6,376 research outputs found

    On The Modeling of OpenFlow-based SDNs: The Single Node Case

    Full text link
    OpenFlow is one of the most commonly used protocols for communication between the controller and the forwarding element in a software defined network (SDN). A model based on M/M/1 queues is proposed in [1] to capture the communication between the forwarding element and the controller. Albeit the model provides useful insight, it is accurate only for the case when the probability of expecting a new flow is small. Secondly, it is not straight forward to extend the model in [1] to more than one forwarding element in the data plane. In this work we propose a model which addresses both these challenges. The model is based on Jackson assumption but with corrections tailored to the OpenFlow based SDN network. Performance analysis using the proposed model indicates that the model is accurate even for the case when the probability of new flow is quite large. Further we show by a toy example that the model can be extended to more than one node in the data plane.Comment: Published in Proceedings of CS & IT for NeCOM 201

    Design of an Integrated SDN/NFV management and orchestration architecture

    Get PDF
    This project aims at explaining and defining the SDN technology with integration of the NFV technology. We will also see the logic of this technology applied to a program designed for this project. The objective of this project is to understand the purpose of this technology, where is it going to be used, why companies like Google or Microsoft for over 2 years have been investing time and resources to develop and to implement the technology on the corporate level, as well as on the level of regular user like you and me. Firstly we will focus on the explanation of the SDN technology, what it is, what for is it going to be used and what is the future of this technology. Why the SDN is so important? Next, we will explain the use of the NFV and show how it is going to change the way we see the network right now. NFV also works with the SDN. Once we define the basics of the two technologies, we will proceed to the explanation of the practical part of this project. I would like to comment on the software used for this project is open source, since the OS used on the machine that carried out the simulations, and wrote this lines, to the package Rstudio. The practical part is to simulate how will work the network flows when this technology is used. The program will optimize the resources that we want for the proper performance of the global system. For example, we can optimize the path, the number of machines the flow has to cross, optimize the global delay of the flow, etc. Finally, we will reach specific conclusions based on the work we have done, as well as some personal outcome, such as the analysis of the difficulties encountered during the performance, as well as training and finally knowledge gained through work

    PENGARUH PANJANG TUNGKAI, DAYA LEDAK TUNGKAI DAN PERCAYA DIRI TERHADAP KEMAMPUAN LARI 60 METER MURID SDN MATTOANGING 2 MAKASSAR

    Get PDF
    Abstract, The Influence of Legs Length, Legs Explosive Power and Self Confidence on 60 Meter Running Ability of Students at SDN Mattoanging 2 Makassar. (Supervised by Suwardi and Irvan). The type of this study is path analysis research,which aims at examining (1) The direct influence of legs length on self confidence of students at SDN Mattoanging 2 Makassar. (2) The direct influence of legs explosive power on self confidence of students at SDN Mattoanging 2 Makassar. (3) The direct influence of self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (4) The direct influence of legs length on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (5) The direct influence of legs explosive power on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (6) The direct influence of legs length through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (7) The direct influence of legs explosive power through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. The research populations were student of grade 4, 5, and 6 at SDN Mattoanging 2 Makassar. Samples were selected by employing random sampling technique and obtained 30 samples. Data analysis techniques used in this study were statistic descriptive and statistic inferential analysis through SPSS version 23 program at the level of significance α = 0,05. The results of the study reveal that (1) There is direct influence of legs length on self confidence of students at SDN Mattoanging 2 Makassar by 0,493 with the influence percentage of 24,3%. (2) There is direct influence of legs explosive power on self confidence of students at SDN Mattoanging 2 Makassar by 0,456 with the influence percentage of 20,7%. (3) There is direct influence of self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,325 with the influence percentage of 10,5%. (4) There is direct influence of legs length on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -1,085 with the influence percentage of 11,77%. (5) There is direct influence of legs explosive power on 60 meter running ability of students at SDN Mattoanging 2 Makassar by 0,456 with the influence percentage of 20,7%. (6) There is indirect influence of legs length through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,160 with the influence percentage of -16%. (7) There is indirect influence of legs explosive power through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,1482 with the influence percentage of -14,82%

    SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks

    Full text link
    The SRv6 architecture (Segment Routing based on IPv6 data plane) is a promising solution to support services like Traffic Engineering, Service Function Chaining and Virtual Private Networks in IPv6 backbones and datacenters. The SRv6 architecture has interesting scalability properties as it reduces the amount of state information that needs to be configured in the nodes to support the network services. In this paper, we describe the advantages of complementing the SRv6 technology with an SDN based approach in backbone networks. We discuss the architecture of a SRv6 enabled network based on Linux nodes. In addition, we present the design and implementation of the Southbound API between the SDN controller and the SRv6 device. We have defined a data-model and four different implementations of the API, respectively based on gRPC, REST, NETCONF and remote Command Line Interface (CLI). Since it is important to support both the development and testing aspects we have realized an Intent based emulation system to build realistic and reproducible experiments. This collection of tools automate most of the configuration aspects relieving the experimenter from a significant effort. Finally, we have realized an evaluation of some performance aspects of our architecture and of the different variants of the Southbound APIs and we have analyzed the effects of the configuration updates in the SRv6 enabled nodes

    The Challenges in SDN/ML Based Network Security : A Survey

    Full text link
    Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switching of the entire SDN. Compromising the models is consequently a very desirable goal. Previous surveys have been done on either adversarial machine learning or the general vulnerabilities of SDNs but not both. Through examination of the latest ML-based SDN security applications and a good look at ML/SDN specific vulnerabilities accompanied by common attack methods on ML, this paper serves as a unique survey, making a case for more secure development processes of ML-based SDN security applications.Comment: 8 pages. arXiv admin note: substantial text overlap with arXiv:1705.0056

    The end of an era? The medium- and long-term effects of the global crisis on growth in low-income countries

    Get PDF
    This paper investigates the medium- and long-term growth effects of the global financial crises on Low-Income Countries (LICs). Using several methodological approaches, including impulse response function analysis, growth spells techniques and panel regressions, we show that external demand (ED) shocks are not historically associated with sharp declines in output growth. Given existing evidence that LICs were primarily impacted by such a shock in the global financial crisis, our analysis provides some optimism on the chances that LICs will avoid a protracted period of slow growth. However, we also show that there seem to be persistent output losses associated with ED shocks in the medium-run. In terms of policy implications, our analysis provides evidence that countries with lower deficits, lower debt, more flexible exchange rate regimes, and a higher stock of international reserves are more likely to dampen the effects of an ED shock on growth. --Global financial crisis,external shocks,low-income countries,medium- and long-term growth,impulse response functions,growth spells,panel growth regressions
    • …
    corecore