VoIP is a revolutionary technology for transmission of voice over internet protocol than from plain telephony systems. But current VoIP solutions have some important issues which are packet loss, latency, and jitter e...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
Time-Sensitive Networking (TSN) has recently become an important standard to support time-sensitive reliable low-latency data transmission in industrial and real-time applications. This work explores the use of differ...
详细信息
The current research work proposes a difficultydriven comparison of three most visited automobile websites namely the Automobile Site1, Automobile Site2, Automobile Site3 on parameters including performance, Search en...
详细信息
Monitoring of environmental parameters in areas with a sparsely populated and less infrastructure is quite challenging due to issues such as high power consumption, limited range for transmission, and lack of scalabil...
详细信息
Individuals who are blind or have reduced vision often struggle to navigate their environments, as traditional tools like canes offer limited information. While smart glasses have the potential to assist, existing mod...
详细信息
Underwater environments present unique challenges for image analysis due to light attenuation, scattering, and color distortion, which significantly degrade image quality. These facts make simple operations such as im...
详细信息
OTT platforms such as Netflix and Amazon Prime have been in the market for more than a decade. They have come to full-fledged usage especially during the lockdown. The main reason for their magnanimous success is ease...
详细信息
This research uses a dual-plate verification system for improving vehicle security by using IoT and embedded systems. The system compares front and rear license plates to detect any anomaly, which signals unauthorized...
详细信息
Air pollution poses serious health risks, including respiratory issues and hospitalization. This study focuses on predicting the Air Quality Index (AQI) in Delhi, leveraging data from monitoring stations and machine l...
详细信息
暂无评论