Do you want to publish a course? Click here

الشبكات المعرفة برمجيا SDN هي عبارة عن بنية شبكية جديدة توفر التحكم المركزي بكامل الشبكة. يعمل هذا المتحكم كنظام تشغيل يقوم بإرسال التعليمات وتطبيق التغييرات من خلال الواجهات التخاطبية بينه وبين الأجهزة المسؤولة عنها ويدعى بالمتحكم.
Decoupling the decision-making process from the data forwarding process is the heart of software-defined networks technology. One of the most important components of this technology is the controller, which is the smartest component in the network. Many of the controllers have been developed since the technology originated, and many researches have been done to compare the performance of these controllers for productivity, delay and protection. And due to the importance of selecting the appropriate controller according to different parameters and network states, we studied the performance of four controllers: Floodlight, Beacon, Nox, RYU in terms of productivity, RTT, time of establishing connection with an OpenFlow switch and the time for adding an input to the switch flow table. The results showed that the Beacon control was superior in performance when the number of switches in the network was equal to the number of processor cores used by the controller. For RTT and the time needed to add an input to the flow table, the NOX controller achieved less time. Finally, the Floodlight controller was the best in terms of establishing connection with the switch because it needed less time.
Current traditional IP networks start to be complex as the demands of the users are ever-growing. Software Defined Network (SDN) is a new paradigm to ease the management of the network and make the network programmable by decoupling the control plane and forwarding plane (such as switch and router). A centralized controller is used to manage the control plane, and it interacts with the forwarding plane using a standardized OpenFlow protocol. However, many controllers are used recently such as POX, Ryu, ONOS, and OpenDaylight. The important question is which is the best controller to use in our network and fits our network’s goals? To answer this question, a decision-making method is proposed in this paper. First, four SDN controllers are selected, and five criteria are analyzed to collect these controllers’ properties. Then a Multi-Criteria Decision Making method named TOPSIS is used to rank the controllers and choose the best one. By applying this method, a comparative study is done to evaluate the four controllers in an environment of LAN topology, and “Ryu” controller is selected as the best one based on our criteria.
Device to device Communications (D2D Communications) is a new promising technology, that is used to increase data exchanged volume, to expand the coverage area of base stations, core network data offloading, and to move to new frequency bands that have not been used in mobile networks before.
In this paper we introduce a specification model for the host migration process in Software Defined Network, and for verifying the reachability property for packets that do not change after the migration, and achieve the required modifications to meet the same properties. The model is designed by TLA+ language and verified by TLC which is correlated with it. The model is implemented by few states to meet the required property.
In this paper the network specification by logic algebra is presented then the packets are classified into reachable packets and dropped packets according to the current state of the network and flow tables of switches. The model specification is written by TLA+ language which is built on First Order Logic (FOL), and the specification is checked by TLC. This model will help the programmers to detect the network in proactive verification and prove that this configuration meets the global policy of the network.
We present in this thesis a new structure that incorporates SDN with Vanets, and we make a meticulous study of routing mechanisms and their effects on security aspects. We also present a new security system that depends on public key infrastructure, and finally we demonstrate how to benefit from SDN in facing several security attacks and preaches, which are common in traditional Vanets, through number of security algorithms which allow deploying intrusion detection systems as a step towards self-healing and self-configuration system.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا