Automatic configuration of routing control platforms in OpenFlow networks
نویسندگان
چکیده
منابع مشابه
Network Configuration in OpenFlow Networks
Software-defined networking (SDN), and in particular networks based on an OpenFlow control plane, are expected to take significant share in upcoming deployments. Network programmability has emerged as a particularly desirable property for such new deployments, in which logically centralized software will be able to both control and manage operation. This paper focuses on one aspect of network m...
متن کاملAutomatic Configuration of PVCs in ATM Networks
This paper describes an agent-based approach to the automatic provision of Permanent Virtual Channels (PVC) in ATM networks. The agent framework described fosters flexibility and seamless evolution by the definition of capability skills. Skills are plugged into the agent’s brain which is responsible for the coordination of the agent’s behavior. The application of this agent framework to the pro...
متن کاملAutomatic Landing of Small Helicopters on 4 DOF Moving Platforms
In this research, an automatic control system is designed for landing of a small helicopter on a 4 DOF moving platform. The platform has three translational and one directional degree of freedom. The controller design approach is based on development of helicopter nonlinear dynamic model into the SDC (State Dependent Coefficient) form and real time solving of state dependent Riccati equation (S...
متن کاملUsing OpenFlow to control redundant paths in wireless networks
The deployment of wireless networks in critical industrial environments must ensure the availability of monitoring and control applications, for which it is essential to exploit redundancy techniques. In order to reduce to zero the failover time, in this paper, the Parallel Redundancy Protocol (PRP) is used in Wireless Local Area Networks (WLAN) which are implemented under the Software-Defined ...
متن کاملAutomatic Control of Configuration of Web Anonymization
Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2013
ISSN: 0146-4833
DOI: 10.1145/2534169.2491695