To see the other types of publications on this topic, follow the link: Packet Forwarding Engines (Routers).

Journal articles on the topic 'Packet Forwarding Engines (Routers)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 45 journal articles for your research on the topic 'Packet Forwarding Engines (Routers).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kai, Yi, and Bin Liu. "Traffic Dispatch Policy in a Power-Aware Router." Applied Mechanics and Materials 380-384 (August 2013): 3366–69. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3366.

Full text
Abstract:
In this paper, we present a new traffic dispatch policy for a power-aware router, which was named GreenRouter and was proposed in our previous publication [. Packet processing capacities, mainly including IP lookup and forwarding engines, are shared and modulated according to traffic loads, unoccupied capacities are powered off in order to save power. A flow based traffic dispatch policy was proposed to allocate traffic from network interfaces to processing engines dynamically. Significant power saving has been achieved while QoS constrains have been satisfied. We present a new packet-based di
APA, Harvard, Vancouver, ISO, and other styles
2

Mizrak, A. T., S. Savage, and K. Marzullo. "Detecting compromised routers via packet forwarding behavior." IEEE Network 22, no. 2 (2008): 34–39. http://dx.doi.org/10.1109/mnet.2008.4476069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meena, Ramesh Chand, Surbhi Bhatia, Rutvij H. Jhaveri, et al. "Enhancing Software-Defined Networks with Intelligent Controllers to Improve First Packet Processing Period." Electronics 12, no. 3 (2023): 600. http://dx.doi.org/10.3390/electronics12030600.

Full text
Abstract:
Software-Defined Networking (SDN) has a detailed central model that separates the data plane from the control plane. The SDN controller is in charge of monitoring network security and controlling data flow. OpenFlow-enabled routers and switches work as packet-forwarding devices in the network system. At first, OpenFlow forwarding devices like routers and switches do not know how to handle the data packets transmitted by the host. This is because they do not have any security controls, policies, or information. These packets are sent to their destination. In this situation, the OpenFlow forward
APA, Harvard, Vancouver, ISO, and other styles
4

Hanji, Bhagyashri R., and Rajashree Shettar. "Cross Layer Solution for Energy and Delay Optimization in MANETs." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4745. http://dx.doi.org/10.11591/ijece.v8i6.pp4745-4754.

Full text
Abstract:
A novel method for packet forwarding in MANETs has been proposed in this paper. A node in the network acts as both host and router. Energy utilization of the node increases as all nodes in MANET operate as source, destination, and router to forward packets to the next hop ultimately to reach destination. Routers execute a variety of functions from simple packet classification for forwarding to complex payload revision. As the number of tasks and complexity increases, processing time required also increases resulting in significant processing delay in routers. The proposed work optimizes packet
APA, Harvard, Vancouver, ISO, and other styles
5

Mun, Ju Hyoung, and Hyesook Lim. "On Sharing an FIB Table in Named Data Networking." Applied Sciences 9, no. 15 (2019): 3178. http://dx.doi.org/10.3390/app9153178.

Full text
Abstract:
As a new networking paradigm, Named Data Networking (NDN) technology focuses on contents, and content names are used as identifiers for forwarding and routing, as opposed to IP addresses in the current Internet. NDN routers forward packets by looking up a Forwarding Information Base (FIB), each entry of which has a name prefix and output faces. An FIB should have the information to forward Interest packets for any contents. Hence, the size of an FIB would be excessively large in NDN routers, and the traffic for building an FIB would be significant. In order to reduce the traffic associated wit
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Jian Feng, Zheng Liu, and Rui Gu. "6to4 Tunnel Drive Research and Realization on High-End Routers." Advanced Materials Research 838-841 (November 2013): 3268–72. http://dx.doi.org/10.4028/www.scientific.net/amr.838-841.3268.

Full text
Abstract:
In this paper we designed a set of driving process in order to achieve the IPv6 network connectivity between the isolated IPv6 islands which can instruct tunnel packet to forward on the chips. First, it introduces 6to4 tunnel, system structure and the process of chip forwarding. Then it introduces how the drvier respond to the platform and write the correct message on the chip after processing. Experimental results show that the driving process can instruct 6to4 tunnel packet to forward on the NP chip very well. The result is good and has strong practicability.
APA, Harvard, Vancouver, ISO, and other styles
7

Zeng, Li, Hong Ni, and Rui Han. "The Yellow Active Queue Management Algorithm in ICN Routers Based on the Monitoring of Bandwidth Competition." Electronics 10, no. 7 (2021): 806. http://dx.doi.org/10.3390/electronics10070806.

Full text
Abstract:
Deploying the active queue management (AQM) algorithm on a router is an effective way to avoid packet loss caused by congestion. In an information-centric network (ICN), routers not only play a role of packets forwarding but are also content service providers. Congestion in ICN routers can be further summarized as the competition between the external forwarding traffic and the internal cache response traffic for limited bandwidth resources. This indicates that the traditional AQM needs to be redesigned to adapt to ICN. In this paper, we first demonstrated mathematically that allocating more ba
APA, Harvard, Vancouver, ISO, and other styles
8

Youn, Taek-Young, Joongheon Kim, David Mohaisen, and Seog Chung Seo. "Faster Data Forwarding in Content-Centric Network via Overlaid Packet Authentication Architecture." Sustainability 12, no. 20 (2020): 8746. http://dx.doi.org/10.3390/su12208746.

Full text
Abstract:
Content-Centric Networking (CCN) is one of the emerging paradigms for the future Internet, which shifts the communication paradigm from host-centric to data-centric. In CCN, contents are delivered by their unique names, and a public-key-based signature is built into data packets to verify the authenticity and integrity of the contents. To date, research has tried to accelerate the validation of the given data packets, but existing techniques were designed to improve the performance of content verification from the requester’s viewpoint. However, we need to efficiently verify the validity of da
APA, Harvard, Vancouver, ISO, and other styles
9

Jia, Wen-Kang, and Zhu Jin. "Fractional-N SVRF Forwarding Algorithm for Low Port-Density Packet Forwarding Engines." IEEE Networking Letters 3, no. 2 (2021): 42–46. http://dx.doi.org/10.1109/lnet.2021.3061135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghani, Rana Fareed, and Laith Al-Jobouri. "Packet Loss Optimization in Router Forwarding Tasks Based on the Particle Swarm Algorithm." Electronics 12, no. 2 (2023): 462. http://dx.doi.org/10.3390/electronics12020462.

Full text
Abstract:
Software-defined networks (SDNs) are computer networks where parameters and devices are configured by software. Recently, artificial intelligence aspects have been used for SDN programs for various applications, including packet classification and forwarding according to the quality of service (QoS) requirements. The main problem is that when packets from different applications pass through computer networks, they have different QoS criteria. To meet the requirements of packets, routers classify these packets, add them to multiple weighting queue systems, and forward them according to their pr
APA, Harvard, Vancouver, ISO, and other styles
11

Tian, Xuejun, Lizi Wen, Xingyan Yang, Liangzhe Chen, Gang Min, and Zhong Shu. "Research on Network Routing Control Algorithm Based on OpenFlow and IGP." Journal of Physics: Conference Series 2218, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2218/1/012017.

Full text
Abstract:
Abstract Given the coexistence of heterogeneous hybrid networks such as IP network, 4G network and Software Defined Network (SDN) in the application of digital news media system, this paper designs a routing control algorithm based on SDN network architecture, which can realize the compatibility of internal gateway protocol and OpenFlow communication strategies. Through the analysis of OpenFlow communication protocol in SDN network architecture, the relationship between Interior Gateway Protocol (IGP) and OpenFlow routing rules is found out. Based on the existing hardware structure of the Open
APA, Harvard, Vancouver, ISO, and other styles
12

Rezaei, Hadis, Sahar Sadeghi, and Leila Badeli. "Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks." International Journal of Computer Science and Information Technology 13, no. 6 (2021): 19–30. http://dx.doi.org/10.5121/ijcsit.2021.13602.

Full text
Abstract:
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names instead of locations and creates essential changes in the abstraction of network services from "delivering packets to specific destinations” to "retrieving data with special names" makes. This fundamental change creates new opportunities and intellectual challenges in all areas, especially network routing and communication, communication security, and privacy. The focus of this dissertation is on the forwarding aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest
APA, Harvard, Vancouver, ISO, and other styles
13

Yuan, Jie, Erxia Li, Chaoqun Kang, Fangyuan Chang, Tingting Yuan, and Xiaoyong Li. "Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers." Future Internet 11, no. 8 (2019): 168. http://dx.doi.org/10.3390/fi11080168.

Full text
Abstract:
Software-defined networking (SDN) is a modern network architecture, which separates the network control plane from the data plane. Considering the gradual migration from traditional networks to SDNs, the hybrid SDN, which consists of SDN-enabled devices and legacy devices, is an intermediate state. For wide-area hybrid SDNs, to guarantee the control performance, such as low latency, multi SDN controllers are usually needed to be deployed at different places. How to assign them to switches and partition the network into several control domains is a critical problem. For this problem, the contro
APA, Harvard, Vancouver, ISO, and other styles
14

Bazmi, Parisa, and Manijeh Keshtgary. "A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING." IIUM Engineering Journal 17, no. 2 (2016): 59–69. http://dx.doi.org/10.31436/iiumej.v17i2.617.

Full text
Abstract:
Named Data Networking (NDN) is a new Internet architecture which has been proposed to eliminate TCP/IP Internet architecture restrictions. This architecture is abstracting away the notion of host and working based on naming datagrams. However, one of the major challenges of NDN is supporting QoS-aware forwarding strategy so as to forward Interest packets intelligently over multiple paths based on the current network condition. In this paper, Neural Network (NN) Based Traffic-aware Forwarding strategy (NNTF) is introduced in order to determine an optimal path for Interest forwarding. NN is embe
APA, Harvard, Vancouver, ISO, and other styles
15

Qureshi, Adnan Mahmood, Nadeem Anjum, Rao Naveed Bin Rais, Masood Ur-Rehman, and Amir Qayyum. "Detection of malicious consumer interest packet with dynamic threshold values." PeerJ Computer Science 7 (March 17, 2021): e435. http://dx.doi.org/10.7717/peerj-cs.435.

Full text
Abstract:
As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequent
APA, Harvard, Vancouver, ISO, and other styles
16

RB, Sajyth, and Sujatha G. "Design of data confidential and reliable bee clustering routing protocol in MANET (Vol 2)." International Journal of Engineering & Technology 7, no. 2.8 (2018): 661. http://dx.doi.org/10.14419/ijet.v7i2.8.10552.

Full text
Abstract:
Mobile ad hoc network (MANET) requires extraneous energy effectualness and legion intelligence for which a best clustered based approach is pertained called the “Bee-Ad Hoc-C”. In MANET the mechanism of multi-hop routing is imperative but may leads to a challenging issue like lack of data privacy during communication. ECC (Elliptical Curve Cryptography) is integrated with the Bee clustering approach to provide an energy efficient and secure data delivery system. Even though it ensures data confidentiality, data reliability is still disputable such as data dropping attack, Black hole attack (At
APA, Harvard, Vancouver, ISO, and other styles
17

Dinh, Ngoc-Thanh, and Younghan Kim. "An Efficient Content Store-Based Forwarding Scheme for Internet of Things." Sensors 21, no. 22 (2021): 7607. http://dx.doi.org/10.3390/s21227607.

Full text
Abstract:
One of the main advantages of information-centric networking (ICN) is that a requested piece of content can be retrieved from a content store (CS) at any intermediate node, instead of its original content producer. In existing ICN designs, nodes forward Interest packets mainly based on forwarding information base (FIB). FIB is constructed from name prefixes registered by content producers with a list of next hops to the name prefixes. The ICN forwarding engine uses those information to forward Interest packets towards corresponding content producers. CS information of a node is currently used
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Bo, Jinlin Wang, Xiaoyong Zhu, Jiali You, and Linlin Hu. "An Adaptive Hierarchical Hybrid Multicast Based on Information-Centric Networking." Electronics 10, no. 23 (2021): 3002. http://dx.doi.org/10.3390/electronics10233002.

Full text
Abstract:
Many information-centric services have emerged, such as IPTV and video conferencing. These services put a lot of demands on scalable multicast communication. However, traditional IP multicast has low adoption because of its poor scalability. Therefore, some stateless multicast methods were proposed, which encapsulate the destination’s information into the packet header without requiring routers to maintain the multicast forwarding state. However, stateless multicast also faces some problems, such as ingress router overload, high forwarding overhead, packet redundancy, etc. In addition, most mu
APA, Harvard, Vancouver, ISO, and other styles
19

Akhbarizadeh, M. J., and M. Nourani. "Throughput increase in packet forwarding engines using adaptive block-selection scheme." IEEE Communications Letters 9, no. 9 (2005): 838–40. http://dx.doi.org/10.1109/lcomm.2005.1506720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rajan, Kaushik, and Ramaswamy Govindarajan. "A Novel Cache Architecture and Placement Framework for Packet Forwarding Engines." IEEE Transactions on Computers 58, no. 8 (2009): 1009–25. http://dx.doi.org/10.1109/tc.2009.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ali, Syed Iftekhar, Md Shafiqul Islam, and Mohammad Rakibul Islam. "A Comprehensive Review of Energy Efficient Content Addressable Memory Circuits for Network Applications." Journal of Circuits, Systems and Computers 25, no. 04 (2016): 1630002. http://dx.doi.org/10.1142/s0218126616300026.

Full text
Abstract:
Content addressable memory (CAM) can perform high-speed table look-up with bit level masking capability. This feature makes CAMs extremely attractive for high-speed packet forwarding and classification in network routers. High-speed look-up implies all the CAM word entries to be accessed and compared with a search word to find a suitable match in a single clock cycle. This parallel search activity requires large energy consumption which needs to be reduced. In this paper, a review of the energy reduction techniques of CAM is presented. A comparative study of some popular techniques has been ma
APA, Harvard, Vancouver, ISO, and other styles
22

Pu, Cong. "Pro NDN : MCDM-Based Interest Forwarding and Cooperative Data Caching for Named Data Networking." Journal of Computer Networks and Communications 2021 (March 18, 2021): 1–16. http://dx.doi.org/10.1155/2021/6640511.

Full text
Abstract:
Named data networking (NDN), as a specific architecture design of information-centric networking (ICN), has quickly became a promising candidate for future Internet architecture, where communications are driven by data names instead of IP addresses. To realize the NDN communication paradigm in the future Internet, two important features, stateful forwarding and in-network caching, have been proposed to cope with drawbacks of host-based communication protocols. The stateful forwarding is designed to maintain the state of pending Interest packets to guide Data packets back to requesting consumer
APA, Harvard, Vancouver, ISO, and other styles
23

GAO, XIANMING, BAOSHENG WANG, XU AN WANG, and XIAOZHE ZHANG. "FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540001. http://dx.doi.org/10.1142/s0219265915400010.

Full text
Abstract:
In traditional router, it usually consists of forwarding element (FE) and control element (CE). However, there is a tight coupling between FE model and logical functions, thus restricting service innovation and user customized ability. In this context, we explore the insightful prospect of functional integration between logical function-based FE model and strategy-driven FE model to propose a new FE model. In this paper, we firstly propose an idea of FE-Brick model for next-generation router architecture, which includes two types of elements: logical function-based FE (LFFE) and strategy-drive
APA, Harvard, Vancouver, ISO, and other styles
24

Xu, Yong, Hong Ni, and Xiaoyong Zhu. "An Effective Transmission Scheme Based on Early Congestion Detection for Information-Centric Network." Electronics 10, no. 18 (2021): 2205. http://dx.doi.org/10.3390/electronics10182205.

Full text
Abstract:
As one of the candidates for future network architecture, Information-Centric Networking (ICN) has revolutionized the manner of content retrieval by transforming the communication mode from host-centric to information-centric. Unlike a traditional TCP/IP network, ICN uses a location-independent name to identify content and takes a receiver-driven model to retrieve the content. Moreover, ICN routers not only perform a forwarding function but also act as content providers due to pervasive in-network caching. The network traffic is more complicated and routers are more prone to congestion. These
APA, Harvard, Vancouver, ISO, and other styles
25

Lai, Wei Kuang, Mu Lung Weng, Yuh Chung Lin, and Chin Shiuh Shieh. "An Incentive Mechanism Using Game Theory for Wireless Mesh Networks." Applied Mechanics and Materials 284-287 (January 2013): 2694–98. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2694.

Full text
Abstract:
Wireless mesh networks (WMNs) have attracted much attention in recent years. The main problems in WMNs are the unfairness in bandwidth sharing and potential selfish behavior. In this paper, an incentive-based pricing model is designed which follows the concepts of mechanism design in game theory to encourage nodes to relay packets for other nodes and therefore achieve fairness. In the pricing model, we consider the packet transmitting amounts, idle conditions and the special need of border nodes in the margin area. The incentive is the main feature of the model. We also discuss the model using
APA, Harvard, Vancouver, ISO, and other styles
26

Ji, Xiaopeng, Cunlai Pu, and Jie Li. "Energy-constrained transmission on hybrid communication networks." International Journal of Modern Physics C 29, no. 11 (2018): 1850114. http://dx.doi.org/10.1142/s0129183118501140.

Full text
Abstract:
The real communication systems usually consist of different types of agents, e.g. computers, routers, base stations and mobile phones, forming various hybrid communication networks. Furthermore, in many cases, those agents are energy-constrained resulting in a limited lifetime of the communication networks. We proposed a hybrid communication network model composed of energy-constrained base stations and mobile users, and further gave a novel energy-aware gateway selection strategy to balance the energy consumption of base stations. We developed a new metric of nodes, called node forwarding str
APA, Harvard, Vancouver, ISO, and other styles
27

Aouad, Siham, Issam El Meghrouni, Yassine Sabri, Adil Hilmani, and Abderrahim Maizate. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384. http://dx.doi.org/10.11591/ijres.v12.i3.pp384-391.

Full text
Abstract:
<span>In software-defined networking (SDN), network traffic is managed by software controllers or application programming interfaces (APIs) rather than hardware components. It differs from traditional networks, which use switches and routers to control traffic. Using SDN, you can create and control virtual networks or traditional hardware networks. Furthermore, OpenFlow allows network administrators to control exact network behavior through centralized control of packet forwarding. For these reasons, SDN has advantages over certain security issues, unlike traditional networks. However, m
APA, Harvard, Vancouver, ISO, and other styles
28

Byun, Hayoung, Qingling Li, and Hyesook Lim. "Vectored-Bloom Filter for IP Address Lookup: Algorithm and Hardware Architectures." Applied Sciences 9, no. 21 (2019): 4621. http://dx.doi.org/10.3390/app9214621.

Full text
Abstract:
The Internet Protocol (IP) address lookup is one of the most challenging tasks for Internet routers, since it requires to perform packet forwarding at wire-speed for tens of millions of incomming packets per second. Efficient IP address lookup algorithms have been widely studied to satisfy this requirement. Among them, Bloom filter-based approach is attractive in providing high performance. This paper proposes a high-speed and flexible architecture based on a vectored-Bloom filter (VBF), which is a space-efficient data structure that can be stored in a fast on-chip memory. An off-chip hash tab
APA, Harvard, Vancouver, ISO, and other styles
29

., Shambhavi. "Router1x3 Protocol Design Implementation and Verification with Virtual Cut through Mechanism for Network on Chip (NoC)." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 16–24. http://dx.doi.org/10.22214/ijraset.2021.36226.

Full text
Abstract:
Hundreds of processors and memory cores are implemented on a single substrate called the System on Chip (SoC). The SoC with bus-based architecture has restrictions on the processing speed of the system and as the design becomes complex and the issue of scalability arises. Hence NoC is designed to enhance the scalability, data reliability, and processing speed with low power consumption by decoupling communication from computations [1]. Using NoC the IP cores of SoC are connected through on-chip routers and send data to each other through packet switching. The router is a processing chip that d
APA, Harvard, Vancouver, ISO, and other styles
30

Sapio, Amedeo, Mario Baldi, Fulvio Risso, Narendra Anand, and Antonio Nucci. "Packet Capture and Analysis on MEDINA, A Massively Distributed Network Data Caching Platform." Parallel Processing Letters 27, no. 03n04 (2017): 1750010. http://dx.doi.org/10.1142/s0129626417500104.

Full text
Abstract:
Traffic capture and analysis is key to many domains including network management, security and network forensics. Traditionally, it is performed by a dedicated device accessing traffic at a specific point within the network through a link tap or a port of a node mirroring packets. This approach is problematic because the dedicated device must be equipped with a large amount of computation and storage resources to store and analyze packets. Alternatively, in order to achieve scalability, analysis can be performed by a cluster of hosts. However, this is normally located at a remote location with
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Kai-Chun, You-Tun Teng, and Wen-Long Chin. "High-Throughput CBC Mode Crypto Circuit." Electrical Science & Engineering 5, no. 1 (2023): 20–30. http://dx.doi.org/10.30564/ese.v5i1.5636.

Full text
Abstract:
The objective of this study is to investigate a high-throughput cipher-block chaining (CBC) mode crypto circuit, which can be embedded in commercial home gateways or switches/routers. Concurrently, the area efficiency of block ciphers can be improved as well. However, the CBC mode encounters the problem of data dependency. To solve this issue, a data scheduling mechanism of network packets is proposed to eliminate the data dependency of input data for CBC mode pipelined crypto engines. The proposed CBC mode architecture can be applied to advanced encryption standards (AES), triple data encrypt
APA, Harvard, Vancouver, ISO, and other styles
32

Calle-Cancho, Jesús, Javier Carmona-Murillo, José-Luis González-Sánchez, and David Cortés-Polo. "A Novel Link-Network Assignment to Improve the Performance of Mobility Management Protocols in Future Mobile Networks." Wireless Communications and Mobile Computing 2022 (April 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/7061588.

Full text
Abstract:
5G is expected to support new services and applications that will change the user experience and will drive to a new business landscape. Moreover, most of the services will require optimum connectivity and seamless mobility in heterogeneous networks. To cope with these challenges, network mobility management and network densification are envisioned to be key factors in the emerging 5G architectures. By deploying a large number of cells, 5G architectures can provide users with high throughput and flexible access services, an improvement of the network scalability and optimized network coverage.
APA, Harvard, Vancouver, ISO, and other styles
33

Amin, Rashid, Nadir Shah, and Waqar Mehmood. "Enforcing Optimal ACL Policies Using K-Partite Graph in Hybrid SDN." Electronics 8, no. 6 (2019): 604. http://dx.doi.org/10.3390/electronics8060604.

Full text
Abstract:
Software Defined Networking (SDN) as an innovative network paradigm that separates the management and control planes from the data plane of forwarding devices by implementing both the management and control planes at a logically centralized entity, called controller. Therefore, it ensures simple network management and control. However, due to several reasons (e.g., deployment cost, fear of downtime) organizations are very reluctant to adopt SDN in practice. Therefore, a viable solution is to replace the legacy devices by SDN devices incrementally. This results in a new network architecture cal
APA, Harvard, Vancouver, ISO, and other styles
34

Jin, Zhu, and Wen-Kang Jia. "DH-SVRF: A Reconfigurable Unicast/Multicast Forwarding for High-Performance Packet Forwarding Engines." IEEE Transactions on Parallel and Distributed Systems, 2021, 1. http://dx.doi.org/10.1109/tpds.2021.3108899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

"Reliable Transmission in Wireless Sensor Networks using Greedy Perimeter Stateless Routing Scales Method." International Journal of Recent Technology and Engineering 8, no. 2 (2019): 5130–34. http://dx.doi.org/10.35940/ijrte.b2824.078219.

Full text
Abstract:
The wireless networks are made up of numerous numbers of wireless stations. The communication between these wireless stations requires traveling multiple hops to exchange information. The Wireless mobile network plays important roles in various sensing applications. This research paper planned to develop real time, trivial clarification method for transmitting in a wireless mobile sensor network. The proposed method works grounded on the routers positions and destination address of the packets to transfer packets, whereas the existing greedy forwarding decisions methods use information about t
APA, Harvard, Vancouver, ISO, and other styles
36

Shahul Hamead, Haja Moinudeen, Thanga Nadar Thangathai Mirnalinee, and Dhandapani Kavipriya. "Selective wakeup for parallel forward engines under variable load towards energy conservation in IP routers." Concurrency and Computation: Practice and Experience, August 11, 2023. http://dx.doi.org/10.1002/cpe.7881.

Full text
Abstract:
SummaryRecent studies have shown that a large amount of energy consumption in the communication medium occurs at the data processing plane. The data plane executes the forwarding decisions in the routers and switches. Through initial studies, the line card was identified as the most granular component of the router and later forward engine, a sub component of line card has been recognized as the most power intensive component of routers. Fundamental techniques like link rate adaption, sleep and wake‐up have been imposed to reduce the energy at line cards and forward engines. On the other hand,
APA, Harvard, Vancouver, ISO, and other styles
37

Christinal, J. Benitha, and V. Vivek. "An Analysis on End-To-End Inference Methods based On Packet Probing in Network." International Journal of Communication Networks and Security, July 2011, 40–46. http://dx.doi.org/10.47893/ijcns.2011.1007.

Full text
Abstract:
Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone’s life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of applications (e.g. peer-to-peer), provide bandwidth guarantee for certain applications, avoiding shared congestion in flows are increasingly challenging tasks. The problem is complicated by the fact that one cannot rely on the cooperation of indivi
APA, Harvard, Vancouver, ISO, and other styles
38

Ji, Yanpeng, Siming Zeng, Jianli Zhao, et al. "A congestion control scheme based on path recovery for smart grid communication." EURASIP Journal on Advances in Signal Processing 2023, no. 1 (2023). http://dx.doi.org/10.1186/s13634-023-00989-1.

Full text
Abstract:
AbstractIn order to solve the problem that the original path forwarding traffic caused by congestion that cannot be recovered in time in Smart Grid Communication, a congestion control scheme RFCC (Router Forwarding Congestion Control) based on path recovery is proposed, which not only supports the receiving end combined with router nodes to relieve congestion, it can also solve the problem of low transmission performance caused by not being able to restore the original path in time after the traffic is transferred. Active queue management technology is used to detect congestion and notify down
APA, Harvard, Vancouver, ISO, and other styles
39

G, Gopichand, and Saravanaguru Ra A.K. "Collaborative Packet Dropping Intrusion Detection in MANETs." Recent Patents on Computer Science 12 (June 18, 2019). http://dx.doi.org/10.2174/2213275912666190618163426.

Full text
Abstract:
: Wireless Networks treat MANET as a network that requires no preexisting infrastructure for setting up the network and is self-organized dynamically, which is made on impermanent basis. In MANET, Nodes are peripatetic hence topology remains not fixed for them. Hence all member nodes are harmonized with each other for establishing the network. MANET includes wireless broadcast from source to destination for forwarding data in the form of packets. Before transmitting the packets from the source to the destination node, route is searched to the destination node starting from the source node. Due
APA, Harvard, Vancouver, ISO, and other styles
40

Hossain, Md Anwar, and Mst Sharmin Akter. "Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network." Global Journal of Computer Science and Technology, March 23, 2019, 11–16. http://dx.doi.org/10.34257/gjcstevol19is2pg11.

Full text
Abstract:
Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping comman
APA, Harvard, Vancouver, ISO, and other styles
41

Hossain, Md Anwar, Md Mohon Ali, Mst Sharmin Akter, and Md Shahriar Alam Sajib. "Performance Comparison of EIGRP, OSPF and RIP Routing Protocols using Cisco Packet Tracer and OPNET Simulator." Global Journal of Computer Science and Technology, March 30, 2020, 1–7. http://dx.doi.org/10.34257/gjcstgvol20is2pg1.

Full text
Abstract:
In this paper, the intention has to create a network configuration that is similar for all routing protocols RIP, OSPF, and EIGRP by which we want to analysis the performance of these protocols using Cisco Packet Tracer and OPNET simulator. We use various protocols for forwarding the packets in a network topology. For successful delivery of the packets from the source node to the accurate destination node, the routers maintain a routing table. The amount of network information stored by a router depends on its algorithm. For the performance measure, we will simulate real-time scenarios of the
APA, Harvard, Vancouver, ISO, and other styles
42

Klenze, Tobias, Christoph Sprenger, and David Basin. "IsaNet: A framework for verifying secure data plane protocols." Journal of Computer Security, September 15, 2022, 1–43. http://dx.doi.org/10.3233/jcs-220021.

Full text
Abstract:
Today’s Internet is built on decades-old networking protocols that lack scalability, reliability and security. In response, the networking community has developed path-aware Internet architectures that solve these problems while simultaneously empowering end hosts to exert some control on their packets’ route through the network. In these architectures, autonomous systems authorize forwarding paths in accordance with their routing policies, and protect these paths using cryptographic authenticators. For each packet, the sending end host selects an authorized path and embeds it and its authenti
APA, Harvard, Vancouver, ISO, and other styles
43

Jia, Wen-Kang, Yaw-Chung Chen, Zhu Jin, and Weihao Geng. "Scalable multicast control-plane for optical packet forwarding engines: A multiway SVRF approach." Optical Switching and Networking, August 2022, 100713. http://dx.doi.org/10.1016/j.osn.2022.100713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Prabha, S. Krishna, Broumi said, and Selçuk Topal. "A Novel Routing Network Algorithm Via Neutrosphic Fuzzy Set Approach." International Journal of Neutrosophic Science, 2021, 9–22. http://dx.doi.org/10.54216/ijns.130102.

Full text
Abstract:
Routers steer and bid network data, through packets that hold a variety of categories of data such as records, messages, and effortless broadcasts like web interfaces. The procedure of choosing a passageway for traffic in a network or between several networks is called routing. Starting from telephone networks to public transportation the principles of routing are applied. Routing is the higher-level decision-making that directs network packets from their source en route for their destination through intermediate network nodes by specific packet forwarding mechanisms. The main function of the
APA, Harvard, Vancouver, ISO, and other styles
45

"Sdn for Load Balancing Nodes in Wireless Sensor Network." International Journal of Engineering and Advanced Technology 9, no. 5 (2020): 1121–25. http://dx.doi.org/10.35940/ijeat.e1044.069520.

Full text
Abstract:
In this paper, we study about Software Defined Networking (SDN) is centralized controller of the network. It has maintained the information regarding the whole network which being able to optimize the available network resources and makes the route decision for forward packets. In Traditional networks, each device possess with own configuration and state which makes difficult to networking and expensive to maintain and forward packets. It also uses multiple routing algorithms for many different devices such as routers and switches and no centralized approach for routing. SDN architecture is ce
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!