multi-controller domain, aiming at OpenFlow Protocol and its upcoming challenging tasks.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Software-defined Networking (SDN)
It is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via:
open interfaces
abstraction of lower-level functionality
SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers.
This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the SDN controller, or control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
Software-Defined Networking Layers as Proposed by the Comprehensive Survey done on the topic:
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey.Proceedings of the IEEE,103(1), 14-76.
The 8 layers are simply presented to be easily understood by the attendees.
Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networ...Asma Swapna
Software Defined Networking (SDN) is the best
choice in establishing a software controlled inter-domain network. Convergence of different Wireless link technologies bring the mobile users to choose the network being in any geographical location. IEEE 802.21 is such a standard for exchanging networking information for connecting with the network being at any region in the world. Integrated with SDN wireless network this functionality of IEEE 802.21 standard can discover programmable network services with profound resource utilization. However, the information exchange should circulate through a reliable source. Hence, the security analysis of IEEE 802.21 Media Independent Handover (MIH) mechanism for Software Defined Wireless Network (SDWN) is the primary concern of this research work. This study, conducts architectural and functional analysis of MIH integrated with SDWN interface for mobility management of the wireless nodes. The outcome specifies a possible integration with future deployment opportunities in information exchange of IEEE 802.21 MIH for programmable network devices.
VeriFlow is a system that provides real-time verification of network-wide invariants by obtaining a real-time view of the network and using dynamic monitoring and custom algorithms for error detection. It works by generating equivalence classes to limit the search space, representing forwarding behavior using forwarding graphs, and running queries to check invariants. Experiments show that VeriFlow can verify most updates within 1 millisecond with minimal impact on TCP connection latency. While faster than Header Space Analysis, VeriFlow and HSA both aim to verify the data plane but use different data structures and approaches.
This document provides an overview of performance evaluation for software defined networking (SDN) based on adaptive resource management. It begins with definitions of SDN and discusses its architecture, advantages, protocols, simulators, and controllers. It then outlines challenges in SDN including controller scalability, network updates, and traffic management. Simulation tools like Mininet and Floodlight and Open vSwitch controllers are explored. Different path finding algorithms and approaches to resource management optimization are also summarized. The document appears to be a student paper or project on evaluating SDN performance through adaptive resource allocation techniques.
This document discusses performance evaluation strategies for multi-access edge computing (MEC). It introduces MEC and outlines its advantages and challenges, including unpredictable network traffic from user mobility. It presents a performance model called MECCA and describes deployment models for testing MEC applications in cloud and edge-cloud environments. The testing approach focuses on key metrics like response time and throughput as more clients are added. Potential use cases for MEC include autonomous vehicles, healthcare, manufacturing, and augmented reality.
A Software Engineering Perspective on SDN ProgrammabilityFelipe Alencar
Presentation of the survey published in the IEEE COMMUNICATIONS SURVEYS & TUTORIALS 2015. Software-Defined Networking (SDN) has received a great deal of attention from both academia and industry in recent years. Studies on SDN have brought a number of interesting technical discussions on network architecture design, along with scientific contributions. Researchers, network operators, and vendors are trying to establish new standards and provide guidelines for proper implementation and deployment of such novel approach. It is clear that many of these research efforts have been made in the southbound of the SDN architecture, while the northbound interface still needs improvements. By focusing in the SDN northbound, this paper surveys the body of knowledge and discusses the challenges for developing SDN software. We investigate the existing solutions and identify trends and challenges on programming for SDN environments. We also discuss future developments on techniques, specifications, and methodologies for programmable networks, with the orthogonal view from the Software Engineering discipline.
The document provides a summary of the NECOS Project Technical Highlights from an industrial workshop held on October 18th, 2019. It discusses the following key points:
- The NECOS approach of Lightweight Slice Defined Cloud (LSDC) to abstract, isolate, orchestrate, and separate logical behaviors from physical network and cloud resources.
- Results and achievements of the project including developing the LSDC platform, Slice-as-a-Service model, use case specifications and scenarios, architecture design, and five prototype demos.
- Dissemination efforts including numerous publications, contributions to standards bodies, workshops organized, keynotes sponsored, and tutorials held to promote the project outcomes.
This document provides an overview of the ARCADIA Project, a Horizon 2020 funded consortium working on tools and methods for software development. The project runs from 2015-2017 with a budget of 3.5M Euros. It aims to develop approaches for designing reactive systems that can adapt based on their operational environment. This includes making applications more context-aware and composable from independently orchestratable components. The project is developing a software engineering environment, optimization engine, and policies framework to deploy and manage distributed applications across programmable infrastructure using network softwarization technologies. It includes three use cases related to security/privacy, survivable IoT communications, and quality of service/energy efficiency trade-offs.
Self-adaptation Challenges for Cloud-based Applications (Feedback Computing 2...Soodeh Farokhi
Abstract: Software applications accessible over the web are typically subject to very dynamic workloads. Since cloud elasticity provides the ability to adjust the deployed environment on the fly, modern software systems tend to target cloud as a fertile deployment environment. However, relying only on native elasticity features of cloud service providers is not sufficient for modern applications. This is because current features rely on users' knowledge for configuring the performance parameters of the elasticity mechanism and in general users cannot optimally determine such sensitive parameters. In order to overcome this user dependency, using approaches from autonomic computing is shown to be appropriate. Control theory proposes a systematic way to design feedback control loops to handle unpredictable changes at runtime for software applications. Although there are still substantial challenges to effectively utilize feedback control in self-adaptation of software systems, software engineering and control theory communities have made recent progress to consolidate their differences by identifying challenges that can be addressed cooperatively. This paper is in the same vein, but in a narrower domain given that cloud computing is a sub-domain of software engineering. It aims to highlight the challenges in the self-adaptation process of cloud-based applications in the perspective of control engineers.
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
This document evaluates different authentication mechanisms for control plane applications in software defined networks (SDNs). It discusses how a lack of trust between network applications and controllers is a challenge for SDN security. The document reviews several proposed authentication mechanisms and outlines a research proposal to evaluate these mechanisms under different performance scenarios in order to recommend a well-performing and reliable standard for the northbound API. It will use literature reviews and simulations with Mininet and NS3 to test authentication mechanisms on factors like the number of authenticated/unauthenticated applications over time.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
This document outlines an agenda for a course on analysis and design of algorithms. It discusses several fundamental algorithmic strategies including brute force, branch-and-bound, and heuristics. Brute force is defined as exhaustively checking all possible solutions. Branch-and-bound systematically prunes branches that cannot lead to optimal solutions. Heuristics provide approximate solutions through rules of thumb to guide problem solving. Examples are provided for solving the traveling salesman problem using brute force and branch-and-bound, and the 0/1 knapsack problem using these strategies. Characteristics and application domains of heuristics are also summarized.
This document provides an overview of the Fundamentals of Computer Programming course. It introduces the course coordinator, Dr. Deepika Sharma, and lists her qualifications. It outlines the course objectives, which include mastering computer fundamentals and Python concepts, and learning data visualization and classification algorithms. The evaluation scheme is also detailed, which assesses students through assignments, exams, projects and attendance. Key topics to be covered include computer fundamentals, Python programming, object-oriented programming, and data preprocessing.
The document discusses security issues in software-defined networking (SDN). It outlines how SDN architectures separate the control plane from the data plane and use centralized controllers. However, this introduces new security threats, such as attacks on controllers, control plane communication, and applications. The document analyzes threats across the different SDN layers and proposes some mitigation approaches, concluding that while SDN was not initially designed with security in mind, it could potentially improve network security when properly implemented.
The main scope of up-gradation to the advanced computer networks is to make the technical advancement in the network management and so managing the traffic control (that is the control plane and data or forwarding plane) while abridging it in the Multi-Controller Domain. SDN refers to the isolation of the network control plane from the forwarding plane, with a control plane overseeing many networking systems. This paper investigates how new improvements in SDN and the programmability of networks can be helpful to abridge tasks, improve dexterity, and encounter new task necessities within the U.S. Department of Defense (DoD) and open networks. These improvised network services across the digital network entail a multi-controller domain. This paper represents the research in SDN and multi-controller domain, aiming at OpenFlow Protocol and its upcoming challenging tasks.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Software-defined Networking (SDN)
It is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via:
open interfaces
abstraction of lower-level functionality
SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers.
This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the SDN controller, or control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
Software-Defined Networking Layers as Proposed by the Comprehensive Survey done on the topic:
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey.Proceedings of the IEEE,103(1), 14-76.
The 8 layers are simply presented to be easily understood by the attendees.
Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networ...Asma Swapna
Software Defined Networking (SDN) is the best
choice in establishing a software controlled inter-domain network. Convergence of different Wireless link technologies bring the mobile users to choose the network being in any geographical location. IEEE 802.21 is such a standard for exchanging networking information for connecting with the network being at any region in the world. Integrated with SDN wireless network this functionality of IEEE 802.21 standard can discover programmable network services with profound resource utilization. However, the information exchange should circulate through a reliable source. Hence, the security analysis of IEEE 802.21 Media Independent Handover (MIH) mechanism for Software Defined Wireless Network (SDWN) is the primary concern of this research work. This study, conducts architectural and functional analysis of MIH integrated with SDWN interface for mobility management of the wireless nodes. The outcome specifies a possible integration with future deployment opportunities in information exchange of IEEE 802.21 MIH for programmable network devices.
VeriFlow is a system that provides real-time verification of network-wide invariants by obtaining a real-time view of the network and using dynamic monitoring and custom algorithms for error detection. It works by generating equivalence classes to limit the search space, representing forwarding behavior using forwarding graphs, and running queries to check invariants. Experiments show that VeriFlow can verify most updates within 1 millisecond with minimal impact on TCP connection latency. While faster than Header Space Analysis, VeriFlow and HSA both aim to verify the data plane but use different data structures and approaches.
This document provides an overview of performance evaluation for software defined networking (SDN) based on adaptive resource management. It begins with definitions of SDN and discusses its architecture, advantages, protocols, simulators, and controllers. It then outlines challenges in SDN including controller scalability, network updates, and traffic management. Simulation tools like Mininet and Floodlight and Open vSwitch controllers are explored. Different path finding algorithms and approaches to resource management optimization are also summarized. The document appears to be a student paper or project on evaluating SDN performance through adaptive resource allocation techniques.
This document discusses performance evaluation strategies for multi-access edge computing (MEC). It introduces MEC and outlines its advantages and challenges, including unpredictable network traffic from user mobility. It presents a performance model called MECCA and describes deployment models for testing MEC applications in cloud and edge-cloud environments. The testing approach focuses on key metrics like response time and throughput as more clients are added. Potential use cases for MEC include autonomous vehicles, healthcare, manufacturing, and augmented reality.
A Software Engineering Perspective on SDN ProgrammabilityFelipe Alencar
Presentation of the survey published in the IEEE COMMUNICATIONS SURVEYS & TUTORIALS 2015. Software-Defined Networking (SDN) has received a great deal of attention from both academia and industry in recent years. Studies on SDN have brought a number of interesting technical discussions on network architecture design, along with scientific contributions. Researchers, network operators, and vendors are trying to establish new standards and provide guidelines for proper implementation and deployment of such novel approach. It is clear that many of these research efforts have been made in the southbound of the SDN architecture, while the northbound interface still needs improvements. By focusing in the SDN northbound, this paper surveys the body of knowledge and discusses the challenges for developing SDN software. We investigate the existing solutions and identify trends and challenges on programming for SDN environments. We also discuss future developments on techniques, specifications, and methodologies for programmable networks, with the orthogonal view from the Software Engineering discipline.
The document provides a summary of the NECOS Project Technical Highlights from an industrial workshop held on October 18th, 2019. It discusses the following key points:
- The NECOS approach of Lightweight Slice Defined Cloud (LSDC) to abstract, isolate, orchestrate, and separate logical behaviors from physical network and cloud resources.
- Results and achievements of the project including developing the LSDC platform, Slice-as-a-Service model, use case specifications and scenarios, architecture design, and five prototype demos.
- Dissemination efforts including numerous publications, contributions to standards bodies, workshops organized, keynotes sponsored, and tutorials held to promote the project outcomes.
This document provides an overview of the ARCADIA Project, a Horizon 2020 funded consortium working on tools and methods for software development. The project runs from 2015-2017 with a budget of 3.5M Euros. It aims to develop approaches for designing reactive systems that can adapt based on their operational environment. This includes making applications more context-aware and composable from independently orchestratable components. The project is developing a software engineering environment, optimization engine, and policies framework to deploy and manage distributed applications across programmable infrastructure using network softwarization technologies. It includes three use cases related to security/privacy, survivable IoT communications, and quality of service/energy efficiency trade-offs.
Self-adaptation Challenges for Cloud-based Applications (Feedback Computing 2...Soodeh Farokhi
Abstract: Software applications accessible over the web are typically subject to very dynamic workloads. Since cloud elasticity provides the ability to adjust the deployed environment on the fly, modern software systems tend to target cloud as a fertile deployment environment. However, relying only on native elasticity features of cloud service providers is not sufficient for modern applications. This is because current features rely on users' knowledge for configuring the performance parameters of the elasticity mechanism and in general users cannot optimally determine such sensitive parameters. In order to overcome this user dependency, using approaches from autonomic computing is shown to be appropriate. Control theory proposes a systematic way to design feedback control loops to handle unpredictable changes at runtime for software applications. Although there are still substantial challenges to effectively utilize feedback control in self-adaptation of software systems, software engineering and control theory communities have made recent progress to consolidate their differences by identifying challenges that can be addressed cooperatively. This paper is in the same vein, but in a narrower domain given that cloud computing is a sub-domain of software engineering. It aims to highlight the challenges in the self-adaptation process of cloud-based applications in the perspective of control engineers.
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
This document evaluates different authentication mechanisms for control plane applications in software defined networks (SDNs). It discusses how a lack of trust between network applications and controllers is a challenge for SDN security. The document reviews several proposed authentication mechanisms and outlines a research proposal to evaluate these mechanisms under different performance scenarios in order to recommend a well-performing and reliable standard for the northbound API. It will use literature reviews and simulations with Mininet and NS3 to test authentication mechanisms on factors like the number of authenticated/unauthenticated applications over time.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
This document outlines an agenda for a course on analysis and design of algorithms. It discusses several fundamental algorithmic strategies including brute force, branch-and-bound, and heuristics. Brute force is defined as exhaustively checking all possible solutions. Branch-and-bound systematically prunes branches that cannot lead to optimal solutions. Heuristics provide approximate solutions through rules of thumb to guide problem solving. Examples are provided for solving the traveling salesman problem using brute force and branch-and-bound, and the 0/1 knapsack problem using these strategies. Characteristics and application domains of heuristics are also summarized.
This document provides an overview of the Fundamentals of Computer Programming course. It introduces the course coordinator, Dr. Deepika Sharma, and lists her qualifications. It outlines the course objectives, which include mastering computer fundamentals and Python concepts, and learning data visualization and classification algorithms. The evaluation scheme is also detailed, which assesses students through assignments, exams, projects and attendance. Key topics to be covered include computer fundamentals, Python programming, object-oriented programming, and data preprocessing.
Java Control Structure Session 1 Complete (1).pptxRahulSingh190790
Here are the blanks filled in:
1. if - The statement is used to execute a code block if a condition is true.
2. if-else - The statement is used to execute a different code block if the original condition is false.
3. if-else-if ladder - To test multiple conditions sequentially and execute the first true block.
4. nested if - To check multiple conditions in a dependent manner, with inner 'if' statements only being evaluated if outer 'if' conditions are true.
Dr. Tanvi FOCP Unit-2 Session-1 PPT (Revised).pdfRahulSingh190790
This document outlines the agenda and objectives for a series of sessions on introducing Python programming. The sessions will cover Python features, environment setup, syntax, data types, operators, strings, and regular expressions. The goals are for students to understand why Python is useful, install Python correctly, configure their environment, and gain familiarity with Python's core concepts and fundamentals. Real-world uses of Python include web development, data science, machine learning, automation, and cross-platform software development.
This document appears to be a research paper proposal presented by a scholar in the [Department Name] department. It includes sections on the introduction, literature review summarizing several previous studies, identified gaps in existing literature, objectives and hypotheses, proposed methodology and research design, potential outcomes, bibliography, and a concluding thank you slide. The scholar's name and provisional registration number are also provided.
This document is an index map for a project located in Bihar, India. It includes the following key information:
- The project involves preparing a detailed project report and feasibility study for a proposed 4-lane elevated/extradosed cable bridge over the Ganga River parallel to an existing rail-cum-road bridge between Digha and Sonepur.
- The index map provides an overview of the project area, showing locations like Digha, Sonepur, Patna, and key transportation infrastructure like roads, railroads, and the existing bridges.
- It also shows the proposed alignment for the new 4-lane bridge in Option 1, including the bridge length of approximately 4.56 km
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
artificial intelligence and data science contents.pptx
Synopsis Lokesh Pawar.pptx
1. Design of an Energy Efficient and Secure
Service Framework for Software Defined
Networks
Presented by:
Lokesh Pawar
21YCS1004
(Department of Computer Science & Engineering )
LOKESH PAWAR
Co-Supervisor:
Dr. Rohit Bajaj
(Associate Professor, CSE)
CSE 1
Supervisor :
Dr. Gaurav Bathla
(Professor, CSE)
2. Table of Contents
• Introduction
• Software Defined Networks
• Model and Types of SDN
• Software Defined Edge Computing
• Applications of SDN
• Literature Review
• Research Gaps
• Research Questions
• Objectives
• Methodologies
• Work Plan
• References
CSE LOKESH PAWAR 2
3. Introduction: Traditional Networking
• The exponential growth in demand of service from the server.
• Incapability of the traditional network infrastructure in providing
– Ubiquitous Access
– Dynamic Management
– Service Request Failures
– Reconfiguration of the Network
• To avoid these issues cloud infrastructure is utilized.
• The cloud utilization brings in few other challenges:
– Latency
– Cost
CSE 3
LOKESH PAWAR
Figure 1: Traditional Cloud Network
4. Software Defined Networks
• SDN is software oriented and runs on the top of the control plane.
• The traditional network is hardware oriented [1].
• SDN can resolve the issues evolved in cloud and traditional infrastructure.
• It has a capability to communicate with the underlying hardware and can manage
the traffic.
• It also provides a new way of managing and controlling the data packets with the
help of centralized multiple servers.
• SDN allows administrators to :
– Control the Network
– Customization
– Resource Management
– Network Capacity
CSE 4
LOKESH PAWAR
5. Software Defined Networks
• SDN is divided into three planes:
– Data Plane
– Control Plane
– Application Plane
• Data Plane is responsible for collection, storage
and routing of the data [1].
• Control Plane is responsible for handling the
Control Decisions, Control Synchronizations
and Resource Management.
• Application Plane is responsible for intrusion
detection and load balancing.
CSE LOKESH PAWAR 5
Figure 2: SDN Architecture [1]
6. Model and Types of SDN
• Models of SDN
– Open SDN: This is implemented at the data plane level and it’s a protocol suite for
controlling the switches.
– SDN by API: Instead of using open protocol API’s controls the movement of the data
through the devices in the network.
– SDN Overlay: It runs on the top of existing hardware without disturbing the physical
network.
– Hybrid SDN: A combined service is provided where traditional protocols caters routine
traffic and SDN caters other traffic.
• Types of SDN
– Single Controller (Central SDN): Single controller is used to manage all the Control
Synchronizations, Control Decisions and Resource Management.
– Multiple Controller(Hybrid): Multiple Controllers are used to manage all the Control
Synchronizations, Control Decisions and Resource Management.
CSE 6
LOKESH PAWAR
7. Software Defined Edge Computing
• SDEC is implemented on edge services present in the application layer of SDN.
• SDEC is decoupled into Software Defined Edge Devices, Software Defined Edge
Storage and Software Defined Edge Computing Resources.
• They are abstraction and definition for terminal devices edge storage resources and
edge resource management [2].
CSE LOKESH PAWAR 7
Figure 3: Component View of SDEC [2]
8. Applications of Software Defined Network
• Network Monitoring
• Security
• High Performance
• Energy management
• Virtualization
• Intelligent Routing
• Reconfiguration Network
• Dynamic
CSE 8
LOKESH PAWAR
9. Literature Review
CSE 9
Author & Year Findings Journal
Chen J. et al. [18] &
2022
• Designed an automatic load balancing architecture
which is based on reinforcement learning.
• The optimal path is determined by using deep
deterministic policy gradient.
• Pytorch is utilized to implement the RL.
WCMC, Hindawi
Ali J. et al. [28] &
2022
• Clustering technology is used for managing the
network.
• Multi Criteria Decision Making technique was also
used along with Clustering technique.
• This technique was not able to focus on energy and
load balancing, but it is scalable and no latency.
Sensors, MDPI
LOKESH PAWAR
10. Literature Review
CSE LOKESH PAWAR 10
Author & Year Findings Journal
Babbar H. et al. [14]
& 2021
• Single Controller can not manage the heavy traffic
due to the restricted capability.
• The author utilized migrating switches technique for
proposing a scalable load balancing algorithm.
• Multi Controller environment was utilized to reach
an optimized solution.
Sustainability,
MDPI
Simoes R. et al. [27]
& 2021
• Network function virtualization technique was used
to reach to optimal solution.
• This technique focused on energy efficiency, load
balancing, security, network quality and it is robust
as well.
Future Internet,
MDPI
11. Literature Review
CSE 11
Author & Year Findings Journal
Nsaif M. et. al.[29]
& 2021
• Authors used an Integer Programming Model
• This technique focused upon Energy efficiency,
load balancing and network quality performance.
Electronics,
MDPI
Lee S. et al. [20] &
2020
• They have proposed a tool which uses fuzzing
technologies for discovering unidentified attacks.
• Author believes that present studies are not
sufficient for discovering security ambiguities.
Computers &
Security, Elsevier
LOKESH PAWAR
12. Literature Review
CSE LOKESH PAWAR 12
Author & Year Findings Journal
Hayjneh A. et al.
[23] & 2020
• A system model for effective usage of SDN was
presented.
• Also drawn the attention on mitigating the
masquerading attack.
Computers,
MDPI
Hosny W. et al. [16]
& 2019
• Proposed an algorithm for controlling and adaptive
load balancing in SDN.
• Compared the algorithm on the basis of throughput
and Response Time.
JCNC, Hindawi
13. Literature Review
CSE 13
Author & Year Findings Journal
Gebremariam A.
[6] & 2018
• Proposed an algorithm for resource slicing where
first respondents can share their activities.
• They have used Stochastic Geometric tool for
building a model.
• Low latency emergency services can be availed
using the model and algorithm so proposed.
Wireless
Communic
ation and
Mobile
Computing,
Hindawi
Hu Y. et al. [8] &
2017
• An algorithm has been given by the author for
controlling the congestion.
• A new method was proposed to judge the node
congestion.
• Write Name of the method
Scientific
Programmi
ng,
Hindawi
LOKESH PAWAR
14. Literature Review
CSE LOKESH PAWAR 14
Author & Year Findings Journal
Neves P. et al. [10]
& 2016
• Heterogeneous Traffic induces performance
challenges.
• The Author has proposed a novel framework using
NFV and SDN.
IJDSN,
Hindawi
Ahmad I. et al.[24]
& 2015
• It is a survey article, deals in security threat and
challenges in SDN.
• SDN increases the visibility of the network hence
security can be easily managed.
• Author has shown concern on Future challenges
as well.
IEEE
Communic
ation
Surveys &
Tutorials
15. Literature Review
CSE 15
Author & Year Findings Journal
Zhong H. et al.
[15] & 2015
• Given an efficient load balancing scheme based
on variance analysis.
• Open Flow Switching Technology was utilized
to achieve the results.
• The whole work was conducted with Single
Controller.
• Obtained results were low cost, increased
reliability and scalable.
Mobile
Information
System,
Hindawi
Moshref M. et al.
[11] & 2014
• Described a new framework which
dynamically balances the resources.
• The proposed algorithm does not use apriori
approach.
• It dynamically searches for sufficient resource
with desired accuracy.
SIGCOMM’1
4, ACM.
LOKESH PAWAR
16. Research Gaps
• Efficient Management of Limited Resources [3][5][9]
• Traffic Forwarding for Definitive Service Delivery[7][12]
• Combating Network Delays[17][25]
• Latency Management[18][20]
• Seamless Mobility[1][2][29]
• Energy Consumption[5][9][28]
• Data Privacy[21][25]
CSE 16
LOKESH PAWAR
17. Research Questions
• How the allocation of the available resources to the requesting nodes using
a resource allocation strategy can be done.
• How Quality of service enhancement can be managed for application layer
devices where lower-latency and high data rate is required by the
devices.(limiting to processing, storage and energy).
• The maintenance of traffic flow and balancing the load of the network at
the time of huge traffic generation, certain strategies can be framed to
manage the traffic flow and balance the load.
• How the authentication challenges be served for reliable networks.
CSE 17
LOKESH PAWAR
18. Objectives
• To study and analyze the existing schemes for energy efficient and secure
Software Defined Networks.
• To design and implement an energy efficient and secure framework for
Software Defined Networks.
• To evaluate and validate the performance of the proposed framework.
CSE 18
LOKESH PAWAR
20. Methodology 2-Research Design
• An optimized load balancing scheme will be introduced for providing
effective services in software defined edge computing.
• The incoming data packets to the switch are sent to the distributed SDN
controllers, these controllers have an access to the state of the art lower
layers and upper layers to take the forwarding decisions.
CSE 20
LOKESH PAWAR
Figure 5: Generalized Multi-Controller Oriented Model
21. Methodology 3-Research Process
• To achieve this objective, a multi-controller Software Defined Network
(SDN) framework will be created. A policy based attack detection (Pbad)
mechanism will be ran on the top of each Software Defined Network
Controller (SDNC).
• This policy based attack detection mechanism will be implemented in the
northbound interface of Software Defined Network Controller (SDNC).
Every Autonomous System will be managed and controlled by SDN
Controller.
• With the help of policy based attack detection (Pbad) the attacks can be
traced and actions can be taken to mitigate the potential attacks.
CSE 21
LOKESH PAWAR
23. Methodology 4-Research Process
• To achieve this objective the proposed scheme and framework will be
tested for accuracy and efficiency using realistic parameters.
• The scheme comprises of SDN and edge nodes so the proposed scheme
can be simulated on:
– Mininet
– Network Simulator (NS-3)
CSE 23
LOKESH PAWAR
24. Research Paper
• Paper Submitted and under review: “Binary Tree Based Data Gathering
Routing Scheme for Wireless Sensor Networks”
• Paper Communicated: In Wireless Personal Communication: “A
bibliographic review on SDN and Edge Computing”
CSE LOKESH PAWAR 24
25. Work Plan
CSE 25
LOKESH PAWAR
A: Literature Review and Final Synopsis Submission.
B: Designing of Algorithms/Framework.
C: Drafting the real requirement of all the objectives.
D: Real-Time testing and validation of the proposed algorithms/framework.
E: Drafting the Thesis.
F: Research Paper Publication.
26. References
• [1]. Rafique W. et al. “Complementing IoT Services Through Software Defined
Networking and Edge Computing: A Comprehensive Survey”, IEEE Communications
Surveys & Tutorials, Vol. 22, No. 3, pp. 1761-1800, 2020.
• [2]. Hu P. et al. “Software-Defined Edge Computing (SDEC): Principle, Open IoT
System Architecture, Applications, and Challenges”, IEEE Internet of Things Journal,
Vol. 7, No. 7, pp. 5934-5945, 2020.
• [3]. Dai M. et al. “A Software-Defined-Networking-Enabled Approach for Edge-Cloud
Computing in the Internet of Things”, IEEE Network, IEEE, pp. 66-73, 2021.
• [4]. Xia W. et al. “A survey on Software-Defined Networking”, IEEE Communications
Surveys & Tutorials, Vol. 17, No. 1, pp. 27-51, 2015.
• [5]. Li Y. et al. “Enhancing the Internet of Things with Knowledge-Driven Software-
Defined Networking Technology: Future Perspectives”, Sensors, MDPI, pp. 1-20, 2020.
• [6].Gebremariam A. et al. “SoftPSN: Software-Defined Resource Slicing for Low-
Latency Reliable Public Safety Networks”, Wireless Communications and Mobile
Computing, Wiley | Hindawi, Vol. 2018, pp. 1-7, 2018.
CSE 26
LOKESH PAWAR
27. References
• [7]. Li H. et al. “A Software-Defined Networking Roadside Unit Cloud Resource
Management Framework for Vehicle Ad Hoc Networks”, Journal of Advanced
Transportation, Wiley | Hindawi, Vol. 2022, pp. 1-13, 2022.
• [8]. Hu Y. et al. “Software-Defined Congestion Control Algorithm for IP
Networks”, Scientific Programming, Wiley | Hindawi, Vol. 2017, pp. 1-8, 2017.
• [9]. Qureshi M. et al. “A comparative analysis of resource allocation schemes for
real-time services in high-performance computing systems”, IJDSN, SAGE, Vol. 16
(8), pp 1-35, 2020.
• [10]. Neves P. et al. “The SELFNET Approach for Autonomic Management in an
NFV/SDN Networking Paradigm”, IJDSN, Hindawi, Vol. 2016, pp. 1-17, 2016.
• [11]. Moshref M. et.al. “DREAM: Dynamic Resource Allocation for Software-
defined Measurement”, SIGCOMM’14, ACM, pp. 419-430, 2014.
• [12]. Sarbazi M. et al. “Improving resource allocation in software-defined networks
using clustering”, Cluster Computing 23, Springer, pp. 1199-1210, 2020.
CSE 27
LOKESH PAWAR
28. References
• [13]. Semong T. et al. “Intelligent Load Balancing Techniques in Software Defined
Networks: A Survey”, Electronics, MDPI, 9, 1091, 2020.
• [14]. Babbar H. et al. “Load Balancing Algorithm on the Immense Scale of Internet
of Things in SDN for Smart Cities”, Sustainability, MDPI, 13, 9587, 2021.
• [15]. Zhong H. et al. “An Efficient SDN Load Balancing Scheme Based on Variance
Analysis for Massive Mobile Users”, Mobile Information Systems, Hindawi, Vol.
2015,pp. 1-9, 2015.
• [16]. Hosny W. et al. “Generic Controller Adaptive Load Balancing (GCALB) for SDN
Networks”, Journal of Computer Networks and Communication, Hindawi, Vol.
2019,pp. 2019.
• [17]. Babbar H. et al. “Load Balancing Algorithm for Migrating Switches in
Software-Defined Vehicular Networks”, Computers, Materials & Continua, Tech
Press Science, Vol. 67 No. 1, pp. 1301-1316, 2021.
• [18]. Chen J. et al. “ALBRL: Automatic Load-Balancing Architecture Based on
Reinforcement Learning in Software-Defined Networking”, Wireless
Communications and Mobile Computing, Hindawi, Vol. 2022, pp. 1-17, 2022.
CSE 28
LOKESH PAWAR
29. References
• [19]. Chen J. et al. “ALBLP: Adaptive Load-Balancing Architecture Based on Link-
State Prediction in Software-Defined Networking”, Wireless Communications and
Mobile Computing, Wiley | Hindawi, Vol. 2022. Pp. 1-16, 2022.
• [20]. Lee S. et al. “A Comprehensive Security Assessment Framework for
Software-Defined Networks”, Computers & Security, Elsevier, pp.1-20, 2020.
• [21]. Varadharajan V. et al. “A Policy-Based Security Architecture for Software-
Defined Networks”, IEEE Transactions On Information Forensics And Security,
Vol. 14,No. 4, pp. 897-912, 2019.
• [22]. Eom T. “A Systematic Approach to Threat Modeling and Security Analysis
for Software Defined Networking”, IEEE Access, Vol. 7 2019, pp. 137432-137445,
2019.
• [23]. Hayjneh A. et.al. “Improving Internet of Things (IoT) Security with
Software-Defined Networking (SDN)”, Computers 2020, MDPI,9,8, pp. 1-14,
2020.
• [24]. Ahmad I. et al. “Security in Software Defined Networks: A Survey”, IEEE
Communication Surveys & Tutorials, Vol. 17, No. 4, pp. 2317-2346, 2015.
CSE 29
LOKESH PAWAR
30. References
• [25]. Mavromatis A. et.al. “A Software-Defined IoT Device Management
Framework for Edge and Cloud Computing”, IEEE Internet of Things Journal, Vol.
7, No. 3, pp. 1718-1735, 2020.
• [26]. Munoz R. et al. “Integration of IoT, Transport SDN, and Edge/Cloud
Computing for Dynamic Distribution of IoT Analytics and Efficient Use of
Network Resources”, Journal of Lightwave Technology, Vol. 36, No. 7, pp. 1420-
1428, 2018.
• [27]. Simoes R. et al. “Dynamic Allocation of SDN Controllers in NFV-Based
MEC for the Internet of Vehicles”, Future Internet, MDPI, pp. 1-24, 2021.
• [28]. Ali J. et al. “An Effective Approach for Controller Placement in Software-
Defined Internet-of-Things (SD-IoT)”, Sensors, MDPI, pp. 1-16, 2022.
• [29]. Nsaif M. et al. “An Adaptive Routing Framework for Efficient Power
Consumption in Software-Defined Datacenter Networks”, Electronics, MDPI, pp.
1-18, 2021.
CSE 30
LOKESH PAWAR