Mutualized OpenFlow architecture for network access management

Author(s):  
Benjamin Villain ◽  
Julien Ridoux ◽  
Julien Rotrou ◽  
Guy Pujolle
2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


Author(s):  
C. Warren Axelrod

Managing digital identities and computer and network access rights is difficult at the best of times. But today’s rapidly changing organizational structures and technology dependencies make for even greater challenges. In this chapter, we review the various stages in the identity and access management (IAM) lifecycle from the particular perspective of organizations undergoing substantial change from mergers and acquisitions, business expansions and contractions, as well as internal structural and technological changes. We also look at the impact on IAM of incidents originating from outside organizations, such as natural disasters (earthquakes, hurricanes, volcanic eruptions, etc.) and manmade catastrophes (terrorist bombings, major oil spills, etc.). We address the question of how one might prepare for and respond to such events by managing and controlling identification and authorization in fast-moving, difficult-to-control situations.


Author(s):  
Marcus A. Brewer ◽  
Kay Fitzpatrick ◽  
James C. Cline

Increased traffic and heavy truck percentages associated with energy exploration in West Texas have placed unprecedented demands on the region’s highway network as well as driveway access to and from that network. Access management principles have proven to be effective in improving operations and safety in numerous locations, but many of those locations have been in urban or suburban locations where land uses and traffic patterns are different from those typically found in rural West Texas, so guidelines for driveway spacing and other access management treatments in rural, high-speed areas are not as commonplace. This paper describes the study of a corridor with high volumes, high truck percentages, high speeds, high turning volumes, and high demand for access. The study team reviewed the applicable guidelines and policies for driveway spacing in Texas, as well as relevant findings from other guidelines and research, to develop a set of recommended driveway spacing values for cars and for trucks on high-speed rural roads.


2013 ◽  
Vol 760-762 ◽  
pp. 1095-1099
Author(s):  
Tong Lin Wang ◽  
Hui Qun Zhao ◽  
Hai Gang Yang

For the large number of applications in the real environment of reader of the central control and more practical decentralized control approach to management, analysis and point out their inadequacies, A network structure, which provides a good management and control of the reader and meets the demand of its application in the real world, is proposed and its demonstration system is accomplished. On the basis of central control, the structure can conduct distributed control and complete different operations wanted. Furthermore, it has higher reliability and flexibility , is more easily maintained and more open and has higher coordination.


2019 ◽  
Vol 11 (2) ◽  
pp. 13-26
Author(s):  
Yaser A. Mowafi ◽  
Tareq Alaqarbeh ◽  
Rami Alazrai

In this article, the authors present a design and implementation of a context-based network access mechanism for eliciting context information and adapting this information with mobile applications' network access management. This paper proposes a multi-criteria decision-making algorithm based on fuzzy analytic hierarchy process that allows for integrating four context criteria, namely location, network, time, and speed, with network access service management of mobile applications at run-time. This article evaluates the proposed mechanism in the Android operating system running on handheld smart phone devices. Evaluation results have revealed the significance of fuzzy analytic hierarchy process method in providing network access management features based on real-time assessment of user context.


Sign in / Sign up

Export Citation Format

Share Document