Updating rules in the flow tables of SDN switches are complex and time-consuming. Therefore, we propose a cache-based scheme (named FlowShadow) to improve the packet processing performance and keep continuous operating while updating rules in the flow tables. FlowShadow caches the microflows in the hash table to build a fast path for packet processing. By…
Tags: OMNeT++ Projects
A symbolic system synthesis approach for hard real-time systems based on coordinated SMT-solving
We propose an SMT-based system synthesis approach where the logic solver performs static binding and routing while the background theory solver computes global time-triggered schedules. In contrast to previous work, we assign additional time to the logic solver in order to refine the binding and routing such that the background theory solver is more likely…
Representation of spectrum sensing experimentation functionality for federated management and control
Spectrum sensing is one of the core functionalities of a true cognitive radio (CR) that supports operation over a broad range of frequencies and can autonomously adapt transmission parameters to the operating environment. There are several types of hardware ranging from sophisticated (i.e. Nutaq Radio420X FPGA mezzanine card) to low cost (i.e. WiSpy) that can be used to…
Optimum welch FFT segment size for duty cycle estimation in spectrum awareness system
In order to realize practical dynamic spectrum access (DSA), implementing spectrum sensing with reasonably low cost is very challenging due to the required detection accuracy and quickness. For this issue, we have introduced an extended DSA, smart spectrum access (SSA), where any useful information in terms of spectrum utilization, such as statistics regarding spectrum utilization,…
Outage Analysis of ZFB-MRT/MRC Underlay Two-Way Relay Systems
We analyse the end-to-end (E2E) outage probabilities (OPs) of zero-forcing beamforming and maximal-ratio-transmission/combining (ZFB-MRT/MRC) for an underlay network, which consists of a single-antenna fixed-gain amplify-and-forward (AF) two-way relay and two multi-antenna terminals. Assuming both path loss effects and small-scale fading and considering both secondary-to-primary (S2P) and primary-to-secondary (P2S) interferences, the exact and asymptotic E2E OPs are…
Cooperative sensing under imperfect feedback channels in dynamic spectrum access networks
In this paper, cooperative spectrum sensing under perfect and imperfect feedback channels is investigated. In particular, the optimal number of cognitive radios (CRs) required to minimize the total error of the sensing process when a perfect/imperfect reporting channels is derived. We show that the total error is always greater than zero regardless of the number…
Search in Combined Social and Wireless Communication Networks: Delay and Success Analysis
This paper models and analyzes the problem of search (navigation) with local information in combined social and wireless communication networks. Social networks are modeled with short-range and long-range connections representing smallworld and scale-free network characteristics. By distinguishing the delay and success probability on different link types, the end-to-end delay distribution and success probability are first…
Optimal Configuration of Network Coding in Ad Hoc Networks
In this paper, we analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of two significant factors, namely, the throughput loss and the decoding loss, which are jointly treated as the overhead of NC. In particular, physical-layer NC and random linear NC are adopted in static…
Implementation of network intrusion detection system using variant of decision tree algorithm
As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation…
Mobile Sink based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks
Energy hole problem is a critical issue for data gathering in Wireless Sensor Networks. Sensors near the static sink act as relays for far sensor and thus will deplete their energy very quickly, resulting energy holes in the sensor field. Exploiting the mobility of a sink has been widely accepted as an efficient way to…