To see the other types of publications on this topic, follow the link: VSwitch.

Journal articles on the topic 'VSwitch'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 journal articles for your research on the topic 'VSwitch.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sans, Francisco, and Eric Gamess. "Analytical Performance Evaluation of Different Switch Solutions." Journal of Computer Networks and Communications 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/953797.

Full text
Abstract:
The virtualization of the network access layer has opened new doors in how we perceive networks. With this virtualization of the network, it is possible to transform a regular PC with several network interface cards into a switch. PC-based switches are becoming an alternative to off-the-shelf switches, since they are cheaper. For this reason, it is important to evaluate the performance of PC-based switches. In this paper, we present a performance evaluation of two PC-based switches, using Open vSwitch and LiSA, and compare their performance with an off-the-shelf Cisco switch. The RTT, throughput, and fairness for UDP are measured for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that the Cisco switch presents the best performance, and both PC-based switches have similar performance. Between Open vSwitch and LiSA, Open vSwitch represents a better choice since it has more features and is currently actively developed.
APA, Harvard, Vancouver, ISO, and other styles
2

Tu, Cheng-Chun, Joe Stringer, and Justin Pettit. "Building an Extensible Open vSwitch Datapath." ACM SIGOPS Operating Systems Review 51, no. 1 (September 11, 2017): 72–77. http://dx.doi.org/10.1145/3139645.3139657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akkoc, Mertkan, and Berk Canberk. "Interval Partitioning for Packet Classification in OpenFlow vSwitch." IEEE Networking Letters 2, no. 3 (September 2020): 128–31. http://dx.doi.org/10.1109/lnet.2020.3007570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Effendi, Mufid Ridlo, Eki Ahmad Zaki Hamidi, and Andriansyah Saepulloh. "Implementasi GRE Tunneling Menggunakan Open vSwitch Pada Jaringan Kampus." TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol 3, no. 2 (November 11, 2017): 103–11. http://dx.doi.org/10.15575/telka.v3i2.62.

Full text
Abstract:
Perkembangan informasi yang pesat membuat penambahan jaringan baru harus dilakukan dengan cepat, efektif, dan efisien. Menghubungkan dua jaringan lokal yang berbeda wilayah dibutuhkan metoda yang tepat tanpa biaya yang besar. Salah satu metode jaringan untuk menghubungkan dua jaringan lokal yang berbeda wilayah tanpa terkoneksi langsung secara fisik yaitu menggunakan metode tunneling. Salah satu metode tunneling adalah GRE. Metode GRE menggunakan Open vSwitch dengan menggunakan simulator mininet dengan topologi jaringan kampus sederhana telah dilakukan pada penelitian ini. Simulasi ini menghasilkan hasil yang diinginkan dengan terkoneksinya tiap host pada jaringan kampus yang berbeda wilayah.
APA, Harvard, Vancouver, ISO, and other styles
5

Effendi, Mufid Ridlo, Eki Ahmad Zaki Hamidi, and Andriansyah Saepulloh. "Implementasi GRE Tunneling Menggunakan Open vSwitch Pada Jaringan Kampus." TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol 3, no. 2 (November 11, 2017): 103–11. http://dx.doi.org/10.15575/telka.v3n2.103-111.

Full text
Abstract:
Perkembangan informasi yang pesat membuat penambahan jaringan baru harus dilakukan dengan cepat, efektif, dan efisien. Menghubungkan dua jaringan lokal yang berbeda wilayah dibutuhkan metoda yang tepat tanpa biaya yang besar. Salah satu metode jaringan untuk menghubungkan dua jaringan lokal yang berbeda wilayah tanpa terkoneksi langsung secara fisik yaitu menggunakan metode tunneling. Salah satu metode tunneling adalah GRE. Metode GRE menggunakan Open vSwitch dengan menggunakan simulator mininet dengan topologi jaringan kampus sederhana telah dilakukan pada penelitian ini. Simulasi ini menghasilkan hasil yang diinginkan dengan terkoneksinya tiap host pada jaringan kampus yang berbeda wilayah.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Runkai, Xiaolin Chang, Jelena Mišić, and Vojislav B. Mišić. "Performance Modeling of Linux Network System with Open vSwitch." Peer-to-Peer Networking and Applications 13, no. 1 (February 21, 2019): 151–62. http://dx.doi.org/10.1007/s12083-019-00723-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Peixuan, Yang Xu, and H. Jonathan Chao. "OVS-CAB: Efficient rule-caching for Open vSwitch hardware offloading." Computer Networks 188 (April 2021): 107844. http://dx.doi.org/10.1016/j.comnet.2021.107844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Ye, Haiyang Jiang, Yulei Wu, Chunjing Han, Yilong Lv, Xing Li, Bowen Yang, Serge Fdida, and Gaogang Xie. "C2QoS: Network QoS guarantee in vSwitch through CPU-cycle management." Journal of Systems Architecture 116 (June 2021): 102148. http://dx.doi.org/10.1016/j.sysarc.2021.102148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Huihui, Xuanhao Luo, and Du Xu. "Intelligent queue management of open vSwitch in multi-tenant data center." Future Generation Computer Systems 144 (July 2023): 50–62. http://dx.doi.org/10.1016/j.future.2023.02.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Osinski, Tomasz, Halina Tarasiuk, Paul Chaignon, and Mateusz Kossakowski. "A Runtime-Enabled P4 Extension to the Open vSwitch Packet Processing Pipeline." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 2832–45. http://dx.doi.org/10.1109/tnsm.2021.3055900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Huang, Tao, Siyu Yan, Fan Yang, Tian Pan, and Jiang Liu. "Building SDN-Based Agricultural Vehicular Sensor Networks Based on Extended Open vSwitch." Sensors 16, no. 1 (January 19, 2016): 108. http://dx.doi.org/10.3390/s16010108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Emmerich, Paul, Daniel Raumer, Sebastian Gallenmüller, Florian Wohlfart, and Georg Carle. "Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis." Journal of Network and Systems Management 26, no. 2 (July 21, 2017): 314–38. http://dx.doi.org/10.1007/s10922-017-9417-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tasoulas, Evangelos, Feroz Zahid, Ernst Gunnar Gran, Kyrre Begnum, Bjørn Dag Johnsen, and Tor Skeie. "Efficient routing and reconfiguration in virtualized HPC environments with vSwitch‐enabled lossless networks." Concurrency and Computation: Practice and Experience 31, no. 2 (February 27, 2018): e4443. http://dx.doi.org/10.1002/cpe.4443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Marzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (June 28, 2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.

Full text
Abstract:
Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overcame the problem, namely speeding up configuration and reducing human error or errors in configuring virtual networks. The automation system can speed up the virtual network management process compared to the manual method based on 5 (five) experiments, namely when the manufacturing operation has an average time of 08 minutes and 42 seconds faster. Whereas when the addition operation has an average faster time of 08 minutes 17 seconds. On the other hand, when the deletion operation has an average time of 42 seconds faster.
APA, Harvard, Vancouver, ISO, and other styles
15

Elloumi Zitouna, Imene. "Learning-based Orchestrator for Intelligent Software-defined Networking Controllers." International Journal of Software Engineering & Applications 11, no. 6 (November 30, 2020): 17–30. http://dx.doi.org/10.5121/ijsea.2020.11602.

Full text
Abstract:
This paper presents an overview of our learning-based orchestrator for intelligent Open vSwitch that we present this using Machine Learning in Software-Defined Networking technology. The first task consists of extracting relevant information from the Data flow generated from a SDN and using them to learn, to predict and to accurately identify the optimal destination OVS using Reinforcement Learning and QLearning Algorithm. The second task consists to select this using our hybrid orchestrator the optimal Intelligent SDN controllers with Supervised Learning. Therefore, we propose as a solution using Intelligent Software-Defined Networking controllers (SDN) frameworks, OpenFlow deployments and a new intelligent hybrid Orchestration for multi SDN controllers. After that, we feeded these feature to a Convolutional Neural Network model to separate the classes that we’re working on. The result was very promising the model achieved an accuracy of 72.7% on a database of 16 classes. In any case, this paper sheds light to researchers looking for the trade-offs between SDN performance and IA customization.
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Min-Xiou, and Chi-Hsun Wu. "The Network Live Migration Design Based On The Mobile IPv6 Network Mobility For Hybrid Cloud Network." International Journal of Advanced Networking and Applications 13, no. 06 (2022): 5229–36. http://dx.doi.org/10.35444/ijana.2022.13609.

Full text
Abstract:
In the Cloud Computing, the migration mechanism can provide services, computing jobs and resources moved from a virtual environment to another virtual environment, and service providers can fit out their logic network architectures to offer services for user requirements. The network live migration across the different networks is a big challenge of the migration mechanism. In the paper, logical network architecture was proposed to provide the Cloud Computing in a hybrid network environment. The logical network concept, tunnel technology, domain name service and some existing network protocols were integrated into the proposed mechanism to provide network live migration across the different networks. The proposed mechanism implemented based on Open vSwitch and XEN. In our experimental results, we confirm that the proposed mechanism can provide network live migration across the different networks, and the network service will not be break. The performance evaluations also show that the proposed architecture can better than the NEMO solution.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Rui, Zhiyong Zhang, Lei Ju, and Zhiping Jia. "A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 21–40. http://dx.doi.org/10.4018/ijisp.2015070102.

Full text
Abstract:
Software-Defined Networking (SDN) and OpenFlow have brought a promising architecture for the future networks. However, there are still a lot of security challenges to SDN. To protect SDN from the Distributed denial-of-service (DDoS) flooding attack, this paper extends the flow entry counters and adds a mark action of OpenFlow, then proposes an entropy-based distributed attack detection model, a novel IP traceback and source filtering response mechanism in SDN with OpenFlow-based Deterministic Packet Marking. It achieves detecting the attack at the destination and filtering the malicious traffic at the source and can be easily implemented in SDN controller program, software or programmable switch, such as Open vSwitch and NetFPGA. The experimental results show that this scheme can detect the attack quickly, achieve a high detection accuracy with a low false positive rate, shield the victim from attack traffic and also avoid the attacker consuming resource and bandwidth on the intermediate links.
APA, Harvard, Vancouver, ISO, and other styles
18

Reddy, Vaka Avinash, K. Venkatesh, and L. N. B. Srinivas. "Software Defined Networking Based Delay Sensitive Traffic Engineering of Critical Data in Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 48–53. http://dx.doi.org/10.1166/jctn.2020.8628.

Full text
Abstract:
The exponential growth of the number of devices that are connected to the internet is increasing. At present, there are more than 13 billion devices are connected and it was predicted that this number reaches up to 25 billion by 2020. In an Internet of Things ecosystem, these devices are embedded to perform specific tasks in which they cannot take decisions. When there is an emergency state in any one of the nodes, the other nodes also produce the traffic simultaneously which makes the border router busy and creates a delay in message propagation and causes loss to the productivity. In the proposed architecture, Software Defined Networking offers a solution to this problem by making wireless sensor network more intelligent and also makes network capable of making self-decision during emergency state. In the proposed architecture an Open vSwitch installed on a Raspberry Pi as a Data Plane and Open Network Operating system, Mininet can be used as a Control Plane. The NodeMCU-ESP8266 wireless devices act as end nodes. A routing path with minimum latency during critical traffic can be implemented using Software Defined Networking.
APA, Harvard, Vancouver, ISO, and other styles
19

Bonelli, Nicola, Fabio Del Vigna, Alessandra Fais, Giuseppe Lettieri, and Gregorio Procissi. "Programming socket-independent network functions with nethuns." ACM SIGCOMM Computer Communication Review 52, no. 2 (April 30, 2022): 35–48. http://dx.doi.org/10.1145/3544912.3544917.

Full text
Abstract:
Software data planes running on commodity servers are very popular in real deployments. However, to attain top class performance, the software approach requires the adoption of accelerated network I/O frameworks, each of them characterized by its own programming model and API. As a result, network applications are often closely tied to the underlying technology, with obvious issues of portability over different systems. This is especially true in cloud scenarios where different I/O frameworks could be installed depending on the configuration of the physical servers in the infrastructure. The nethuns library proposes a unified programming abstraction to access and manage network operations over different I/O frameworks. The library is freely available to the community under the BSD license and currently supports AF_XDP and netmap for fast packet handling along with the classic AF_PACKET and the pcap library. Network applications based on nethuns need only to be re-compiled to run over a different network API. The experiments prove that the overhead introduced by nethuns is negligible, hence making it a convenient programming platform that eases the coding process while guaranteeing high performance and portability. As proofs of concept, a handy traffic generator as well as the popular Open vSwitch application have been successfully ported and tested over nethuns.
APA, Harvard, Vancouver, ISO, and other styles
20

Golubkova, E. M., A. M. Kruglov, and A. A. Vereshchagin. "NETWORK INTERACTION IN VIRTUALIZED ENVIRONMENTS AND FEATURES OF VIRTUAL STAND DEVELOPMENT." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 206 (August 2021): 47–52. http://dx.doi.org/10.14489/vkit.2021.08.pp.047-052.

Full text
Abstract:
This article describes a virtual bench developed by the authors for studying network interaction in virtualization and containerization environments. The functional diagrams of the two modules of the stand are presented, as well as the exact characteristics of the software and hardware used in the work. The study of network interaction is carried out in a certain complex of proprietary and free software, which distinguishes it from previous studies. To build a virtual stand, the VMWare system was used, with the help of which 2 stand modules were created. The hypothesis of the research is that installed DPDK libraries on hosts and VMs and containers, as well as configuring OvS will increase network performance, which includes bandwidth and latency parameters. Network research is carried out in two modes of operation using the software switch Open vSwitch and DPDK libraries. The results of the study and the authors recommendations are given at the end of the work. Also, the key features of configuring virtual machines, containers and software switch, which are the main objects of research, were described. Further research on the topic involves defining a set of best practices for configuring all components of the network infrastructure (including the number of numa nodes, cpu pinning topology and the amount of huge pages), and making recommendations for choosing the main parameters of VMs and containers.
APA, Harvard, Vancouver, ISO, and other styles
21

Nguyen, Tri Gia, Hai Hoang Nguyen, and Trung Phan. "SAFE: EFFICIENT DDOS ATTACK DEFENSE WITH ELASTIC TRAFFIC FLOW INSPECTION IN SDN-BASED DATA CENTERS." Journal of Computer Science and Cybernetics 39, no. 1 (March 3, 2023): 17–32. http://dx.doi.org/10.15625/1813-9663/16629.

Full text
Abstract:
In this paper, we propose an efficient distributed denial-of-Service (DDoS) Attack deFEnse solution, namely SAFE, which utilizes an elastic traffic flow inspection mechanism, for Software-Defined Networking (SDN) based data centers. In particular, we first examine a leaf-spine SDN-based data center network, which is highly vulnerable to volumetric DDoS attacks. Next, we develop a rank-based anomaly detection algorithm to recognize anomalies in the amount of incoming traffic. Then, for the traffic flow inspection, we introduce a component called DFI (Deep Flow Inspection) running an Open vSwitch (OvS) that can be dynamically initiated (as a virtual machine) on-demand to collect traffic flow statistics. By utilizing deep reinforcement learning-based traffic monitoring from our previous study, the DFIs can be protected from the flow-table overflow problem while providing more detailed traffic flow information. Afterward, a machine learning-based attack detector analyzes the gathered flow rule statistics to identify the attack, and appropriate policies are implemented if an attack is recognized. The experiment results show that the SAFE can effectively defend against volumetric DDoS attacks while assuring a reliable Quality-of-Service level for benign traffic flows in SDN-based data center networks. Specifically, for TCP SYN and UDP floods, the SAFE attack detection performance is improved by approximately 40% and 30%, respectively, compared to the existing SATA solution. Furthermore, the attack mitigation performance, the ratio of dropped malicious packets obtained by the SAFE is superior by approximately 48% (for TCP SYN flood) and 52% (for UDP flood) to the SATA.
APA, Harvard, Vancouver, ISO, and other styles
22

Dong, Feihu, Yasheng Zhang, Guiyu Liu, Hongzhi Yu, and Chenhua Sun. "Delay-Sensitive Service Provisioning in Software-Defined Low-Earth-Orbit Satellite Networks." Electronics 12, no. 16 (August 16, 2023): 3474. http://dx.doi.org/10.3390/electronics12163474.

Full text
Abstract:
With the advancement of space technology and satellite communications, low-Earth-orbit (LEO) satellite networks have experienced rapid development in the past decade. In the vision of 6G, LEO satellite networks play an important role in future 6G networks. On the other hand, a variety of applications, including many delay-sensitive applications, are continuously emerging. Due to the highly dynamic nature of LEO satellite networks, supporting time-deterministic services in such networks is challenging. However, we can provide latency guarantees for most delay-sensitive applications through data plane traffic shaping and control plane routing optimization. This paper addresses the routing optimization problem for time-sensitive (TS) flows in software-defined low-Earth-orbit (LEO) satellite networks. We model the problem as an integer linear programming (ILP) model aiming to minimize path handovers and maximum link utilization while meeting TS flow latency constraints. Since this problem is NP-hard, we design an efficient longest continuous path (LCP) approximation algorithm. LCP selects the longest valid path in each topology snapshot that satisfies delay constraints. An auxiliary graph then determines the routing sequence with minimized handovers. We implement an LEO satellite network testbed with Open vSwitch (OVS) and an open-network operating system (ONOS) controller to evaluate LCP. The results show that LCP reduces the number of path handovers by up to 31.7% and keeps the maximum link utilization lowest for more than 75% of the time compared to benchmark algorithms. In summary, LCP achieves excellent path handover optimization and load balancing performance under TS flow latency constraints.
APA, Harvard, Vancouver, ISO, and other styles
23

Rashid Mahmood, Muhammad Imran, and Sayyid Kamran Hussain. "Assessment of Network & Processor Virtualization in Cloud Computing." Journal of Computing & Biomedical Informatics 2, no. 01 (March 15, 2021): 111–27. http://dx.doi.org/10.56979/201/2021/26.

Full text
Abstract:
Cloud Computing is an emerging field in applied computer science. Cloud computing depends on virtualization, where a sole physical resource is virtualized into numerous virtual resources. Resources that are being virtualized include physical storage, processing units, volatile memories, network, and further physical resources. Processor and network virtualization offer several advantages like lessening hardware cost, energy consumption, and the human struggle for administration and management of resources. In this article, the primary concentration was on the evaluation and assessment of network virtualization between different cloud computing hypervisors and to contrast their evaluated results. This comparison is based on a few experiments performed on Citrix XenServer, Microsoft Hyper-V, and VMware vSphere hypervisors. XenServer uses Open vSwitch for its network virtualization whereas Hyper-V and vSphere use Microsoft network virtualization and vSphere switch for managing their network virtualization respectively. We have found that virtual networks are further scalable and secure than physical networks. We can assign multiple virtual interfaces or connections to a single virtual machine. In light of various experiments, in which we have compared non-virtualized with virtualized scenarios, for all these above-mentioned hypervisors, we found out that we can use virtual networks with and without VLAN Tags or VLAN Ids. Hyper-V provides further flexibility and options regarding VLAN Tag in comparison with XenServer or vSphere. We have also found that XenServer and vSphere give us extra network throughput in comparison with Hyper-V in terms of TCP and UDP whereas Round Trip Time (RTT) in the virtual network of all hypervisors are high in comparison with the non-virtual environment. Network CPU usage is also measured and found that vSphere and XenServer together consume more CPU during network activity in comparison with Hyper-V. We also found that processor virtualization did not majorly result from the average schedule time in comparison with a non-virtualized machine. We consequently conclude that in general a small reduction in the performance, in the case of virtualization is insignificant as compared with the advantages we get from virtualization when using cloud hypervisors. For the application of virtualization, this work will motivate to set up of data centers using a virtualized environment.
APA, Harvard, Vancouver, ISO, and other styles
24

Mauricio, Leopoldo, and Marcelo Rubinstein. "A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware." Journal of Internet Services and Applications 14, no. 1 (February 16, 2023): 10–20. http://dx.doi.org/10.5753/jisa.2023.2847.

Full text
Abstract:
This paper proposes and implements a Network Function Virtualization (NFV) security architecture to provide automatic and efficient detection and mitigation against Web application malware. The mitigation is given by dynamically chaining a Virtual Security Function (VSF) to the data stream to block malicious exploitation traffic without affecting the benign traffic. We implement an NFV Security Controller (NFV-SC) that interacts with an Intrusion Detection System and a Web Application Firewall (WAF), both implemented as VSFs. We also implement a vulnerability scanner and a mechanism to automatically create rules in advance in the WAF-VSF when a security vulnerability is found in an application, even if no malicious traffic has attempted to exploit the flaw. In addition, it dynamically identifies and removes no longer used security rules to improve performance. We implement and evaluate our security proposal in the Open Platform for NFV (OPNFV). The evaluation results in our experimental scenarios show that the NFV security architecture automatically blocks 99.12% of the HTTP malicious traffic without affecting 93.6% of the benign HTTP requests. Finally, we show that the number of rules in the WAF-VSF severely affects the latency to load HTTP response headers and that the number of redirection OpenFlow rules within Open vSwitches is not enough to significantly impact the end-user experience in modern web browser applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhong, Ni, Hisashi Shima, and Hiro Akinaga. "Rectifying Polarity Switch of Pt/TiO2-x/Pt." MRS Proceedings 1174 (2009). http://dx.doi.org/10.1557/proc-1174-v06-07.

Full text
Abstract:
AbstractCurrent-voltage (I-V) characteristic of Pt/TiO2-x/Pt has been investigated. The Pt/TiO2-x/Pt devices in the initial state exhibit a rectifying I-V behavior. By applying a pulse voltage, the rectifying polarity could be switched to an opposite direction. The mechanism of the rectifying polarity switch is proposed as the local drift of defects, such as oxygen vacancies (VO), due to applying pulse voltage. It is found that the required pulse voltage height for the polarity switch (Vswitch) exhibits much dependence on the operation temperature and width of applied pulse voltage. With an increase of the pulse voltage width or the measurement temperature (T), Vswitch exhibits a decrease with increase of T. These results suggest that the rectifying polarity switch in the Pt/TiO2-x/Pt is attributed to a thermal and dynamic dependence process, which agree well with the localized migration of VO induced by applied pulse voltage.
APA, Harvard, Vancouver, ISO, and other styles
26

Dmytrenko, V. V. "Simulation and analysis models of hybrid software­configured devices." Connectivity 166, no. 6 (2023). http://dx.doi.org/10.31673/2412-9070.2023.063743.

Full text
Abstract:
The analysis of the algorithm, based on which the simulation and analytical model of the hybrid software-configurable device is automatically synthesized, was carried out. The solution for modeling OpenFlow equipment was also considered, and an original OpenFlow switch model was developed, which is distinguished by the ability to manage delays based on the results of its mathematical model. The operation scheme of a hybrid switch that supports both traditional switching and OpenFlow switching has been developed. This scheme allows solving complex tasks in the physical infrastructure of virtualized networks. A module has been developed to create a realistic delay and limit the capacity and performance of the hybrid switch model, which can work according to the data obtained as a result of the experimental study. Additional traffic processing schemes have been developed for a more detailed implementation of the hybrid software-configurable equipment model. The basic model of the switch presented in the INET OMNeT++ framework is considered. The switch is represented by a set of modules interacting through the OMNeT transmission system. The most detailed modules of Ethernet interfaces are implemented, in particular, there are implementations of the input queue of the Tail-Drop type, output queues of the FIFO, RED, WRED, PQ, CBFQ types, as well as the implementation of the transmission delay on the line. The virtualization technology of network functions, which is built on the basis of software-configured networks, has been studied, and the most popular Linux-based solutions are used as a software-controlled Open vSwitch switch. The considered methods of forming a model of such a switch. Open vSwitch is architecturally different from both classical and OpenFlow real switches, as there are no dedicated packet refactoring units (except for network cards with hardware header processing and FPGAs), dedicated memory and processors for switching, Open vSwitch uses a kernel module (or module DPDK for direct transmission without the participation of the kernel) to transmit packets based on information from the OVSDB database or OpenFlow tables.
APA, Harvard, Vancouver, ISO, and other styles
27

Ma, Huihui, Xuanhao Luo, and Du Xu. "Intelligent Queue Management of Open Vswitch in Multi-Tenant Data Center." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4263895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Rashelbach, Alon, Ori Rottenstreich, and Mark Silberstein. "Scaling by Learning: Accelerating Open vSwitch Data Path With Neural Networks." IEEE/ACM Transactions on Networking, 2022, 1–14. http://dx.doi.org/10.1109/tnet.2022.3215143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Malakhov, S. V., and D. O. Yakupov. "Влияние виртуального коммутатора Open vSwitch на показатели производительности контроллера Floodlight (на англ. языке)." Электросвязь, no. 4(41) (April 25, 2023). http://dx.doi.org/10.34832/elsv.2023.41.4.009.

Full text
Abstract:
The purpose of the experimental study is to measure packet delays and losses per session in cases where there are no stream records in the switching tables. Also, the dependence of the change in bandwidth method on delays will be investigated, and it is concluded that packets are lost. After conducting the study experimentally, a conclusion will be written about the use of the OpenFlow protocol in the early stages of design for small networks. Цель проведения экспериментального исследования заключается в измерении задержек и потерь пакетов за сессию в тех случаях, когда в таблицах коммутации отсутствуют записи потоков. Также исследована зависимость изменения пропускной способности от задержек и сделан вывод о потере пакетов. По результатам экспериментального исследования сделан вывод об использовании протокола OpenFlow на ранних стадиях проектирования малых сетей.
APA, Harvard, Vancouver, ISO, and other styles
30

Dai, Yuanjun, An Wang, Yang Guo, and Songqing Chen. "Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks." ACM Transactions on Internet Technology, September 2, 2022. http://dx.doi.org/10.1145/3559759.

Full text
Abstract:
Distributed denial of service (DDoS) attacks have been prevalent on the Internet for decades. Albeit various defenses, they keep growing in size, frequency and duration. The new network paradigm, Software-defined networking (SDN), is also vulnerable to DDoS attacks. SDN uses logically centralized control, bringing the advantages in maintaining a global network view and simplifying programmability. When attacks happen, the control path between the switches and their associated controllers may become congested due to their limited capacity. However, the data plane visibility of SDN provides new opportunities to defend against DDoS attacks in the cloud computing environment. To this end, we conduct measurements to evaluate the throughput of the software control agents on some of the hardware switches when they are under attacks. Then, we design a new mechanism, called Scotch , to enable the network to scale up its capability and handle the DDoS attack traffic. In our design, the congestion works as an indicator to trigger the mitigation mechanism. Scotch elastically scales up the control plane capacity by using a Open vSwitch based overlay. Scotch takes advantage of both the high control plane capacity of a large number of vSwitches and the high data plane capacity of commodity physical switches to increase the SDN network scalability and resiliency under abnormal (e.g., DDoS attacks) traffic surges. We have implemented a prototype and experimentally evaluated Scotch , Our experiments in the small scale lab environment and large scale GENI testbed demonstrate that Scotch can elastically scale up the control channel bandwidth upon attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Sun, Guanchao, Wei Li, and Di Wang. "Performance Evaluation of DPDK Open vSwitch with Parallelization Feature on Multi-Core Platform." Journal of Communications, 2018, 685–90. http://dx.doi.org/10.12720/jcm.13.11.685-690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mohamad, Aldy, and Purnawarman Musa. "Designing Software Define Network Prototypes with Open vSwitch as Monitoring Traffic Police on The Raspberry Pi." AVITEC 2, no. 2 (August 19, 2020). http://dx.doi.org/10.28989/avitec.v2i2.712.

Full text
Abstract:
Technology is growing from year to year even day to day, this has made the increasing need for infrastructure that supports especially in aspects of computer networks. The increasing number of traffic that is burdening the router or switch encourages the increasing number of nodes to network devices with the aim of reducing and dividing the burden on network traffic. The need for traffic management and control is very important because with the increasing number of network devices and the higher traffic, making a network administrator need more time to handle if there are problems in the network. This research is trying to implement open vSwitch technology on low-cost raspberry pi devices. And by applying the traffic shaping and traffic rate methods by utilizing the traffic control feature on Linux, and then try to divide the amount of traffic received by network devices so that the traffic load becomes controlled. The results of this study, show the results of successful implementation and traffic management work well.
APA, Harvard, Vancouver, ISO, and other styles
33

Agrawal, Lalita, Ayan Mondal, and Mohammad S. Obaidat. "T‐RESIN: Throughput‐aware dynamic resource orchestration for Internet of Everything‐enabled software‐defined edge networks." International Journal of Communication Systems, April 20, 2024. http://dx.doi.org/10.1002/dac.5802.

Full text
Abstract:
SummaryIn this work, we address the problem of resource allocation in Internet of Everything (IoE)‐enabled software‐defined edge networks. In the existing literature, the researchers considered optimizing the performance of the software‐defined networking (SDN) platform using a single‐tier architecture, where the Internet of Things (IoT) devices are in the same tier. However, with the advent of edge computing, we can explore the two‐tier architecture of edge networks—local tier and edge tier—in the presence of SDN, which has not been explored. Hence, we propose an evolutionary game‐based resource allocation scheme for software‐defined edge networks. Additionally, we aim to optimize the QoS of the edge‐based IoE services while optimizing the throughput of the system. The IoT devices use the proposed scheme in the local tier to identify the optimized mapping to the SDN switches. On the other hand, in the edge tier, the proposed scheme aims to optimize the throughput while allocating the IoE service to the optimal subset of edge devices. We evaluated the performance of the proposed scheme using the Python3‐based Mininet platform in the presence of Ryu Controller and Open vSwitches. Ryu is an element‐based software defined networking framework, which offers software elements with well‐described API that enables developers to produce new network control functions. We observed that by using T‐RESIN, the network throughput increases by 27.98%–31.84% than using the existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography