Bhargavi Goswami | Queensland University of Technology (original) (raw)

Papers by Bhargavi Goswami

Research paper thumbnail of Lightweight Anti DDoS Security Tool: Edge Level Filtering in SDN using P4

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Satellite Communication Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HULA: Dynamic and Scalable Load Balancing Mechanism for Data Plane of SDN

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of GNSS Signal Obstruction Removal Tool for Evaluating and Improving Position Accuracy in Satellite Networks

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on P4 Challenges in Software Defined Networks: P4 Programming

IEEE Access

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Systematic Study on LoRa Communication in IoT: Implementation Challenges and Research Solutions

Communications in computer and information science, 2022

Bookmarks Related papers MentionsView impact

Research paper thumbnail of LoRa-based IoT applications on campus: experimental demonstrations and performance evaluation

IOP Conference Series: Materials Science and Engineering

Lora technology is widely used in solving many IoT problems because of its long-range capability ... more Lora technology is widely used in solving many IoT problems because of its long-range capability and low-cost. However, the model which works in the 2.4GHz frequency and without regional limitations is a novelty and its full capabilities are unknown. In this research the device is test for its transmission capabilities on a university campus because this is the conditions with high 2.4GHz interference from Wi-Fi, Bluetooth, etc. The authors also try to find the packet delivery rate and define at what distance LoRa end-node starts to lose connection with its gateway. Along the way receiving signal strength indicator is registered in order to understand the device power level. All of it is done by placing the gateway in the middle of the campus so that it equally reaches the furthermost points, connecting it with a LoRa-based end-node and testing this connection by placing the end-node device in different spots within the area and analysing the connection. LoRa 2.4GHz has shown lower ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy Efficient Communication Using Constrained Application Protocol for IoT Devices

Communications in Computer and Information Science

Bookmarks Related papers MentionsView impact

Research paper thumbnail of P4 based Load Balancing Strategies for Large Scale Software-Defined Networks

2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Neighborhood Area Networks Communication Model for Smart Grid: Design and Performance Evaluation

2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Key Establishment Technique for Secure Diversified Wireless Network

With the rising use of Wireless network in recent years, the demand of security is increasing wit... more With the rising use of Wireless network in recent years, the demand of security is increasing with time that researchers need to study on that. The Low computational requirement, less energy consumption and easy implementation are the cardinal design characteristics taken into consideration during the establishment of the key based on channel reciprocity technique. This method, by observing the wireless channel, attempts to establish a shared key for providing security to wireless network in diversified networking scenario. The pedestal of the raised technique are: I. The method of computing the wireless channel reciprocity into binary bits to form a secret way, II. The method of exploiting communication error and correcting mismatch bit by nodes to obtain key agreement and III. Take a tour on achievability and security issues related to this technique. This paper gives a helicopter view on raised research over channel reciprocity based key establishment technique, developed to erad...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Newly developed Algorithm RCP+ for Congestion Control on large scale Wireless Networks

With the rising number of people and devices encroaching into the world of Internet, the demand o... more With the rising number of people and devices encroaching into the world of Internet, the demand of bandwidth continues to grow higher and higher. Thus, this is the need of the time that newly developed approaches should be theoretically and practically tested, proved and improved in their efficiency and capability of handling large scale wireless network scenario smoothly. Here, we authors, come up with a proposal of a new approach to congestion control that is novel in the following ways. The newly developed protocol towards congestion control, named as RCP+, is designed and implemented with a view to eliminate limitations of the most widely accepted two algorithms of TCP and RCP. The biggest advantage of this protocol is; it would also coexist with other networking protocols. The protocol we have developed shares fair bandwidth in both the networks-small or large. Starting from small networks to big networks we tested the newly proposed protocol and results showed up that RCP+ is ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security and Performance Evaluation of Software Defined Network Controllers Against Distributed Denial of Service Attack

2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021

Software-Defined Network (SDN) has pioneered the era of a programmable network where it defines c... more Software-Defined Network (SDN) has pioneered the era of a programmable network where it defines control plane and data plane which become two distinct cores. The technology bolsters the concept of logical centralization by eradicating the concept of individually programmed devices and network virtualization. The control plane acts as a controller that directs the activities and configurations applied within a network. SDN is not open source however the SDN controller is an open-source application. All controllers mentioned possess distinct pros and cons depending on the SDN environment. One of the most threatening flaws SDN exposed to is Distributed Denial of Service attack (DDoS). It is because once a controller is attacked the whole network might collapse. To explore the resilience proficiency of SDN controllers towards DDoS attacks, researchers performed a security assessment by evaluating controllers’ performance against DDoS attacks. The experiment measured 5 network parameters against the 6 most widely used SDN controllers. Finally, a thorough analysis is done on the obtained results that are graphically presented. The conclusion is drawn ranking the controllers based on the capabilities of handling DDoS attack events and their reaction.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Experimental Based Performance Testing of Different TCP Protocol Variants in comparison of RCP+ over Hybrid Network Scenario

Widely implemented topology in Internet is Heterogeneous networks which are a combination of wire... more Widely implemented topology in Internet is Heterogeneous networks which are a combination of wired and wireless networks. Due to high bandwidth availability at wired links and high delayed products at wireless links, bottleneck situation is generated at Access Point and it has to face severe Congestion consequences. Some of the most known and recent protocols developed to provide faster and lighter congestion control are TCP (Transmission Control Protocol), multiple Variants of TCP and the Rate Control Protocol (RCP). TCP is the most widely used congestion control protocol in the today's Internet scenario. However, TCP has limitations such as not providing good bandwidth utilizations especially in high bandwidth-delay product networks, introducing high network load and excessive overhead over the network, whereas, RCP is not flexible enough to co-exist with dynamic hybrid networking scenario where multiple protocols co-exist. RCP involves complex computations at routers and have...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization of Software-Defined Networks During Load Balancing Experiment Using Floodlight Controller

Data Visualization, 2020

With the growing impact of globalization, large-scale networks are now not countable with the tip... more With the growing impact of globalization, large-scale networks are now not countable with the tip of fingers as businesses have grown drastically and every day more and more organization are stepping into the lobby of large-scale networks. While the entire network is allocated with a diverse set of resources, it is necessary to address the balance of the usage of Internet resources to avoid long waiting queues and congestions over certain hotlines of communication channels that have always been the focus for the entire market. As the traditional network has evolved to software defined-networks (SDN), for addressing load balancing issue over SDN, we as researchers have come forward to provide the solution to the problem by means of this chapter. Here, researchers have discussed and demonstrated the implementation of the unique technique of load balancing on software-defined networks on Floodlight Controller over mininet simulator with the focus on Data Visualization while performing the experiment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Professional chat application based on natural language processing

2018 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), 2018

There has been an emerging trend of a vast number of chat applications which are present in the r... more There has been an emerging trend of a vast number of chat applications which are present in the recent years to help people to connect with each other across different mediums, like Hike, WhatsApp, Telegram, etc. The proposed network-based android chat application used for chatting purpose with remote clients or users connected to the internet, and it will not let the user send inappropriate messages. This paper proposes the mechanism of creating professional chat application that will not permit the user to send inappropriate or improper messages to the participants by incorporating base level implementation of natural language processing (NLP). Before sending the messages to the user, the typed message evaluated to find any inappropriate terms in the message that may include vulgar words, etc., using natural language processing. The user can build an own dictionary which contains vulgar or irrelevant terms. After pre-processing steps of removal of punctuations, numbers, conversion...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on Various Handoff Methods in Mobile Ad Hoc Network Environment

Advances in Intelligent Systems and Computing, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement of LAN Infrastructure Performance for Data Center in Presence of Network Security

Advances in Intelligent Systems and Computing, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization: Experiment to Impose DDoS Attack and Its Recovery on Software-Defined Networks

Data Visualization, 2020

The entire network is doing paradigm shift towards the software-defined networks by separating fo... more The entire network is doing paradigm shift towards the software-defined networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX [2], Ryu [3], Floodlight [4], OpenDayLight [6], ONOS [7] and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However, more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Scalability of software defined network on floodlight controller using OFNet

2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017

Software Defined Network is the thriving area of research in the realm of networking. With growin... more Software Defined Network is the thriving area of research in the realm of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the competence and applicability to hold up the fault tolerance of the solution offered in the form of SDN Controllers. Out of the accessible multiple controllers with enabled the SDN functionalities to the network infrastructure, one of the best choice in controllers is Floodlight Controller. This research article is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing dual scenarios implemented, experimented and analyzed on the emulation tool of OFNet. Floodlight Controller is tested in the emulation environment by observing eight different parameters of the controller and checked its performance in scalable networking conditions over linear topology by gradually increasing the number of nodes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lightweight Anti DDoS Security Tool: Edge Level Filtering in SDN using P4

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Satellite Communication Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HULA: Dynamic and Scalable Load Balancing Mechanism for Data Plane of SDN

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of GNSS Signal Obstruction Removal Tool for Evaluating and Improving Position Accuracy in Satellite Networks

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on P4 Challenges in Software Defined Networks: P4 Programming

IEEE Access

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Systematic Study on LoRa Communication in IoT: Implementation Challenges and Research Solutions

Communications in computer and information science, 2022

Bookmarks Related papers MentionsView impact

Research paper thumbnail of LoRa-based IoT applications on campus: experimental demonstrations and performance evaluation

IOP Conference Series: Materials Science and Engineering

Lora technology is widely used in solving many IoT problems because of its long-range capability ... more Lora technology is widely used in solving many IoT problems because of its long-range capability and low-cost. However, the model which works in the 2.4GHz frequency and without regional limitations is a novelty and its full capabilities are unknown. In this research the device is test for its transmission capabilities on a university campus because this is the conditions with high 2.4GHz interference from Wi-Fi, Bluetooth, etc. The authors also try to find the packet delivery rate and define at what distance LoRa end-node starts to lose connection with its gateway. Along the way receiving signal strength indicator is registered in order to understand the device power level. All of it is done by placing the gateway in the middle of the campus so that it equally reaches the furthermost points, connecting it with a LoRa-based end-node and testing this connection by placing the end-node device in different spots within the area and analysing the connection. LoRa 2.4GHz has shown lower ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy Efficient Communication Using Constrained Application Protocol for IoT Devices

Communications in Computer and Information Science

Bookmarks Related papers MentionsView impact

Research paper thumbnail of P4 based Load Balancing Strategies for Large Scale Software-Defined Networks

2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Neighborhood Area Networks Communication Model for Smart Grid: Design and Performance Evaluation

2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Key Establishment Technique for Secure Diversified Wireless Network

With the rising use of Wireless network in recent years, the demand of security is increasing wit... more With the rising use of Wireless network in recent years, the demand of security is increasing with time that researchers need to study on that. The Low computational requirement, less energy consumption and easy implementation are the cardinal design characteristics taken into consideration during the establishment of the key based on channel reciprocity technique. This method, by observing the wireless channel, attempts to establish a shared key for providing security to wireless network in diversified networking scenario. The pedestal of the raised technique are: I. The method of computing the wireless channel reciprocity into binary bits to form a secret way, II. The method of exploiting communication error and correcting mismatch bit by nodes to obtain key agreement and III. Take a tour on achievability and security issues related to this technique. This paper gives a helicopter view on raised research over channel reciprocity based key establishment technique, developed to erad...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Newly developed Algorithm RCP+ for Congestion Control on large scale Wireless Networks

With the rising number of people and devices encroaching into the world of Internet, the demand o... more With the rising number of people and devices encroaching into the world of Internet, the demand of bandwidth continues to grow higher and higher. Thus, this is the need of the time that newly developed approaches should be theoretically and practically tested, proved and improved in their efficiency and capability of handling large scale wireless network scenario smoothly. Here, we authors, come up with a proposal of a new approach to congestion control that is novel in the following ways. The newly developed protocol towards congestion control, named as RCP+, is designed and implemented with a view to eliminate limitations of the most widely accepted two algorithms of TCP and RCP. The biggest advantage of this protocol is; it would also coexist with other networking protocols. The protocol we have developed shares fair bandwidth in both the networks-small or large. Starting from small networks to big networks we tested the newly proposed protocol and results showed up that RCP+ is ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security and Performance Evaluation of Software Defined Network Controllers Against Distributed Denial of Service Attack

2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021

Software-Defined Network (SDN) has pioneered the era of a programmable network where it defines c... more Software-Defined Network (SDN) has pioneered the era of a programmable network where it defines control plane and data plane which become two distinct cores. The technology bolsters the concept of logical centralization by eradicating the concept of individually programmed devices and network virtualization. The control plane acts as a controller that directs the activities and configurations applied within a network. SDN is not open source however the SDN controller is an open-source application. All controllers mentioned possess distinct pros and cons depending on the SDN environment. One of the most threatening flaws SDN exposed to is Distributed Denial of Service attack (DDoS). It is because once a controller is attacked the whole network might collapse. To explore the resilience proficiency of SDN controllers towards DDoS attacks, researchers performed a security assessment by evaluating controllers’ performance against DDoS attacks. The experiment measured 5 network parameters against the 6 most widely used SDN controllers. Finally, a thorough analysis is done on the obtained results that are graphically presented. The conclusion is drawn ranking the controllers based on the capabilities of handling DDoS attack events and their reaction.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Experimental Based Performance Testing of Different TCP Protocol Variants in comparison of RCP+ over Hybrid Network Scenario

Widely implemented topology in Internet is Heterogeneous networks which are a combination of wire... more Widely implemented topology in Internet is Heterogeneous networks which are a combination of wired and wireless networks. Due to high bandwidth availability at wired links and high delayed products at wireless links, bottleneck situation is generated at Access Point and it has to face severe Congestion consequences. Some of the most known and recent protocols developed to provide faster and lighter congestion control are TCP (Transmission Control Protocol), multiple Variants of TCP and the Rate Control Protocol (RCP). TCP is the most widely used congestion control protocol in the today's Internet scenario. However, TCP has limitations such as not providing good bandwidth utilizations especially in high bandwidth-delay product networks, introducing high network load and excessive overhead over the network, whereas, RCP is not flexible enough to co-exist with dynamic hybrid networking scenario where multiple protocols co-exist. RCP involves complex computations at routers and have...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization of Software-Defined Networks During Load Balancing Experiment Using Floodlight Controller

Data Visualization, 2020

With the growing impact of globalization, large-scale networks are now not countable with the tip... more With the growing impact of globalization, large-scale networks are now not countable with the tip of fingers as businesses have grown drastically and every day more and more organization are stepping into the lobby of large-scale networks. While the entire network is allocated with a diverse set of resources, it is necessary to address the balance of the usage of Internet resources to avoid long waiting queues and congestions over certain hotlines of communication channels that have always been the focus for the entire market. As the traditional network has evolved to software defined-networks (SDN), for addressing load balancing issue over SDN, we as researchers have come forward to provide the solution to the problem by means of this chapter. Here, researchers have discussed and demonstrated the implementation of the unique technique of load balancing on software-defined networks on Floodlight Controller over mininet simulator with the focus on Data Visualization while performing the experiment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Professional chat application based on natural language processing

2018 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), 2018

There has been an emerging trend of a vast number of chat applications which are present in the r... more There has been an emerging trend of a vast number of chat applications which are present in the recent years to help people to connect with each other across different mediums, like Hike, WhatsApp, Telegram, etc. The proposed network-based android chat application used for chatting purpose with remote clients or users connected to the internet, and it will not let the user send inappropriate messages. This paper proposes the mechanism of creating professional chat application that will not permit the user to send inappropriate or improper messages to the participants by incorporating base level implementation of natural language processing (NLP). Before sending the messages to the user, the typed message evaluated to find any inappropriate terms in the message that may include vulgar words, etc., using natural language processing. The user can build an own dictionary which contains vulgar or irrelevant terms. After pre-processing steps of removal of punctuations, numbers, conversion...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on Various Handoff Methods in Mobile Ad Hoc Network Environment

Advances in Intelligent Systems and Computing, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement of LAN Infrastructure Performance for Data Center in Presence of Network Security

Advances in Intelligent Systems and Computing, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization: Experiment to Impose DDoS Attack and Its Recovery on Software-Defined Networks

Data Visualization, 2020

The entire network is doing paradigm shift towards the software-defined networks by separating fo... more The entire network is doing paradigm shift towards the software-defined networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX [2], Ryu [3], Floodlight [4], OpenDayLight [6], ONOS [7] and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However, more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Scalability of software defined network on floodlight controller using OFNet

2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017

Software Defined Network is the thriving area of research in the realm of networking. With growin... more Software Defined Network is the thriving area of research in the realm of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the competence and applicability to hold up the fault tolerance of the solution offered in the form of SDN Controllers. Out of the accessible multiple controllers with enabled the SDN functionalities to the network infrastructure, one of the best choice in controllers is Floodlight Controller. This research article is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing dual scenarios implemented, experimented and analyzed on the emulation tool of OFNet. Floodlight Controller is tested in the emulation environment by observing eight different parameters of the controller and checked its performance in scalable networking conditions over linear topology by gradually increasing the number of nodes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on Various Handoff Methods in Mobile Ad Hoc Network Environment

Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 767. Springer, Singapore, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization of Software-Defined Networks During Load Balancing Experiment Using Floodlight Controller

In: Anouncia S., Gohel H., Vairamuthu S. (eds) Data Visualization. Springer, Singapore, 2020

With the growing impact of globalization, large-scale networks are now not countable with the tip... more With the growing impact of globalization, large-scale networks are now
not countable with the tip of fingers as businesses have grown drastically and every day more and more organization are stepping into the lobby of large-scale networks. While the entire network is allocated with a diverse set of resources, it is necessary to address the balance of the usage of Internet resources to avoid long waiting queues and congestions over certain hotlines of communication channels that have always been the focus for the entire market. As the traditional network has evolved to software defined-networks (SDN), for addressing load balancing issue over SDN, we as researchers have come forward to provide the solution to the problem by means of this chapter. Here, researchers have discussed and demonstrated the implementation
of the unique technique of load balancing on software-defined networks on Floodlight Controller over mininet simulator with the focus on Data Visualization while performing the experiment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Visualization: Experiment to Impose DDoS Attack and Its Recovery on Software-Defined Networks

In: Anouncia S., Gohel H., Vairamuthu S. (eds) Data Visualization. Springer, Singapore, 2020

The entire network is doing paradigm shift towards the software-defined networks by separating fo... more The entire network is doing paradigm shift towards the software-defined
networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making
software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX [2], Ryu [3], Floodlight [4], OpenDayLight [6], ONOS [7] and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However,
more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of
now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack.

Bookmarks Related papers MentionsView impact