نتایج جستجو برای: پروتکل openflow

تعداد نتایج: 4722  

Journal: :International journal of Computer Networks & Communications 2015

Journal: :Computer Networks 2015
Peter Peresíni Maciej Kuzniar Marco Canini Daniele Venzano Dejan Kostic Jennifer Rexford

The emergence of OpenFlow-capable switches enables exciting new network functionality, at the risk of programming errors that make communication less reliable. The centralized programming model, where a single controller program manages the network, seems to reduce the likelihood of bugs. However, the system is inherently distributed and asynchronous, with events happening at different switches...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2015

Journal: :Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 2018

Journal: :Applied sciences 2021

Software-defined networking (SDN) is an innovative architecture that separates the control plane from data to simplify and speed up management of large networks. This means logic has been moved network hardware level centralized level. Therefore, use OpenFlow Discovery Protocol (OFDP) one most common protocols used discover topology in a then transmit it for management. However, OFDP various sh...

2013
Joshua Reich Christopher Monsanto Nate Foster Jennifer Rexford

Managing today’s computer networks is a complex and error-prone task. These networks consist of a wide variety of devices, from routers and switches, to firewalls, network-address translators, load balancers, and intrusion-detection systems. Network administrators must express policies through tedious box-by-box configuration, while grappling with a multitude of protocols and baroque, vendor-sp...

2013
YongJoo Song Seungwon Shin Yongjin Choi

In this paper, we propose a new network architecture, Network Iron Curtain that can handle network scanning attacks automatically. Network Iron Curtain does not require additional devices or complicated configurations when it detects scanning attack, and it can confuse scanning attackers by providing fake scanning results. When an attacker sends a scanning packet to a host in Network Iron Curta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید