Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from the data and management planes, thereby streamlining network administration. SDN's centralized...
详细信息
Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from the data and management planes, thereby streamlining network administration. SDN's centralized network management makes configuring access control list (ACL) policies easier, which is important as these policies frequently change due to network application needs and topology modifications. Consequently, this action may trigger modifications at the SDN controller. In response, the controller performs computational tasks to generate updated flow rules in accordance with modified ACL policies and installs flow rules at the data plane. Existing research has investigated reactive flow rules installation that changes in ACL policies result in packet violations and network inefficiencies. Network management becomes difficult due to deleting inconsistent flow rules and computing new flow rules per modified ACL policies. The proposed solution efficiently handles ACL policy change phenomena by automatically detecting ACL policy change and accordingly detecting and deleting inconsistent flow rules along with the caching at the controller and adding new flow rules at the data plane. A comprehensive analysis of both proactive and reactive mechanisms in SDN is carried out to achieve this. To facilitate the evaluation of these mechanisms, the ACL policies are modeled using a 5-tuple structure comprising Source, Destination, Protocol, Ports, and Action. The resulting policies are then translated into a policy implementation file and transmitted to the controller. Subsequently, the controller utilizes the network topology and the ACL policies to calculate the necessary flow rules and caches these flow rules in hash table in addition to installing them at the switches. The proposed solution is simulated in Mininet Emulator using a set of ACL policies, hosts, and switches. The results are presented by varying the ACL policy at different time instances, inter-packet de
Computational linguistics refers to an interdisciplinary field associated with the computational modelling of natural language and studying appropriate computational methods for linguistic *** number of social media u...
详细信息
Computational linguistics refers to an interdisciplinary field associated with the computational modelling of natural language and studying appropriate computational methods for linguistic *** number of social media users has been increasing over the last few years,which have allured researchers’interest in scrutinizing the new kind of creative language utilized on the Internet to explore communication and human opinions in a *** and sarcasm detection is a complex task inNatural Language Processing(NLP).Irony detection has inferences in advertising,sentiment analysis(SA),and opinion *** the last few years,irony-aware SA has gained significant computational treatment owing to the prevalence of irony in web ***,this study develops Computational Linguistics with Optimal Deep Belief Network based Irony Detection and Classification(CLODBN-IRC)model on social *** presented CLODBN-IRC model mainly focuses on the identification and classification of irony that exists in social *** attain this,the presented CLODBN-IRC model performs different stages of pre-processing and TF-IDF feature *** irony detection and classification,the DBN model is exploited in this *** last,the hyperparameters of the DBN model are optimally modified by improved artificial bee colony optimization(IABC)*** experimental validation of the presentedCLODBN-IRCmethod can be tested by making use of benchmark *** simulation outcomes highlight the superior outcomes of the presented CLODBN-IRC model over other approaches.
As an increasing number of students move to online learning platforms that deliver personalized learning experiences, there is a great need for the production of high-quality educational content. Large language models...
详细信息
Identifying disease-associated RNAs is crucial in revealing the pathogenic mechanisms of diseases [1], and biologists have made notable progress in this field [2]. However, more effective computational methods are nee...
Identifying disease-associated RNAs is crucial in revealing the pathogenic mechanisms of diseases [1], and biologists have made notable progress in this field [2]. However, more effective computational methods are needed to provide reference disease-associated RNAs, reducing the manpower and material resources required for biological experiments.
To keep up with the dynamic nature of the modern classroom, teachers must have access to online learning platforms for professional development purposes. This investigation looks at how these platforms can be used to ...
详细信息
The paper is devoted to the solution of urgent problem in the field of transport and warehouse logistics -development of cyber-physical integrated system of courier delivery services. The paper proposes the architectu...
详细信息
The study of propositional logic—fundamental to the theory of computing—is a cornerstone of the undergraduate computerscience curriculum. Learning to solve logical proofs requires repeated guided practice, but unde...
详细信息
The task of structural identification the interval models of static objects is considered. It is shown that this task at each iteration is a task the forming and solving interval systems of nonlinear algebraic equatio...
详细信息
Natural systems often exhibit chaotic behavior in their space-time evolution. Systems transiting between chaos and order manifest a potential to compute, as shown with cellular automata and artificial neural networks....
详细信息
Biometric authentication scheme has been widely adopted for authentication purpose due to its uniqueness, universality, and distinctiveness. However, research has shown that these schemes are not necessarily more secu...
详细信息
暂无评论