Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2472-2475.DOI: 10.11772/j.issn.1001-9081.2014.09.2472
• Network and communications • Previous Articles Next Articles
LYV Yilong1,HUANG Chuanhe1,JIA Yonghong1,ZHANG Hai1
Received:
2014-03-26
Revised:
2014-05-16
Online:
2014-09-30
Published:
2014-09-01
Contact:
LYV Yilong
Supported by:
;The Ph.D. Programs Foundation of Ministry of Education of China; Key Project of Natural Science Foundation of Hubei Province
吕怡龙1,黄传河1,2,贾永宏1,张海1
通讯作者:
吕怡龙
作者简介:
基金资助:
国家自然科学基金资助项目;湖北省自然科学基金资助项目;教育部博士点基金资助项目
CLC Number:
LYV Yilong HUANG Chuanhe JIA Yonghong ZHANG Hai. Simulation of switch's processing delay in software defined network[J]. Journal of Computer Applications, 2014, 34(9): 2472-2475.
吕怡龙 黄传河 贾永宏 张海. 软件定义网络中交换机处理时延的仿真[J]. 计算机应用, 2014, 34(9): 2472-2475.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2472
[1]ZHANG S, ZOU F. Survey on software defined network research [J]. Application Research of Computers,2013,30(8):2246-2251. (张顺淼,邹复民.软件定义网络研究综述[J].计算机应用研究,2013,30(8):2246-2251.)
[2]YEGANEH S H, TOOTOONCHIAN A, GANJALI Y. On scalability of software-defined networking [J]. IEEE Communications Magazine, 2013, 51(2): 136-141.
[3]VAUGHAN-NICHOLS S J. OpenFlow: The next generation of the network? [J]. Computer, 2011, 44(8): 13-15.
[4]GUPTA M, SOMMERS J, BARFORD P. Fast, accurate simulation for SDN prototyping [C]// SIGCOMM 2013: Proceedings of the 2013 Special Interest Group on Data Communication. New York: ACM, 2013: 31-36.
[5]WANG S Y, CHOU C L, YANG C M. EstiNet OpenFlow network simulator and emulator [J]. IEEE Communications Magazine, 2013, 51(9): 110-117.
[6]PONGRACZ G, MOLNAR L, KIS Z L. Removing roadblocks from SDN: OpenFlow software switch performance on Intel DPDK [C]// EWSDN 2013: Proceedings of the 2013 Second European Workshop on Software Defined Networks. Piscataway: IEEE, 2013: 62-67.
[7]FARIAS F, SALVATTI J, VICTOR P, et al.Integrating legacy forwarding environment to OpenFlow/SDN control plane [C]// APNOMS 2013: Proceedings of the 2013 Asia Pacific Network Operations and Management Symposium. Piscataway: IEEE, 2013:1-3.
[8]FUKUDA I, FUJITA T. Deployment of OpenFlow/SDN technologies to carrier services [J]. IEICE Transactions on Communications, 2013, 96(12): 2946-2952.
[9]REN T, XU Y. Analysis of the new features of OpenFlow 1.4[C]// ICITSM 2013: Proceedings of the 2013 2nd International Conference on Information Technology, System & Management. Amsterdam: Atlantis Press, 2014:73-77.
[10]ROY A, YOCUM K, SNOEREN A C. Challenges in the emulation of large scale software defined networks [C]// APSYS 2013: Proceedings of the 2013 4th Asia-Pacific Workshop on Systems. New York: ACM, 2013: 10-16.
[11]JIANG P, CHEN M, LI B. Measuring performance of the OpenFlow software switch [J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2013, 25(1): 24-29. (蒋培成,陈鸣,李兵.OpenFlow 软交换机的性能测量[J].重庆邮电大学学报:自然科学版, 2013, 25(1): 24-29.)
[12]CANINI M, VENZANO D, PERENI P, et al.A nice way to test OpenFlow applications [C]// NSDI 2012: Proceedings of the 2012 9th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2012: 10.
[13]SALEHI M E, FAKHRAIE S M, YAZDANBAKHSH A. Instruction set architectural guidelines for embedded packet-processing engines [J]. Journal of Systems Architecture, 2012, 58(3): 112-125. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||