Search results for " networking"
showing 10 items of 1264 documents
Firewall as a service in SDN OpenFlow network
2015
Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…
A managerial approach to firms’ networking strategy
2009
As recently pointed out by many authors and companies‟ manager, the company competitiveness is more and more based on the ability of a firm to build strategic and competitive networks with partners and competitors. Nowadays, in a competitive environment, firms are facing challenges such as the growing demand of innovation, the increasing competitiveness and the need to penetrate new markets, by using network strategies. Consequently, such motivations are putting an increasing interest on networking strategy issue, which are becoming an essential strength of company competitive strategy. In this work the most significant theories on firm networking are reviewed and an innovative strategic pe…
DEMAND Project: An algorithm for the assessment of the prosumers’ flexibility
2020
Demand side aggregation represents an important opportunity for ancillary services provision due to the potential that the coordinated management of distributed resources has on affecting power systems' operation. In this framework, the Aggregator has a main role and takes on different relationships with the other actors of the power system, usually becoming a mediator between the prosumers and the distribution system operator. The DEMAND project introduces a new point of view in demand side aggregation by proposing a new framework where the Aggregator is no more needed and prosumers can share and combine their flexibility in a new aggregation platform called Virtual Aggregation Environment…
Cognitive Radio Application for Smart Grid
2012
The communication infrastructure between energy generation, transmission, distribution and utilization will require multi-way communications, interoperability between the advanced and existing system, and end-to-end reliable and secure communications with low-latencies. Revolutionary communication architecture is required for effective operation and control of smart grid, and cognitive radio based communication architecture can provide a unique solution. By leveraging cognitive radio technology, the suggested communications infrastructure promises to utilize potentially all available spectrum resources efficiently in the smart grid. The radio agility allows the smart grid devices to sense t…
Selecting between CNC turning centers using a combined AHP and fuzzy approach
2019
Abstract CNC turning centers (CNCTC) are designed to perform simple turning operations, for parts having a symmetry axis. However, the flexibility of these machine-tools is increasing rapidly. Supplementary modules, such as Y-axis and driven tools, which allow the user to perform milling operations, are fitted on CNCTC. Selecting the proper CNCTC, out of a great number of commercially available solution has become a very difficult task. A combined approach using Analytic Hierarchy Process (AHP) and fuzzy logic is proposed, to assist the decision-making process of choosing between three variants of CNCTC.
CADWAN – A Control Architecture for Dense Wi-Fi Access Networks
2018
The growing demands of ubiquitous computing are leading towards the densification of wireless access networks. The challenges of high density deployments can be addressed by network- wide centralized control. To this end we propose CADWAN – a Control Architecture for efficient management of Dense Wi-Fi Access Networks. Its main advantages are: flexibility (it supports software- defined wireless networking), scalability (it uses a three-tier optimization framework), and extendibility (it exploits a unified control interface with support for heterogeneous devices). Furthermore, CADWAN is complementary to ongoing developments in IEEE 802.11, especially 802.11ax.
Cloud Computing Vulnerabilities Analysis
2019
Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze the main cloud computing solutions, analyze the vulnerabilities identified for these solutions, and also calculate the impact of these vulnerabilities based on the NVD scores. We average the scores for each solution for each cloud computing model. This way, we can see the impact of the vulnerabilities identified so far for each cloud computin…
Florintesa, a program agreement for the italian botanical gardens and the national floristic heritage.
2014
OUR CLAIM: "The Botanical Gardens are, par excellence, responsible for carrying out the important mission of the conservation of our flora, through specific actions on live plants and their seeds, along with education and outreach aimed at spreading a new environmental culture, more careful and respectful of the essential needs of life, more sensible to the aesthetic and scientific value of the national flora" To overcome the isolation and strengthen their role in our society, the University Botanical Gardens have become promoters of national and European consortiums: examples are the working group "Botanical and Historic Gardens" of the Italian Botanical Society (1) and, on the global leve…
Stability of Positive Systems in WSN Gateway for IoT&IIoT
2020
Modern sensor networks work on the basis of intelligent sensors and actuators, their connection is carried out using conventional or specifically dedicated networks. The efficiency and smooth transmission of such a network is of great importance for the accuracy of measurements, sensor energy savings, or transmission speed. Ethernet in many networks is typically based on the TCP/IP protocol suite. Regardless of whether or not the network transmission is wired or wireless, it should always be reliable. TCP ensures transmission reliability through retransmissions, congestion control and flow control. But TPC is different in networks based on the UDP protocol. The most important here is the tr…
Survey: Intrusion Detection Systems in Encrypted Traffic
2016
Intrusion detection system, IDS, traditionally inspects the payload information of packets. This approach is not valid in encrypted traffic as the payload information is not available. There are two approaches, with different detection capabilities, to overcome the challenges of encryption: traffic decryption or traffic analysis. This paper presents a comprehensive survey of the research related to the IDSs in encrypted traffic. The focus is on traffic analysis, which does not need traffic decryption. One of the major limitations of the surveyed researches is that most of them are concentrating in detecting the same limited type of attacks, such as brute force or scanning attacks. Both the …