scholarly journals Proxy SDN Controller for Wireless Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-14
Author(s):  
Won-Suk Kim ◽  
Sang-Hwa Chung

Management of wireless networks as well as wired networks by using software-defined networking (SDN) has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC) for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

2020 ◽  
Author(s):  
Gustavo Cainelli ◽  
Max Feldman ◽  
Tiago Rodrigo Cruz ◽  
Ivan Muller ◽  
Carlos Eduardo Pereira

The use of industrial wireless networks has been growing continuously and it hasbecome an alternative to wired networks. One of the main elements of an industrial wireless network is the network manager, this component is responsible for tasks related to the network construction and maintenance. This work presents the development of a network manager compatible with the WirelessHART protocol, but also customizable, where it is possible to make modifications in order to carry out studies with this protocol. Case studies are presented where the developed tool was used for studies related to communications scheduling, adaptive channel mapping and fast data collection, thus proving the efficiency of the proposed manager.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 665
Author(s):  
Antonio Furtado ◽  
Rodolfo Oliveira ◽  
Luis Bernardo ◽  
Rui Dinis

Decentralized wireless networks are gaining increasing popularity as they do not need a fixed infrastructure. Simultaneously, multiple research initiatives have led to different findings at the PHY layer of the wireless communication systems, which include Multi-Packet Reception (MPR) techniques that enable a receiver to decode multiple packets that are transmitted simultaneously. However, the distributed nature of decentralized wireless networks demands different network control policies that should take into account the MPR capabilities to increase the network performance. This work studies the performance of a wireless network composed of multiple transmitters that are willing to transmit to a single receiver. This receiver has MPR capability and adopts an Energy-based Sensing (EBS) technique to enable uplink users’ transmissions without interfering with the ongoing transmissions from other transmitters. The first remark to be made is that the MPR technique performance depends on the channel propagation conditions and on the amount of time the receiver needs to detect the spectrum’s occupancy state. However, it is shown that by increasing the number of samples needed to increase the sensing accuracy, the receiver may degrade its throughput, namely if the receiver is equipped with a single radio, that is sequentially used for sensing and transmitting (split-phase operation). The results presented in the paper show the impact of the channel propagation condition and EBS parameterization on wireless network throughput and the cases where the receiver MPR capture performance is greatly improved by the use of a spectrum sensing technique.


Author(s):  
Dr.Yasser A. Seleman

Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply.   As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies. Knowing security holes and contributes significantly to the wireless network is immune from attempts to infiltrate and penetration design Keywords—Protocol: Language is between computers connected via the network, in order to exchange information. If we define the language of the Protocol technology, we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages.


2019 ◽  
Vol XXII (1) ◽  
pp. 144-150
Author(s):  
Glăvan D.

A Software Defined Network (SDN) is an architecture used to form agile and flexible networks. SDN's goal is to improve network control, allowing service providers to respond rapidly to changing requirements. In a SDN, an administrator or a network engineer can configure the traffic from a centralized control console without having to touch individual network switches. Due to the fact that the control plan is entered by SDN as a network manager, a Single of Failure Point (SPoF) is also introduced. If SDN can not be reached by network devices, the network will crash. Distributed Denial of service (DDoS) attack is a way to make SDN Controller inaccessible. In this paper are presented the potential vulnerabilities of SDN Controller that can be exploited for DDoS attack as well as the presence of methods of detection and attenuation of these attacks.


Author(s):  
Asep Wishnu ◽  
Bambang Sugiantoro

The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.


2019 ◽  
Vol 01 (03) ◽  
pp. 148-160
Author(s):  
Krishnaraj Natarajan

The wireless network that are formed on the fly, without relying on the previous infrastructure, including the autonomous devices that lie nearby are called the flying wireless networks. Despite of the networks, self-configuring and self-healing nature, it incurs many challenges due to its mobile nature, limited battery span and the lack of the centralized control, so these wireless network requires a perfect routing protocol addressing the challenges and improving the performance of the network, so the paper presents the survey on the various routing protocols that enhances the performance of the flying wireless network. The survey is further continued with the analysis of the routing protocols to evince the capability of the same on the grounds of network life time, energy consumption and the quality of service.


2017 ◽  
Vol 7 (1.2) ◽  
pp. 229 ◽  
Author(s):  
B. V. V. S. Prasad ◽  
Sd. Salman Ali

Traditional communication networks can be leveraged by separating controlling functions from forwarding functions using emerging technology known as Software Defined Networking (SDN). Though SDN has been around for some years, it was mostly limited to wired networks. Of late, it is being adapted to wireless networks. The programmable interface with decoupled controller can be used with MANET to integrate with other networks besides controlling it well. Both control and security are inevitable for the successful implementation of SDN in wireless networks. Towards this end, in this paper we implemented SDN based MANET for secure routing. Open Flow is used for implementing SDN controller while IDC is used for securing communications. Our framework is evaluated with NS3 simulations that reveal significant performance improvement when compared with traditional ad hoc networks that do not use SDN. This is achieved as SDN controller can quickly adapt to changed topologies due to node mobility.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
Hafiz Munsub Ali ◽  
Jiangchuan Liu ◽  
Waleed Ejaz

Abstract In densely populated urban centers, planning optimized capacity for the fifth-generation (5G) and beyond wireless networks is a challenging task. In this paper, we propose a mathematical framework for the planning capacity of a 5G and beyond wireless networks. We considered a single-hop wireless network consists of base stations (BSs), relay stations (RSs), and user equipment (UEs). Wireless network planning (WNP) should decide the placement of BSs and RSs to the candidate sites and decide the possible connections among them and their further connections to UEs. The objective of the planning is to minimize the hardware and operational cost while planning capacity of a 5G and beyond wireless networks. The formulated WNP is an integer programming problem. Finding an optimal solution by using exhaustive search is not practical due to the demand for high computing resources. As a practical approach, a new population-based meta-heuristic algorithm is proposed to find a high-quality solution. The proposed discrete fireworks algorithm (DFWA) uses an ensemble of local search methods: insert, swap, and interchange. The performance of the proposed DFWA is compared against the low-complexity biogeography-based optimization (LC-BBO), the discrete artificial bee colony (DABC), and the genetic algorithm (GA). Simulation results and statistical tests demonstrate that the proposed algorithm can comparatively find good-quality solutions with moderate computing resources.


Sign in / Sign up

Export Citation Format

Share Document