Software Defined Networking (SDN) was born as a solution for next-generation network design. Due to its flexible architecture, SDN promises to make network devices simpler while giving better centralized control ability over network and improving parameters such as flexibility, resilience, reliability, and security. In this paper, we briefly introduce the SDN architecture and the Floodlight Controller that is one of the popular SDN controllers. We build a web-based user interface for the Floodlight Controller by using REST API. This application is the first program in the Floodlight SDN Controller literature to view the controller upon several properties such as device connections and flow tables.
Software Defined Networking: A Concept and Related IssuesEswar Publications
SDN (Software Defined Networking) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (OpenFlow) between the control plane and the networking devices (data plane). Its implementation is fully supported by software so that we can control the behavior of networking devices through programmatic control. This programmatic control provides various new ways to find breakpoints and failures in networking devices. Today SDN has become an important part of networking, so it is important to emulate its behavior. SDN support virtualization which makes it scalable and flexible. Data traffic resides in the data plane. The main function of intelligent controller is to decide the routing
policy and manage the traffic in data plane. So effectively SDN emerges as a networking architecture that has the ability to solve all problems those were found in traditional architecture In this paper the authors discussed historical perspective of SDN, languages that support SDN, emulation tools, security issues with SDN and advantages that makes SDN suitable choice for today’s network.
This document is a term paper on Software Defined Networking (SDN). It discusses how SDN proposes separating the control plane from the data plane in network architecture, making networks programmable. The key points made are:
1) SDN introduces three planes - data, control, and management. The control plane centralizes network intelligence through a controller.
2) Benefits of SDN include simpler network management through centralized control and programming. It also enables network virtualization.
3) The document outlines the layers in the SDN architecture, including the data plane (forwarding devices), southbound interface, network operating system controller, and northbound interface for programming.
The DEUS project aims to tackle the challenges of deploying and maintaining wireless enterprise networks through three objectives: easy deployment using automatic configuration, ease of use with an intelligent wireless mesh backbone that adapts to conditions, and easy management with monitoring and configuration tools. The resulting DEUS network uses a two-tier architecture of wireless mesh routers forming a backbone connected to various client networks. New nodes are securely added to the network through a four-step process managed by a coordinator node. The intelligent mesh backbone automatically organizes the network and supports roaming and interconnectivity between different networks. Administrators can monitor the network and devices using easy management tools that consume minimal bandwidth.
This document discusses the SDN landscape and challenges. It provides an overview of Ericsson's research in packet technologies and SDN. Some key challenges discussed include navigating the hype around SDN, addressing all aspects of the ONF architecture and framework, determining the functions of the SDN controller versus NMS, whether SDN will transform carrier networks, having one controller platform for different application areas, industry traction of new open-source controller initiatives, determining the right level of split between control and data planes, programmability needs, and developing a migration strategy from legacy networks to SDN. The document advocates for experience from live network trials as SDN fits best with a DevOps model.
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
This document discusses implementing a firewall application in a Software Defined Networking (SDN) environment using Mininet and the POX controller. The authors create an SDN network topology in Mininet with hosts and switches. They develop an OpenFlow-based firewall that checks incoming packets against rules defined in the POX controller. This allows filtering of traffic and blocking of unauthorized access in a centralized, software-based way without dedicated hardware. The firewall implementation and experiment results using this SDN testbed are presented.
SDN Control Plane scalability research proposalYatindra shashi
The document proposes a hybrid SDN control plane scalability model to handle millions of flows per second with low latency for large networks. It combines hierarchical and distributed control by using local controllers to manage specific switches, a logical central controller with a global view, and distributed physical controllers running ONIX instances with a shared network information base to reduce load on the central controller. The proposed model aims to scale control plane capacity while maintaining SDN principles of separating the control and data planes. It is argued this hybrid approach could improve performance and reliability compared to simple OpenFlow architectures.
This document discusses software defined networking (SDN) and OpenFlow. It notes drawbacks of existing networks like difficulty performing experiments, slower innovation, and proprietary hardware. SDN is introduced as a new paradigm that decouples the forwarding hardware from the control logic. The switch acts only as a forwarding device controlled by a centralized software controller. OpenFlow is described as an SDN architecture using a protocol for communication between OpenFlow switches and the controller through a secure channel, with switches containing flow tables controlled by the controller.
Software Defined Networking: A Concept and Related IssuesEswar Publications
SDN (Software Defined Networking) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (OpenFlow) between the control plane and the networking devices (data plane). Its implementation is fully supported by software so that we can control the behavior of networking devices through programmatic control. This programmatic control provides various new ways to find breakpoints and failures in networking devices. Today SDN has become an important part of networking, so it is important to emulate its behavior. SDN support virtualization which makes it scalable and flexible. Data traffic resides in the data plane. The main function of intelligent controller is to decide the routing
policy and manage the traffic in data plane. So effectively SDN emerges as a networking architecture that has the ability to solve all problems those were found in traditional architecture In this paper the authors discussed historical perspective of SDN, languages that support SDN, emulation tools, security issues with SDN and advantages that makes SDN suitable choice for today’s network.
This document is a term paper on Software Defined Networking (SDN). It discusses how SDN proposes separating the control plane from the data plane in network architecture, making networks programmable. The key points made are:
1) SDN introduces three planes - data, control, and management. The control plane centralizes network intelligence through a controller.
2) Benefits of SDN include simpler network management through centralized control and programming. It also enables network virtualization.
3) The document outlines the layers in the SDN architecture, including the data plane (forwarding devices), southbound interface, network operating system controller, and northbound interface for programming.
The DEUS project aims to tackle the challenges of deploying and maintaining wireless enterprise networks through three objectives: easy deployment using automatic configuration, ease of use with an intelligent wireless mesh backbone that adapts to conditions, and easy management with monitoring and configuration tools. The resulting DEUS network uses a two-tier architecture of wireless mesh routers forming a backbone connected to various client networks. New nodes are securely added to the network through a four-step process managed by a coordinator node. The intelligent mesh backbone automatically organizes the network and supports roaming and interconnectivity between different networks. Administrators can monitor the network and devices using easy management tools that consume minimal bandwidth.
This document discusses the SDN landscape and challenges. It provides an overview of Ericsson's research in packet technologies and SDN. Some key challenges discussed include navigating the hype around SDN, addressing all aspects of the ONF architecture and framework, determining the functions of the SDN controller versus NMS, whether SDN will transform carrier networks, having one controller platform for different application areas, industry traction of new open-source controller initiatives, determining the right level of split between control and data planes, programmability needs, and developing a migration strategy from legacy networks to SDN. The document advocates for experience from live network trials as SDN fits best with a DevOps model.
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
This document discusses implementing a firewall application in a Software Defined Networking (SDN) environment using Mininet and the POX controller. The authors create an SDN network topology in Mininet with hosts and switches. They develop an OpenFlow-based firewall that checks incoming packets against rules defined in the POX controller. This allows filtering of traffic and blocking of unauthorized access in a centralized, software-based way without dedicated hardware. The firewall implementation and experiment results using this SDN testbed are presented.
SDN Control Plane scalability research proposalYatindra shashi
The document proposes a hybrid SDN control plane scalability model to handle millions of flows per second with low latency for large networks. It combines hierarchical and distributed control by using local controllers to manage specific switches, a logical central controller with a global view, and distributed physical controllers running ONIX instances with a shared network information base to reduce load on the central controller. The proposed model aims to scale control plane capacity while maintaining SDN principles of separating the control and data planes. It is argued this hybrid approach could improve performance and reliability compared to simple OpenFlow architectures.
This document discusses software defined networking (SDN) and OpenFlow. It notes drawbacks of existing networks like difficulty performing experiments, slower innovation, and proprietary hardware. SDN is introduced as a new paradigm that decouples the forwarding hardware from the control logic. The switch acts only as a forwarding device controlled by a centralized software controller. OpenFlow is described as an SDN architecture using a protocol for communication between OpenFlow switches and the controller through a secure channel, with switches containing flow tables controlled by the controller.
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...Ken Ott
Presented at ICN 2014 : The Thirteenth International Conference on Networks, 2014-6-20. Authors: Gyorgy Kalman, Dalimir Orfanus, Rahil Hussain; ABB Corporate Research.
Abstract—Industrial Ethernet is the preferred network technology in industrial green field deployments. Active devices interconnecting the nodes are switches. In an industrial deployment, nodes are typically located on the same Layer 2 network. Routers or firewalls are almost exclusively used at the network edges. The current trend on engineering of industrial devices is to include an embedded Ethernet switch, instead of using discrete units. This paper is giving an overview on switch implementation possibilities, with respect to performance, features, logical architecture and flexibility.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The document discusses the need for middleware in wireless sensor networks. It describes some of the challenges in designing middleware for sensor networks, including limited resources, scalability, and heterogeneity. It then summarizes several approaches to sensor network middleware, including virtual machine approaches, modular programming approaches, database approaches, and message-oriented middleware.
The document provides an overview of Panduit's Unified Physical Infrastructure (UPI) principles and reference architecture for industrial automation physical infrastructure design. It describes how Panduit maps the logical network design to the physical implementation using standards like the Purdue Enterprise Reference Architecture and Cisco/Rockwell Automation network guides. Panduit then adds detailed physical infrastructure design and component selection based on environmental considerations to provide a complete solution that ensures performance, security, optimization and expansion of the physical network layer.
Distributed system is an application that executes a collection of protocols to coordinate the actions of multiple processes on a communication network, such that all components cooperate together to perform a single or small set of related tasks.
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
This document provides an overview of wireless local area networks (WLANs), including their architecture and components. It defines key terms like basic service set (BSS), extended service set (ESS), stations, and access points. It describes the two types of BSS architectures - ad-hoc and infrastructure networks. Infrastructure networks use access points to connect stations and form a star topology, while ad-hoc networks connect stations directly without an access point in a peer-to-peer topology. An ESS connects multiple BSSs through a distribution system to increase network coverage.
The document discusses the TCP/IP transport layer. It describes UDP and TCP protocols. UDP is a connectionless protocol that provides best-effort delivery, while TCP is connection-oriented and provides reliable, sequenced transmission of data with acknowledgements and flow control. The document also outlines how transport layer protocols map to network and application layers to enable communication between applications.
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
This document summarizes a study that implemented a dynamic internetworking in a real-world IT domain. The study created a network topology for an organization using Cisco Packet Tracer with routers, switches, computers and a DHCP server. It configured routing protocols, access control lists, authentication, VLANs and inter-VLAN routing. DHCP was configured to automatically assign IP addresses. Routing protocols like RIP, OSPF and EIGRP were configured between routers. Access control lists were used to filter traffic and provide security. Authentication ensured security and remote access was provided using telnet. VLANs divided the network into broadcast domains and inter-VLAN routing allowed communication between VLANs.
Middleware is software that lies between an operating system and applications. It hides the complexity of operating systems and networks from application developers. Middleware systems provide services like remote communication and distributed computing. They allow applications to communicate across networks in a heterogeneous environment. Middleware reduces the burden on developers to build distributed applications directly on top of network protocols and operating systems.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This presentation of mine gives basic idea about SDN, use of SDN in different fields, cause of evolution of a new network architecture, openFlow standard and Architectural components.
UNIT I INTRODUCTION 7
Examples of Distributed Systems–Trends in Distributed Systems – Focus on resource sharing – Challenges. Case study: World Wide Web.
The document provides an implementation plan for a new network at WWTC's New York office. It details tasks for installing LAN equipment, security technologies like firewalls and intrusion prevention, Active Directory, configurations for routers, switches and VLANs, and a project timeline. The network will use Cisco equipment and include 87 workstations, file and application servers, firewalls, switches, routers, and connections to two ISPs for redundancy. Active Directory, group policies, and security measures like antivirus and access control will be configured.
Structured cabling is a standardized telecommunications infrastructure that consists of subsystems including demarcation points, equipment rooms, vertical cabling, horizontal wiring, and work area components. It integrates voice, data, video, and management systems throughout a building in a device-independent way. Network planning involves business planning, long-term planning, short-term planning, sourcing assets, and operations/maintenance to design a network that meets subscriber and operator needs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Eswar Publications
This document summarizes and reviews various checkpointing and rollback recovery algorithms that have been proposed to provide fault tolerance in mobile ad hoc networks (MANETs). It begins with background information on MANETs and checkpointing. Checkpointing techniques take snapshots of process states and store them to allow recovery from failures without restarting from the beginning. The document then describes different types of checkpointing, including uncoordinated, coordinated, communication-induced, and hybrid approaches. Several specific algorithms for MANETs checkpointing are then analyzed, including flooding-based, concurrent checkpointing, cluster-based, and mobility-aware approaches. The document concludes by stating that checkpointing presents challenges for MANETs due to their dynamic topology and limited
As computer network grow larger and more complex, there is a need for a new simple kind of approach to configure them. SDN has emerged as promising network architecture. It takes the control plane away from the individual nodes and centralize the network control by utilizing a flow based traffic management. Mininet is a cost effective and an efficient way to emulate and study SDN.This paper presents a study of programmable networks with basics of Mininet.
Our journal is official publication of the Utilitas mathematical journal original research articles and aspect of both the pure and applied mathematics. UMJ coverage extends to Operations Research, Mathematical Economics, Mathematics Biology and Computer Science. our Journal has became fully open access Journal.
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...Ken Ott
Presented at ICN 2014 : The Thirteenth International Conference on Networks, 2014-6-20. Authors: Gyorgy Kalman, Dalimir Orfanus, Rahil Hussain; ABB Corporate Research.
Abstract—Industrial Ethernet is the preferred network technology in industrial green field deployments. Active devices interconnecting the nodes are switches. In an industrial deployment, nodes are typically located on the same Layer 2 network. Routers or firewalls are almost exclusively used at the network edges. The current trend on engineering of industrial devices is to include an embedded Ethernet switch, instead of using discrete units. This paper is giving an overview on switch implementation possibilities, with respect to performance, features, logical architecture and flexibility.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The document discusses the need for middleware in wireless sensor networks. It describes some of the challenges in designing middleware for sensor networks, including limited resources, scalability, and heterogeneity. It then summarizes several approaches to sensor network middleware, including virtual machine approaches, modular programming approaches, database approaches, and message-oriented middleware.
The document provides an overview of Panduit's Unified Physical Infrastructure (UPI) principles and reference architecture for industrial automation physical infrastructure design. It describes how Panduit maps the logical network design to the physical implementation using standards like the Purdue Enterprise Reference Architecture and Cisco/Rockwell Automation network guides. Panduit then adds detailed physical infrastructure design and component selection based on environmental considerations to provide a complete solution that ensures performance, security, optimization and expansion of the physical network layer.
Distributed system is an application that executes a collection of protocols to coordinate the actions of multiple processes on a communication network, such that all components cooperate together to perform a single or small set of related tasks.
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
This document provides an overview of wireless local area networks (WLANs), including their architecture and components. It defines key terms like basic service set (BSS), extended service set (ESS), stations, and access points. It describes the two types of BSS architectures - ad-hoc and infrastructure networks. Infrastructure networks use access points to connect stations and form a star topology, while ad-hoc networks connect stations directly without an access point in a peer-to-peer topology. An ESS connects multiple BSSs through a distribution system to increase network coverage.
The document discusses the TCP/IP transport layer. It describes UDP and TCP protocols. UDP is a connectionless protocol that provides best-effort delivery, while TCP is connection-oriented and provides reliable, sequenced transmission of data with acknowledgements and flow control. The document also outlines how transport layer protocols map to network and application layers to enable communication between applications.
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
This document summarizes a study that implemented a dynamic internetworking in a real-world IT domain. The study created a network topology for an organization using Cisco Packet Tracer with routers, switches, computers and a DHCP server. It configured routing protocols, access control lists, authentication, VLANs and inter-VLAN routing. DHCP was configured to automatically assign IP addresses. Routing protocols like RIP, OSPF and EIGRP were configured between routers. Access control lists were used to filter traffic and provide security. Authentication ensured security and remote access was provided using telnet. VLANs divided the network into broadcast domains and inter-VLAN routing allowed communication between VLANs.
Middleware is software that lies between an operating system and applications. It hides the complexity of operating systems and networks from application developers. Middleware systems provide services like remote communication and distributed computing. They allow applications to communicate across networks in a heterogeneous environment. Middleware reduces the burden on developers to build distributed applications directly on top of network protocols and operating systems.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This presentation of mine gives basic idea about SDN, use of SDN in different fields, cause of evolution of a new network architecture, openFlow standard and Architectural components.
UNIT I INTRODUCTION 7
Examples of Distributed Systems–Trends in Distributed Systems – Focus on resource sharing – Challenges. Case study: World Wide Web.
The document provides an implementation plan for a new network at WWTC's New York office. It details tasks for installing LAN equipment, security technologies like firewalls and intrusion prevention, Active Directory, configurations for routers, switches and VLANs, and a project timeline. The network will use Cisco equipment and include 87 workstations, file and application servers, firewalls, switches, routers, and connections to two ISPs for redundancy. Active Directory, group policies, and security measures like antivirus and access control will be configured.
Structured cabling is a standardized telecommunications infrastructure that consists of subsystems including demarcation points, equipment rooms, vertical cabling, horizontal wiring, and work area components. It integrates voice, data, video, and management systems throughout a building in a device-independent way. Network planning involves business planning, long-term planning, short-term planning, sourcing assets, and operations/maintenance to design a network that meets subscriber and operator needs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Eswar Publications
This document summarizes and reviews various checkpointing and rollback recovery algorithms that have been proposed to provide fault tolerance in mobile ad hoc networks (MANETs). It begins with background information on MANETs and checkpointing. Checkpointing techniques take snapshots of process states and store them to allow recovery from failures without restarting from the beginning. The document then describes different types of checkpointing, including uncoordinated, coordinated, communication-induced, and hybrid approaches. Several specific algorithms for MANETs checkpointing are then analyzed, including flooding-based, concurrent checkpointing, cluster-based, and mobility-aware approaches. The document concludes by stating that checkpointing presents challenges for MANETs due to their dynamic topology and limited
As computer network grow larger and more complex, there is a need for a new simple kind of approach to configure them. SDN has emerged as promising network architecture. It takes the control plane away from the individual nodes and centralize the network control by utilizing a flow based traffic management. Mininet is a cost effective and an efficient way to emulate and study SDN.This paper presents a study of programmable networks with basics of Mininet.
Our journal is official publication of the Utilitas mathematical journal original research articles and aspect of both the pure and applied mathematics. UMJ coverage extends to Operations Research, Mathematical Economics, Mathematics Biology and Computer Science. our Journal has became fully open access Journal.
our journal publishes original research and review articles on all aspects of both pure and applied mathematics. It's publish Algebra,Analysis,Geometry,Topology,Number Theory,Differential Equations etc. UMJ coverage extends to Operations Research, Mathematical Economics, Mathematics Biology and Computer Science.
Utilitas Mathematica Journal has a original research in all areas of pure and applied mathematics.UMJ coverage extends to Operations Research, Mathematical Economics, Mathematics Biology and Computer Science.It enjoys good reputation and popularity at international level in terms of research papers and distribution worldwide.
Utilitas Mathematica Journal the journal publishes original research in all areas of pure and applied mathematics, statistics Algebra,Topology,Differential Equations,Mathematical Physics Utilitas Mathematica international level in terms of research provides worldwide.
https://utilitasmathematica.com/index.php/Index
This document discusses a proposed spiking neural network (SNN) approach for dynamic resource allocation in software defined networking (SDN). The SNN would allocate bandwidth resources among network slices based on demand. It analyzes past traffic data using an online training method to continuously learn and adapt allocations in real-time. The SNN architecture has input, hidden and output layers to estimate traffic. Simulation results showed a 98.8% benefit to network throughput from this approach. Machine learning and SNNs are well-suited for dynamic resource optimization in 5G networks due to their ability to analyze large datasets and make autonomous allocation decisions.
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
Abstract: SDN creates a dynamic and flexible network architecture that can change as the business
requirements change. The growth of the SDN market and cloud computing are very much connected. As the
applications change and the network is abstracted, virtualization become a necessary step and SDN serves as
the fundamental building blocks for the network. Traditional networking devices are composed of an embedded
control plane that manages switching, routing and traffic engineering activities while the data plane forwards
packet/frames based on traffic. In SDN architecture, control plane functions are removed from individual
networking devices and embedded in a centralizedserver. The SDN controller makes all traffic related decisions
in the network without nodes active participation, as opposed to today’s networks.
Keyword-API, cloud computing, IT, middleware, OpenFlow, SDN
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
Implementation model architecture software defined network using raspberry Pi...TELKOMNIKA JOURNAL
Software defined network (SDN) made with basic concepts that are different from traditional networks in controlling the network, the separation between the control layer and forwarding layer on different devices allows the administrator to adjust the control plan for all devices centralized in one action, while in traditional network, the control and forwarding layers are located in the infrastructure making network administrator must manage devices one by one. Research using single board computers on network technology provides an opportunity to implement SDN architecture. Raspberry Pi has sufficient ability. QoS results meet the ITU-T G.1010 reference which indicates that Raspberry Pi can be used on designed networks.
SDN: A New Approach to Networking TechnologyIRJET Journal
This document summarizes SDN (Software Defined Networking) and its relationship to network virtualization and NFV (Network Function Virtualization). It discusses how SDN separates the control plane from the data plane to make networks programmable. It also describes how network virtualization allows multiple virtual networks to run simultaneously on top of a physical network. NFV aims to virtualize network functions like firewalls and load balancers that were traditionally hardware-based. The document argues that SDN, network virtualization, and NFV work together to provide flexible, easily reconfigurable networks and reduce costs. When combined, they allow networks to be centrally programmed and abstracted from physical hardware.
This document provides an overview of performance evaluation for software defined networking (SDN) based on adaptive resource management. It begins with definitions of SDN and discusses its architecture, advantages, protocols, simulators, and controllers. It then outlines challenges in SDN including controller scalability, network updates, and traffic management. Simulation tools like Mininet and Floodlight and Open vSwitch controllers are explored. Different path finding algorithms and approaches to resource management optimization are also summarized. The document appears to be a student paper or project on evaluating SDN performance through adaptive resource allocation techniques.
Controller Placement Problem resiliency evaluation in SDN-based architecturesIJCNCJournal
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
- SDN : Software defined network : Introduction & Basics
- Why we need SDN & Features of SDN
- SDN Role in Data and Forwarding Plane , Control Plane & Management Plane
- SDN Framework & Architecture
- Openflow Architecture
- Need of SDN
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
In software-defined networking (SDN), network traffic is managed by software controllers or application programming interfaces (APIs) rather than hardware components. It differs from traditional networks, which use
switches and routers to control traffic. Using SDN, you can create and control virtual networks or traditional hardware networks. Furthermore, OpenFlow allows network administrators to control exact network behavior
through centralized control of packet forwarding. For these reasons, SDN has advantages over certain security issues, unlike traditional networks.
However, most of the existing vulnerabilities and security threats in the traditional network also impact the SDN network. This document presents the attacks targeting the SDN network and the solutions that protect against
these attacks. In addition, we introduce a variety of SDN security controls, such as intrusion detection systems (IDS)/intrusion prevention system (IPS), and firewalls. Towards the end, we outline a conclusion and perspectives.
This document discusses software defined networking (SDN) and its applications to optical transport networks. It begins with an introduction to the rapid growth of network traffic and need for more programmatic control of networks. It then provides an overview of SDN architecture with separated control and data planes. OpenFlow is discussed as an SDN protocol that can enable programmatic control of optical elements. The document outlines some key characteristics and applications of optical networks, including setting up connection paths and transport virtual private networks (VPNs). It also discusses optical network architectures like ROADMs and different control paradigms like centralized versus distributed control. In summary, the document explores how SDN principles can be applied to optical transport networks to provide more flexible, automated
The document summarizes the history and principles of software-defined networking (SDN). It discusses how SDN evolved from separating the control plane and data plane in telephone networks. The Internet Engineering Task Force later proposed standards to apply this concept to data networks, including the OpenFlow protocol. SDN aims to centralize network intelligence in a controller to make the network more programmable and flexible. It separates the network into three layers - the application, control, and infrastructure layers connected through APIs. The centralized controller directs traffic flow without touching individual switches, allowing administrators to shape traffic from a software-based control plane.
Similar to Web-Based User Interface for the Floodlight SDN Controller (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
20240609 QFM020 Irresponsible AI Reading List May 2024
Web-Based User Interface for the Floodlight SDN Controller
1. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3175
Web-Based User Interface for the Floodlight SDN
Controller
Hakan Akcay
Department of Computer Engineering, Istanbul University, Istanbul
Email: hknakcay@gmail.com
Derya Yiltas-Kaplan
Department of Computer Engineering, Istanbul University, Istanbul
Email : deryayiltas@gmail.com
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
Software Defined Networking (SDN) was born as a solution for next-generation network design. Due to its flexible
architecture, SDN promises to make network devices simpler while giving better centralized control ability over
network and improving parameters such as flexibility, resilience, reliability, and security. In this paper, we briefly
introduce the SDN architecture and the Floodlight Controller that is one of the popular SDN controllers. We build
a web-based user interface for the Floodlight Controller by using REST API. This application is the first program
in the Floodlight SDN Controller literature to view the controller upon several properties such as device
connections and flow tables.
Keywords – Floodlight Controller, OpenFlow, Programmable Networks, SDN Web, Software-Defined Network.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 14, 2017 Date of Acceptance: March 22, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
INTRODUCTION
The increase in the number of devices connected to the
Internet, makes it very difficult to control the network.
Problems such as configuration errors, lack of capacity of
routing tables, security leaks are more common than ever
before. Controlling the network by an administrator has
become highly complex because of the inflexible behavior
of the network components from switches and routers to
firewalls, network address translators, load balancers, and
intrusion detection systems.
In this context, Software Defined Networking (SDN) is
a new way to design and manage networks [1]. SDN is a
network programming framework that allows developers
to program the network services with making it more
intelligence and enhancing the performance of the network
[1]. SDN is an agile, simple to implement and not costly
architecture that decouples the data level from the control
level [2].
SDN is being contributed by many prominent vendors
like Cisco, Google, HP, Big Switch Networks, etc. [1].
The rest of this paper organized as follows: Section 2
introduces traditional networks. Section 3 describes SDN
in more detail. Section 4 is about Floodlight Controller
and finally Section 5 presents the conclusions.
1. TRADITIONAL NETWORKS
In the traditional networks, all network elements are
defined by OSI (Open Systems Interconnection) model.
This model has 7 layers that can have multiple protocols
individually [3]. Each layer operates depending on its own
lower layer and serves the upper layer. There are simple
network devices on the lower layers of the OSI model
while more complicated devices work on the upper layers.
Therefore, operating the devices on the upper layers is
more complicated than that on lower layers [3]. Switches
are layer 2 elements and also the simplest devices in
present networks. Routers are more complex, because they
manage network traffic based on the forwarding decisions
with using the routing tables which are constructed
manually.
According to the traditional network approach, most of
the network functionalities are implemented in a dedicated
manner such as configuration of routers and switches,
delivery of network applications using a hardware such as
ASIC (Application Specific Integrated Circuit) [4]. Data
flow is managed by routers and switches by using certain
protocols.
We represent a traditional network architecture in Fig.1
by including the data, control, and management planes
together.
Fig. 1. Traditional network management
2. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3176
The limitations of the traditional networks are
becoming more important. In addition, they are not agile,
slow to implement and takes too long to market [2].
In the traditional network approach, network
administrators typically configure individual network
devices by using the vendor based configuration
interfaces. Network operators are responsible for
configuring policies and implement many complex
protocols to a wide range of network applications [5].
They have to apply these high-level policies into low-level
configuration commands manually to configure network
elements. They have very limited tools to perform these
complex tasks [5].
However, internet applications and services become
more complex and difficult to control day by day [5]. The
idea of “Programmable Networks” emerged to facilitate
network evolution. In particular, SDN is a new network
design that promises to simplify network management and
enable network innovation and evolution [5].
2. SOFTWARE-DEFINED NETWORKING
SDN is changing the way of design and management of
the networks. SDN is a result of long work to make
computer networks more programmable and flexible [6].
SDN has two important characteristics. First, SDN
separates the control plane and the data plane of the
network elements. Second, SDN centralizes the control
plane with a single software called SDN Controller that
manages the entire network and its components, such as
OpenFlow switches, routers, and other middleboxes, via
Application Programming Interfaces (API) [6]. An SDN
Controller uses a protocol called OpenFlow to control
switches and routers from the controller software. We
represent a simplified view of the SDN architecture in Fig.
2.
Fig. 2. Simplified view of the SDN architecture.
With the separation of control and data planes, network
components return to the simple forwarding devices and
the control of these elements is implemented in the
logically centralized controller software [7]. The SDN
Controller directly controls the forwarding elements via
well-defined APIs. The mostly used one of these APIs is
OpenFlow. An OpenFlow switch has one or more flow
table inside and each table consists of some flow rules.
Each rule of table matches a subset of the traffic actions
such as dropping, forwarding, and modifying. The
controller software has the ability of inserting, modifying,
and deleting the rules of a flow table of switch. Therefore,
an OpenFlow switch can be instructed by a controller and
behaves like a router, firewall or performs other roles like
load balancer [7].
2.1. SDN CONTROLLERS
SDN works on five fundamental traits: plane separation, a
simplified network device, centralized control, network
automation, and openness [8].
SDN Controllers fulfill the task of centralized control.
The Controller is the main component of the network
operation system (NOS) and the SDN networks.
Controllers take the responsibility of establishing every
flow in the network by modifying flow entries on the
network devices [9]. Controllers must perform
management of the network state and also the distribution
of this state. A controller may involve a database to store
information about network elements and the related
softwares. A Controller software must provide a modern,
commonly RESTful (Representational state transfer) API
to an external application [10]. The communication
between a controller and all network devices must be
provided via a secure TCP control session. Additionally, a
3. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3177
device and topology discovery mechanism and a service
management system must be provided.
3. FLOODLIGHT CONTROLLER
Floodlight is Java-based, open source and one of the most
popular SDN controllers supporting physical and virtual
OpenFlow compatible switches. It has a number of
packages denoted by org.openlow [8]. Floodlight is based
on Bacon controller from Standford University [10].
The Floodlight architecture is modular with including
device management module, topology module, learning
switch, load balancer, Web Graphical User Interface (Web
GUI) for web access, counter module for statistics.
Floodlight controller presents a RESTful API allowing
some applications to learn and get the state of the
controller and network [10]. It uses LLDP protocol to
discover network topology. Floodlight Provider module
called as core module, handles I/O from network devices
and turns incoming OpenFlow messages into Floodlight
events.
Floodlight controller uses event listeners for receive
notifications. Most important listeners are: SwitchListener,
DeviceListener, MessageListener.
SwitchListener is used to receive notifications
whenever a switch is connected or disconnected to the
internet or has a change in its port status. DeviceListener is
notified whenever a device (generally an end-user node)
has been added, removed, moved or has changed its IP
address or VLAN address [8].
MessageListener gets notifications whenever a packet
has been received by the controller. When a packet is
received, the application processes the packet and takes
the appropriate action [8].
Floodlight controller provides both reactive and
proactive applications: Java APIs for reactive and
RESTful APIs for proactive application style. Proactive
Floodlight applications can use the RESTful APIs to get
information about the network state. Floodlight RESTful
API uses the Restlet framework and includes a small web
server inside that allows external applications to
communicate with the SDN controller. Floodlight
Controller Structure is shown in Fig.3.
Fig. 3. Floodlight controller structure [11]
3.1. FLOODLIGHT REST API
In the early days of commercial Internet, setting
configuration parameters of devices has been possible only
using methods such as CLI, TL1, NETCONF, SNMP, TR-
069 [10]. These mechanisms are available now and have
been rarely used with SDN. But they are slow and difficult
to maintain [10]. Furthermore, they are not suitable for
today’s data centers because that the data centers are
required dynamic, frequent, and automated management
tasks.
In the last few years, newer methods have been
developed to make remote configuration changes on the
network devices. The most popular and common one is the
REST API. REST has been developed to make API calls
across networks and uses Hypertext Transfer Protocol
(HTTP) which is commonly used to pass the web traffic
[10]. They are simple and extensible and use a standard
TCP port and thus do not require any special configuration
to allow API calls to pass through firewalls [10]. SDN
Controller northbound API is shown in Fig. 4.
Fig. 4. SDN controller northbound API
The web-based REST mechanism is based on some
methods such as HTTP GET, PUT, POST, and DELETE.
It is very easy to make these REST calls secure by using
HTTPS (Secure HTTP) protocol instead of HTTP. The
Floodlight Web GUI is built on the REST API.
4. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3178
3.2. FLOODLIGHT WEB GUI
In this section, we mention our Floodlight Web GUI in
detail. This GUI provides a way for users to view the
controller’s state information, to connect switches via
inter-switch links and the hosts to the network, to monitor
the flow tables of the switches and the network topology
[11]. Most of the statistics can be queried and displayed in
an easy-to-read and tabular fashion by using this web GUI.
Additionally, several modules of the Floodlight Controller
can be exposed to the end users via this web GUI. For
example, the Static Flow Pusher module has this GUI to
insert the flows easily [11].
We develop the Floodlight Web GUI’s home page as
the controller’s dashboard as in Fig. 5. Here, network
administrators can monitor the status, uptime, selected role
of the controller, connected switches count, connected
hosts count, and the links between the switches.
Also, the details about the controller’s memory
consumption, the storage tables, and all loaded modules
can be monitored. All of these parts of the GUI uses the
REST API calls of the Floodlight Controller.
Fig. 5. Home page of the controller
One of the most important module of the GUI is the
switches module that gives some detailed information of
the connected switches such as flow count, packet count,
buffer size, flow table count, vendor, hardware, and
software version (see Fig. 6). Additionally, the
administrators can change the role of a switch to Master,
Slave or Equal by using this module.
Fig. 6. Flow summary table of a switch
It is possible to add static flow entries to the flow table
of a switch (see Fig. 7) and to monitor the port table of this
switch.
Fig.7. Flow table of a switch
Web GUI presents a list of the hosts connected to the
network with the information of the MAC address of a
host, IPV4 address, IPV6 address, MAC address of the
connected switch, connected port of the switch, and last
seen time.
All links between the switches can be monitored via
GUI. Properties such as the direction of links, source
switch and its port, destination switch and its port, and
type of the link (internal, external) are the information
provided.
Floodlight controller comes with a firewall module. A
network administrator can change the status of the
firewall, can enable/disable the firewall and change subnet
mask of the firewall by using this module as in Fig. 8.
Also, new firewall rules can be added or deleted.
Fig. 8. Firewall module of GUI
While adding a firewall rule, the parameters that must
be provided are switch id, source port, source mac address,
destination mac address, source IP address, destination IP
address, protocol type (TCP, UDP or ICMP), priority, and
action (ALLOW, DENY) [11].
Floodlight contains an application that enforces Access
Control Lists (ACL) in a reactive way. It is a firewall
application that monitors Packet-in messages and then
pushes appropriate flow entries [11]. In a proactive way,
without being requested by the switch, the controller
enforces ACL rules to switches too. Thus, the controller
prevents additional delays [11].
5. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3179
Fig. 9 represents the record insertion to the ACL and
Table 1 gives the properties of an ACL rule.
Fig.9. Adding a record to the ACL
Table 1. Properties of an ACL rule
Key Value Notes
nw-
proto
string "TCP" or "UDP" or
"ICMP" (ignoring case)
src-ip IPv4
address[/mask]
Either src-ip or dst-ip
must be specified.
dst-ip IPv4
address[/mask]
Either src-ip or dst-ip
must be specified.
tp-dst number Valid when nw-proto ==
"TCP" or "UDP".
action string "DENY" or "ALLOW"
(ignoring case), set to
"DENY" if not specified.
Topology discovering module of the Floodlight uses
LLDP protocol. And GUI calls the related RESTful API
method of this module. Topology view of network is
based on DIRECT and TUNNEL links discovered based
on LLDP packets [11]. Our sample SDN topology built in
the GUI is represented in Fig. 10.
Fig.10. SDN topology view in the GUI
4. CONCLUSION
The traditional network architecture cannot fulfill today’s
network requirements efficiently and the popularity of
SDN is increasing day by day.
SDN is the new network paradigm and can be easily
implemented to the classical networks. The Floodlight
controller and GUI provide many useful tools and a
programmable network framework. SDN is just a new tool
for developing new applications to solve network-
management problems more easily. To support more
widely ranged network services, SDN applications would
require much more complex methods to analyze and
control the network traffic, and programmable hardware.
Before developing an SDN application, the developer
must decide between two general styles of SDN
applications: reactive or proactive. In case of the reactive
SDN applications, the output of the communication
between the switch and the controller is usually a new
flow entry in the switch’s flow table. Reactive applications
can program multiple switches parallelly. On the other
hand, the proactive SDN applications require less
communication from switch to controller. The proactive
SDN applications program switches connected to the
network with the flow entries that are appropriate to
control and manage the incoming traffic before it arrives at
the switch.
The reactive type is more useful when the connectivity
to the controller is lost but less additional latency is
provided with the proactive programming.
REFERENCES
[1] A. Shahid, J. Fiaidhi and S. Mohammed,
Implementing Innovative Routing Using Software
6. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3180
Defined Networking (SDN), International Journal
of Multimedia and Ubiquitous Engineering, 11(2),
2016, 159-172.
[2] G. Wiley, Software networks, virtualization, sdn, 5g
and security (Great Britain: ISTE Ltd and John
Wiley & Sons, 2015).
[3] K. Ahokas, Software-defined networking, Aalto
University CSE-E4430 Methods and Tools for
Network Systems, Finland, Autumn 2014.
[4] Pooja, M. Sood, SDN and Mininet: Some Basic
Concepts, Int. J. Advanced Networking and
Applications, 07(02), 2015, 2690-2693.
[5] B. A. A. Nunes, M. Mendonca, X. N. Nguyen, K.
Obraczka and T. Turletti, A Survey of Software-
Defined Networking: Past, Present, and Future of
Programmable Networks, IEEE Communications
Surveys & Tutorials, 16(3), 1617-1634.
[6] N. Feamster, J. Rexford, and E. Zegura, The road to
SDN: an intellectual history of programmable
networks, SIGCOMM Comput. Commun, 44(2),
2014, 87-98.
[7] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E.
Rothenberg, S. Azodolmolky and S. Uhlig,
Software-Defined Networking: A Comprehensive
Survey, in Proceedings of the IEEE, 103(1), 2015,
14-76.
[8] P. Göransson, C. Black, Software defined networks
(USA: Morgan Kaufmann, 2014).
[9] Y. Jarraya, T. Madi and M. Debbabi, A Survey and a
Layered Taxonomy of Software-Defined
Networking, IEEE Communications Surveys &
Tutorials, 16(4), 2014, 1955-1980.
[10] T. D. Nadeau, K. Gray, SDN: software defined
networks (USA: O’Reilly, 2013).
[11] R. Izard (administrator), H. Akcay (GUI developer),
(2017). Floodlight WEB GUI. [online]
Floodlight.atlassian.net. Available at:
https://floodlight.atlassian.net/wiki/spaces/floodlight
controller/pages/40403023/Web+GUI [Accessed 17
Mar. 2017].