Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee
|
|
|
- Tobias Martin
- 10 years ago
- Views:
Transcription
1 International Journal of Science and Engineering Vol.4 No.2(2014): Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of Electrical and Computer Engineering National Chiao Tung University, Taiwan Abstract To provide the essential network protection, data flows are forced to pass through the desired sequences of security devices (middleboxes) in a datacenter, which is called security traversal. In this paper, we identify the problem of quality of service (QoS) guarantee in security traversal and propose a scheme to dynamically change the security traversal path. The dynamic security traversal scheme is achieved by the proposed optimal security traversal with middlebox addition (OSTMA) mechanism which poses and solves the considered QoS-guaranteed problem as a constrained shortest path problem (CSP). Besides, we design a system framework with a centralized security traversal controller adopting the proposed OSTMA mechanism, which leverage the capability of OpenFlow networks to dynamically monitor the network condition information and reconfigure the security traversal path. Finally, our experiment shows results show that the proposed dynamic security traversal scheme can achieve QoS requirements while still reserving the scalability and flexibility of distributed security middleboxes. Keywords-Cloud datacenter, Security traversal, OpenFlow networks I. Introduction Cloud datacenter services have been increasing explosively in recent years. To provide the essential network protection in cloud datacenters, traditional security devices, such as firewall, intrusion detection system (IDS), intrusion prevention system (IPS), will be placed at a few choke points (e.g., core routers), and rely on routing to the desired security deployment to enforce security inspection [1]. For the purpose of extending the flexibility of security management, rule-based forwarding is proposed for userdefined security requirements [2]. That is, if a data flow comes from the untrusted source, then it must be traversed to certain security devices for security inspection according to user requirements. A user can further select the path or specify which security device that his/her packets should traverse. The datacenter provider thus forces the data flow through the desired sequences of security devices. Such process is called security traversal. For example, a receiver R defines that the data flow comes from sender S needs to be checked by the firewall and the IDS sequentially. After the data flow sent by sender S, it must go through the firewall and then the IDS. If the data flow is passed, then it is delivered to receiver R. Security traversal issue in datacenter has been investigated in the literature. The concept of software middlebox, which is implemented by a distributed virtual machine (VM) dedicated to one or a set of security functions, is proposed to improve the scalability of security service in [3]. These software middleboxes can provide more dynamic flexibility for security traversal. However, since the security traversal path which is determined by these distributed security middleboxes is only based on nearby middleboxes and network condition information, the delay of such path cannot ensure the quality of service (QoS) guarantee all the time. Specifically, when unexpected burst requests of security inspection or security middlebox collapse occurs, the security traversal path cannot be dynamically changed to another path by these distributed security middleboxes, causing severe security service delay. To overcome the problem of QoS guarantee in security traversal, we propose a dynamic security traversal scheme in software defined networking (SDN) environment. SDN is a networking paradigm where a logically centralized controller manages elements and behaviors of the entire network. SDN introduces new possibilities for experimental network to be easily implemented and tested via the the OpenFlow protocols [4] which is an open standard of SDN. The OpenFlow network consists of a centralized controller and OpenFlow switches for decision making and packet forwarding, respectively. The OpenFlow controller can monitor the network topology and the network traffic information by manipulating OpenFlow switches. Although SDN has been shown to provide the advantage of dynamic network traffic monitoring and flexible data flow rerouting, SDN has received no or little attention to providing QoS guarantee for security traversal. Thus, in this paper, we develop an optimal security traversal with middlebox addition (OSTMA) mechanism and a system framework with a centralized security traversal controller adopting the proposed OSTMA mechanism, which leverage the capability of OpenFlow networks to dynamically monitor the network condition information and reconfigure the security traversal path. The main contributions and novelties of this work are three-fold: We model the considered security traversal scenario as a constrained shortest path problem (CSP) and propose OSTMA mechanism to ensure QoS guarantee. Since the data flow is inspected by security middleboxes, the delay performance is dominated by the service loading of in-path middleboxes. Traditional Corresponding author:[email protected] DOI: /IJSE.2014.(4-2).62
2 252 International Journal of Science and Engineering network delay measurement such as hop-count and timestamp are unsuitable for the considered security traversal. Thus, we propose to apply queueing theory combing network congestion measurement to evaluate the delay performance of security traversal path. We design a system framework adopting OSTMA mechanism and a corresponding process for Open- Flow networks. In this framework, we develop a middlebox monitor module in the OpenFlow controller by the open source libvirt API [5]. Moreover, we realize the proposed OSTMA mechanism with a security traversal engine in the OpenFlow controller, which leverages the capability of the OpenFlow controller to dynamically monitor the network condition information and reconfigure the security traversal path. Experiment results based on real and virtualized OpenFlow network environment show that the proposed dynamic security traversal scheme can achieve QoS requirements while still reserving the scalability and flexibility of distributed security middleboxes. The rest of the paper is organized as follows. Section II describes the background of SDN. Section III discusses the related works of security traversal. Section IV presents the proposed OSTMA mechanism. In Section V, we demonstrate the proposed system framework for OpenFlow networks. Section VI shows the experiment result of the proposed scheme. We give our concluding remarks in Section VII. II. Software Defined Networking (SDN) Software defined networking (SDN) is a networking paradigm where a central software controller manages networking elements and dedicates the overall network behavior. In SDN, network devices become simple packet forwarding devices, while the intelligence or the control logic is implemented in the controller [6]. That is, SDN decouples the control software from packet forwarding devices, and uses a centralized controller capable of managing network traffic for the dynamic network environments. SDN has been shown to increase the flexibility of deploying network infrastructure, the programmability of controlling network device, and the reliability of providing network service [7]. OpenFlow is an open standard that enables researchers to easily implement SDN protocols via software in experimental networks. OpenFlow identifies and exploits a common set of functions and provides the protocol for programming the flow table that indicates the processing applied to any packet of a certain data flow [8]. The OpenFlow network consists of a centralized OpenFlow controller and OpenFlow switches for decision making and packet forwarding, respectively. The OpenFlow controller sends commands to manipulate all OpenFlow switches, maintains network topology information, and monitors the overall status of entire network. The OpenFlow switch forwards incoming packets according to the flow table set by the OpenFlow controller.the OpenFlow controller makes Fig. 1. The OpenFlow Architecture the flow decisions and manipulates the overall network operation by updating the flow table in the OpenFlow switch as shown in Fig. 1. The flow table is a database that records flow entries, associated with commands from the OpenFlow controller to apply an action on a certain flow [9]. The flow entries in the flow table can be added and removed based on the OpenFlow protocol. III. Related Work There are many researchers focus on supporting security traversal in datacenters. Policy-aware switching proposes to integrate a number of security functions into a pswitch that is deployed in datacenters [10]. The pswitch maintains a rule table which is the pre-defined policy. Once the pswitch receives a packet, it forces the packet to traverse a sequence of security devices and then forward the packet to the next hop. It takes security devices off the data paths to improve flexibility and facilitate management and operation, but it has poor scalability and lacks of flexibility and resilience when traversing. A hybrid security architecture that hardware security devices and software security devices coexist in a datacenters is proposed in [3]. The software security device, called software middlebox, is implemented with a virtual machine (VM) dedicated to one or a set of security functions. A lable-based forwarding mechanism, which is included in a software middlebox agent, determines the next hop based on the label encapsulated in the packet header. These software middleboxes can provide more dynamic scalability for security services. The author of [11] shows that distributed software middlebox causes inefficient manipulation and proposes a centralized, unified control plane for managing data flow through distributed middleboxes in security traversal. However, previous works do not consider the QoS issues for security traversal. Since these distributed software middleboxes can only determine the security traversal path based on the local network information, unexpected
3 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee 253 TABLE I Comparison of the previous works and our proposed scheme in security traversal Middlebox QoS Scalability Flexibility deployment guarantee Mechanism Pswitch [10] Centralized hardware Low Low No Policy-aware switch with centralized middleboxes HSA [3] Distributed software High Medium No Label-based traversal with distributed agents Ours Distributed software High High Yes Dynamic QoS traversal with a centralized controller burst data flow or collapsed middleboxes may cause severe service delay. Thus, we propose to dynamically select optimal security traversal path to ensure QoS with centralized controller. Complete comparison between previous works and this work is presented in Table I. IV. Optimal Security Traversal with Middlebox Addition (OSTMA) Mechanism In this section, we model the considered security traversal scenario as a constrained shortest path problem (CSP) and show the proposed OSTMA mechanism to ensure QoS guarantee. Since the data flow is inspected by middleboxes, the delay performance is dominated by the middlebox loading. Thus we select the cost and delay metrics according to the network conditions as well as the middlebox loading to support the QoS requirements. In our formulation, a network is represented as a directed simple graph G (N, L, M), where N is the set of nodes and L is the set of all link, so that, Link (i, j) is an ordered pair, which is outgoing from node i and incoming to node j. Let R st be the set of all paths from source node s to destination node t. Specifically, for any path r R st, we define cost function f C and delay function f D measured as f C (r) = c ij (1) and f D (r) = (i,j) r m(r) k=1 d k (2), respectively, where c ij is the cost metric for the Link (i, j), d k is the delay metric for the k-th middlebox, and m (r) is the number of middleboxes on the r. We select c ij as the weighted sum of network congestion measure and middlebox loading measure as follows, c ij = (1 β) g ij + βs k, 0 β 1, (i, j) L, k M (3), where g ij denotes the network congestion measure for the traffic on Link (i, j), s k is middlebox loading measure of the k-th middlebox, and β is the scale factor that provides the flexibility for different network condition. The formula for g ij is defined as follows, g ij = { Tij 0.7 B ij T ij, 0, 0.7 B ij < T ij 0.7 B ij T ij (4) where T ij is the total measured traffic amount in bps and B ij is the max achievable bandwidth in bps on Link (i, j). We select s k = λ k µ k (5) which is defined as the middlebox loading intensity. And d k = 1 (µ k λ k ) is the expected waiting time for the M/M/1 queueing model, where λ k and µ k is the input rate and the service rate of the k-th middlebox, respectively [12]. Then, the CSP problem can be formally stated as finding (6) r = arg min r {f C (r) r R st, f D (m) D max } (7) We obtain the minimum cost security traversal path r satisfying a specified QoS requirement from the solution of the CSP problem stated in (7). However, the CSP problem is known to be NP-complete [13], so there are heuristic and approximation algorithms in the literature. Therefore, to find the optimal security traversal path, we apply the Lagrangian Relaxation Based Aggregated Cost (LARAC) algorithm which is a polynomial time algorithm that efficiently finds a good ( path without deviating from the optimal solution in O [n + m log m] 2) time [14]. Figure 2 shows the system flow of the proposed OSTMA mechanism. First, a user defines the security and QoS requirement which specify the sequences of middleboxes and the delay constraint, respectively. Secondly, the system dynamically monitors the traffic of each link and the loading of each middlebox. These information are used to evaluate the delay performance of a path. After that, the system runs the LARAC algorithm to solve the CSP problem of (7). If there is no path that satisfies the QoS requirement, a new middlebox is added to the network and then the network information is re-monitored. Finally, the forwarding policy is set by the centralized controller. V. System Framework for OpenFlow Networks In this section, we present the system framework of dynamic security traversal for the proposed OSTMA mechanism in OpenFlow networks. The system framework, as shown in Fig. 3, consists of four modules in the SDN controller and OpenFlow switches. The system process can be classified into three stages: network condition information collecting, security traversal decision making, and traffic flow controlling. We then describe these stages as follows.
4 254 International Journal of Science and Engineering User setting Security and QoS requirement Monitoring Network traffic and middlebox status Delay measurement by queueing theory Optimal security traversal path selection by solution of CSP Find a path satisfy the QoS? Yes No Add a new middlebox Set the forwarding policy Fig. 3. OpenFlow-based dynamic security traversal framework. Fig. 2. System flow of Optimal Security Traversal with Middlebox Addition (OSTMA) Mechanism. TABLE II An example of host-port-switch table Host IP Host MAC Switch Port number :d3:c2:48:e4:af 00:00:00:00:00:00:00: :50:cf:b0:2e:42 00:00:00:00:00:00:00:07 1 1) Network Condition Information Collecting: In the first stage, the condition information of these middleboxes and the network is dynamically collected by the middlebox monitor module and the network monitor module, respectively. The middlebox monitor module records the CPU usage of the VM which serves as a middlebox. This information can be collected through the libvirt, which is an open source API that is used for managing cloud platform virtualization. The network monitor module monitors the network topology and the network traffic flow via the OpenFlow switches. We express the network topology as a host-port-switch table and a switch-link matrix. The host-port-switch table is used to record the information that end hosts connect to the OpenFlow switches. The host-port-switch table stores the IP address and the MAC address of the end host, the OpenFlow switch ID, and the port number to which the end host connects.table II shows an example of the entries stored in this table. The switch-link matrix, which stores port mapping information of each connected OpenFlow switch, is used to record the information that the OpenFlow switches connect to each TABLE III An example of switch-link matrix Switch 1 Switch 2 Switch 3 Switch 4 Switch 1 x 3 x 2 Switch 2 3 x 4 5 Switch 3 x 3 x 4 Switch x other. Table III shows an example of the entries stored in this matrix. The network traffic flow is calculated by the received and transmitted packets of each OpenFlow switch port. 2) Security Traversal Decision Making: In this stage, the security traversal Engine is responsible for analyzing delay performance based on the network condition information collected by the previous stage and then dynamically determines the optimal security traversal path. According to the OpenFlow protocol, when a packet from a new data flow from an end host arrives at the OpenFlow switch the first time, the switch forwards the packet to the controller since there is no match with its installed flow entries. Upon receiving the packet, the security traversal engine in the controller extracts the header, and then checks the source/destination host addresses. Next, the security traversal engine evaluates the delay performance based on the network condition information. After that, the optimal security traversal path is determined by resolving a CSP problem subject to the user-defined security and QoS requirement. Finally, the security traversal engine sends the optimal path decision to the routing engine. To ensure the QoS guarantee, the engine periodically checks the delay performance of the path based on the current network condition. The engine will recalculate the optimal security traversal path once the path violates the QoS guarantee. 3) Traffic Flow Controlling: In this stage, the routing engine receives the optimal path decision from the security traversal engine, translates the logical path to the explicit network routes, and sets all the routes by updating the flow table in the OpenFlow switch. The path-to-route translator divides a path into multiple end-to-end network routes and computes the shortest route from one host/middlebox to another based on current network topology. Then the route operator converts the shortest route to flow entries and updates to each OpenFlow switch on the route.
5 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee 255 VI. Experiment Result We implement the proposed system framework of dynamic security traversal over a standard OpenFlow controller, Floodlight [15]. There are also several standard controller alternatives such as NOX and Beacon, but currently Floodlight is the most stable controller. Floodlight is a Java-based OpenFlow Controller and is open-source and Apache-licensed software, supported by a community of developers. It offers a systematic development architecture with abundant of application programming interfaces (APIs) which is easy to extend and enhance. The proposed OSTMA mechanism is implemented on top of the existing modules in the OpenFlow controller. The proposed mechanism is tested with a real network environment and a virtualized network environment. For the real network environment, we use an open-source software package (OpenWRT) [16] for OpenFlow v1.0 [4] with TP- Link TL-WR1043ND as the OpenFlow switch. And we set up the VMs as the end host and the middlebox. For virtualized network environment, we use Mininet [17] to emulate the entire network topology in Linux environment. The Mininet permits the specification of a network interconnecting virtualized devices including network devices, end hosts, switches and controllers. We use a Python script to create the network topology in Mininet. Both of the real and virtualized network environments are controlled by aforementioned Floodlight controller. Figure 4 shows an experiment scenario with four security traversal paths from source to destination. We assume that the data sent by the source host needs to be checked by IDS and IPS sequentially. Upon receiving a packet in controller, the OpenFlow controller evaluates the delay performance based on the network condition and selects an optimal security traversal path from path one to path four according to the QoS requirement (e.g., 630ms). In the proposed dynamic security traversal scheme, the OpenFlow controller periodically checks the delay performance of the security traversal path every one unit time (i.e., re-traversal period=1). If the OpenFlow controller finds a QoS violation, it recalculates the security traversal path. Fig. 5 shows the delay performance of the four security traversal paths and the proposed scheme. The security traversal delay is the data transmission time from source to destination. It is observed that the proposed dynamic security traversal scheme can always ensure the QoS guarantee. Figure 6 shows the delay performance of the four security traversal paths and the proposed scheme, similar to Fig. 5, but the OpenFlow controller periodically checks the delay performance of the security traversal path every five unit time (i.e., re-traversal period=5). It is observed that there are some QoS violations within the period of five unit time. However, it costs less path calculation and reconfiguration times. Table IV compares the QoS violation times and the path reconfiguration times for different re-traversal periods within 60 unit time. The result shows that, as the OpenFlow controller recalculates the security Source Fig. 4. Other Service Delay of security traversal (ms) IDS IDS IPS IPS Experiment scenario of security traversal paths. Path1 Path2 Path3 Path4 Destination path1 path2 path3 path4 OSTMApath (period=1) Unit time QoS Requirement Fig. 5. Delay performance of the four security traversal paths and the proposed dynamic security traversal scheme with re-traversal period=1. traversal path more frequently to ensure a more strictly QoS requirement, the more frequent path reconfiguration results a higher computing and communication overhead for the OpenFlow controller and switches. Therefore, it is crucial for a security service provider to determine a proper re-traversal period that takes the QoS requirement and the network condition into account. VII. Conclusiosn In this paper, we propose a dynamic security traversal scheme for ensuring the QoS guarantee in OpenFlow networks. We identify the problem of QoS guarantee in security traversal as a CSP problem and propose an OSTMA TABLE IV Comparison of the QoS violation times and the path reconfiguration times for different re-traversal periods within 60 unit times. Re-traversal period=1 Re-traversal period=5 QoS Probability Path violation of QoS reconfiguration times violation times
6 256 International Journal of Science and Engineering Delay of security traversal path(ms) path1 path2 path3 path4 OSTMApath (period=5) Unit time QoS Requirement Fig. 6. Delay performance of the four security traversal paths and the proposed dynamic security traversal scheme with re-traversal period=5. [11] A. Gember, T. Benson, and A. Akella, Challenges in unifying control of middlebox traversals and functionality, in Proceedings of Large-Scale Distributed Systems and Middleware (LADIS), [12] D. Gross, J. F. Shortle, J. M. Thompson, and C. M. Harris, Fundamentals of queueing theory. Wiley. com, [13] Z. Wang and J. Crowcroft, Quality-of-service routing for supporting multimedia applications, IEEE Journal on Selected Areas in Communications, vol. 14, no. 7, pp , [14] A. Juttner, B. Szviatovski, I. Mécs, and Z. Rajkó, Lagrange relaxation based method for the qos routing problem, in IEEE International Conference on Computer Communications (IN- FOCOM), vol. 2, 2001, pp vol.2. [15] Floodlight, [16] OpenWrt Linux distribution for embedded devices, [17] B. Lantz, B. Heller, and N. McKeown, A network in a laptop: rapid prototyping for software-defined networks, in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, mechanism which can dynamically select the optimal security traversal path. Besides, we design a system framework adopting OSTMA mechanism and the corresponding process for OpenFlow networks. Our experiment results based on real and virtualized OpenFlow network environment show that the proposed scheme can ensure QoS guarantee. Our future work includes improving the delay performance by setting a proper scale factor β according to different network service behavior. References [1] Cisco data center infrastructure 2.5 design guide, [2] L. Popa, N. Egi, S. Ratnasamy, and I. Stoica, Building extensible networks with rule-based forwarding (rbf), in In Proc. of USENIX Symposium on Operating Systems Design and Implementation, 2010, pp [3] H.-Y. Lam, S. Zhao, K. Xi, and H. J. Chao, Hybrid security architecture for data center networks, in IEEE International Conference on Communications (ICC), 2012, pp [4] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, Openflow: enabling innovation in campus networks, SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp , [5] Libvirt Team. libvirt: The virtualization api, [6] H. Kim and N. Feamster, Improving network management with software defined networking, IEEE Communications Magazine, vol. 51, no. 2, pp , [7] K. Jeong, J. Kim, and Y.-T. Kim, Qos-aware network operating system for software defined networking with generalized openflows, in IEEE Network Operations and Management Symposium (NOMS), [8] O. M. M. Othman and K. Okamura, Design and implementation of application based routing using openflow, in Proceedings of the 5th International Conference on Future Internet Technologies. ACM, 2010, pp [9] H. E. Egilmez, S. T. Dane, K. T. Bagci, and A. M. Tekalp, Openqos: An openflow controller design for multimedia delivery with end-to-end quality of service over software-defined networks, in IEEE Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), [10] D. A. Joseph, A. Tavakoli, and I. Stoica, A policy-aware switching layer for data centers, in ACM SIGCOMM Computer Communication Review, vol. 38, no. 4, 2008, pp
VIDEO STREAMING OVER SOFTWARE DEFINED NETWORKS WITH SERVER LOAD BALANCING. Selin Yilmaz, A. Murat Tekalp, Bige D. Unluturk
VIDEO STREAMING OVER SOFTWARE DEFINED NETWORKS WITH SERVER LOAD BALANCING Selin Yilmaz, A. Murat Tekalp, Bige D. Unluturk College of Engineering, Koç University, 34450 Sariyer, Istanbul, Turkey ABSTRACT
Research on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management
Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
OpenQoS: An OpenFlow Controller Design for Multimedia Delivery with End-to-End Quality of Service over Software-Defined Networks
OpenQoS: An OpenFlow Controller Design for Multimedia Delivery with End-to-End Quality of Service over Software-Defined Networks Hilmi E. Egilmez, S. Tahsin Dane, K. Tolga Bagci and A. Murat Tekalp Koc
How To Build A Policy Aware Switching Layer For Data Center Data Center Servers
A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley 1 Problem: Middleboxes are hard to deploy Place on network path Overload path
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Power-efficient Virtual Machine Placement and Migration in Data Centers
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Power-efficient Virtual Machine Placement and Migration
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics
Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational
A Study on Software Defined Networking
A Study on Software Defined Networking Yogita Shivaji Hande, M. Akkalakshmi Research Scholar, Dept. of Information Technology, Gitam University, Hyderabad, India Professor, Dept. of Information Technology,
Design and implementation of server cluster dynamic load balancing in virtualization environment based on OpenFlow
Design and implementation of server cluster dynamic load balancing in virtualization environment based on OpenFlow Wenbo Chen Hui Li Qiang Ma Zhihao Shang Lanzhou University Lanzhou University Lanzhou
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei
Enhancing the Quality Level Support for Real-time Multimedia Applications in Software-Defined Networks
1 Enhancing the Quality Level Support for Real-time Multimedia Applications in Software-Defined Networks Francesco Ongaro, Eduardo Cerqueira, Luca Foschini, Antonio Corradi, and Mario Gerla Department
DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
Time-based Updates in OpenFlow: A Proposed Extension to the OpenFlow Protocol
CCIT Report #835, July 2013, EE Pub No. 1792, Technion, Israel 1 Time-based Updates in : A Proposed Extension to the Protocol Tal Mizrahi, Yoram Moses Department of Electrical Engineering Technion Israel
Limitations of Current Networking Architecture OpenFlow Architecture
CECS 572 Student Name Monday/Wednesday 5:00 PM Dr. Tracy Bradley Maples OpenFlow OpenFlow is the first open standard communications interface that enables Software Defined Networking (SDN) [6]. It was
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар
УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук
Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V4 PP 32-41 Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs Ragalatha
libnetvirt: the network virtualization library
libnetvirt: the network virtualization library Daniel Turull, Markus Hidell, Peter Sjödin KTH Royal Institute of Technology, School of ICT Stockholm, Sweden Email: {danieltt,mahidell,psj}@kth.se Abstract
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Security improvement in IoT based on Software Defined Networking (SDN)
Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,
Autonomicity Design in OpenFlow Based Software Defined Networking
GC'12 Workshop: The 4th IEEE International Workshop on Management of Emerging Networks and Services Autonomicity Design in OpenFlow Based Software Defined Networking WANG Wendong, Yannan HU, Xirong QUE,
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Software Defined Networking for Telecom Operators: Architecture and Applications
2013 8th International Conference on Communications and Networking in China (CHINACOM) Software Defined Networking for Telecom Operators: Architecture and Applications Jian-Quan Wang China Unicom Research
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks (or: How to Provide Security Monitoring as a Service in Clouds?) Seungwon Shin SUCCESS Lab Texas A&M University Email:
Software Defined Networks
Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors
Extensible and Scalable Network Monitoring Using OpenSAFE
Extensible and Scalable Network Monitoring Using OpenSAFE Jeffrey R. Ballard [email protected] Ian Rae [email protected] Aditya Akella [email protected] Abstract Administrators of today s networks are
OpenADN: Mobile Apps on Global Clouds Using OpenFlow and Software Defined Networking
OpenADN: Mobile Apps on Global Clouds Using OpenFlow and Software Defined Networking Subharthi Paul Washington University in Saint Louis [email protected] Raj Jain Washington University in Saint Louis
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES Tran Song Dat Phuc - Uyanga Department of Computer Science and Engineering SeoulTech 2014 Table of
Combined Smart Sleeping and Power Scaling for Energy Efficiency in Green Data Center Networks
UNIFI@ECTI-CON 2013 (May 14 th 17 th 2013, Krabi, Thailand) Combined Smart Sleeping and Power Scaling for Energy Efficiency in Green Data Center Networks Nguyen Huu Thanh Department of Communications Engineering
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
OpenFlow: Enabling Innovation in Campus Networks
OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification
An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture
435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract
Autonomous Fast Rerouting for Software Defined Network
Autonomous ast Rerouting for Software Defined Network 2012.10.29 NTT Network Service System Laboratories, NTT Corporation Shohei Kamamura, Akeo Masuda, Koji Sasayama Page 1 Outline 1. Background and Motivation
Supporting Information-Centric Networking in SDN
Supporting Information-Centric Networking in SDN Peng Li, Wu Muqing, Wang Ning, and Liu Hongbao Abstract Recently the Software-Defined Networking (SDN) has attracted increasing attention in the research
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments
Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments Aryan TaheriMonfared Department of Electrical Engineering and Computer Science University of Stavanger
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
Software Defined Networking & Openflow
Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
48 0890-8044/15/$25.00 2015 IEEE
An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Survey: Software Defined Networks with Emphasis on Network Monitoring
Survey: Software Defined Networks with Emphasis on Network Monitoring Prashanth [email protected] Indian Institute of Technology, Bombay (IIT-B) Powai, Mumbai, Maharastra India 31 Oct 2015 Abstract
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
software networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
Software Defined Networking
Software Defined Networking Stefano Giordano Dipartimento di Ingegneria dell Informazione Università di Pisa 3D Reference model of ISDN Hourglass reference model of a TCP/IP network Network Ossification
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support
OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support Qingwei Du and Huaidong Zhuang College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Research Article Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow
International Journal of Distributed Sensor Networks Volume 215, Article ID 531538, 9 pages http://dx.doi.org/1.1155/215/531538 Research Article Dynamic Server Cluster Load Balancing in Virtualization
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR
Software Defined Networking and the design of OpenFlow switches
Software Defined Networking and the design of OpenFlow switches Paolo Giaccone Notes for the class on Packet Switch Architectures Politecnico di Torino December 2015 Outline 1 Introduction to SDN 2 OpenFlow
Multiobjective Multicast Routing Algorithm
Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py
Software-Defined Infrastructure and the SAVI Testbed
Software-Defined Infrastructure and the SAVI Testbed Joon-Myung Kang 1, Thomas Lin 2, Hadi Bannazadeh 2, and Alberto Leon-Garcia 2 1 HP Labs., Palo Alto, CA, 94304, USA, [email protected] 2 Dept.
ulobal: Enabling In-Network Load Balancing for Arbitrary Internet Services on SDN
ulobal: Enabling In-Network Load Balancing for Arbitrary Internet Services on SDN Alex F R Trajano, Marcial P Fernandez Universidade Estadual do Ceará Fortaleza, Ceará, Brazil Email: [email protected],
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Bandwidth Allocation in a Network Virtualization Environment
Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero [email protected] Xavier Hesselbach [email protected] Department of Telematics Technical University of Catalonia
PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks
PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks Shihabur R. Chowdhury, Md. Faizul Bari, Reaz Ahmed and Raouf Boutaba David R. Cheriton School of Computer Science, University
Dynamic Controller Deployment in SDN
Dynamic Controller Deployment in SDN Marc Huang, Sherrill Lin, Dominic Yan Department of Computer Science, University of Toronto Table of Contents Introduction... 1 Background and Motivation... 1 Problem
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. Braun University of Basel Cs321 - HS 2012 (Slides material from www.bigswitch.com)
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
Dynamically Reconfigurable Network Nodes in Cloud Computing Systems
Dynamically Reconfigurable Network Nodes in Cloud Computing Systems HAYASHI Takeo, UENO Hiroshi Abstract As communication uses broader bandwidths and communication needs become diversified, a wide variety
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Mobility Management Framework in Software Defined Networks
, pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]
