Добірка наукової літератури з теми "Software - configured networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software - configured networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Software - configured networks"

1

Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (December 2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Saleh, Zahraa, and Qahhar Qadir. "The Downside of Software-Defined Networking in Wireless Network." UKH Journal of Science and Engineering 4, no. 2 (December 31, 2020): 147–56. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp147-156.

Повний текст джерела
Анотація:
Mobile traffic volumes have grown exponentially because of the increase in services and applications. Traditional networks are complex to manage because the forwarding, control, and management planes are all bundled together and, thus, administrators are supposed to deploy high-level policies, as each vendor has its own configuration methods. Software-Defined Networking (SDN) is considered the future paradigm of communication networks. It decouples control logic from its underlying hardware, thereby promoting logically centralized network control and making the network more programmable and easy to configure. Low-power wireless technologies are moving toward a multitenant and multiapplication Internet of Things (IoT), which requires an architecture with scalable, reliable, and configured solutions. However, employing an SDN-based centralized architecture in the environment of a low-power wireless IoT network introduces significant challenges, such as difficult-to-control traffic, unreliable links, network contention, and high associated overheads that can significantly affect the performance of the network. This paper is a contribution toward a performance evaluation for the use of SDN in wireless networking by evaluating the latency, packet drop ratio (PDR), data extraction rate (DER), and overheads. The results show that SDN adds a high percentage of overheads to the network, which is about 43% of the 57% user packets, and the DER drops when the number of mesh nodes are increased, in addition to the high loss that was observed for packets that traveled over more hops.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Thirunavukkarasu, V., A. Senthil Kumar, P. Prakasam, and G. Suresh. "Lifetime Maximization for 5G Mobile Networks Using Secured and Finest Optimal Routing Protocol." Journal of Nanoelectronics and Optoelectronics 16, no. 11 (November 1, 2021): 1791–96. http://dx.doi.org/10.1166/jno.2021.3139.

Повний текст джерела
Анотація:
The lifetime enhancement of any 5G Wireless Networks is essential to increase the efficacy and also the network performance. Hence, to enhance the lifetime, identifying a reliable routing protocol is the major challenge in any wireless network. In this proposed research, combined optimization technique named Secured and Finest Optimal Routing (SFOR) protocol is proposed to increase the network lifetime. Therefore, the given scenario is configured as Software Defined Network (SDN) which will configure the network dynamically for efficient management. Three scenario’s of the routing problem is arrived once, the routing of the mobile node is unidentified to derive a SFOR for maximizing the network lifetime. The arrived three scenario’s are mathematically modeled as Linear Programming (LP) problem and the problems are resolved utilizing the source node routing strategies. In this research work, the planned SFOR procedure is deployed in addition efficacy is associated through the reported methods. It is detected that the projected SFOR procedure increases the era of the network is 16% and 50% as compared with Virtual Ad hoc Routing Protocol and Path Collection constructed on Trust Protocol respectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Evglevskaya, N. V., A. I. Paramonov, P. I. Smirnov, and R. V. Shamilova. "Software Defined Network architecture model and cognitive control method for organizing multiple access in the Internet of Things." Radio industry 28, no. 4 (November 27, 2018): 68–75. http://dx.doi.org/10.21778/2413-9599-2018-28-4-68-75.

Повний текст джерела
Анотація:
The study has the method of random multiple wireless access in the networks of the Internet of Things and the control architecture, similar to a software-configured network, examined. The models of collision description, network parameters selection and their initial values, which provide target values for the probability of the delivery in the considered networks, are analyzed. The paper proposes a method the novelty of which lies in the usage of cognitive control of network parameters, taking into account the heterogeneity of conditions for different users with a given probability of data delivery. The proposed method and model of random multiple access and cognitive selection of network parameters are relevant and can be applied when building the access level of the Internet of Things in networks with allowable losses when managing large volumes of heterogeneous traffic and ensuring the required quality of service.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Suresh Babu, Kolluru, and Srikanth Vemuru. "A Low-Cost Software Defined Radio Based Cognitive Radio Test-Bed for LTE Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 51. http://dx.doi.org/10.14419/ijet.v7i3.1.16797.

Повний текст джерела
Анотація:
In this work, we present a low-cost implementation of a Cognitive Radio (CR) test-bed for LTE and LTE-Advanced (LTE-A) Networks. The test-bed setup is implemented using highly integrated Software Defined Radio (SDR) platforms which are well suited for wireless communication. Each transceiver can be configured to work as a primary (resp. secondary) eNodeB or a primary (resp. secondary) user in a Heterogeneous Cognitive Radio framework. In this context, we study the problem of spectrum management in an LTE based heterogeneous network and propose simple distributed algorithms which the secondary eNodeB can employ to efficiently manage the spectral opportunities that arise in such a network. Experimental validation show significant improvement in the secondary link throughput.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhao, Yongli, Jie Zhang, Dahai Han, Lei Wang, Wanyi Gu, and Yuefeng Ji. "Routing on pre-configured topology for dynamic optical networks." Photonic Network Communications 17, no. 3 (August 27, 2008): 299–310. http://dx.doi.org/10.1007/s11107-008-0164-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Roka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.

Повний текст джерела
Анотація:
The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. Signature-based Intrusion Detection System matches network packets against a pre-configured set of intrusion signatures. Current implementations of IDS employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded technique would allow more efficient and scalable exploitation of these multi-processor machines.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

LI, DAWEI, JIE WU, DAJIN WANG, and JIAYIN WANG. "Software-Defined Networking Switches for Fast Single-Link Failure Recovery." Journal of Interconnection Networks 18, no. 04 (December 2018): 1850014. http://dx.doi.org/10.1142/s0219265918500147.

Повний текст джерела
Анотація:
In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through pre-configured IP tunnels), which will deliver the affected traffic to its destination without using the failed link. The goal of the approach is to achieve faster failure recovery than traditional routing protocols that employ reactive computing upon link failures. Software-Defined Networking (SDN) switches can serve as the designated switches because they can flexibly redirect affected traffic to other routes, instead of only to the shortest paths in the network. However, SDN switches are very expensive. Our objective is to minimize the number of SDN switches needed and to guarantee that the network can still recover from any single-link failure. For networks with uniform link costs, we show that using normal non-SDN switches with IP tunneling capability as designated switches can guarantee recovery from any single-link failure. For networks with general link costs, we find that not all single-link failures can be recovered by using non-SDN switches as designated switches; by using SDN switches only when necessary, we can reduce the total number of SDN switches needed compared to an existing work. We conduct extensive simulations to verify our proposed approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Garrison, Philip, Esther Han Beol Jang, Michael A. Lithgow, and Nicolás Andrés Pace. ""The Network Is an Excuse": Hardware Maintenance Supporting Community." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–20. http://dx.doi.org/10.1145/3479608.

Повний текст джерела
Анотація:
The global community networking movement promotes locally-managed network infrastructure as a strategy for affordable Internet connectivity. This case study investigates a group of collectively managed WiFi Internet networks in Argentina and the technologists who design the networking hardware and software. Members of these community networks collaborate on maintenance and repair and practice new forms of collective work. Drawing on Actor-Network Theory, we show that the networking technologies play a role in the social relations of their maintenance and that they are intentionally configured to do so. For technology designers and deployers, we suggest a path beyond designing for easy repair: since every breakdown is an opportunity to learn, we should design for accessible repair experiences that enable effective collaborative learning.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bakouri, Mohsen, Mohammed Alsehaimi, Husham Farouk Ismail, Khaled Alshareef, Ali Ganoun, Abdulrahman Alqahtani, and Yousef Alharbi. "Steering a Robotic Wheelchair Based on Voice Recognition System Using Convolutional Neural Networks." Electronics 11, no. 1 (January 5, 2022): 168. http://dx.doi.org/10.3390/electronics11010168.

Повний текст джерела
Анотація:
Many wheelchair people depend on others to control the movement of their wheelchairs, which significantly influences their independence and quality of life. Smart wheelchairs offer a degree of self-dependence and freedom to drive their own vehicles. In this work, we designed and implemented a low-cost software and hardware method to steer a robotic wheelchair. Moreover, from our method, we developed our own Android mobile app based on Flutter software. A convolutional neural network (CNN)-based network-in-network (NIN) structure approach integrated with a voice recognition model was also developed and configured to build the mobile app. The technique was also implemented and configured using an offline Wi-Fi network hotspot between software and hardware components. Five voice commands (yes, no, left, right, and stop) guided and controlled the wheelchair through the Raspberry Pi and DC motor drives. The overall system was evaluated based on a trained and validated English speech corpus by Arabic native speakers for isolated words to assess the performance of the Android OS application. The maneuverability performance of indoor and outdoor navigation was also evaluated in terms of accuracy. The results indicated a degree of accuracy of approximately 87.2% of the accurate prediction of some of the five voice commands. Additionally, in the real-time performance test, the root-mean-square deviation (RMSD) values between the planned and actual nodes for indoor/outdoor maneuvering were 1.721 × 10−5 and 1.743 × 10−5, respectively.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Software - configured networks"

1

Волосянко, Кирило Сергійович. "Аналіз процедур забезпечення якості у мобільних мережах 5G". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39365.

Повний текст джерела
Анотація:
Мета роботи: підвищення якості надання послуг кінцевим користувачам мобільних мережах 5G за рахунок поєднання доступних засобів керування. В даній роботі розглядається технологія 5G, принцип роботи, вимоги до якості мережі. Також ознаюмлюємось з технологією SDN, її архітектурою та принципами роботи. Проведено аналіз технології SDN та 5G, описані недоліки SDN, також переваги 5G та вимоги до її якості.
Purpose: to improve the quality of services to end users of 5G mobile networks through a combination of available controls. In any case, you can use 5G technology, working, requiring other users to follow. We will also define with SDN technology, its architecture and principles of work. Analytical technologies of SDN and 5G are carried out, shortcomings of SDN, and also 5G are described and necessary for its work.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Марчук, Олександр Олегович. "Метод управління безпекою інформаційних потоків мережі IoT за допомогою SDN". Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39304.

Повний текст джерела
Анотація:
Актуальність: Підвищення якості функціонування мереж зв'язку за рахунок поліпшення надійності є складною науково-технічною та економічною проблемою. Це обумовлено тим що до мереж з новими технологіями, таким як програмно-конфігуровані мережі (SDN) в даний час висувають високі вимоги по надійності (відмовостійкості) в тому числі до характеристик відновлення мережі після відмови. При розробці заходів, що підвищують надійність доцільна постановка задачі максимально можливого підвищення якості функціонування мережі при мінімальному часу відновлення зв'язку. Високий рівень відмовостійкості мережі забезпечується за рахунок швидкого виявлення пошкоджень і усунення їх наслідків за короткий час. Існуючі методи забезпечення надійності в мережах SDN можна поділити на два самостійних класи: захисне перемикання (резервування) і відновлення (перемаршрутизація). Звідси випливає що для системного підходу до дослідження методів забезпечення надійності SDN доцільно використовувати засоби математичного моделювання. Дослідження механізмів забезпечення надійності SDN розглядається в ряді робіт, як вітчизняних, так і зарубіжних. Однак в даних роботах не проводиться порівняльний аналіз використання механізмів забезпечення відмовостійкості, а також комбінації цих механізмів. Так само в ряді робіт не враховуються економічні показники використання даних механізмів. Мета роботи: підвищити відмовостійкість при DoS-атаці системи Інтернету речей з використанням концепції SDN за рахунок премаршутизації та резервування комунікаційних ресурсів, що дозволить зменшити час до виявлення відмови методами швидкого відновлення, зменшиння відсотка навантаженості. Задачі дослідження: 1. Проаналізувати існуючі підходи щодо управління безпекою інформаційних потоків мережі IoT за допомогою SDN . 2. Запропонувати модель управління безпекою інформаційних потоків мережі IoT при DoS-атаці, яка дозволить зменшити як ймовірність відмови, так і вплив відмови ; 3. Вдосконалити процедуру керування безпекою інформаційних потоків мережі IoT яка враховує можливості організації потоків в програмно-керованих мережах (SDN); 4. Розробити удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN та резервування контролера, що дозволить отримати надійну мережу, не враховуючи збільшення часу до виявлення відмови при роботі методів швидкого відновлення. 5. Розробка імітаційної моделі в середовищі MiniNet, планування та проведення експерименту з метою перевірки теоритичних положень та доведення їх ефективності. 6. Розробка стартап проекту для системи безпеки IoT. Об’єкт дослідження: пристрої і технології організації програмно-керованого зв'язку в мережі Інтернету речей. Предмет дослідження: моделі та методи управління безпекою інформаційних потоків мережі IoT за допомогою SDN Методи дослідження: Проведені дослідження базуються на теорії ймовірностей, математичній статистиці, теорії телекомунікацій методах моделювання. Моделювання фрагмента мережі ІР проведено на основі пакета MiniNet. Наукова новизна: Запропоновано удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN, який дозволяє підвищити відмовостійкість при DoS-атаці системи Інтернету речей, зменшити час до виявлення відмови методами швидкого відновлення, зменшити відсотка завантаженості мережі, за рахунок премаршутизації та резервування комунікаційних ресурсів. Практична новизна: Пропонована модель PFI скорочує час на встановлення шляху, знижує час обробки контролера і зменшує трафік каналу управління при DoS-атаці на мережу шляхом використання методів резервування та відновлення зв’язку, також взаємодіє з протоколами безпеки, основним з них є OpenFlow.
Relevance: Improving the quality of communication networks by improving reliability is a complex scientific, technical and economic problem. This is due to the fact that networks with new technologies, such as software-configured networks (SDN) currently have high requirements for reliability (fault tolerance), including the characteristics of network recovery after failure. When developing measures to increase reliability, it is advisable to set the task of maximizing the quality of network operation with a minimum connection recovery time. The high level of fault tolerance of the network is provided due to fast detection of damages and elimination of their consequences in a short time. Existing methods of ensuring reliability in SDN networks can be divided into two separate classes: protective switching (redundancy) and recovery (rerouting). It follows that for a systematic approach to the study of methods to ensure the reliability of SDN, it is advisable to use mathematical modeling. The study of the mechanisms of ensuring the reliability of SDN is considered in a number of works, both domestic and foreign. However, these works do not provide a comparative analysis of the use of mechanisms to ensure fault tolerance, as well as a combination of these mechanisms. Similarly, a number of works do not take into account the economic indicators of the use of these mechanisms. Purpose: to develop a method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will provide a reliable network, without taking into account the increase in time to detect failure of rapid recovery methods. Research objectives: 1. to propose a model of security management of information flows of the IoT network; 2. provide an algorithm for managing the security of information flows of the IoT network using SDN; 3. to reveal the methodology for determining the effectiveness of security management of information flows of the IoT network using SDN; 4. to develop an improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Object of research: devices and technologies of communication organization in the Internet of Things. Subject of research: data transmission models and methods of ensuring the functioning of the Internet of Things in the face of hazards. Research methods: The research is based on probability theory, mathematical statistics, modeling methods and field experiments. The simulation of a fragment of the IP network was performed on the basis of a simulation package. Scientific novelty: An improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy has been proposed, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Practical novelty: The obtained results can be implemented in a real enterprise in order to improve the quality of security management of information flows of the IoT network using SDN.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Одарченко, Роман Сергійович, Roman Odarchenko та Одарченко Роман Сергеевич. "Методологія підвищення ефективності функціонування стільникових мереж зв'язку". Thesis, Національний авіаційний університет, 2019. http://er.nau.edu.ua/handle/NAU/38385.

Повний текст джерела
Анотація:
В роботі було розроблено методологію підвищення ефективності стільникових мереж зв’язку, яка полягає у використанні удосконалено методу планування мережі стільникового зв’язку для розгортання стільникових мереж нового покоління, методу оцінки ключових показників функціонування мережі стільникового оператора з метою безперервної оптимізації мережі оператора шляхом використання методу оптимізації підсистеми базових станцій розгорнутої мережі стільникового оператора, удосконаленого методу розвантаження радіо інтерфейсу мережі стільникового оператора із використанням підмережі Wi-Fi (Wireless Fidelity), методу оптимізації багаторівневого транспортного сегменту стільникової мереж, удосконаленого методу маршрутизації із резервуванням ресурсів та балансуванням навантаження транспортної мережі стільникового оператора, методу оцінки ефективності програмно-конфігурованої мережі та методу мережецентричного моніторингу та реагування на кіберінциденти в мережі оператора стільникового зв’язку. За допомогою розробленої методології операторам стільникового зв’язку вдається підвищити ефективність функціонування своїх мереж за рахунок збільшення радіусу зон обслуговування абонентів стільникових мереж, мінімізації необхідної кількості базових станцій для побудови мережі, збільшення вдвічі кількості активних абонентів, які обслуговуються в стільнику та забезпечення балансування навантаження в радіопідмережі, підвищення економічної ефективності транспортної мережі, підвищення рівня надійності мережі, оптимізації утилізації транспортних каналів, проведення більш гнучкого та оперативного розширення мережі, запровадження нових сервісів, підвищення оперативності доставки даних для ієрархічної структури рівня управління. Отримані наукові результати доцільно використовувати під час планування безпроводових мереж стандарту LTE та 5G, розробки обладнання та програмного забезпечення для систем передачі даних, а також в навчальному процесі.
Диссертация посвящена вопросам разработки методологии повышения эфективности сотовых сетей связи. В работе был проведен анализ качества обслуживания абонентов сотовых сетей в Украине с целью определения их эффективности. Было установлено, что заявленные требования к сетям четвертого поколения не достигаются ни в одной из реализованных сетей, а фактическое качество обслуживания абонентов находится на достаточно низком уровне, что свидетельствует о низкой эффективности существующих методов планирования радиосетей, транспортных подсистем и методов управления. В работе были предложены альтернативные стратегии развития операторов сотовой связи в Украине. В работе впервые разработана методология повышения эффективности сотовых сетей связи, заключающаяся в использовании усовершенствованного метода планирования сети LTE для развертывания сотовых сетей нового поколения, метода оценки ключевых показателей функционирования сети сотового оператора с целью непрерывного оп-тимизации сети оператора путем использования метода оптимизации подсистемы базо вых станций развернутой сети сотового оператора, усовершенствованного метода рас-погрузки радио интерфейса сети сотового оператора с использованием подмел-режиме Wi-Fi, метода оптимизации многоуровневого транспортного сегмента сотовой сетей, метода резервирования ресурсов и балансировки нагрузки транспортной ме-режи сотового оператора и метода оценки эффективности программно-конфигурируемых сети. С помощью разработанной методологии операторам сотовой связи удается повысить эффективность своих сетей за счет увеличения радиус зон обслуживания абонентов сотовых сетей, минимизации необходимого количества базовых станций для построения сети, увеличение вдвое количества активных абонентов, обслугвуються в базовой и обеспечения балансировки нагрузки в радиопидмережи, повышение економинои эффективности транспортной сети, повышение уровня надежности сети, оптимизацией утилизации транспортных каналов, проведение более гибкого и оперативного расширения сети, внедрение новых сервисов, повышения оперативности доставки данных для иерархической структуры уровня управления.
The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. Chief among them is the tremendous growth in multimedia applications on mobile devices – streaming music and video, two-way video conferencing and social networking to name a few. The telecoms industry is undergoing a major transformation towards 5G networks in order to fulfil the needs of existing and emerging use cases. The 5G architecture should seamlessly support both fixed and mobile access technologies under a fully converged end-to-end system in order to deliver future service requirements for some of the deployment scenarios that could be supported. This technologies in nearest future have come to Ukraine too. That’s why in this dissertation an analysis of the quality of service of subscribers of cellular networks in Ukraine was conducted in order to determine the efficiency of their operation and security. An analysis of the quality of customer service in the implemented projects of LTE networks in the world and 4G networks in Ukraine has established that the claimed requirements for fourth generation networks are not achieved in any of the implemented networks, and the actual quality of customer service (target efficiency) is at a rather low level which indicates the low efficiency of existing radio network planning methods, transport subsystems, control and cybersecurity management methods. This made it possible to determine the directions by which it is necessary to increase the efficiency of the operation of cellular networks. In this dissertation were developed several methods to improve network efficiency. The method of planning of the network of the cellular operator enables cellular operators to more accurately assess the coverage of radio coverage areas, choose key indicators of service quality, more efficient frequency planning and capital cost calculation, which in turn allows us to assess the feasibility of constructing a cellular network option. On the basis of this advanced method, a training software (web-application) was developed to evaluate radio coverage zones of LTE network base stations. The method for evaluating key indicators of service quality, the level of information security and the efficiency of cellular networks makes it possible to assess the most important indicators of the quality of functioning and security of the cellular network network in order to continuously monitor and optimize them when introducing new services during customer service. The method for optimizing the subsystem of base stations allows to increase the radius of subscriber service areas of cellular networks, which allows minimizing the number of base stations for network construction, and therefore reduce the cost of the cellular operator to build the subsystem of the base stations, that is, increase the economic efficiency of the network. Improved method of the radio interface off-loading using a non-3GPP standard subnet allow to reduce the load on the radio interface of the network of the cellular network to an acceptable level, double the number of active subscribers, which are served in the cell, and provide load balancing and increase the efficiency of the radio subnetwork. The method of optimization of a multi-level transport segment of a cellular network has been developed, which allows to improve the structure of the transport network during the transition to new generations networks, providing the necessary capacity and increasing and improving the efficiency of the transport network. The method of routing with resource reservation and balancing of the traffic of a cellular operator with the consideration of information security requirements allows to increase the efficiency of the transport channels usage. The method for evaluating the effectiveness of a software-configured network allows for a more flexible and operational expansion of the network, the introduction of new services, increasing the efficiency of data delivery for the hierarchical structure. The method of network-centric monitoring and response to cyber incidents in the network of the cellular network allows real-time monitoring of the state of cyber security, its level and, consequently, the efficiency of the cellular network. On the base of these methods in this dissertation was developed cellular networks efficiency improving methodology, which is using the improved method of LTE network planning, the key method for assessing performance of the cellular operator for the purpose of continuous operator network optimizing using the method of base station subsystem optimization, improved method of radio interface of the cellular operator offloading using Wi-Fi, the method of optimization of multi-vehicle segment of the cellular network, the method of roating with resource reservation and load balancing of mobile operator and method of SDN network effectiveness evaluation. Using the developed methodology mobile operators can improve the efficiency of their networks by increasing the radius of the service areas, minimizing the required number of base stations for the construction of the network, doubling the number of active subscribers in the cell and provide load balancing in transport and radio network, increase transport network efficiency, enhance network reliability, optimize utilization of transport channels for a more flexible and rapid network expansion, introduction of new services and improved data delivery in the hierarchical structure of SDN. It is advisable to use the obtained scientific results when planning LTE and 5G wireless networks, developing equipment and software for data transmission systems, as well as in the learning process.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Software - configured networks"

1

Miletić, Darko. Moodle security: Learn how to install and configure Moodle in the most secure way possible. Birmingham, U.K: Packt Pub., 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Inc, ebrary, ed. ADempiere 3.4 ERP solutions: Design configure, and implement a robust enterprise resource planning system in your organization by using ADempiere. Birmingham, U.K: Packt Pub., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Inc, ebrary, ed. pfSense 2 cookbook: A practical, example-driven guide to configure even the most advanced features of pfSense 2. Birmingham, U.K: Packt Open Source, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Software - configured networks"

1

Sanvito, Davide. "Traffic Management in Networks with Programmable Data Planes." In Special Topics in Information Technology, 13–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_2.

Повний текст джерела
Анотація:
AbstractThis brief includes a summary of the Ph.D. thesis entitled “Traffic management in networks with programmable data planes” and supervised by Prof. Antonio Capone. Software-Defined Networking (SDN) enables the configuration and operation of communications networks through open software programming interfaces providing an unprecedented flexibility in their dynamic reconfiguration and management. The thesis analyses the opportunities for traffic management provided by the SDN paradigm at different levels. Starting from the programmability at the control plane, we have designed a Traffic Engineering framework operating on the global view offered on top of the controller to proactively configure the network according to traffic measurements while limiting the number of reconfigurations. In order to deal with unexpected conditions such as network failures and congestion, the above centralized, global and proactive approach has been complemented by reactive and distributed approaches based on advanced stateful programmable data planes which enable a self-adaptation according to partial local information yielding to a more prompt and scalable reaction. All the solutions presented in the thesis have been evaluated with software prototypes based on research-oriented or production-ready open-source tools. Some of the extensions developed for these tools have been integrated as official open-source contributions.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gupta, Govind P. "Software-Defined Networking Paradigm in Wireless Sensor Networks." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 254–67. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3640-6.ch012.

Повний текст джерела
Анотація:
Software-defined networking (SDN) is an emerging network design and management paradigm that offers a flexible way for reducing the complexity of the network management and configuration. SDN-based wireless sensor networks (SDWSNs) consist of a set of software-defined sensor nodes equipped with different types of sensors. In SDWSN, sensor node is able to conduct different sensing tasks according to the programs injected into it and functionalities of these nodes can also be dynamically configured by injecting different application-specific programs. SDWSNs adopt the characteristics of SDN and can provide energy efficient solutions for various problems such as topology management, sleep scheduling, routing, and localization, etc. This chapter discusses how to apply SDN model in the design of an energy-efficient protocol for wireless sensor networks and also presents an overview of SDN model proposed for wireless sensor networks and SDN-based resource management, routing, sleep scheduling algorithm, localization for SDWSNs. Finally, open research challenges are summarized.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mbale, Jameson, and Manish Wadhwa. "Securing Enterprises from Malicious Attacks on their Networks." In Advances in Business Information Systems and Analytics, 118–42. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6473-9.ch006.

Повний текст джерела
Анотація:
Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the first direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are configured with Access Control Lists (ACL) that are used to filter in the intended packets and filter out the dangerous malicious packets from network traffic. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mani, Santosh, and Manisha J. Nene. "Distributed Denial of Service Attacks Detection and Mitigation in Software Defined Mesh Networks." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210218.

Повний текст джерела
Анотація:
Networks configured in Mesh topology provide Network security in the form of redundancy of communication links. But redundancy also contributes to complexity in configuration and subsequent troubleshooting. Critical networks like Backbone Networks (used in Cloud Computing) deploy the Mesh topology which provides additional security in terms of redundancy to ensure availability of services. Distributed Denial of Service attacks are one of the most prominent attacks that cause an immense amount of loss of data as well as monetary losses to service providers. This paper proposes a method by which using SDN capabilities and sFlow-RT application, Distributed Denial of Service (DDoS) attacks is detected and consequently mitigated by using REST API to implement Policy Based Flow Management through the SDN Controller which will help in ensuring uninterrupted services in scenarios of such attacks and also further simply and enhance the management of Mesh architecture-based networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ramadan, Rabie A., and Fatma H. Elfouly. "Multi-Object Tracking in Wireless Sensor Networks Using Swarm Intelligence." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 293–313. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5788-4.ch012.

Повний текст джерела
Анотація:
Wireless sensor networks (WSNs) may be described as a self-configured wireless networks that can be used to track physical objects or monitor environmental features, such as temperature or motion. The sensed data is then passed across the network to the main location or sink node, where the data can be processed and analyzed. Sensor nodes in WSN are fundamentally resource-constrained: they have restricted processing power, computing, space, and transmission bandwidth. Object tracking is considered as one of the major applications. However, many of the recent articles focused on object localization. In this chapter, the authors suggest an effective approach for tracking objects in WSNs. The aim is to achieve both minimal energy consumption in reporting activity and balanced energy consumption across the WSN lifetime extension of sensor nodes. Furthermore, data reliability is considered in our model. The chapter starts by formulating the multi-object tracking problem using 0/1 Integer Linear programming. In addition, the authors adopted the swarm intelligence technique to solve the optimization problem.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Róka, Rastislav. "Broadband NG-PON Networks and Their Designing Using the HPON Network Configurator." In Convergence of Broadband, Broadcast, and Cellular Network Technologies, 277–97. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5978-0.ch012.

Повний текст джерела
Анотація:
With the emerging applications and needs of ever increasing bandwidth, it is anticipated that the Next-Generation Passive Optical Network (NG-PON) with much higher bandwidth is a natural path forward to satisfy these demands and for network operators to develop valuable access networks. NG-PON systems present optical access infrastructures to support various applications of many service providers. Therefore, some general requirements for NG-PON networks are characterized and specified. Hybrid Passive Optical Networks (HPON) present a necessary phase of the future transition between PON classes with TDM or WDM multiplexing techniques utilized on the optical transmission medium – the optical fiber. Therefore, some specific requirements for HPON networks are characterized and presented. For developing hybrid passive optical networks, there exist various architectures and directions. They are also specified with emphasis on their basic characteristics and distinctions. Finally, the HPON network configurator as the interactive software tool is introduced in this chapter. Its main aim is helping users, professional workers, network operators and system analysts to design, configure, analyze, and compare various variations of possible hybrid passive optical networks. Some of the executed analysis is presented in detail.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nayak, Seema, Manoj Nayak, and Pankaj Pathak. "A Review on FPGA-Based Digital Filters for De-Noising ECG Signal." In Sensor Network Methodologies for Smart Applications, 1–24. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-4381-8.ch001.

Повний текст джерела
Анотація:
This chapter gives an overview of synthesis and analysis of digital filters on FPGA for denoising ECG signal, which provides clinical information related to heart diseases. Various types of IIR and FIR filtration techniques used for noise removal are also discussed. Many developments in the medical system technology gave birth to monitoring systems based on programmable logic devices (PLDs). Although not new to the realm of programmable devices, field programmable gate arrays (FPGAs) are becoming increasingly popular for rapid prototyping of designs with the aid of software simulation and synthesis. They are reprogrammable silicon chips, configured to implement customized hardware and are highly desirable for implementation of digital filters. The extensive literature review of various types of noise in ECG signals, filtering techniques for noise removal, and FPGA implementation are presented in this chapter.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Lin, Wei-Wen, Jih-Sheng Shen, and Pao-Ann Hsiung. "An Efficient Hardware/Software Communication Mechanism for Reconfigurable NoC." In Dynamic Reconfigurable Network-on-Chip Design, 84–109. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-807-4.ch004.

Повний текст джерела
Анотація:
With the progress of technology, more and more intellectual properties (IPs) can be integrated into one single chip. The performance bottleneck has shifted from the computation in individual IPs to the communication among IPs. A Network-on-Chip (NoC) was proposed to provide high scalability and parallel communication. An ASIC-implemented NoC lacks flexibility and has a high non-recurring engineering (NRE) cost. As an alternative, we can implement an NoC in a Field Programmable Gate Arrays (FPGA). In addition, FPGA devices can support dynamic partial reconfiguration such that the hardware circuits can be configured into an FPGA at run time when necessary, without interfering hardware circuits that are already running. Such an FPGA-based NoC, namely reconfigurable NoC (RNoC), is more flexible and the NRE cost of FPGA-based NoC is also much lower than that of an ASIC-based NoC. Because of dynamic partial reconfiguration, there are several issues in the RNoC design. We focus on how communication between hardware and software can be made efficient for RNoC. We implement three communication architectures for RNoC namely single output FIFO-based architecture, multiple output FIFO-based architecture, and shared memory-based architecture. The average communication memory overhead is less on the single output FIFO-based architecture and the shared memory-based architecture than on the multiple output FIFO-based architecture when the lifetime interval is smaller than 0.5. In the performance analysis, some real applications are applied. Real application examples show that performance of the multiple output FIFO-based architecture is more efficient by as much as 1.789 times than the performance of the single output FIFO-based architecture. The performance of the shared memory-based architecture is more efficient by as much as 1.748 times than the performance of the single output FIFO-based architecture.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Godoy, Pablo Daniel, Osvaldo Lucio Marianetti, and Carlos Gabriel García Garino. "Experiences With Computer Architecture Remote Laboratories." In Handbook of Research on Software Quality Innovation in Interactive Systems, 133–53. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7010-4.ch005.

Повний текст джерела
Анотація:
This chapter resumes several experiences about using a remote laboratory based on Raspberry Pi computers and Arduino microcontrollers. The remote laboratory has been used to teach computer architecture, parallel programming, and computer networks on computer sciences and telecommunications careers. The laboratory is aimed at students with medium level of programming knowledge, which require flexible access to the computers being able to implement their own solutions. Students can explore the software and hardware of the laboratory computers, deploy, and run their codes, perform input and output operations, and configure the computers. Four different architectures are described, based on cloud computing and remote procedure calls, IoT platforms, VPN, and remote desktop. On the other hand, practical activities performed by students are summarized. Advantages and disadvantages of these architectures, problems that arose during the teaching experiences, and future work are described.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Software - configured networks"

1

Bellio, Philip R. "Digital Controls and Modern Fuel Systems for Marine Prime Movers." In ASME Turbo Expo 2000: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/2000-gt-0324.

Повний текст джерела
Анотація:
Digital controls and modern fuel systems for marine prime movers are beginning to populate the waterways and oceans, but long after industrial facilities recognized their benefits and standardized on them. Additionally, it is somewhat ironic that many marine prime movers, particularly aeroderivative gas turbines, still utilize aircraft or aircraft-derivative hydromechanical controls, yet require significant engine room manning. Digital controls, electrically actuated fuel and air valves, shipboard networks, and CRT-based operator interfaces have all been proven, and are available for every marine prime mover application. It appears to be more of a mindset than anything else preventing the move to electronic controls and modern fuel systems. Additional roadblocks to change may be “comfort with the old stuff”, marine certifications, and high availability of older hardware. As demands for improved efficiency, decreased emissions, and reduced operating expense continue there will be more pressure to upgrade existing older controls and fuel systems, as well as build ships with prime movers equipped with current control technology. A modern electronic control designed for prime movers which interfaces to not only the prime mover, can also provide data to shipboard systems, as well as be configured for satellite links to off-shore facilities. Other advantages of a digital control and modern fuel system include: • Software configurable/dependent • Self-diagnostics and monitoring • Condition-based maintenance • Elimination of hydraulics • Reduced manning requirements • Precise air and fuel metering • Current technology
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Vaz, Gabriel Marvel, Tiago Antonio Rizzetti, and Walter Priesnitz Filho. "Um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões com a ferramenta Suricata." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17358.

Повний текст джерела
Анотація:
Neste artigo é apresentado um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões em uma rede de computadores de uma instituição de ensino. A arquitetura adotada baseou-se em utilizar um Network Intrusion Prevention System (NIPS) em conjunto com Host Intrusion Prevention System (HIPS), a fim de detectar e bloquear ataques destinados à rede. O software Suricata foi configurado inline, filtrando o tráfego da rede. Para visualização dos logs, a pilha Elasticsearch, Logstash e Kibana (ELK) foi configurada em conjunto com a ferramenta Synesis, permitindo a visualização dos dados através de uma interface Web. Com isso, foi possível detectar e bloquear ameaças, dentre elas varreduras, comunicações originadas por hosts maliciosos entre outras. A partir disso, foram tomadas ações como a adição de novas regras de firewall, criação de uma blacklist, dentre outras medidas que contribuíram para elevar o nível de segurança da rede.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vaz, Gabriel Marvel, Tiago Antonio Rizzetti, and Walter Priesnitz Filho. "Um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões com a ferramenta Suricata." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17358.

Повний текст джерела
Анотація:
Neste artigo é apresentado um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões em uma rede de computadores de uma instituição de ensino. A arquitetura adotada baseou-se em utilizar um Network Intrusion Prevention System (NIPS) em conjunto com Host Intrusion Prevention System (HIPS), a fim de detectar e bloquear ataques destinados à rede. O software Suricata foi configurado inline, filtrando o tráfego da rede. Para visualização dos logs, a pilha Elasticsearch, Logstash e Kibana (ELK) foi configurada em conjunto com a ferramenta Synesis, permitindo a visualização dos dados através de uma interface Web. Com isso, foi possível detectar e bloquear ameaças, dentre elas varreduras, comunicações originadas por hosts maliciosos entre outras. A partir disso, foram tomadas ações como a adição de novas regras de firewall, criação de uma blacklist, dentre outras medidas que contribuíram para elevar o nível de segurança da rede.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Silva, Thiago Bueno da, José A. T. Gavazza, Fábio L. Verdi, José A. Suruagy, Juliano Coelho, Flávio Silva, and Antônio M. Alberti. "Plano de Controle da Arquitetura NovaGenesis para um Ponto de Interconexão de Tráfego Multi-Arquitetura." In Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wpeif.2021.17197.

Повний текст джерела
Анотація:
Este artigo introduz a arquitetura NovaGenesis ao contexto de Software Defined Networks com P4. Por meio do projeto Future Internet Exchange Point, a arquitetura é capaz de configurar dinamicamente um roteador P4 que conecta dois hosts NG. Os resultados obtidos comprovam a viabilidade do protótipo, visto que os atrasos inseridos não impactam muito na aplicação NG.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cerqueira de Santana, Jose´ Paulo, and Ose´ias Boettcher Fonseca. "Pilot Project for Acquisition System of Chromatograph Signals and Custody Measurements Via Web." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0169.

Повний текст джерела
Анотація:
This article defines a very cheap alternative for acquisition of chromatograph signals and/or custody measurements in the process plants of oil and gas pipelines. The devices possess standards and diverse communication ports, demanding a modular architecture to acquire the values of the devices and provide the signals by Web/Intranet, using corporative network, dial-up PSTN line, leased line or cellular phone. This solution is applicable to sets of field devices that need to collect data in real time or in periods of time pre-configured and provide the information for visualization by a browser, load in a database or monitor the devices remotely by the supervision central. The architecture has the following characteristics: • Modularity; • Conversion of the out signal of the devices into standard Ethernet; • The Modbus-rtu is a network protocol; • Provide the signals by Web/Intranet; • Visualization of the signals in Browser; • Historical register of the data read in web Server devices; • Operational environment Windows 2000, Windows CE; • Configuration of the time of frequency of the equipments signals; • Allow integration with supervisory system; • Allow integration with corporative Data Base. To validate the architecture, we made tests in a Pilot Project, carried through in a PETROBRAS receiving station of Natural Gas, using the hardware and software components described in the article.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ramerth, D. L., A. V. MirzaMoghadam, A. Kiratsingh, and G. Banda. "A Probabilistic Secondary Flow System Design Process for Gas Turbine Engines." In ASME Turbo Expo 2010: Power for Land, Sea, and Air. ASMEDC, 2010. http://dx.doi.org/10.1115/gt2010-22071.

Повний текст джерела
Анотація:
Gas turbine engine secondary flow systems are sensitive to variation in part dimensions, clearances, flow coefficients, swirl ratios, head loss factors, tolerances, boundary conditions, etc. This paper reveals a process and software application which embodies the process wherein both offer a measurable contribution to secondary airflow system reliability. The probabilistic methodology is empirically validated by (1) applying it to an engine component that failed in a validation test, and (2) demonstrating that a multiple order sensitivity analysis performed during detailed design was unable to detect a failure mode while a probabilistic analysis revealed a small yet significant risk of catastrophic failure. Therefore, a secondary flow analyst does not have a justifiable reason to be highly confident of a design qualified by a first, second, or higher order sensitivity analysis. The last example empirically demonstrates compatibility of optimization techniques with probabilistic methods (as part of the process) to quantify the likelihood of failure and reveal an optimized design space of key characteristics where risk is eliminated and the effects of variation are controlled. Trade study analysis is more valuable if it includes a quantitative evaluation of the effects of variation on alternate designs and the response to failure modes. A key feature of the software application is a relational database with the capability to configure and effectively manage flow networks in many forms including, a status model, failure modes of the status model, multiple alternative designs as well as failure modes specific to an alternative design.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Li, Wei, W. Ed Red, C. Greg Jensen, and Tyler Davis. "Dynamic Reconfigurable Machine Tool Controller." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-61317.

Повний текст джерела
Анотація:
This paper presents a dynamic reconfigurable control strategy based on the Direct Machining And Control (DMAC) research at Brigham Young University. We propose a reconfigurable framework which will allow a DMAC compliant machine to be controlled by a variety of applications and control laws. This Reconfigurable Mechanism for Application Control (RMAC) paradigm uses a hierarchical architecture to configure a mechanism into a device driver for direct control by an application like CAD/CAM. The paradigm is one of a mechanism device driver assigned to each mechanism class or model, and uses only the master model to control the mechanism. The traditional M&G code language is no longer necessary since motion entities (NURBS, lines, arcs, etc) are passed directly to the mechanism. The design strategy of using dynamic-link libraries (DLL) to form a mechanism device driver permits a mechanism to assume different operating configurations, depending on the number of axes and machine resolution. For example, the machine can perform as a material removal machine in one instant, and then, by loading a new device driver, act as a Coordinate Measuring Machine (CMM). This strategy is possible because DMAC is a software and networked-based control architecture. Both the CAD/CAM planning software and the real-time control software reside on the same PC. The CAM process plan can thus directly control the machine without need for process plan decomposition into the forms supported by the native controller. The architectural framework is explained in detail and the methodology for control software reconfiguration into a device driver is presented. For demonstration purposes three device drivers will be implemented on one machine to demonstrate feasibility and usefulness.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії