6,376 research outputs found
On The Modeling of OpenFlow-based SDNs: The Single Node Case
OpenFlow is one of the most commonly used protocols for communication between
the controller and the forwarding element in a software defined network (SDN).
A model based on M/M/1 queues is proposed in [1] to capture the communication
between the forwarding element and the controller. Albeit the model provides
useful insight, it is accurate only for the case when the probability of
expecting a new flow is small. Secondly, it is not straight forward to extend
the model in [1] to more than one forwarding element in the data plane. In this
work we propose a model which addresses both these challenges. The model is
based on Jackson assumption but with corrections tailored to the OpenFlow based
SDN network. Performance analysis using the proposed model indicates that the
model is accurate even for the case when the probability of new flow is quite
large. Further we show by a toy example that the model can be extended to more
than one node in the data plane.Comment: Published in Proceedings of CS & IT for NeCOM 201
Design of an Integrated SDN/NFV management and orchestration architecture
This project aims at explaining and defining the SDN technology with integration of the NFV technology. We will also see the logic of this technology applied to a program designed for this project. The objective of this project is to understand the purpose of this technology, where is it going to be used, why companies like Google or Microsoft for over 2 years have been investing time and resources to develop and to implement the technology on the corporate level, as well as on the level of regular user like you and me. Firstly we will focus on the explanation of the SDN technology, what it is, what for is it going to be used and what is the future of this technology. Why the SDN is so important? Next, we will explain the use of the NFV and show how it is going to change the way we see the network right now. NFV also works with the SDN. Once we define the basics of the two technologies, we will proceed to the explanation of the practical part of this project. I would like to comment on the software used for this project is open source, since the OS used on the machine that carried out the simulations, and wrote this lines, to the package Rstudio. The practical part is to simulate how will work the network flows when this technology is used. The program will optimize the resources that we want for the proper performance of the global system. For example, we can optimize the path, the number of machines the flow has to cross, optimize the global delay of the flow, etc. Finally, we will reach specific conclusions based on the work we have done, as well as some personal outcome, such as the analysis of the difficulties encountered during the performance, as well as training and finally knowledge gained through work
PENGARUH PANJANG TUNGKAI, DAYA LEDAK TUNGKAI DAN PERCAYA DIRI TERHADAP KEMAMPUAN LARI 60 METER MURID SDN MATTOANGING 2 MAKASSAR
Abstract, The Influence of Legs Length, Legs Explosive Power and Self Confidence on 60 Meter Running Ability of Students at SDN Mattoanging 2 Makassar. (Supervised by Suwardi and Irvan).
The type of this study is path analysis research,which aims at examining (1) The direct influence of legs length on self confidence of students at SDN Mattoanging 2 Makassar. (2) The direct influence of legs explosive power on self confidence of students at SDN Mattoanging 2 Makassar. (3) The direct influence of self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (4) The direct influence of legs length on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (5) The direct influence of legs explosive power on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (6) The direct influence of legs length through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. (7) The direct influence of legs explosive power through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar. The research populations were student of grade 4, 5, and 6 at SDN Mattoanging 2 Makassar. Samples were selected by employing random sampling technique and obtained 30 samples. Data analysis techniques used in this study were statistic descriptive and statistic inferential analysis through SPSS version 23 program at the level of significance α = 0,05.
The results of the study reveal that (1) There is direct influence of legs length on self confidence of students at SDN Mattoanging 2 Makassar by 0,493 with the influence percentage of 24,3%. (2) There is direct influence of legs explosive power on self confidence of students at SDN Mattoanging 2 Makassar by 0,456 with the influence percentage of 20,7%. (3) There is direct influence of self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,325 with the influence percentage of 10,5%. (4) There is direct influence of legs length on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -1,085 with the influence percentage of 11,77%. (5) There is direct influence of legs explosive power on 60 meter running ability of students at SDN Mattoanging 2 Makassar by 0,456 with the influence percentage of 20,7%. (6) There is indirect influence of legs length through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,160 with the influence percentage of -16%. (7) There is indirect influence of legs explosive power through self confidence on 60 meter running ability of students at SDN Mattoanging 2 Makassar by -0,1482 with the influence percentage of -14,82%
SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks
The SRv6 architecture (Segment Routing based on IPv6 data plane) is a
promising solution to support services like Traffic Engineering, Service
Function Chaining and Virtual Private Networks in IPv6 backbones and
datacenters. The SRv6 architecture has interesting scalability properties as it
reduces the amount of state information that needs to be configured in the
nodes to support the network services. In this paper, we describe the
advantages of complementing the SRv6 technology with an SDN based approach in
backbone networks. We discuss the architecture of a SRv6 enabled network based
on Linux nodes. In addition, we present the design and implementation of the
Southbound API between the SDN controller and the SRv6 device. We have defined
a data-model and four different implementations of the API, respectively based
on gRPC, REST, NETCONF and remote Command Line Interface (CLI). Since it is
important to support both the development and testing aspects we have realized
an Intent based emulation system to build realistic and reproducible
experiments. This collection of tools automate most of the configuration
aspects relieving the experimenter from a significant effort. Finally, we have
realized an evaluation of some performance aspects of our architecture and of
the different variants of the Southbound APIs and we have analyzed the effects
of the configuration updates in the SRv6 enabled nodes
The Challenges in SDN/ML Based Network Security : A Survey
Machine Learning is gaining popularity in the network security domain as many
more network-enabled devices get connected, as malicious activities become
stealthier, and as new technologies like Software Defined Networking (SDN)
emerge. Sitting at the application layer and communicating with the control
layer, machine learning based SDN security models exercise a huge influence on
the routing/switching of the entire SDN. Compromising the models is
consequently a very desirable goal. Previous surveys have been done on either
adversarial machine learning or the general vulnerabilities of SDNs but not
both. Through examination of the latest ML-based SDN security applications and
a good look at ML/SDN specific vulnerabilities accompanied by common attack
methods on ML, this paper serves as a unique survey, making a case for more
secure development processes of ML-based SDN security applications.Comment: 8 pages. arXiv admin note: substantial text overlap with
arXiv:1705.0056
The end of an era? The medium- and long-term effects of the global crisis on growth in low-income countries
This paper investigates the medium- and long-term growth effects of the global financial crises on Low-Income Countries (LICs). Using several methodological approaches, including impulse response function analysis, growth spells techniques and panel regressions, we show that external demand (ED) shocks are not historically associated with sharp declines in output growth. Given existing evidence that LICs were primarily impacted by such a shock in the global financial crisis, our analysis provides some optimism on the chances that LICs will avoid a protracted period of slow growth. However, we also show that there seem to be persistent output losses associated with ED shocks in the medium-run. In terms of policy implications, our analysis provides evidence that countries with lower deficits, lower debt, more flexible exchange rate regimes, and a higher stock of international reserves are more likely to dampen the effects of an ED shock on growth. --Global financial crisis,external shocks,low-income countries,medium- and long-term growth,impulse response functions,growth spells,panel growth regressions
- …