scholarly journals Software Defined Networks using Mininet

A software defined network (SDN) is combined with centralized management by providing separation of the network, data and control planes. Different cloud computing environments, enterprise data centers and service providers are using this important feature. By implementing software defined data centers. Here in this paper we have used Mininet to demonstrate the applicability of SDN for different scalability. We study the performance of two SDN controllers – RYU and POX, that are implemented in Python using Mininet and D-ITG, Distributed Internet Traffic Generator. During this study we have used two network topologies, single and linear. The performance parameters used are maximum delay, average jitter, average bitrate. Experimental results demonstrated that the linear topology with RYU controller performs better as compared to single topology with POX controller for different network sizes

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2021 ◽  
Vol 38 (1) ◽  
pp. 244-265
Author(s):  
Emily C. Skarbek

AbstractFiscal equivalence in the public administration of justice requires local police and courts to be financed exclusively by the populations that benefit from their services. Within a polycentric framework, broad based taxation to achieve fiscal equivalence is a desirable principle of public finance because it conceptually allows for the provision of justice to be determined by constituent’s preferences, and increases the political accountability of service providers to constituents. However, the overproduction of justice services can readily occur when the benefits of the justice system are not enjoyed equally. Paradoxically, the same properties that make fiscal equivalence desirable by imposing restraint and control between constituents and local government also create internal pressures for agents of the state to engage in predatory, revenue-generating behavior.


2021 ◽  
Vol 14 (1) ◽  
pp. 410-419
Author(s):  
Mohammed Jabardi ◽  
◽  
Asaad Hadi ◽  

One of the most popular social media platforms, Twitter is used by millions of people to share information, broadcast tweets, and follow other users. Twitter is an open application programming interface and thus vulnerable to attack from fake accounts, which are primarily created for advertisement and marketing, defamation of an individual, consumer data acquisition, increase fake blog or website traffic, share disinformation, online fraud, and control. Fake accounts are harmful to both users and service providers, and thus recognizing and filtering out such content on social media is essential. This study presents a new approach to detect fake Twitter accounts using ontology and Semantic Web Rule Language (SWRL) rules. SWRL rules-based reasoner is utilized under predefined rules to infer whether the profile is trust or fake. This approach achieves a high detection accuracy of 97%. Furthermore, ontology classifier is an interpretable model that offers straightforward and human-interpretable decision rules.


2021 ◽  
Vol 12 (1) ◽  
pp. 74-83
Author(s):  
Manjunatha S. ◽  
Suresh L.

Data center is a cost-effective infrastructure for storing large volumes of data and hosting large-scale service applications. Cloud computing service providers are rapidly deploying data centers across the world with a huge number of servers and switches. These data centers consume significant amounts of energy, contributing to high operational costs. Thus, optimizing the energy consumption of servers and networks in data centers can reduce operational costs. In a data center, power consumption is mainly due to servers, networking devices, and cooling systems, and an effective energy-saving strategy is to consolidate the computation and communication into a smaller number of servers and network devices and then power off as many unneeded servers and network devices as possible.


Author(s):  
Khurram Sharif

This paper explores the nature of trust and satisfaction existing between service providers (large organizations) and a network of 47 distributors (small organizations) within the Kuwaiti telecommunications sector. Data was collected using a questionnaire based survey involving a convenience sample of 209 respondents representing 47 distributor outlets. The results show that the Kuwaiti telecommunications sector asymmetric relationship network was largely driven by cognitive input of trust, that is, technical competency was favored over affective input. Furthermore, there was a significant relationship between cognitive input and Long-term Satisfaction Disposition (LSD) and control input (i.e. use of power) and LSD. This indicates that trust, although favored, was not a condition for establishing long-term satisfaction within asymmetric business relationships. Finally, the influence of wasta (i.e. favoritism) and control input on trust are found to be insignificant.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


Author(s):  
Sanjay P. Ahuja

The proliferation of public cloud providers and services offered necessitate that end users have benchmarking-related information that help compare the properties of the cloud computing environment being provided. System-level benchmarks are used to measure the performance of overall system or subsystem. This chapter surveys the system-level benchmarks that are used for traditional computing environments that can also be used to compare cloud computing environments. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system-level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes.


Sign in / Sign up

Export Citation Format

Share Document