Academic literature on the topic 'Software-configured network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software-configured network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software-configured network"

1

Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Evglevskaya, N. V., A. I. Paramonov, P. I. Smirnov, and R. V. Shamilova. "Software Defined Network architecture model and cognitive control method for organizing multiple access in the Internet of Things." Radio industry 28, no. 4 (2018): 68–75. http://dx.doi.org/10.21778/2413-9599-2018-28-4-68-75.

Full text
Abstract:
The study has the method of random multiple wireless access in the networks of the Internet of Things and the control architecture, similar to a software-configured network, examined. The models of collision description, network parameters selection and their initial values, which provide target values for the probability of the delivery in the considered networks, are analyzed. The paper proposes a method the novelty of which lies in the usage of cognitive control of network parameters, taking into account the heterogeneity of conditions for different users with a given probability of data delivery. The proposed method and model of random multiple access and cognitive selection of network parameters are relevant and can be applied when building the access level of the Internet of Things in networks with allowable losses when managing large volumes of heterogeneous traffic and ensuring the required quality of service.
APA, Harvard, Vancouver, ISO, and other styles
3

Ou, Zhou, and Xiao Peng Xie. "Research on In-Vehicle FlexRay Bus Network Nodes." Advanced Materials Research 591-593 (November 2012): 1325–29. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1325.

Full text
Abstract:
Network node designs of hardware system and software system based on in-vehicle FlexRay Bus were put forward. Structure and theory of node’s MCU, communication controller and Bus drive were analyzed. The simplest system of FlexRay Bus node was structured, and main files program, clock program, interruption program, and FlexRay Bus communication program were configured. The operation status of FlexRay Bus protocol was analyzed, and programs of receiving and transmitting data were designed. The experimental system based on MC9S12XF512 was established, and in development environment of CodeWarrior IDE, FlexRay Bus networks nodes communication was accomplished based on TDMA and FTDMA mechanism.
APA, Harvard, Vancouver, ISO, and other styles
4

Garrison, Philip, Esther Han Beol Jang, Michael A. Lithgow, and Nicolás Andrés Pace. ""The Network Is an Excuse": Hardware Maintenance Supporting Community." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–20. http://dx.doi.org/10.1145/3479608.

Full text
Abstract:
The global community networking movement promotes locally-managed network infrastructure as a strategy for affordable Internet connectivity. This case study investigates a group of collectively managed WiFi Internet networks in Argentina and the technologists who design the networking hardware and software. Members of these community networks collaborate on maintenance and repair and practice new forms of collective work. Drawing on Actor-Network Theory, we show that the networking technologies play a role in the social relations of their maintenance and that they are intentionally configured to do so. For technology designers and deployers, we suggest a path beyond designing for easy repair: since every breakdown is an opportunity to learn, we should design for accessible repair experiences that enable effective collaborative learning.
APA, Harvard, Vancouver, ISO, and other styles
5

Suresh Babu, Kolluru, and Srikanth Vemuru. "A Low-Cost Software Defined Radio Based Cognitive Radio Test-Bed for LTE Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 51. http://dx.doi.org/10.14419/ijet.v7i3.1.16797.

Full text
Abstract:
In this work, we present a low-cost implementation of a Cognitive Radio (CR) test-bed for LTE and LTE-Advanced (LTE-A) Networks. The test-bed setup is implemented using highly integrated Software Defined Radio (SDR) platforms which are well suited for wireless communication. Each transceiver can be configured to work as a primary (resp. secondary) eNodeB or a primary (resp. secondary) user in a Heterogeneous Cognitive Radio framework. In this context, we study the problem of spectrum management in an LTE based heterogeneous network and propose simple distributed algorithms which the secondary eNodeB can employ to efficiently manage the spectral opportunities that arise in such a network. Experimental validation show significant improvement in the secondary link throughput.
APA, Harvard, Vancouver, ISO, and other styles
6

Taniguchi, Yoshiaki, Hiroaki Tsutsumi, Nobukazu Iguchi, and Kenzi Watanabe. "Design and Evaluation of a Proxy-Based Monitoring System for OpenFlow Networks." Scientific World Journal 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/6513649.

Full text
Abstract:
Software-Defined Networking (SDN) has attracted attention along with the popularization of cloud environment and server virtualization. In SDN, the control plane and the data plane are decoupled so that the logical topology and routing control can be configured dynamically depending on network conditions. To obtain network conditions precisely, a network monitoring mechanism is necessary. In this paper, we focus on OpenFlow which is a core technology to realize SDN. We propose, design, implement, and evaluate a network monitoring system for OpenFlow networks. Our proposed system acts as a proxy between an OpenFlow controller and OpenFlow switches. Through experimental evaluations, we confirm that our proposed system can capture packets and monitor traffic information depending on administrator’s configuration. In addition, we show that our proposed system does not influence significant performance degradation to overall network performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Geng Ran, Ying Hong Luo, and Yu Zhou. "OPNET-Based Simulation and Research of Communication Network Performance in Digital Traction Substation." Applied Mechanics and Materials 440 (October 2013): 283–88. http://dx.doi.org/10.4028/www.scientific.net/amm.440.283.

Full text
Abstract:
In order to keep pace with the development of IEC61850-based intelligent and digital power grid technology, a high-performance communication network must be configured in the process of electrified railway traction substation digitization to achieve the various functions of the substation automation system (SAS). First of all, the structure of communication network in a digital traction substation and the category of different data flow in it are analyzed in this paper. Secondly, the part of packet end-to-end delay (ETE Delay) is specifically discussed. In the last place, by using OPNET, a dynamic network modeling and simulating software, the networks both in substation level and process level is simulated and researched. The results show that the network built in this article can meet the real-time requirements of IEC61850.
APA, Harvard, Vancouver, ISO, and other styles
8

Geng, Qiang, and Xueqin Huang. "VRRP Load Balance Technology Simulation Practice Based on GNS3." MATEC Web of Conferences 228 (2018): 03012. http://dx.doi.org/10.1051/matecconf/201822803012.

Full text
Abstract:
This paper introduced the working principle of VRRP Load Balance Technology and technical detail. Through simulation software GNS3 it constructed the Load Balance network, and configured the VRRP technology, which causes the different local area network to data flow load balance through the VRRP technology, when a single point of failure occurs, the gateway can be migrated adaptively without affect the normal use of the network. It provides a flexible and effective solution to implement the load balance lab environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Bakouri, Mohsen, Mohammed Alsehaimi, Husham Farouk Ismail, et al. "Steering a Robotic Wheelchair Based on Voice Recognition System Using Convolutional Neural Networks." Electronics 11, no. 1 (2022): 168. http://dx.doi.org/10.3390/electronics11010168.

Full text
Abstract:
Many wheelchair people depend on others to control the movement of their wheelchairs, which significantly influences their independence and quality of life. Smart wheelchairs offer a degree of self-dependence and freedom to drive their own vehicles. In this work, we designed and implemented a low-cost software and hardware method to steer a robotic wheelchair. Moreover, from our method, we developed our own Android mobile app based on Flutter software. A convolutional neural network (CNN)-based network-in-network (NIN) structure approach integrated with a voice recognition model was also developed and configured to build the mobile app. The technique was also implemented and configured using an offline Wi-Fi network hotspot between software and hardware components. Five voice commands (yes, no, left, right, and stop) guided and controlled the wheelchair through the Raspberry Pi and DC motor drives. The overall system was evaluated based on a trained and validated English speech corpus by Arabic native speakers for isolated words to assess the performance of the Android OS application. The maneuverability performance of indoor and outdoor navigation was also evaluated in terms of accuracy. The results indicated a degree of accuracy of approximately 87.2% of the accurate prediction of some of the five voice commands. Additionally, in the real-time performance test, the root-mean-square deviation (RMSD) values between the planned and actual nodes for indoor/outdoor maneuvering were 1.721 × 10−5 and 1.743 × 10−5, respectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Roka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.

Full text
Abstract:
The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. Signature-based Intrusion Detection System matches network packets against a pre-configured set of intrusion signatures. Current implementations of IDS employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded technique would allow more efficient and scalable exploitation of these multi-processor machines.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software-configured network"

1

Марчук, Олександр Олегович. "Метод управління безпекою інформаційних потоків мережі IoT за допомогою SDN". Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39304.

Full text
Abstract:
Актуальність: Підвищення якості функціонування мереж зв'язку за рахунок поліпшення надійності є складною науково-технічною та економічною проблемою. Це обумовлено тим що до мереж з новими технологіями, таким як програмно-конфігуровані мережі (SDN) в даний час висувають високі вимоги по надійності (відмовостійкості) в тому числі до характеристик відновлення мережі після відмови. При розробці заходів, що підвищують надійність доцільна постановка задачі максимально можливого підвищення якості функціонування мережі при мінімальному часу відновлення зв'язку. Високий рівень відмовостійкості мережі забезпечується за рахунок швидкого виявлення пошкоджень і усунення їх наслідків за короткий час. Існуючі методи забезпечення надійності в мережах SDN можна поділити на два самостійних класи: захисне перемикання (резервування) і відновлення (перемаршрутизація). Звідси випливає що для системного підходу до дослідження методів забезпечення надійності SDN доцільно використовувати засоби математичного моделювання. Дослідження механізмів забезпечення надійності SDN розглядається в ряді робіт, як вітчизняних, так і зарубіжних. Однак в даних роботах не проводиться порівняльний аналіз використання механізмів забезпечення відмовостійкості, а також комбінації цих механізмів. Так само в ряді робіт не враховуються економічні показники використання даних механізмів. Мета роботи: підвищити відмовостійкість при DoS-атаці системи Інтернету речей з використанням концепції SDN за рахунок премаршутизації та резервування комунікаційних ресурсів, що дозволить зменшити час до виявлення відмови методами швидкого відновлення, зменшиння відсотка навантаженості. Задачі дослідження: 1. Проаналізувати існуючі підходи щодо управління безпекою інформаційних потоків мережі IoT за допомогою SDN . 2. Запропонувати модель управління безпекою інформаційних потоків мережі IoT при DoS-атаці, яка дозволить зменшити як ймовірність відмови, так і вплив відмови ; 3. Вдосконалити процедуру керування безпекою інформаційних потоків мережі IoT яка враховує можливості організації потоків в програмно-керованих мережах (SDN); 4. Розробити удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN та резервування контролера, що дозволить отримати надійну мережу, не враховуючи збільшення часу до виявлення відмови при роботі методів швидкого відновлення. 5. Розробка імітаційної моделі в середовищі MiniNet, планування та проведення експерименту з метою перевірки теоритичних положень та доведення їх ефективності. 6. Розробка стартап проекту для системи безпеки IoT. Об’єкт дослідження: пристрої і технології організації програмно-керованого зв'язку в мережі Інтернету речей. Предмет дослідження: моделі та методи управління безпекою інформаційних потоків мережі IoT за допомогою SDN Методи дослідження: Проведені дослідження базуються на теорії ймовірностей, математичній статистиці, теорії телекомунікацій методах моделювання. Моделювання фрагмента мережі ІР проведено на основі пакета MiniNet. Наукова новизна: Запропоновано удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN, який дозволяє підвищити відмовостійкість при DoS-атаці системи Інтернету речей, зменшити час до виявлення відмови методами швидкого відновлення, зменшити відсотка завантаженості мережі, за рахунок премаршутизації та резервування комунікаційних ресурсів. Практична новизна: Пропонована модель PFI скорочує час на встановлення шляху, знижує час обробки контролера і зменшує трафік каналу управління при DoS-атаці на мережу шляхом використання методів резервування та відновлення зв’язку, також взаємодіє з протоколами безпеки, основним з них є OpenFlow.<br>Relevance: Improving the quality of communication networks by improving reliability is a complex scientific, technical and economic problem. This is due to the fact that networks with new technologies, such as software-configured networks (SDN) currently have high requirements for reliability (fault tolerance), including the characteristics of network recovery after failure. When developing measures to increase reliability, it is advisable to set the task of maximizing the quality of network operation with a minimum connection recovery time. The high level of fault tolerance of the network is provided due to fast detection of damages and elimination of their consequences in a short time. Existing methods of ensuring reliability in SDN networks can be divided into two separate classes: protective switching (redundancy) and recovery (rerouting). It follows that for a systematic approach to the study of methods to ensure the reliability of SDN, it is advisable to use mathematical modeling. The study of the mechanisms of ensuring the reliability of SDN is considered in a number of works, both domestic and foreign. However, these works do not provide a comparative analysis of the use of mechanisms to ensure fault tolerance, as well as a combination of these mechanisms. Similarly, a number of works do not take into account the economic indicators of the use of these mechanisms. Purpose: to develop a method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will provide a reliable network, without taking into account the increase in time to detect failure of rapid recovery methods. Research objectives: 1. to propose a model of security management of information flows of the IoT network; 2. provide an algorithm for managing the security of information flows of the IoT network using SDN; 3. to reveal the methodology for determining the effectiveness of security management of information flows of the IoT network using SDN; 4. to develop an improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Object of research: devices and technologies of communication organization in the Internet of Things. Subject of research: data transmission models and methods of ensuring the functioning of the Internet of Things in the face of hazards. Research methods: The research is based on probability theory, mathematical statistics, modeling methods and field experiments. The simulation of a fragment of the IP network was performed on the basis of a simulation package. Scientific novelty: An improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy has been proposed, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Practical novelty: The obtained results can be implemented in a real enterprise in order to improve the quality of security management of information flows of the IoT network using SDN.
APA, Harvard, Vancouver, ISO, and other styles
2

Одарченко, Роман Сергійович, Roman Odarchenko та Одарченко Роман Сергеевич. "Методологія підвищення ефективності функціонування стільникових мереж зв'язку". Thesis, Національний авіаційний університет, 2019. http://er.nau.edu.ua/handle/NAU/38385.

Full text
Abstract:
В роботі було розроблено методологію підвищення ефективності стільникових мереж зв’язку, яка полягає у використанні удосконалено методу планування мережі стільникового зв’язку для розгортання стільникових мереж нового покоління, методу оцінки ключових показників функціонування мережі стільникового оператора з метою безперервної оптимізації мережі оператора шляхом використання методу оптимізації підсистеми базових станцій розгорнутої мережі стільникового оператора, удосконаленого методу розвантаження радіо інтерфейсу мережі стільникового оператора із використанням підмережі Wi-Fi (Wireless Fidelity), методу оптимізації багаторівневого транспортного сегменту стільникової мереж, удосконаленого методу маршрутизації із резервуванням ресурсів та балансуванням навантаження транспортної мережі стільникового оператора, методу оцінки ефективності програмно-конфігурованої мережі та методу мережецентричного моніторингу та реагування на кіберінциденти в мережі оператора стільникового зв’язку. За допомогою розробленої методології операторам стільникового зв’язку вдається підвищити ефективність функціонування своїх мереж за рахунок збільшення радіусу зон обслуговування абонентів стільникових мереж, мінімізації необхідної кількості базових станцій для побудови мережі, збільшення вдвічі кількості активних абонентів, які обслуговуються в стільнику та забезпечення балансування навантаження в радіопідмережі, підвищення економічної ефективності транспортної мережі, підвищення рівня надійності мережі, оптимізації утилізації транспортних каналів, проведення більш гнучкого та оперативного розширення мережі, запровадження нових сервісів, підвищення оперативності доставки даних для ієрархічної структури рівня управління. Отримані наукові результати доцільно використовувати під час планування безпроводових мереж стандарту LTE та 5G, розробки обладнання та програмного забезпечення для систем передачі даних, а також в навчальному процесі.<br>Диссертация посвящена вопросам разработки методологии повышения эфективности сотовых сетей связи. В работе был проведен анализ качества обслуживания абонентов сотовых сетей в Украине с целью определения их эффективности. Было установлено, что заявленные требования к сетям четвертого поколения не достигаются ни в одной из реализованных сетей, а фактическое качество обслуживания абонентов находится на достаточно низком уровне, что свидетельствует о низкой эффективности существующих методов планирования радиосетей, транспортных подсистем и методов управления. В работе были предложены альтернативные стратегии развития операторов сотовой связи в Украине. В работе впервые разработана методология повышения эффективности сотовых сетей связи, заключающаяся в использовании усовершенствованного метода планирования сети LTE для развертывания сотовых сетей нового поколения, метода оценки ключевых показателей функционирования сети сотового оператора с целью непрерывного оп-тимизации сети оператора путем использования метода оптимизации подсистемы базо вых станций развернутой сети сотового оператора, усовершенствованного метода рас-погрузки радио интерфейса сети сотового оператора с использованием подмел-режиме Wi-Fi, метода оптимизации многоуровневого транспортного сегмента сотовой сетей, метода резервирования ресурсов и балансировки нагрузки транспортной ме-режи сотового оператора и метода оценки эффективности программно-конфигурируемых сети. С помощью разработанной методологии операторам сотовой связи удается повысить эффективность своих сетей за счет увеличения радиус зон обслуживания абонентов сотовых сетей, минимизации необходимого количества базовых станций для построения сети, увеличение вдвое количества активных абонентов, обслугвуються в базовой и обеспечения балансировки нагрузки в радиопидмережи, повышение економинои эффективности транспортной сети, повышение уровня надежности сети, оптимизацией утилизации транспортных каналов, проведение более гибкого и оперативного расширения сети, внедрение новых сервисов, повышения оперативности доставки данных для иерархической структуры уровня управления.<br>The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. Chief among them is the tremendous growth in multimedia applications on mobile devices – streaming music and video, two-way video conferencing and social networking to name a few. The telecoms industry is undergoing a major transformation towards 5G networks in order to fulfil the needs of existing and emerging use cases. The 5G architecture should seamlessly support both fixed and mobile access technologies under a fully converged end-to-end system in order to deliver future service requirements for some of the deployment scenarios that could be supported. This technologies in nearest future have come to Ukraine too. That’s why in this dissertation an analysis of the quality of service of subscribers of cellular networks in Ukraine was conducted in order to determine the efficiency of their operation and security. An analysis of the quality of customer service in the implemented projects of LTE networks in the world and 4G networks in Ukraine has established that the claimed requirements for fourth generation networks are not achieved in any of the implemented networks, and the actual quality of customer service (target efficiency) is at a rather low level which indicates the low efficiency of existing radio network planning methods, transport subsystems, control and cybersecurity management methods. This made it possible to determine the directions by which it is necessary to increase the efficiency of the operation of cellular networks. In this dissertation were developed several methods to improve network efficiency. The method of planning of the network of the cellular operator enables cellular operators to more accurately assess the coverage of radio coverage areas, choose key indicators of service quality, more efficient frequency planning and capital cost calculation, which in turn allows us to assess the feasibility of constructing a cellular network option. On the basis of this advanced method, a training software (web-application) was developed to evaluate radio coverage zones of LTE network base stations. The method for evaluating key indicators of service quality, the level of information security and the efficiency of cellular networks makes it possible to assess the most important indicators of the quality of functioning and security of the cellular network network in order to continuously monitor and optimize them when introducing new services during customer service. The method for optimizing the subsystem of base stations allows to increase the radius of subscriber service areas of cellular networks, which allows minimizing the number of base stations for network construction, and therefore reduce the cost of the cellular operator to build the subsystem of the base stations, that is, increase the economic efficiency of the network. Improved method of the radio interface off-loading using a non-3GPP standard subnet allow to reduce the load on the radio interface of the network of the cellular network to an acceptable level, double the number of active subscribers, which are served in the cell, and provide load balancing and increase the efficiency of the radio subnetwork. The method of optimization of a multi-level transport segment of a cellular network has been developed, which allows to improve the structure of the transport network during the transition to new generations networks, providing the necessary capacity and increasing and improving the efficiency of the transport network. The method of routing with resource reservation and balancing of the traffic of a cellular operator with the consideration of information security requirements allows to increase the efficiency of the transport channels usage. The method for evaluating the effectiveness of a software-configured network allows for a more flexible and operational expansion of the network, the introduction of new services, increasing the efficiency of data delivery for the hierarchical structure. The method of network-centric monitoring and response to cyber incidents in the network of the cellular network allows real-time monitoring of the state of cyber security, its level and, consequently, the efficiency of the cellular network. On the base of these methods in this dissertation was developed cellular networks efficiency improving methodology, which is using the improved method of LTE network planning, the key method for assessing performance of the cellular operator for the purpose of continuous operator network optimizing using the method of base station subsystem optimization, improved method of radio interface of the cellular operator offloading using Wi-Fi, the method of optimization of multi-vehicle segment of the cellular network, the method of roating with resource reservation and load balancing of mobile operator and method of SDN network effectiveness evaluation. Using the developed methodology mobile operators can improve the efficiency of their networks by increasing the radius of the service areas, minimizing the required number of base stations for the construction of the network, doubling the number of active subscribers in the cell and provide load balancing in transport and radio network, increase transport network efficiency, enhance network reliability, optimize utilization of transport channels for a more flexible and rapid network expansion, introduction of new services and improved data delivery in the hierarchical structure of SDN. It is advisable to use the obtained scientific results when planning LTE and 5G wireless networks, developing equipment and software for data transmission systems, as well as in the learning process.
APA, Harvard, Vancouver, ISO, and other styles
3

Волосянко, Кирило Сергійович. "Аналіз процедур забезпечення якості у мобільних мережах 5G". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39365.

Full text
Abstract:
Мета роботи: підвищення якості надання послуг кінцевим користувачам мобільних мережах 5G за рахунок поєднання доступних засобів керування. В даній роботі розглядається технологія 5G, принцип роботи, вимоги до якості мережі. Також ознаюмлюємось з технологією SDN, її архітектурою та принципами роботи. Проведено аналіз технології SDN та 5G, описані недоліки SDN, також переваги 5G та вимоги до її якості.<br>Purpose: to improve the quality of services to end users of 5G mobile networks through a combination of available controls. In any case, you can use 5G technology, working, requiring other users to follow. We will also define with SDN technology, its architecture and principles of work. Analytical technologies of SDN and 5G are carried out, shortcomings of SDN, and also 5G are described and necessary for its work.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software-configured network"

1

Gupta, Govind P. "Software-Defined Networking Paradigm in Wireless Sensor Networks." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3640-6.ch012.

Full text
Abstract:
Software-defined networking (SDN) is an emerging network design and management paradigm that offers a flexible way for reducing the complexity of the network management and configuration. SDN-based wireless sensor networks (SDWSNs) consist of a set of software-defined sensor nodes equipped with different types of sensors. In SDWSN, sensor node is able to conduct different sensing tasks according to the programs injected into it and functionalities of these nodes can also be dynamically configured by injecting different application-specific programs. SDWSNs adopt the characteristics of SDN and can provide energy efficient solutions for various problems such as topology management, sleep scheduling, routing, and localization, etc. This chapter discusses how to apply SDN model in the design of an energy-efficient protocol for wireless sensor networks and also presents an overview of SDN model proposed for wireless sensor networks and SDN-based resource management, routing, sleep scheduling algorithm, localization for SDWSNs. Finally, open research challenges are summarized.
APA, Harvard, Vancouver, ISO, and other styles
2

Mbale, Jameson, and Manish Wadhwa. "Securing Enterprises from Malicious Attacks on their Networks." In Advances in Business Information Systems and Analytics. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6473-9.ch006.

Full text
Abstract:
Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the first direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are configured with Access Control Lists (ACL) that are used to filter in the intended packets and filter out the dangerous malicious packets from network traffic. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs.
APA, Harvard, Vancouver, ISO, and other styles
3

Nayak, Seema, Manoj Nayak, and Pankaj Pathak. "A Review on FPGA-Based Digital Filters for De-Noising ECG Signal." In Sensor Network Methodologies for Smart Applications. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-4381-8.ch001.

Full text
Abstract:
This chapter gives an overview of synthesis and analysis of digital filters on FPGA for denoising ECG signal, which provides clinical information related to heart diseases. Various types of IIR and FIR filtration techniques used for noise removal are also discussed. Many developments in the medical system technology gave birth to monitoring systems based on programmable logic devices (PLDs). Although not new to the realm of programmable devices, field programmable gate arrays (FPGAs) are becoming increasingly popular for rapid prototyping of designs with the aid of software simulation and synthesis. They are reprogrammable silicon chips, configured to implement customized hardware and are highly desirable for implementation of digital filters. The extensive literature review of various types of noise in ECG signals, filtering techniques for noise removal, and FPGA implementation are presented in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Wei-Wen, Jih-Sheng Shen, and Pao-Ann Hsiung. "An Efficient Hardware/Software Communication Mechanism for Reconfigurable NoC." In Dynamic Reconfigurable Network-on-Chip Design. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-807-4.ch004.

Full text
Abstract:
With the progress of technology, more and more intellectual properties (IPs) can be integrated into one single chip. The performance bottleneck has shifted from the computation in individual IPs to the communication among IPs. A Network-on-Chip (NoC) was proposed to provide high scalability and parallel communication. An ASIC-implemented NoC lacks flexibility and has a high non-recurring engineering (NRE) cost. As an alternative, we can implement an NoC in a Field Programmable Gate Arrays (FPGA). In addition, FPGA devices can support dynamic partial reconfiguration such that the hardware circuits can be configured into an FPGA at run time when necessary, without interfering hardware circuits that are already running. Such an FPGA-based NoC, namely reconfigurable NoC (RNoC), is more flexible and the NRE cost of FPGA-based NoC is also much lower than that of an ASIC-based NoC. Because of dynamic partial reconfiguration, there are several issues in the RNoC design. We focus on how communication between hardware and software can be made efficient for RNoC. We implement three communication architectures for RNoC namely single output FIFO-based architecture, multiple output FIFO-based architecture, and shared memory-based architecture. The average communication memory overhead is less on the single output FIFO-based architecture and the shared memory-based architecture than on the multiple output FIFO-based architecture when the lifetime interval is smaller than 0.5. In the performance analysis, some real applications are applied. Real application examples show that performance of the multiple output FIFO-based architecture is more efficient by as much as 1.789 times than the performance of the single output FIFO-based architecture. The performance of the shared memory-based architecture is more efficient by as much as 1.748 times than the performance of the single output FIFO-based architecture.
APA, Harvard, Vancouver, ISO, and other styles
5

Mani, Santosh, and Manisha J. Nene. "Distributed Denial of Service Attacks Detection and Mitigation in Software Defined Mesh Networks." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210218.

Full text
Abstract:
Networks configured in Mesh topology provide Network security in the form of redundancy of communication links. But redundancy also contributes to complexity in configuration and subsequent troubleshooting. Critical networks like Backbone Networks (used in Cloud Computing) deploy the Mesh topology which provides additional security in terms of redundancy to ensure availability of services. Distributed Denial of Service attacks are one of the most prominent attacks that cause an immense amount of loss of data as well as monetary losses to service providers. This paper proposes a method by which using SDN capabilities and sFlow-RT application, Distributed Denial of Service (DDoS) attacks is detected and consequently mitigated by using REST API to implement Policy Based Flow Management through the SDN Controller which will help in ensuring uninterrupted services in scenarios of such attacks and also further simply and enhance the management of Mesh architecture-based networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Ramadan, Rabie A., and Fatma H. Elfouly. "Multi-Object Tracking in Wireless Sensor Networks Using Swarm Intelligence." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5788-4.ch012.

Full text
Abstract:
Wireless sensor networks (WSNs) may be described as a self-configured wireless networks that can be used to track physical objects or monitor environmental features, such as temperature or motion. The sensed data is then passed across the network to the main location or sink node, where the data can be processed and analyzed. Sensor nodes in WSN are fundamentally resource-constrained: they have restricted processing power, computing, space, and transmission bandwidth. Object tracking is considered as one of the major applications. However, many of the recent articles focused on object localization. In this chapter, the authors suggest an effective approach for tracking objects in WSNs. The aim is to achieve both minimal energy consumption in reporting activity and balanced energy consumption across the WSN lifetime extension of sensor nodes. Furthermore, data reliability is considered in our model. The chapter starts by formulating the multi-object tracking problem using 0/1 Integer Linear programming. In addition, the authors adopted the swarm intelligence technique to solve the optimization problem.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software-configured network"

1

Cerqueira de Santana, Jose´ Paulo, and Ose´ias Boettcher Fonseca. "Pilot Project for Acquisition System of Chromatograph Signals and Custody Measurements Via Web." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0169.

Full text
Abstract:
This article defines a very cheap alternative for acquisition of chromatograph signals and/or custody measurements in the process plants of oil and gas pipelines. The devices possess standards and diverse communication ports, demanding a modular architecture to acquire the values of the devices and provide the signals by Web/Intranet, using corporative network, dial-up PSTN line, leased line or cellular phone. This solution is applicable to sets of field devices that need to collect data in real time or in periods of time pre-configured and provide the information for visualization by a browser, load in a database or monitor the devices remotely by the supervision central. The architecture has the following characteristics: • Modularity; • Conversion of the out signal of the devices into standard Ethernet; • The Modbus-rtu is a network protocol; • Provide the signals by Web/Intranet; • Visualization of the signals in Browser; • Historical register of the data read in web Server devices; • Operational environment Windows 2000, Windows CE; • Configuration of the time of frequency of the equipments signals; • Allow integration with supervisory system; • Allow integration with corporative Data Base. To validate the architecture, we made tests in a Pilot Project, carried through in a PETROBRAS receiving station of Natural Gas, using the hardware and software components described in the article.
APA, Harvard, Vancouver, ISO, and other styles
2

Bellio, Philip R. "Digital Controls and Modern Fuel Systems for Marine Prime Movers." In ASME Turbo Expo 2000: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/2000-gt-0324.

Full text
Abstract:
Digital controls and modern fuel systems for marine prime movers are beginning to populate the waterways and oceans, but long after industrial facilities recognized their benefits and standardized on them. Additionally, it is somewhat ironic that many marine prime movers, particularly aeroderivative gas turbines, still utilize aircraft or aircraft-derivative hydromechanical controls, yet require significant engine room manning. Digital controls, electrically actuated fuel and air valves, shipboard networks, and CRT-based operator interfaces have all been proven, and are available for every marine prime mover application. It appears to be more of a mindset than anything else preventing the move to electronic controls and modern fuel systems. Additional roadblocks to change may be “comfort with the old stuff”, marine certifications, and high availability of older hardware. As demands for improved efficiency, decreased emissions, and reduced operating expense continue there will be more pressure to upgrade existing older controls and fuel systems, as well as build ships with prime movers equipped with current control technology. A modern electronic control designed for prime movers which interfaces to not only the prime mover, can also provide data to shipboard systems, as well as be configured for satellite links to off-shore facilities. Other advantages of a digital control and modern fuel system include: • Software configurable/dependent • Self-diagnostics and monitoring • Condition-based maintenance • Elimination of hydraulics • Reduced manning requirements • Precise air and fuel metering • Current technology
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!