2018 Moscow Workshop on Electronic and Networking Technologies (MWENT) 2018
DOI: 10.1109/mwent.2018.8337255
|View full text |Cite
|
Sign up to set email alerts
|

Development and research of the PreFirewall network application for floodlight SDN controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 3 publications
0
3
0
1
Order By: Relevance
“…However, when using geographic routing, the Euclidean IEEE 802.1X tree algorithm can be taken advantage of [16], which is a problem that depends only on the number of nodes in the multicast group. Note that the proposed algorithm can introduce IEEE 802.1X (branch) points, which are not compatible with the nodes of the multicast data stream [17], although they are necessary to improve the route. In fact, IEEE 802.1X points is artificial because their coordinates [18] have the same network node.…”
Section: Methodsmentioning
confidence: 99%
“…However, when using geographic routing, the Euclidean IEEE 802.1X tree algorithm can be taken advantage of [16], which is a problem that depends only on the number of nodes in the multicast group. Note that the proposed algorithm can introduce IEEE 802.1X (branch) points, which are not compatible with the nodes of the multicast data stream [17], although they are necessary to improve the route. In fact, IEEE 802.1X points is artificial because their coordinates [18] have the same network node.…”
Section: Methodsmentioning
confidence: 99%
“…Authors in (Sandhya et al, 2017) show that SDN is a promising architecture to build efficient TC model due to its network-wide visibility (Hayes & Ng, 2018). The current SDN controller can enhance TC in large-scale networks (Morzhov & Nikitinskiy, 2018).…”
Section: Related Workmentioning
confidence: 99%
“…In SDN (Morzhov & Nikitinskiy, 2018), coupling the control plane and the data plane has invented another method of routing packets. Routing becomes a communication between switches and SDN controllers instead of consulting a routing table in the routers.…”
Section: Information Routingmentioning
confidence: 99%
“…Пусть каждая вершина дерева правил [3] [4] содержит хеш-таблицу (пару ключзначение). В качестве ключа в хеш-таблице будут храниться значения соответствующих уровню атрибутов правил политики безопасности, а в качестве значений для каждого из ключей в таблице будут храниться адреса памяти смежной вершины на уровень ниже.…”
Section: дерево правилunclassified