Search results for " networking"

showing 10 items of 1264 documents

Firewall as a service in SDN OpenFlow network

2015

Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…

Firewall (construction)OpenFlowNetwork packetbusiness.industryComputer scienceServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSForwarding planeThe InternetDenial-of-service attackSoftware-defined networkingbusinessComputer network2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

A managerial approach to firms’ networking strategy

2009

As recently pointed out by many authors and companies‟ manager, the company competitiveness is more and more based on the ability of a firm to build strategic and competitive networks with partners and competitors. Nowadays, in a competitive environment, firms are facing challenges such as the growing demand of innovation, the increasing competitiveness and the need to penetrate new markets, by using network strategies. Consequently, such motivations are putting an increasing interest on networking strategy issue, which are becoming an essential strength of company competitive strategy. In this work the most significant theories on firm networking are reviewed and an innovative strategic pe…

Firms' networking strategy Governance structure Secondary data set analysisSettore ING-IND/35 - Ingegneria Economico-Gestionale
researchProduct

DEMAND Project: An algorithm for the assessment of the prosumers’ flexibility

2020

Demand side aggregation represents an important opportunity for ancillary services provision due to the potential that the coordinated management of distributed resources has on affecting power systems' operation. In this framework, the Aggregator has a main role and takes on different relationships with the other actors of the power system, usually becoming a mediator between the prosumers and the distribution system operator. The DEMAND project introduces a new point of view in demand side aggregation by proposing a new framework where the Aggregator is no more needed and prosumers can share and combine their flexibility in a new aggregation platform called Virtual Aggregation Environment…

Flexibility (engineering)Computer sciencebusiness.industry020208 electrical & electronic engineeringDistributed Generation020206 networking & telecommunications02 engineering and technologyTop-down and bottom-up designDemand Responsecomputer.software_genreNews aggregatorSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaDemand responseAggregationElectric power systemDistributed generation0202 electrical engineering electronic engineering information engineeringRemunerationBottom-UpDistribution GridsbusinessProsumerAlgorithmcomputerProsumer2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON)
researchProduct

Cognitive Radio Application for Smart Grid

2012

The communication infrastructure between energy generation, transmission, distribution and utilization will require multi-way communications, interoperability between the advanced and existing system, and end-to-end reliable and secure communications with low-latencies. Revolutionary communication architecture is required for effective operation and control of smart grid, and cognitive radio based communication architecture can provide a unique solution. By leveraging cognitive radio technology, the suggested communications infrastructure promises to utilize potentially all available spectrum resources efficiently in the smart grid. The radio agility allows the smart grid devices to sense t…

Flexibility (engineering)EngineeringExploitComputer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryReliability (computer networking)InteroperabilityEnergy Engineering and Power TechnologyCognitive radioSmart gridTransmission (telecommunications)Interference (communication)Electrical and Electronic EngineeringbusinessComputer networkInternational Journal of Smart Grid and Clean Energy
researchProduct

Selecting between CNC turning centers using a combined AHP and fuzzy approach

2019

Abstract CNC turning centers (CNCTC) are designed to perform simple turning operations, for parts having a symmetry axis. However, the flexibility of these machine-tools is increasing rapidly. Supplementary modules, such as Y-axis and driven tools, which allow the user to perform milling operations, are fitted on CNCTC. Selecting the proper CNCTC, out of a great number of commercially available solution has become a very difficult task. A combined approach using Analytic Hierarchy Process (AHP) and fuzzy logic is proposed, to assist the decision-making process of choosing between three variants of CNCTC.

Flexibility (engineering)Task (computing)Computer science0202 electrical engineering electronic engineering information engineeringProcess (computing)General Earth and Planetary SciencesAnalytic hierarchy process020206 networking & telecommunications020201 artificial intelligence & image processingControl engineering02 engineering and technologyFuzzy logicGeneral Environmental ScienceProcedia Computer Science
researchProduct

CADWAN – A Control Architecture for Dense Wi-Fi Access Networks

2018

The growing demands of ubiquitous computing are leading towards the densification of wireless access networks. The challenges of high density deployments can be addressed by network- wide centralized control. To this end we propose CADWAN – a Control Architecture for efficient management of Dense Wi-Fi Access Networks. Its main advantages are: flexibility (it supports software- defined wireless networking), scalability (it uses a three-tier optimization framework), and extendibility (it exploits a unified control interface with support for heterogeneous devices). Furthermore, CADWAN is complementary to ongoing developments in IEEE 802.11, especially 802.11ax.

Flexibility (engineering)Ubiquitous computingAccess networkComputer Networks and CommunicationsComputer sciencebusiness.industryWireless networkSettore ING-INF/03 - TelecomunicazioniInterface (computing)Distributed computing802.11ax CAPWAP dense networks optimization SDN Wi-Fi.020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyComputer Science Applications0203 mechanical engineeringScalability0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessComputer network
researchProduct

Cloud Computing Vulnerabilities Analysis

2019

Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze the main cloud computing solutions, analyze the vulnerabilities identified for these solutions, and also calculate the impact of these vulnerabilities based on the NVD scores. We average the scores for each solution for each cloud computing model. This way, we can see the impact of the vulnerabilities identified so far for each cloud computin…

Flexibility (engineering)business.industryComputer scienceVulnerability020206 networking & telecommunicationsCloud computing02 engineering and technologyComputer securitycomputer.software_genreCVSS0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerProceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things
researchProduct

Florintesa, a program agreement for the italian botanical gardens and the national floristic heritage.

2014

OUR CLAIM: "The Botanical Gardens are, par excellence, responsible for carrying out the important mission of the conservation of our flora, through specific actions on live plants and their seeds, along with education and outreach aimed at spreading a new environmental culture, more careful and respectful of the essential needs of life, more sensible to the aesthetic and scientific value of the national flora" To overcome the isolation and strengthen their role in our society, the University Botanical Gardens have become promoters of national and European consortiums: examples are the working group "Botanical and Historic Gardens" of the Italian Botanical Society (1) and, on the global leve…

Flora of Italy Botanical Gardens networking popularization
researchProduct

Stability of Positive Systems in WSN Gateway for IoT&IIoT

2020

Modern sensor networks work on the basis of intelligent sensors and actuators, their connection is carried out using conventional or specifically dedicated networks. The efficiency and smooth transmission of such a network is of great importance for the accuracy of measurements, sensor energy savings, or transmission speed. Ethernet in many networks is typically based on the TCP/IP protocol suite. Regardless of whether or not the network transmission is wired or wireless, it should always be reliable. TCP ensures transmission reliability through retransmissions, congestion control and flow control. But TPC is different in networks based on the UDP protocol. The most important here is the tr…

Flow control (data)0209 industrial biotechnologyAutomatic controlbusiness.industryComputer scienceMetzler matrixComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork system stability020206 networking & telecommunications02 engineering and technologyWireless sensor networkslaw.inventionNetwork congestion020901 industrial engineering & automationIntelligent sensorIndustrial IoTlawHeaderInternet Protocol0202 electrical engineering electronic engineering information engineeringUser Datagram ProtocolSoftware testing methodologybusinessWireless sensor networkComputer network
researchProduct

Survey: Intrusion Detection Systems in Encrypted Traffic

2016

Intrusion detection system, IDS, traditionally inspects the payload information of packets. This approach is not valid in encrypted traffic as the payload information is not available. There are two approaches, with different detection capabilities, to overcome the challenges of encryption: traffic decryption or traffic analysis. This paper presents a comprehensive survey of the research related to the IDSs in encrypted traffic. The focus is on traffic analysis, which does not need traffic decryption. One of the major limitations of the surveyed researches is that most of them are concentrating in detecting the same limited type of attacks, such as brute force or scanning attacks. Both the …

Focus (computing)Traffic analysisNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesPayload (computing)020206 networking & telecommunications02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreEncryptionSet (abstract data type)Brute force0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesbusinesscomputer050104 developmental & child psychology
researchProduct