Value: 40%
Due Date: 30-JAN-2020
Length: Report and Seminar (1500-2000 words approx.)
Submission method options: Alternative submission method
TASK
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 4 Research Writing for Task 1 Final Report
3. COMPLETING Topic 5 Communicating a report (oral presentation) for Task 2 Presentation
Project Closure is an important final step in project management. As part of closing down
your project, you are required to communicate about the results, findings, conclusion and
lessons learnt from your Project.
Report and Seminar Script Length: While the word length for the Report and Seminar is
stated at 1500 to 2000 words approx., this may vary due to the nature of the project, advice
from your lecturer and presentation modes. You are the best judge at this stage on length,
together with advice from your lecturer. So your Report and Seminar Presentation can be done
with some variation as long as you complete the TWO steps as described below. Use the
marking criteria as a checklist for completed tasks.
WHAT TO DO:
You will be asked to communicate about your project in both written and oral formats:
1. Task 1: Final Report (as PDF and as a Final Post in Project Blog)
2. Task 2: Seminar Presentation
The seminar is an oral, live to class or pre-recorded presentation as advised by your
lecturer, as to the best format and presentation logistics for each class.
Submit to Turnitin both a cover page with Blog address (or Cloud site access link for
big files), the Report and the Seminar presentation file (or cloud site access or
Website etc.).
The intended audience could be your peers as well as invited guests and academics.
1. TASK 1 Final Report in the Blog
1. For the written report, this should be a final blog entry to close the project.
(NOTE: your local lecturer may suggest an alternative report format)
2. The written report entry can discuss the results, findings, conclusion and
lessons learnt from your Project Research Aims and Outcomes.
3. NOTE: the content of the Report should also be a the source for developing
the script or outline for the presentation seminar in Step 2.
4. Ensure that the Project Blog Report is your own work and has not been
submitted elsewhere and complies with the University’s requirements for
academic integrity.
2. TASK 2 Presentation Seminar
1. The time has been deliberately limited to 10
minutes
to force you into
selecting the most appropriate subset of information to present for this
situation and you will be heavily penalised if you take more than 15 minutes.
2. NOTE: If doing a video presentation (MP4 file, YouTube, Vimeo, Voice-overPowerPoint etc.) then try to halve the time for the online audience e.g. 6 – 10
minutes
3. This seminar will vary according to your study mode and so can be done
either/or:
1. live to class of peers – if studying on campus, then question time is
not part of the presentation time.
2. pre-recorded video presentation – if studying online mode then
technical production of the audio and video is considered in lieu of
question time.
3. If you are planning to do a research Masters, Professional Doctorate or
a PhD after this course, then one variation for the seminar may be to
do a Poster Presentation Seminar#. See details below the line.
4. The seminar should be accompanied by appropriate audio/visual tools such
as a set of presentation slides or examples of hardware/software/systems that
are necessary for the audience to understand and follow your presentation.
5. On campus students can ask your local supervisor for the date, time you will
be presenting.
6. Presenting a seminar also demonstrates that you have understood the project
work that has been carried out.
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to apply project management and information and communication
technologies (ICT) tools to plan, execute, record and present their research and project
work as a capstone experience.
• be able to demonstrate advanced communication skills in transmitting their capstone
experiences and ideas.
• be able to justify to an audience of peers any conclusions and professional decisions
made that contribute to creating new knowledge.
quality workNo plagarism
Assessment item 4 – Final Report and Presentation
Value: 40%
Due Date: 30-JAN-2020
Length: Report and Seminar (1500-2000 words approx.)
Submission method options: Alternative submission method
TASK
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 4 Research Writing for Task 1 Final Report
3. COMPLETING Topic 5 Communicating a report (oral presentation) for Task 2 Presentation
Project Closure is an important final step in project management. As part of closing down
your project, you are required to communicate about the results, findings, conclusion and
lessons learnt from your Project.
Report and Seminar Script Length: While the word length for the Report and Seminar is
stated at 1500 to 2000 words approx., this may vary due to the nature of the project, advice
from your lecturer and presentation modes. You are the best judge at this stage on length,
together with advice from your lecturer. So your Report and Seminar Presentation can be done
with some variation as long as you complete the TWO steps as described below. Use the
marking criteria as a checklist for completed tasks.
WHAT TO DO:
You will be asked to communicate about your project in both written and oral formats:
1. Task 1: Final Report (as PDF and as a Final Post in Project Blog)
2. Task 2: Seminar Presentation
The seminar is an oral, live to class or pre-recorded presentation as advised by your
lecturer, as to the best format and presentation logistics for each class.
Submit to Turnitin both a cover page with Blog address (or Cloud site access link for
big files), the Report and the Seminar presentation file (or cloud site access or
Website etc.).
The intended audience could be your peers as well as invited guests and academics.
1. TASK 1 Final Report in the Blog
1. For the written report, this should be a final blog entry to close the project.
(NOTE: your local lecturer may suggest an alternative report format)
2. The written report entry can discuss the results, findings, conclusion and
lessons learnt from your Project Research Aims and Outcomes.
3. NOTE: the content of the Report should also be a the source for developing
the script or outline for the presentation seminar in Step 2.
4. Ensure that the Project Blog Report is your own work and has not been
submitted elsewhere and complies with the University’s requirements for
academic integrity.
2. TASK 2 Presentation Seminar
1. The time has been deliberately limited to 10
minutes
to force you into
selecting the most appropriate subset of information to present for this
situation and you will be heavily penalised if you take more than 15 minutes.
2. NOTE: If doing a video presentation (MP4 file, YouTube, Vimeo, Voice-overPowerPoint etc.) then try to halve the time for the online audience e.g. 6 – 10
minutes
3. This seminar will vary according to your study mode and so can be done
either/or:
1. live to class of peers – if studying on campus, then question time is
not part of the presentation time.
2. pre-recorded video presentation – if studying online mode then
technical production of the audio and video is considered in lieu of
question time.
3. If you are planning to do a research Masters, Professional Doctorate or
a PhD after this course, then one variation for the seminar may be to
do a Poster Presentation Seminar#. See details below the line.
4. The seminar should be accompanied by appropriate audio/visual tools such
as a set of presentation slides or examples of hardware/software/systems that
are necessary for the audience to understand and follow your presentation.
5. On campus students can ask your local supervisor for the date, time you will
be presenting.
6. Presenting a seminar also demonstrates that you have understood the project
work that has been carried out.
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to apply project management and information and communication
technologies (ICT) tools to plan, execute, record and present their research and project
work as a capstone experience.
• be able to demonstrate advanced communication skills in transmitting their capstone
experiences and ideas.
• be able to justify to an audience of peers any conclusions and professional decisions
made that contribute to creating new knowledge.
Evaluationof Telecommunication Equipment Delays
in Software-Defined Networks
I. G. Buzhin, Yu. B. Mironov
Moscow Technical University of Communication and Informatics
Moscow, Russia
bigvrn93@mail.ru, mistiam@gmail.com, buzhin@media-publisher.ru
Abstrat — Mathematical models of the switch and controller
of software-defined networks are built, on the basis of which
formulas are derived for estimating the time delays in the
telecommunications equipment of these networks. The
dependencies of the time delays in the switch and the controller
on the main equipment parameters, which have a major effect on
the delays, are also obtained. The obtained results can be used in
the design of software-configured networks in the context of
various informational impacts (for various input information
flows) with a given level of quality of service.
Key words: software defined network, telecommunication
equipment, time delay, modern networking technology.
I. INTRODUCTION
At the present stage of development of communication
networks, a number of tasks of the session and application
levels are superimposed on the telecommunications equipment
of the transport and channel levels. This situation leads either
to a significant increase in the cost of telecommunications
equipment, or to the occurrence of congestion and lower
quality of services provided.
In this regard, there is a need to separate control functions
and data transfer functions between different types of
telecommunications equipment. This need has led to the
development of technology software-defined networks (SDN)
[1].
In modern communication networks, including software-
defined ones, there are high demands on the quality of
telecommunications services in the context of information
exposure. The quality of telecommunication services is a
combination of the properties of a service, determined by the
quality of the functioning of the network, which characterize
the ability to meet the needs of users. Quality of service is a
set of indicators that determine the degree of user satisfaction
with the service provided to him. Quality of service is
characterized by the properties of usability, availability,
availability, continuity, integrity and security of service. The
quality of the network operation determines the ability of the
network to perform functions that provide communication
between subscribers.
One of the characteristics of the quality of
telecommunications services is the delay created by
telecommunications equipment.
Thus, when designing software- defined networks in the
context of various informational impacts (with different input
information flows) with a given level of quality of service, it is
necessary to evaluate time delays in telecommunications
equipment.
II. ARCHITECTURE OF SOFTWARE-DEFINED NETWORKS
The main idea of the SDN is to separate the traffic transfer
functions from the control functions (including control of both
the traffic itself and its transmitting devices). This is due to the
creation of special software that can work on a separate server
(computer) and which is controlled by the network
administrator. All routers and switches are combined under the
control of a SDN controller or Network Operating System
(SOS), which provides applications with access to network
management and which constantly monitors the configuration
of network facilities.
Thus, the control switch function is transferred to a
separate central device – the SDN controller. This approach
allows you to manage and monitor the state of the network on
a logically centralized controller. In addition, it becomes
possible for a control level to separate from the physical
component using the logical representation of the network as a
whole. The interaction between the level of data transmission
is carried out through a single unified open interface.
In the SDN architecture, according to [1], there are 3 levels
(Fig. 1):
• network infrastructure layer, representing a set of
network structures (switches and communication channels);
• a management level consisting of an operating system
that provides applications with network services and a
software interface for managing network devices and the
network;
application level.
978-1-7281-0606-9/19/$31.00 ©2019 IEEE
Fig. 1. Architecture SDN
One of the central places in the architecture of the SDN is
the network operating system, which in a general sense is an
operating system that provides processing, storage and
transmission of data in the information network. A network
operating system defines an interconnected group of upper-
level protocols that provide basic network functions: object
addressing, service operation, data security, and network
management.
In contrast to the traditional interpretation of the term SOS
as an operating system integrated with the network protocol
stack, in this case, SOS means a software system that provides
monitoring, access, resource management of the entire
network, and not a specific node. It is in this definition that
SOS can be considered a SDN controller. The operating
system does not manage the network, it provides a
programming interface (API) for management. Thus, in fact,
the solution of network management tasks is placed on the
level of applications implemented based on the network
operating system API.
The technology of software-defined networks simplifies
the process of operation and maintenance of networks,
connecting to networks automatically. This technology is
widely used in the Internet of Things. It is assumed that in the
future “things” will become active participants in business,
informational and social processes, where they can interact
and communicate with each other, sharing environmental
information, reacting and influencing the processes occurring
in the outside world, without human intervention. Many
Internet of Things devices are serviced by radio technologies
that use unlicensed radio frequency bands and are designed to
communicate in small radius cells with limited QoS and
security requirements applicable to the home environment.
III. PRINCIPLE OF FUNCTIONING TELECOMMUNICATION
EQUIPMENT OF SOFTWARE-DEFINED NETWORKS
The separation of the level of control and data transfer is
solved within the framework of the SDN. In the SDN switch,
only the data transfer level is implemented. Each SDN switch
has several input and output ports. Switch ports are connected
to ports of another switch by physical communication
channels. The management port is connected to the SDN
controller node — OpenFlow exchanges messages on this
channel to control the switch.
The controller does not manage the network, it provides a
programmatic interface (API) for management. Thus, in fact,
the solution of network management tasks is placed on the
level of applications implemented on the basis of the network
operating system API.
The SDN controller generates data on the state of all
network resources and provides access to them for network
management applications. These applications manage various
aspects of network operation, including building topologies,
routing decisions, load balancing.
To implement this idea, an open protocol OpenFlow has
been developed for managing network equipment that is not
focused on products from a specific supplier. Using this
protocol, specialists themselves can determine and control
which nodes, under what conditions and with what quality
they can interact in the network.
The switch is equipped with a set of addressing tables
(flow tables) that form the addressing pipeline (pipeline),
which consists of one or more serially connected addressing
tables. A packet arriving at one of the input ports of the switch
is first processed (information is read from the packet header),
then it goes to the addressing pipeline. The sequential
processing of the packet in the addressing tables begins. The
package here refers to a bit string from which two parts can be
distinguished: a header and a payload. The operations
performed on packets in the addressing tables do not change
the load of the packet, but are capable of changing its header.
The package header consists of several fields. As a rule,
these fields indicate the identifiers of the network protocols
that must process the packet and the service information used
by them. During the packet passing through the addressing
tables pipeline, service fields (metadata) can be added to the
packet header, which are intended to transfer service
information inside the pipeline, and are reset when a packet
arrives at one of the output ports of the switch. The
composition and size of service fields is determined by the
technical characteristics of a specific SDN switch. Thus, data
transfer decisions are made on the basis of streams, which are
a combination of packet header fields.
The addressing table contains flows records and
instructions for applying actions to a packet. Stream entries
and relevant information from the packet headers begin to
match. If a match is found, the corresponding action is taken
on the packet. It may result in removing a packet from the
switch, switching to another (larger by number) addressing
table, sending it to the controller via a secure OpenFlow
channel, or sending a packet to the desired output port of the
SDN switch. If the switch cannot execute the instruction of
applying the action to the packet, then the packet information
is sent to the controller via the secure OpenFlow channel. If
the information from the packet header did not match any
entry about the streams, then the packet is transmitted to the
next addressing table.
The controller manages the contents of the addressing
tables of the subordinate switches. The OpenFlow protocol
assumes that the main reason for a change in the contents of
the switch tables is the controller’s reaction to events from the
network, and involves several types of notifications so that the
switches can notify the controller of such events, as well as
several types of commands with which the controller can make
modifications to the switch tables.
The switch processes each message received from the
controller, with the possibility of forming a response, if
necessary. If the switch cannot fully process the message
received from the controller, it should send back an error
message to the controller. This can occur due to a switch reset,
QoS policy, or if it is sent to a blocked or faulty port.
The OpenFlow protocol provides reliable message delivery
and processing, but does not provide automatic delivery
confirmations or orderly processing of messages. Message
processing is provided for the primary connection and
additional connections that use reliable data transfer, but is not
supported on additional connections that use unreliable data
transfer. Message delivery is guaranteed as long as the
OpenFlow channel is operational.
IV. ASSEMENT OF DELAYS OF TELECOMMUNICATION
EQUIPMENT OF SOFTWARE-DEFINED NETWORKS
A mathematical model of the functioning of the SDN
switch and the SDN controller was built in [2]. Based on this
model, we obtain the formulas for estimating delays in the
telecommunications equipment of software-defined networks.
The quality of telecommunication services is a
combination of the properties of a service, determined by the
quality of the functioning of the network, which characterize
the ability to meet the needs of users. Ensuring the quality of
telecommunications services is the purpose of designing
communication networks. One of the factors that determines
the quality of service (QoS) is the delay – the time it takes for a
packet (message) after it is sent to reach its destination. When
the telecommunications equipment of the network is
functioning, a switching delay is formed (the time it takes for
the device that received the packet (message) to start
transmitting it to the next telecommunications device.
The model of the functioning of the SDN switch is a
queuing network consisting of two parts (separate queuing
systems): the first part is the input queue of the switch and the
device for reading information from the packet header, the
second part is the flow addressing table. Two independent
Poisson flows of intensity 1λ and 2λ . requests come to the
input of the queuing network. These streams are numbered in
order of decreasing importance of applications. At the time of
termination of the service on the released device, an
application is selected from a non-empty queue with a
minimum number. Incoming requests with intensity 1λ
correspond to packets arriving at the control port of the switch
(from the controller), requests with intensity 2λ correspond to
the rest of the packets arriving at the switch from external
networks. The service times of requests for each of the streams
are independent in aggregate and have an exponential
distribution function. If all devices are busy, then the incoming
application is waiting in the drive, while the applications of
both streams form a common queue. The first priority
applications (1-applications or priority applications) are
packets arriving at the SDN switch from the controller. They
have a relative priority compared to applications of the second
stream (2-applications, or non-priority applications). Then the
average waiting time of the priority application in the first
part of the switch operation model is estimated using formula
(1):
1
1
1 1(1 )
Q
w
λ
π
=
−
(1)
where 1Q – stationary average queue length of priority
requests (packets arriving at the switch from the controller),
1π – probability of losing priority claims in the first part of the
switch model.
The average waiting time of a non-priority application
is estimated using formula (2):
2
2
2 1(1 )
Q
w
λ π
=
−
(2)
where 2Q – stationary average queue length of non-priority
requests (packets arriving at the switch from external
networks).
The second part of the switch operation model is a single-
line queuing system that receives a Poisson flow with intensity
1Λ (intensity of the output stream of the first part of the
switch model). The processing of a packet by each record
, 1,i i S= and the execution of further actions on the packet
will be represented by the servicing device with an average
time of matching 1
σ
the packet with the record of the flows.
Then the delay in the second part of the switch model is
estimated as (3):
3
S
w
σ
= (3)
where S – number of entries in the stream addressing table.
Then the total delay in the SDN switch will be estimated
using (4):
1 2 3w w w w= + + (4)
Central to the architecture of the SDN is the SDN
controller. This device manages the contents of the tables of
addressing flows and lists of rules (actions) of the subordinate
switches. Changing the addressing tables of switches occurs
based on the state of the network and messages coming from
the switches via the OpenFlow channel. We will build the
model of the functioning of the SDN controller without
choosing a specific network operating system. The algorithm
for the operation of the SDN controller described below does
not depend on the specific network operating system and is
common to all network operating systems. The network
operating system will influence the choice of model input
parameters.
The input of the controller receives messages from the
OpenFlow channel from g the switches. The controller
recognizes all these messages and sends them to the controller
core, which decides what needs to be done in the appropriate
situation. Next, a response to this message is generated, which
will contain a list of actions that the controller must perform.
These actions can be: change of addressing tables, deletion or
addressing of a packet to another switch, etc. The controller
core selects the appropriate action from the actions database,
which is located on the controller. It contains all sorts of
actions that the controller can choose. Next, the response is
sent to the switch, where the actions that are specified in this
response are required to be performed.
The algorithm for the functioning of the SDN controller
can be described by a linear queuing system with r waiting
places ( r < ∞ ), into which the Poisson message flow enters
the OpenFlow channel from g the switches. The service times
of messages (applications) are independent and, at the same
time, the service time of each application on any of the
devices is distributed exponentially with a parameter γ . A
message arriving in an overcrowded system (i.e., when all c
devices and all r waiting places are occupied) is lost and is not
returned to it again. The service device simulates the core
processor processing SDN controller.
For the model of the SDN controller, the delay will be
estimated by the stationary distribution of the message
residence time in the model. Note that a message that is made
when i other messages are received in the system immediately
begins to be serviced if i c< , and the time it takes to service
the fully loaded message system 1i c− + if c i c r≤ < + it
waits for service to start. With a fully loaded system, messages
exit from it through exponentially distributed times with the
parameter cγ . Then the waiting time for the start of the
service of the message , 0c i i r+ ≤ < , which made the
messages in the system, is distributed according to the Erlang
law 1 ( )iE x+ with the parameters cγ and 1i + . Using the
formula for the total probability and taking into account that
the distribution function of the stationary distribution
( )conW x of the waiting time for the maintenance of the
message received in the system is conditional, we obtain:
1 1
1
0
0
1
0 1
0
1
( )
( )
1
1
( )
1
c
r
con i c i i
i icon
r
w c i i
icon
W x p p E x
P p E x
π
π
− −
+ +
= =
−
= + +
=
= + = −
= + −
(5)
where ip – probability of i messages are in the system at the
moment t, 0wP = – probability of serving a message without
waiting in the queue, conπ – message loss probability.
Moving on to the Laplace-Stieltjes transformation:
0
1
0 1
0
0
( ) ( )
1
1 ( )
1 ( )
1
1
sx
con con
ir
con
w c i
icon
rcon
w
c
con con
s e dW x
P c p
s c
s cP c p
s c
ω
λ
γ
π γ
λ
γγ
π γ λ
∞
−
−
= +
=
=
= =
= + = − +
− += +
− + −
(6)
where conλ – intensity of incoming messages to the controller
input.
Hence, taking into account the independence of the service
time from the waiting time for the start of service, it follows
that the stationary distribution ( )conW x of the residence time
in the system of the message accepted for service has the form
(7):
0
0
( ) ( )
1 ( )
1
1
sx
con con
rcon
w c
con con
s e dW x
s cP c p
s c s
ϕ
λ
γγγ
π γ λ γ
∞
−
=
= =
− += +
− + − +
(7)
Stationary average waiting time for service start :
( )
( )
‘
2
(0)
1
1
con con
r
con
c
concon
c r c r
pc
c
ω ϕ
ρ
γ γ λ
πγ λ
= =
− + − =
−−
(8)
where con
λρ γ= .
The stationary average message dwell time in the system is
calculated using the Little formula:
1
con conw ω γ
= + (9)
V. ANALYSIS OF DEPENDENCE OF DELAYS ON
PARAMETRS OF TELECOMMUNICATION EQUIPMENT
Based on the formulas obtained for estimating the delays
of telecommunications equipment of software-defined
networks, we obtain the diagrams of dependencies of delays
on the parameters of telecommunications equipment.
Based on formula (4), we construct a graph of the
dependence (Fig.2) of the total delay w on the
parameter 1 2
1
( )λ λρ μ
+= , which is defined as the ratio of the
intensity of the incoming flow to the intensity of packet
processing.
The main influence on the delay in the SDN switch is
provided by the input stream intensity, the processing rate of
incoming packets, and the number and number of entries in the
addressing table. The values of the parameters for plotting the
dependence (Fig. 2) are taken from datasheets [4, 5]. Based on
Fig.2, with an increase in the ratio of the intensity of the
incoming flow to the intensity of packet processing, there is an
increase in the total delay in the SDN switch.
Based on formula (9), we construct a graph of dependence
(Fig. 3) (delays (average residence time conw in the SDN
controller) against the number of processor processor cores.
Fig. 2. The graph of the total delay w switch SDN from 1ρ
Fig. 3. The graph of the delay conw controller SDN from the number c of
logical processor cores
The greatest impact on the delay in the SDN controller is
its input queue, which is characterized by the average waiting
time for service to start (9), and the processor of processing
messages and generating responses to requests from SDN
switches, which is characterized by the average message
processing time.
The values of the parameters for plotting the dependence
(Fig. 3) are taken from datasheets [6]. On the basis of Fig.3,
with an increase in the number c of logical cores of the
message processing processor and the formation of responses
to switch requests, the time delay in the SDN controller
decreases.
VI. CONCLUSION
In this article, formulas (4), (9) were obtained for
estimating the time delays in telecommunications equipment
of software-defined networks, namely, in the SDN switch and
the SDN controller.
The dependence of the time delay in the SDN switch on
the ratio of the intensity of the incoming flow to the intensity
of packet processing was obtained. As a result, it was found
that with an increase in the ratio of the intensity of the
incoming flow to the intensity of packet processing, there is an
increase in the total delay in the SDN switch.
Also, the dependence of the average message dwell time in
the SDN controller on the number of logical cores of the
packet processing processor and the formation of responses by
the SDN switch was obtained. As a result, it was found that
with an increase in the number of logical cores of the message
processing processor and the generation of responses to switch
requests, the time delay in the SDN controller decreases.
The obtained results can be used in the design of software-
defined networks in the context of various informational
impacts (for various input information flows) with a given
level of quality of service.
REFERENCES
[1] ONF TR-502: SDN Architecture [Electronic resource] // Open
Networking Foundation. – URL:
SDN and NFV: Defining Two Different Aspects of the Future of Networking
resources/technical-reports/TR_SDN_ARCH_1.0_06062014 (date of
the application: 01.02.2019).
[2] K. E. Samouylov, I. A. Shalimov, I. G. Buzhin, Y. B. Mironov, “Model
of functioning of telecommunication equipment for software-
configurated networks,” Modern Information Technologies and IT-
Education, vol. 14, no. 1. 2018. doi:10.25559/SITITO.14.201801.013-
026.
[3] V. Vishnevskiy, “Theoretical foundations of computer network design,”
Moscow: The technosphere, 2003, 512 p
[4] D-link. Gigabit Stackable Smart Managed Switches [Electronic
resource]: Electronic text data. – D-link, 2015.
[5] HP Performance Brief for External Audiences [Electronic resource]:
Electronic text data. – HP, 2007.
[6] OpenDaylight Controller:MD-SAL:FAQ [Electronic resource] //
wiki.opendaylight.org. – URL:
https://wiki.opendaylight.org/view/OpenDaylight_Controller:MD-
SAL:FAQ (date of the application: 09.02.2019).
[7] ONF TR-539 OpenFlow Controller Benchmarking Methodologies
[Electronic resource] // Open Network Foundation. – URL:
https://3vf60mmveq1g8vzn48q2o71a-wpengine.netdna-ssl.com/wp-
content/uploads/2014/10/TR-
539_OpenFlow_Controller_Benchmarking_Methodologies_v1 date
of the application: 06.05.2018).
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Gray Gamma 2.2)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.7
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.0000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize true
/OPM 0
/ParseDSCComments false
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo false
/PreserveFlatness true
/PreserveHalftoneInfo true
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Remove
/UCRandBGInfo /Preserve
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
/AbadiMT-CondensedLight
/ACaslon-Italic
/ACaslon-Regular
/ACaslon-Semibold
/ACaslon-SemiboldItalic
/AdobeArabic-Bold
/AdobeArabic-BoldItalic
/AdobeArabic-Italic
/AdobeArabic-Regular
/AdobeHebrew-Bold
/AdobeHebrew-BoldItalic
/AdobeHebrew-Italic
/AdobeHebrew-Regular
/AdobeHeitiStd-Regular
/AdobeMingStd-Light
/AdobeMyungjoStd-Medium
/AdobePiStd
/AdobeSongStd-Light
/AdobeThai-Bold
/AdobeThai-BoldItalic
/AdobeThai-Italic
/AdobeThai-Regular
/AGaramond-Bold
/AGaramond-BoldItalic
/AGaramond-Italic
/AGaramond-Regular
/AGaramond-Semibold
/AGaramond-SemiboldItalic
/AgencyFB-Bold
/AgencyFB-Reg
/AGOldFace-Outline
/AharoniBold
/Algerian
/Americana
/Americana-ExtraBold
/AndaleMono
/AndaleMonoIPA
/AngsanaNew
/AngsanaNew-Bold
/AngsanaNew-BoldItalic
/AngsanaNew-Italic
/AngsanaUPC
/AngsanaUPC-Bold
/AngsanaUPC-BoldItalic
/AngsanaUPC-Italic
/Anna
/ArialAlternative
/ArialAlternativeSymbol
/Arial-Black
/Arial-BlackItalic
/Arial-BoldItalicMT
/Arial-BoldMT
/Arial-ItalicMT
/ArialMT
/ArialMT-Black
/ArialNarrow
/ArialNarrow-Bold
/ArialNarrow-BoldItalic
/ArialNarrow-Italic
/ArialRoundedMTBold
/ArialUnicodeMS
/ArrusBT-Bold
/ArrusBT-BoldItalic
/ArrusBT-Italic
/ArrusBT-Roman
/AvantGarde-Book
/AvantGarde-BookOblique
/AvantGarde-Demi
/AvantGarde-DemiOblique
/AvantGardeITCbyBT-Book
/AvantGardeITCbyBT-BookOblique
/BakerSignet
/BankGothicBT-Medium
/Barmeno-Bold
/Barmeno-ExtraBold
/Barmeno-Medium
/Barmeno-Regular
/Baskerville
/BaskervilleBE-Italic
/BaskervilleBE-Medium
/BaskervilleBE-MediumItalic
/BaskervilleBE-Regular
/Baskerville-Bold
/Baskerville-BoldItalic
/Baskerville-Italic
/BaskOldFace
/Batang
/BatangChe
/Bauhaus93
/Bellevue
/BellMT
/BellMTBold
/BellMTItalic
/BerlingAntiqua-Bold
/BerlingAntiqua-BoldItalic
/BerlingAntiqua-Italic
/BerlingAntiqua-Roman
/BerlinSansFB-Bold
/BerlinSansFBDemi-Bold
/BerlinSansFB-Reg
/BernardMT-Condensed
/BernhardModernBT-Bold
/BernhardModernBT-BoldItalic
/BernhardModernBT-Italic
/BernhardModernBT-Roman
/BiffoMT
/BinnerD
/BinnerGothic
/BlackadderITC-Regular
/Blackoak
/blex
/blsy
/Bodoni
/Bodoni-Bold
/Bodoni-BoldItalic
/Bodoni-Italic
/BodoniMT
/BodoniMTBlack
/BodoniMTBlack-Italic
/BodoniMT-Bold
/BodoniMT-BoldItalic
/BodoniMTCondensed
/BodoniMTCondensed-Bold
/BodoniMTCondensed-BoldItalic
/BodoniMTCondensed-Italic
/BodoniMT-Italic
/BodoniMTPosterCompressed
/Bodoni-Poster
/Bodoni-PosterCompressed
/BookAntiqua
/BookAntiqua-Bold
/BookAntiqua-BoldItalic
/BookAntiqua-Italic
/Bookman-Demi
/Bookman-DemiItalic
/Bookman-Light
/Bookman-LightItalic
/BookmanOldStyle
/BookmanOldStyle-Bold
/BookmanOldStyle-BoldItalic
/BookmanOldStyle-Italic
/BookshelfSymbolOne-Regular
/BookshelfSymbolSeven
/BookshelfSymbolThree-Regular
/BookshelfSymbolTwo-Regular
/Botanical
/Boton-Italic
/Boton-Medium
/Boton-MediumItalic
/Boton-Regular
/Boulevard
/BradleyHandITC
/Braggadocio
/BritannicBold
/Broadway
/BrowalliaNew
/BrowalliaNew-Bold
/BrowalliaNew-BoldItalic
/BrowalliaNew-Italic
/BrowalliaUPC
/BrowalliaUPC-Bold
/BrowalliaUPC-BoldItalic
/BrowalliaUPC-Italic
/BrushScript
/BrushScriptMT
/CaflischScript-Bold
/CaflischScript-Regular
/Calibri
/Calibri-Bold
/Calibri-BoldItalic
/Calibri-Italic
/CalifornianFB-Bold
/CalifornianFB-Italic
/CalifornianFB-Reg
/CalisMTBol
/CalistoMT
/CalistoMT-BoldItalic
/CalistoMT-Italic
/Cambria
/Cambria-Bold
/Cambria-BoldItalic
/Cambria-Italic
/CambriaMath
/Candara
/Candara-Bold
/Candara-BoldItalic
/Candara-Italic
/Carta
/CaslonOpenfaceBT-Regular
/Castellar
/CastellarMT
/Centaur
/Centaur-Italic
/Century
/CenturyGothic
/CenturyGothic-Bold
/CenturyGothic-BoldItalic
/CenturyGothic-Italic
/CenturySchL-Bold
/CenturySchL-BoldItal
/CenturySchL-Ital
/CenturySchL-Roma
/CenturySchoolbook
/CenturySchoolbook-Bold
/CenturySchoolbook-BoldItalic
/CenturySchoolbook-Italic
/CGTimes-Bold
/CGTimes-BoldItalic
/CGTimes-Italic
/CGTimes-Regular
/CharterBT-Bold
/CharterBT-BoldItalic
/CharterBT-Italic
/CharterBT-Roman
/CheltenhamITCbyBT-Bold
/CheltenhamITCbyBT-BoldItalic
/CheltenhamITCbyBT-Book
/CheltenhamITCbyBT-BookItalic
/Chiller-Regular
/Cmb10
/CMB10
/Cmbsy10
/CMBSY10
/CMBSY5
/CMBSY6
/CMBSY7
/CMBSY8
/CMBSY9
/Cmbx10
/CMBX10
/Cmbx12
/CMBX12
/Cmbx5
/CMBX5
/Cmbx6
/CMBX6
/Cmbx7
/CMBX7
/Cmbx8
/CMBX8
/Cmbx9
/CMBX9
/Cmbxsl10
/CMBXSL10
/Cmbxti10
/CMBXTI10
/Cmcsc10
/CMCSC10
/Cmcsc8
/CMCSC8
/Cmcsc9
/CMCSC9
/Cmdunh10
/CMDUNH10
/Cmex10
/CMEX10
/CMEX7
/CMEX8
/CMEX9
/Cmff10
/CMFF10
/Cmfi10
/CMFI10
/Cmfib8
/CMFIB8
/Cminch
/CMINCH
/Cmitt10
/CMITT10
/Cmmi10
/CMMI10
/Cmmi12
/CMMI12
/Cmmi5
/CMMI5
/Cmmi6
/CMMI6
/Cmmi7
/CMMI7
/Cmmi8
/CMMI8
/Cmmi9
/CMMI9
/Cmmib10
/CMMIB10
/CMMIB5
/CMMIB6
/CMMIB7
/CMMIB8
/CMMIB9
/Cmr10
/CMR10
/Cmr12
/CMR12
/Cmr17
/CMR17
/Cmr5
/CMR5
/Cmr6
/CMR6
/Cmr7
/CMR7
/Cmr8
/CMR8
/Cmr9
/CMR9
/Cmsl10
/CMSL10
/Cmsl12
/CMSL12
/Cmsl8
/CMSL8
/Cmsl9
/CMSL9
/Cmsltt10
/CMSLTT10
/Cmss10
/CMSS10
/Cmss12
/CMSS12
/Cmss17
/CMSS17
/Cmss8
/CMSS8
/Cmss9
/CMSS9
/Cmssbx10
/CMSSBX10
/Cmssdc10
/CMSSDC10
/Cmssi10
/CMSSI10
/Cmssi12
/CMSSI12
/Cmssi17
/CMSSI17
/Cmssi8
/CMSSI8
/Cmssi9
/CMSSI9
/Cmssq8
/CMSSQ8
/Cmssqi8
/CMSSQI8
/Cmsy10
/CMSY10
/Cmsy5
/CMSY5
/Cmsy6
/CMSY6
/Cmsy7
/CMSY7
/Cmsy8
/CMSY8
/Cmsy9
/CMSY9
/Cmtcsc10
/CMTCSC10
/Cmtex10
/CMTEX10
/Cmtex8
/CMTEX8
/Cmtex9
/CMTEX9
/Cmti10
/CMTI10
/Cmti12
/CMTI12
/Cmti7
/CMTI7
/Cmti8
/CMTI8
/Cmti9
/CMTI9
/Cmtt10
/CMTT10
/Cmtt12
/CMTT12
/Cmtt8
/CMTT8
/Cmtt9
/CMTT9
/Cmu10
/CMU10
/Cmvtt10
/CMVTT10
/ColonnaMT
/Colossalis-Bold
/ComicSansMS
/ComicSansMS-Bold
/Consolas
/Consolas-Bold
/Consolas-BoldItalic
/Consolas-Italic
/Constantia
/Constantia-Bold
/Constantia-BoldItalic
/Constantia-Italic
/CooperBlack
/CopperplateGothic-Bold
/CopperplateGothic-Light
/Copperplate-ThirtyThreeBC
/Corbel
/Corbel-Bold
/Corbel-BoldItalic
/Corbel-Italic
/CordiaNew
/CordiaNew-Bold
/CordiaNew-BoldItalic
/CordiaNew-Italic
/CordiaUPC
/CordiaUPC-Bold
/CordiaUPC-BoldItalic
/CordiaUPC-Italic
/Courier
/Courier-Bold
/Courier-BoldOblique
/CourierNewPS-BoldItalicMT
/CourierNewPS-BoldMT
/CourierNewPS-ItalicMT
/CourierNewPSMT
/Courier-Oblique
/CourierStd
/CourierStd-Bold
/CourierStd-BoldOblique
/CourierStd-Oblique
/CourierX-Bold
/CourierX-BoldOblique
/CourierX-Oblique
/CourierX-Regular
/CreepyRegular
/CurlzMT
/David-Bold
/David-Reg
/DavidTransparent
/Dcb10
/Dcbx10
/Dcbxsl10
/Dcbxti10
/Dccsc10
/Dcitt10
/Dcr10
/Desdemona
/DilleniaUPC
/DilleniaUPCBold
/DilleniaUPCBoldItalic
/DilleniaUPCItalic
/Dingbats
/DomCasual
/Dotum
/DotumChe
/DoulosSIL
/EdwardianScriptITC
/Elephant-Italic
/Elephant-Regular
/EngraversGothicBT-Regular
/EngraversMT
/EraserDust
/ErasITC-Bold
/ErasITC-Demi
/ErasITC-Light
/ErasITC-Medium
/ErieBlackPSMT
/ErieLightPSMT
/EriePSMT
/EstrangeloEdessa
/Euclid
/Euclid-Bold
/Euclid-BoldItalic
/EuclidExtra
/EuclidExtra-Bold
/EuclidFraktur
/EuclidFraktur-Bold
/Euclid-Italic
/EuclidMathOne
/EuclidMathOne-Bold
/EuclidMathTwo
/EuclidMathTwo-Bold
/EuclidSymbol
/EuclidSymbol-Bold
/EuclidSymbol-BoldItalic
/EuclidSymbol-Italic
/EucrosiaUPC
/EucrosiaUPCBold
/EucrosiaUPCBoldItalic
/EucrosiaUPCItalic
/EUEX10
/EUEX7
/EUEX8
/EUEX9
/EUFB10
/EUFB5
/EUFB7
/EUFM10
/EUFM5
/EUFM7
/EURB10
/EURB5
/EURB7
/EURM10
/EURM5
/EURM7
/EuroMono-Bold
/EuroMono-BoldItalic
/EuroMono-Italic
/EuroMono-Regular
/EuroSans-Bold
/EuroSans-BoldItalic
/EuroSans-Italic
/EuroSans-Regular
/EuroSerif-Bold
/EuroSerif-BoldItalic
/EuroSerif-Italic
/EuroSerif-Regular
/EUSB10
/EUSB5
/EUSB7
/EUSM10
/EUSM5
/EUSM7
/FelixTitlingMT
/Fences
/FencesPlain
/FigaroMT
/FixedMiriamTransparent
/FootlightMTLight
/Formata-Italic
/Formata-Medium
/Formata-MediumItalic
/Formata-Regular
/ForteMT
/FranklinGothic-Book
/FranklinGothic-BookItalic
/FranklinGothic-Demi
/FranklinGothic-DemiCond
/FranklinGothic-DemiItalic
/FranklinGothic-Heavy
/FranklinGothic-HeavyItalic
/FranklinGothicITCbyBT-Book
/FranklinGothicITCbyBT-BookItal
/FranklinGothicITCbyBT-Demi
/FranklinGothicITCbyBT-DemiItal
/FranklinGothic-Medium
/FranklinGothic-MediumCond
/FranklinGothic-MediumItalic
/FrankRuehl
/FreesiaUPC
/FreesiaUPCBold
/FreesiaUPCBoldItalic
/FreesiaUPCItalic
/FreestyleScript-Regular
/FrenchScriptMT
/Frutiger-Black
/Frutiger-BlackCn
/Frutiger-BlackItalic
/Frutiger-Bold
/Frutiger-BoldCn
/Frutiger-BoldItalic
/Frutiger-Cn
/Frutiger-ExtraBlackCn
/Frutiger-Italic
/Frutiger-Light
/Frutiger-LightCn
/Frutiger-LightItalic
/Frutiger-Roman
/Frutiger-UltraBlack
/Futura-Bold
/Futura-BoldOblique
/Futura-Book
/Futura-BookOblique
/FuturaBT-Bold
/FuturaBT-BoldItalic
/FuturaBT-Book
/FuturaBT-BookItalic
/FuturaBT-Medium
/FuturaBT-MediumItalic
/Futura-Light
/Futura-LightOblique
/GalliardITCbyBT-Bold
/GalliardITCbyBT-BoldItalic
/GalliardITCbyBT-Italic
/GalliardITCbyBT-Roman
/Garamond
/Garamond-Bold
/Garamond-BoldCondensed
/Garamond-BoldCondensedItalic
/Garamond-BoldItalic
/Garamond-BookCondensed
/Garamond-BookCondensedItalic
/Garamond-Italic
/Garamond-LightCondensed
/Garamond-LightCondensedItalic
/Gautami
/GeometricSlab703BT-Light
/GeometricSlab703BT-LightItalic
/Georgia
/Georgia-Bold
/Georgia-BoldItalic
/Georgia-Italic
/GeorgiaRef
/Giddyup
/Giddyup-Thangs
/Gigi-Regular
/GillSans
/GillSans-Bold
/GillSans-BoldItalic
/GillSans-Condensed
/GillSans-CondensedBold
/GillSans-Italic
/GillSans-Light
/GillSans-LightItalic
/GillSansMT
/GillSansMT-Bold
/GillSansMT-BoldItalic
/GillSansMT-Condensed
/GillSansMT-ExtraCondensedBold
/GillSansMT-Italic
/GillSans-UltraBold
/GillSans-UltraBoldCondensed
/GloucesterMT-ExtraCondensed
/Gothic-Thirteen
/GoudyOldStyleBT-Bold
/GoudyOldStyleBT-BoldItalic
/GoudyOldStyleBT-Italic
/GoudyOldStyleBT-Roman
/GoudyOldStyleT-Bold
/GoudyOldStyleT-Italic
/GoudyOldStyleT-Regular
/GoudyStout
/GoudyTextMT-LombardicCapitals
/GSIDefaultSymbols
/Gulim
/GulimChe
/Gungsuh
/GungsuhChe
/Haettenschweiler
/HarlowSolid
/Harrington
/Helvetica
/Helvetica-Black
/Helvetica-BlackOblique
/Helvetica-Bold
/Helvetica-BoldOblique
/Helvetica-Condensed
/Helvetica-Condensed-Black
/Helvetica-Condensed-BlackObl
/Helvetica-Condensed-Bold
/Helvetica-Condensed-BoldObl
/Helvetica-Condensed-Light
/Helvetica-Condensed-LightObl
/Helvetica-Condensed-Oblique
/Helvetica-Fraction
/Helvetica-Narrow
/Helvetica-Narrow-Bold
/Helvetica-Narrow-BoldOblique
/Helvetica-Narrow-Oblique
/Helvetica-Oblique
/HighTowerText-Italic
/HighTowerText-Reg
/Humanist521BT-BoldCondensed
/Humanist521BT-Light
/Humanist521BT-LightItalic
/Humanist521BT-RomanCondensed
/Imago-ExtraBold
/Impact
/ImprintMT-Shadow
/InformalRoman-Regular
/IrisUPC
/IrisUPCBold
/IrisUPCBoldItalic
/IrisUPCItalic
/Ironwood
/ItcEras-Medium
/ItcKabel-Bold
/ItcKabel-Book
/ItcKabel-Demi
/ItcKabel-Medium
/ItcKabel-Ultra
/JasmineUPC
/JasmineUPC-Bold
/JasmineUPC-BoldItalic
/JasmineUPC-Italic
/JoannaMT
/JoannaMT-Italic
/Jokerman-Regular
/JuiceITC-Regular
/Kartika
/Kaufmann
/KaufmannBT-Bold
/KaufmannBT-Regular
/KidTYPEPaint
/KinoMT
/KodchiangUPC
/KodchiangUPC-Bold
/KodchiangUPC-BoldItalic
/KodchiangUPC-Italic
/KorinnaITCbyBT-Regular
/KristenITC-Regular
/KrutiDev040Bold
/KrutiDev040BoldItalic
/KrutiDev040Condensed
/KrutiDev040Italic
/KrutiDev040Thin
/KrutiDev040Wide
/KrutiDev060
/KrutiDev060Bold
/KrutiDev060BoldItalic
/KrutiDev060Condensed
/KrutiDev060Italic
/KrutiDev060Thin
/KrutiDev060Wide
/KrutiDev070
/KrutiDev070Condensed
/KrutiDev070Italic
/KrutiDev070Thin
/KrutiDev070Wide
/KrutiDev080
/KrutiDev080Condensed
/KrutiDev080Italic
/KrutiDev080Wide
/KrutiDev090
/KrutiDev090Bold
/KrutiDev090BoldItalic
/KrutiDev090Condensed
/KrutiDev090Italic
/KrutiDev090Thin
/KrutiDev090Wide
/KrutiDev100
/KrutiDev100Bold
/KrutiDev100BoldItalic
/KrutiDev100Condensed
/KrutiDev100Italic
/KrutiDev100Thin
/KrutiDev100Wide
/KrutiDev120
/KrutiDev120Condensed
/KrutiDev120Thin
/KrutiDev120Wide
/KrutiDev130
/KrutiDev130Condensed
/KrutiDev130Thin
/KrutiDev130Wide
/KunstlerScript
/Latha
/LatinWide
/LetterGothic
/LetterGothic-Bold
/LetterGothic-BoldOblique
/LetterGothic-BoldSlanted
/LetterGothicMT
/LetterGothicMT-Bold
/LetterGothicMT-BoldOblique
/LetterGothicMT-Oblique
/LetterGothic-Slanted
/LevenimMT
/LevenimMTBold
/LilyUPC
/LilyUPCBold
/LilyUPCBoldItalic
/LilyUPCItalic
/Lithos-Black
/Lithos-Regular
/LotusWPBox-Roman
/LotusWPIcon-Roman
/LotusWPIntA-Roman
/LotusWPIntB-Roman
/LotusWPType-Roman
/LucidaBright
/LucidaBright-Demi
/LucidaBright-DemiItalic
/LucidaBright-Italic
/LucidaCalligraphy-Italic
/LucidaConsole
/LucidaFax
/LucidaFax-Demi
/LucidaFax-DemiItalic
/LucidaFax-Italic
/LucidaHandwriting-Italic
/LucidaSans
/LucidaSans-Demi
/LucidaSans-DemiItalic
/LucidaSans-Italic
/LucidaSans-Typewriter
/LucidaSans-TypewriterBold
/LucidaSans-TypewriterBoldOblique
/LucidaSans-TypewriterOblique
/LucidaSansUnicode
/Lydian
/Magneto-Bold
/MaiandraGD-Regular
/Mangal-Regular
/Map-Symbols
/MathA
/MathB
/MathC
/Mathematica1
/Mathematica1-Bold
/Mathematica1Mono
/Mathematica1Mono-Bold
/Mathematica2
/Mathematica2-Bold
/Mathematica2Mono
/Mathematica2Mono-Bold
/Mathematica3
/Mathematica3-Bold
/Mathematica3Mono
/Mathematica3Mono-Bold
/Mathematica4
/Mathematica4-Bold
/Mathematica4Mono
/Mathematica4Mono-Bold
/Mathematica5
/Mathematica5-Bold
/Mathematica5Mono
/Mathematica5Mono-Bold
/Mathematica6
/Mathematica6Bold
/Mathematica6Mono
/Mathematica6MonoBold
/Mathematica7
/Mathematica7Bold
/Mathematica7Mono
/Mathematica7MonoBold
/MatisseITC-Regular
/MaturaMTScriptCapitals
/Mesquite
/Mezz-Black
/Mezz-Regular
/MICR
/MicrosoftSansSerif
/MingLiU
/Minion-BoldCondensed
/Minion-BoldCondensedItalic
/Minion-Condensed
/Minion-CondensedItalic
/Minion-Ornaments
/MinionPro-Bold
/MinionPro-BoldIt
/MinionPro-It
/MinionPro-Regular
/Miriam
/MiriamFixed
/MiriamTransparent
/Mistral
/Modern-Regular
/MonotypeCorsiva
/MonotypeSorts
/MSAM10
/MSAM5
/MSAM6
/MSAM7
/MSAM8
/MSAM9
/MSBM10
/MSBM5
/MSBM6
/MSBM7
/MSBM8
/MSBM9
/MS-Gothic
/MSHei
/MSLineDrawPSMT
/MS-Mincho
/MSOutlook
/MS-PGothic
/MS-PMincho
/MSReference1
/MSReference2
/MSReferenceSansSerif
/MSReferenceSansSerif-Bold
/MSReferenceSansSerif-BoldItalic
/MSReferenceSansSerif-Italic
/MSReferenceSerif
/MSReferenceSerif-Bold
/MSReferenceSerif-BoldItalic
/MSReferenceSerif-Italic
/MSReferenceSpecialty
/MSSong
/MS-UIGothic
/MT-Extra
/MTExtraTiger
/MT-Symbol
/MT-Symbol-Italic
/MVBoli
/Myriad-Bold
/Myriad-BoldItalic
/Myriad-Italic
/Myriad-Roman
/Narkisim
/NewCenturySchlbk-Bold
/NewCenturySchlbk-BoldItalic
/NewCenturySchlbk-Italic
/NewCenturySchlbk-Roman
/NewMilleniumSchlbk-BoldItalicSH
/NewsGothic
/NewsGothic-Bold
/NewsGothicBT-Bold
/NewsGothicBT-BoldItalic
/NewsGothicBT-Italic
/NewsGothicBT-Roman
/NewsGothic-Condensed
/NewsGothic-Italic
/NewsGothicMT
/NewsGothicMT-Bold
/NewsGothicMT-Italic
/NiagaraEngraved-Reg
/NiagaraSolid-Reg
/NimbusMonL-Bold
/NimbusMonL-BoldObli
/NimbusMonL-Regu
/NimbusMonL-ReguObli
/NimbusRomNo9L-Medi
/NimbusRomNo9L-MediItal
/NimbusRomNo9L-Regu
/NimbusRomNo9L-ReguItal
/NimbusSanL-Bold
/NimbusSanL-BoldCond
/NimbusSanL-BoldCondItal
/NimbusSanL-BoldItal
/NimbusSanL-Regu
/NimbusSanL-ReguCond
/NimbusSanL-ReguCondItal
/NimbusSanL-ReguItal
/Nimrod
/Nimrod-Bold
/Nimrod-BoldItalic
/Nimrod-Italic
/NSimSun
/Nueva-BoldExtended
/Nueva-BoldExtendedItalic
/Nueva-Italic
/Nueva-Roman
/NuptialScript
/OCRA
/OCRA-Alternate
/OCRAExtended
/OCRB
/OCRB-Alternate
/OfficinaSans-Bold
/OfficinaSans-BoldItalic
/OfficinaSans-Book
/OfficinaSans-BookItalic
/OfficinaSerif-Bold
/OfficinaSerif-BoldItalic
/OfficinaSerif-Book
/OfficinaSerif-BookItalic
/OldEnglishTextMT
/Onyx
/OnyxBT-Regular
/OzHandicraftBT-Roman
/PalaceScriptMT
/Palatino-Bold
/Palatino-BoldItalic
/Palatino-Italic
/PalatinoLinotype-Bold
/PalatinoLinotype-BoldItalic
/PalatinoLinotype-Italic
/PalatinoLinotype-Roman
/Palatino-Roman
/PapyrusPlain
/Papyrus-Regular
/Parchment-Regular
/Parisian
/ParkAvenue
/Penumbra-SemiboldFlare
/Penumbra-SemiboldSans
/Penumbra-SemiboldSerif
/PepitaMT
/Perpetua
/Perpetua-Bold
/Perpetua-BoldItalic
/Perpetua-Italic
/PerpetuaTitlingMT-Bold
/PerpetuaTitlingMT-Light
/PhotinaCasualBlack
/Playbill
/PMingLiU
/Poetica-SuppOrnaments
/PoorRichard-Regular
/PopplLaudatio-Italic
/PopplLaudatio-Medium
/PopplLaudatio-MediumItalic
/PopplLaudatio-Regular
/PrestigeElite
/Pristina-Regular
/PTBarnumBT-Regular
/Raavi
/RageItalic
/Ravie
/RefSpecialty
/Ribbon131BT-Bold
/Rockwell
/Rockwell-Bold
/Rockwell-BoldItalic
/Rockwell-Condensed
/Rockwell-CondensedBold
/Rockwell-ExtraBold
/Rockwell-Italic
/Rockwell-Light
/Rockwell-LightItalic
/Rod
/RodTransparent
/RunicMT-Condensed
/Sanvito-Light
/Sanvito-Roman
/ScriptC
/ScriptMTBold
/SegoeUI
/SegoeUI-Bold
/SegoeUI-BoldItalic
/SegoeUI-Italic
/Serpentine-BoldOblique
/ShelleyVolanteBT-Regular
/ShowcardGothic-Reg
/Shruti
/SILDoulosIPA
/SimHei
/SimSun
/SimSun-PUA
/SnapITC-Regular
/StandardSymL
/Stencil
/StoneSans
/StoneSans-Bold
/StoneSans-BoldItalic
/StoneSans-Italic
/StoneSans-Semibold
/StoneSans-SemiboldItalic
/Stop
/Swiss721BT-BlackExtended
/Sylfaen
/Symbol
/SymbolMT
/SymbolTiger
/SymbolTigerExpert
/Tahoma
/Tahoma-Bold
/Tci1
/Tci1Bold
/Tci1BoldItalic
/Tci1Italic
/Tci2
/Tci2Bold
/Tci2BoldItalic
/Tci2Italic
/Tci3
/Tci3Bold
/Tci3BoldItalic
/Tci3Italic
/Tci4
/Tci4Bold
/Tci4BoldItalic
/Tci4Italic
/TechnicalItalic
/TechnicalPlain
/Tekton
/Tekton-Bold
/TektonMM
/Tempo-HeavyCondensed
/Tempo-HeavyCondensedItalic
/TempusSansITC
/Tiger
/TigerExpert
/Times-Bold
/Times-BoldItalic
/Times-BoldItalicOsF
/Times-BoldSC
/Times-ExtraBold
/Times-Italic
/Times-ItalicOsF
/TimesNewRomanMT-ExtraBold
/TimesNewRomanPS-BoldItalicMT
/TimesNewRomanPS-BoldMT
/TimesNewRomanPS-ItalicMT
/TimesNewRomanPSMT
/Times-Roman
/Times-RomanSC
/Trajan-Bold
/Trebuchet-BoldItalic
/TrebuchetMS
/TrebuchetMS-Bold
/TrebuchetMS-Italic
/Tunga-Regular
/TwCenMT-Bold
/TwCenMT-BoldItalic
/TwCenMT-Condensed
/TwCenMT-CondensedBold
/TwCenMT-CondensedExtraBold
/TwCenMT-CondensedMedium
/TwCenMT-Italic
/TwCenMT-Regular
/Univers-Bold
/Univers-BoldItalic
/UniversCondensed-Bold
/UniversCondensed-BoldItalic
/UniversCondensed-Medium
/UniversCondensed-MediumItalic
/Univers-Medium
/Univers-MediumItalic
/URWBookmanL-DemiBold
/URWBookmanL-DemiBoldItal
/URWBookmanL-Ligh
/URWBookmanL-LighItal
/URWChanceryL-MediItal
/URWGothicL-Book
/URWGothicL-BookObli
/URWGothicL-Demi
/URWGothicL-DemiObli
/URWPalladioL-Bold
/URWPalladioL-BoldItal
/URWPalladioL-Ital
/URWPalladioL-Roma
/USPSBarCode
/VAGRounded-Black
/VAGRounded-Bold
/VAGRounded-Light
/VAGRounded-Thin
/Verdana
/Verdana-Bold
/Verdana-BoldItalic
/Verdana-Italic
/VerdanaRef
/VinerHandITC
/Viva-BoldExtraExtended
/Vivaldii
/Viva-LightCondensed
/Viva-Regular
/VladimirScript
/Vrinda
/Webdings
/Westminster
/Willow
/Wingdings2
/Wingdings3
/Wingdings-Regular
/WNCYB10
/WNCYI10
/WNCYR10
/WNCYSC10
/WNCYSS10
/WoodtypeOrnaments-One
/WoodtypeOrnaments-Two
/WP-ArabicScriptSihafa
/WP-ArabicSihafa
/WP-BoxDrawing
/WP-CyrillicA
/WP-CyrillicB
/WP-GreekCentury
/WP-GreekCourier
/WP-GreekHelve
/WP-HebrewDavid
/WP-IconicSymbolsA
/WP-IconicSymbolsB
/WP-Japanese
/WP-MathA
/WP-MathB
/WP-MathExtendedA
/WP-MathExtendedB
/WP-MultinationalAHelve
/WP-MultinationalARoman
/WP-MultinationalBCourier
/WP-MultinationalBHelve
/WP-MultinationalBRoman
/WP-MultinationalCourier
/WP-Phonetic
/WPTypographicSymbols
/XYATIP10
/XYBSQL10
/XYBTIP10
/XYCIRC10
/XYCMAT10
/XYCMBT10
/XYDASH10
/XYEUAT10
/XYEUBT10
/ZapfChancery-MediumItalic
/ZapfDingbats
/ZapfHumanist601BT-Bold
/ZapfHumanist601BT-BoldItalic
/ZapfHumanist601BT-Demi
/ZapfHumanist601BT-DemiItalic
/ZapfHumanist601BT-Italic
/ZapfHumanist601BT-Roman
/ZWAdobeF
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 150
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages true
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 2.00333
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/ColorImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 150
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages true
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 2.00333
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/GrayImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages true
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 600
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.00167
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier ()
/PDFXOutputCondition ()
/PDFXRegistryName ()
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/ARA
/CHS
/CHT
/CZE
/DAN
/DEU
/ESP
/FRA
/GRE
/HEB
/HRV (Za stvaranje Adobe PDF dokumenata pogodnih za pouzdani prikaz i ispis poslovnih dokumenata koristite ove postavke. Stvoreni PDF dokumenti mogu se otvoriti Acrobat i Adobe Reader 5.0 i kasnijim verzijama.)
/HUN
/ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 5.0 e versioni successive.)
/JPN
/KOR
/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.)
/NOR
/POL
/PTB
/RUM
/RUS
/SLV
/SUO
/SVE
/TUR
/ENU (Use these settings to create Adobe PDF documents suitable for reliable viewing and printing of business documents. Created PDF documents can be opened with Acrobat and Adobe Reader 5.0 and later.)
>>
>> setdistillerparams
<<
/HWResolution [600 600]
/PageSize [612.000 792.000]
>> setpagedevice
ITC571 – Annotated Bibliography
Full Name |
|
Student ID |
|
Subject |
ITC571 – Emerging Technology and Innovations |
Assignment Item 3 |
Annotated Bibliography and JournalSynopsis– 35% |
Due Date |
|
Lecturer’s Name |
Article 1
CITATION |
Buzhin, I. G., & Mironov, Y. B. (2019, March). Evaluation of Telecommunication Equipment Delays in Software-Defined Networks. In 2019 Systems of Signals Generating and Processing in the Field of on Board Communications (pp. 1-6). IEEE. |
|||||||||||
SUMMARY |
Software-defined networks are created based on the mathematical model. The model consists of the switch as well as a controller which estimates time delay of the network in those electronics equipment. There are various types of telecommunications equipment that are needed to divide control functions as well as data transfer functions. After dividing control functions as well as data transfer functions developers are able to make software-defined networks (SDN). In this paper, the new technology is Software-Defined Networks of Telecommunication Equipment. The key role of this equipment is to eliminate the time delay from the network. The special feature of this equipment: every operation and regulation is very easy and operated by the switch as well as the controller. This is the main equipment of that Software-Defined Networks. It has a key effect on the equipment delays. We can delay as a result, which is also obtained. By those results, we can configure software-configured networks. Depending on the numerous input information flows, it has informational impacts that will give a level of service quality. |
|||||||||||
CRITIQUE |
When it comes to the market, then the price of this product will be around 400-500 USD. All information technology businesses will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high standard customer service. It will also assist in the teamwork project and permitted staff to collaborate easily from various locations. I have learned several things from this new technology. I think when this product will come in the market then all communication business will improve. |
Article 2
Akyildiz, I. F., Lin, S. C., & Wang, P. (2015). Wireless software-defined networks (W-SDNs) and network function virtualization (NFV) for 5G cellular systems: An overview and qualitative evaluation. Computer Networks, 93, 66-79. |
Cellular network technology is also a popular and demandable technology that assists wireless data traffic which is continuously increasing. Due to this rapidly-evolving Internet, businesses are widely adopting applications over wireless systems based on the cloud. In this paper, the new technology is 5G cellular systems. The key role of this equipment is to powerfully make a centralized network concept. It will run programmability over the total network system. The special feature of this equipment: it delivers cellular networks with the suppleness needed. It develops as well as adapts as per the network circumstance, which is ever-changing. It also introduces wireless software-defined networks a well. This system has a limitation that this hardware-based design that relies on closed as well as inflexible architectures. To overcome this limitation, we can efficiently create a central network concept with the provisioning of programmability over the whole software-defined network system. This paper is first demonstrating the state-of-the-art solutions of the W-SDNs, as well as their linked NFV methods, are investigated. Then, the main differences among these solutions of W-SDN and their boundaries are declared. There is a famous SDN architecture, SoftAir, which is already in the market for 5G cellular systems. |
When it comes to the market, then the price of this product will be around USD 6.8 million. All information technology and cloud-based business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high-speed internet (10 times faster than previous). Employees will able to complete their work effortlessly and smoothly as well. I have learned several things from this new technology. I think when this product will come in the market then all communication, information technology, and cloud-based business will improve. |
Article 3
Aydeger, A., Akkaya, K., Cintuglu, M. H., Uluagac, A. S., & Mohammed, O. (2016, May). Software defined networking for resilient communications in smart grid active distribution networks. In 2016 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE. |
Software-Defined Networking is nothing but network architecture, which aspires to create networks agile as well as flexible. It also gets better network control by allows businesses. It also provides services to reply quickly to altering business necessities. In this paper, the new technology is the Smart Grid distribution network system. The key role of this equipment is to swap real-time data for observing the grid status. The special feature of this equipment: it contains a huge number of assorted devices. The main approach is a communication infrastructure based on SDN. This software is used for Smart Grid distribution networks among substations. For that, we then examine how this SDN- based system is enabled in Smart Grid infrastructure. It can deliver resilience to vigorous distribution substations with the help of the self-recovery system. In this case, the redundant, as well as wireless communication associations, can be used throughout the emergency times session. For that, we have shown that SDN controllers systems can be efficient for keeping the communication when it provides a lot of litheness in SDN. |
According to the market, then the price of this product will be around 1 billion USD. All information technology and communication business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It allows clients and businesses to manage both end demand. It protects the distribution network and saves energy as well as decrease costs. I have learned several things from this new technology. I think when this product will come in the market then all communication and information technology business will improve. |
Article 4
Rehmani, M. H., Davy, A., Jennings, B., & Assi, C. (2019). Software Defined Networks based Smart Grid Communication: A Comprehensive Survey. IEEE Communications Surveys & Tutorials. |
A smart grid is also known as an electrical grid that is used for reliability issues and transformation. It contains a mixture of operations as well as energy actions. The existing power network is no longer a probable solution because of the high and increasing demand for electricity. This also depends on old infrastructure, reliability issues as well as thus need transformation to an enhanced grid. It is known as a smart grid (SG). Those are smart indicators, smart appliances, renewable power resources, as well as energy well-organized resources. In this paper, the new technology is a smart grid system. The key role is to execute both-way communication, demand surface management, as well as real-time pricing. The special feature of this equipment: it monitors as well as manages the communication networks across the globe. |
When considering the market, then the price of this product will be around 476 Billion. All information technology, electrical, electronics, network business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients and more accurate bills. It saves energy by reducing expenditure. It also protects Fraud detection as well as technical losses. I have learned several things from this new technology. I think when this product will come in the market then all information technology, electrical, electronics, and network marketing business will improve. |
Article 5
Wang, F. Y., Yang, L., Cheng, X., Han, S., & Yang, J. (2016). Network softwarization and parallel networks: beyond software-defined networks. IEEE network, 30(4), 60-65. |
Network softwarization is a revolutionize network system. Its computing infrastructures are premeditated as well as operated to provide services as well as applications. And the parallel network is a combination of two networks in parallel. In an entire network system, all series networks and all parallel networks. The coexistence of numerous protocols for existing network apparatus leads to enormously multifaceted network systems. These complex network systems are not controlled by the development of network expertise. It also cannot convene the growing stress for current treads of information technology. Those are cloud computing, big data, and service visualization applications. In this paper, the new technology is Network softwarization and parallel networks. The key role of this equipment is to convene the rising demands for cloud computing, big data, as well as service visualization applications. The special feature of this equipment is to control software-defined networking to erect neural networks. It successfully optimizes the network system processes using the communications between tangible as well as neural networks. |
When it comes to the market, then the price of this product will be around 4.5 million USD. All information technology, cloud-based, big data business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high standard customer service. It also decreases an organization’s soft costs. I have learned several things from this new technology. I think when this product will come in the market then all communication, information technology, and cloud-based, big data, machine learning business will improve. |
Article 6
Fizi, F. S., & Askar, S. (2016, September). A novel load balancing algorithm for software defined network based datacenters. In 2016 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom) (pp. 1-6). IEEE. |
Load balancing algorithms are based on the Operating System. There several load balancing algorithms are present in the network market. Those are Weighted Round Robin, Random, Source IP, Least connections, URL, etc. In this paper, the new technology is load balancing SDN datacenters. The key role of this equipment is to imitate the planned system; the recommended algorithm was included in the POX regulator as well. The special feature of this equipment is re-routing utilizing the statistics at the SDN regulator. This system is based on a novel algorithm. It is proposed a method of load balancing for SDN-based data centers. There is an emulator, Mininet that was operated to imitate the proposed system. A novel algorithm is not a compulsory algorithm, which was added to the POX regulator. The proposed algorithm plays an overcrowding managing algorithm as well as a new load balancing algorithm. |
According to the market, then the price of this product will be around 1 billion USD. All information technology businesses will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high standard customer service. It improves throughput performance. It reduces human error. I have learned several things from this new technology. I think when this product will come in the market then all communication, information technology, and network business will improve. |
Article 7
Liu, J., Zhang, S., Kato, N., Ujikawa, H., & Suzuki, K. (2015). Device-to-device communications for enhancing quality of experience in software defined multi-tier LTE-A networks. IEEE Network, 29(4), 46-52. |
LTE-Advanced is an updated network system that we pronounced as 4G. LTE is known as 3G. LTE-A is significantly increasing the presentation of cellular networks. It delivers ubiquitous as well as seamless broadband access to a well-off diversity of devices connected by mobiles. In this paper, the new technology is multi-tier LTE-A networks. The key role of this equipment is to impose unparalleled stringent necessities on connected network management at the worker side. The special feature of this equipment is to conquer redoubtable complexity in scheming, organizing, and configuring network systems, protocols, as well as algorithms. These all are supported in the LTE-A technique. In this paper, we particularly focused on the device-to-device communication-based algorithm. This is used to improve the QoE of operators in software-defined multi-tier LTE-A networks. We also give some numerical consequences to exemplify performance gains. This performance can be achieved by applying the projected algorithm to a distinctive 3GPP network scenario. |
When it comes to the market, then the price of this product will be around 5 billion USD. All information technology and cloud-based business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high-speed internet. Employees will able to complete their work effortlessly and smoothly as well. I have learned several things from this new technology. I think when this product will come in the market then all communication, information technology, and cloud-based business will improve. |
Article 8
Gao, S., Li, Z., Xiao, B., & Wei, G. (2018). Security threats in the data plane of software-defined networks. IEEE network, 32(4), 108-113. |
Software-Defined Networks has enabled the widespread network of programmability. It also has speedy network innovation by decoupling the organize plane from the information plane. A possible threat to the entire network is those two planes. The main ideas pointed out that attackers be able to launch numerous hacking techniques from the data plane against Software-Defined Networks. Those are DoS attacks, topology poisoning attacks, and side-channel attacks. In this paper, the author wants to show the significant security issues regarding software-defined networks and security hazards for data plan attacks. The common framework named FlowKeeper was proposed in this paper as the new emerging technology that can reduce or control the data plane attacks. This framework also reduces the workload of the data plane. So the key role of the proposed framework is to improve the data plane security and control attacks such as DoS attack, side-channel attacks, etc. |
As per the market, then the price of this product will be around 24.4 billion. By this framework, the software-defined network security has been improved so it is very beneficial as new technology. It provides a higher security level. I have learned several things from this new technology. I think when this framework will come in the market then all communication and information technology business will improve. |
Article 9
Xiong, B., Yang, K., Zhao, J., Li, W., & Li, K. (2016). Performance evaluation of OpenFlow-based software-defined networks based on queueing model. Computer Networks, 102, 172-185. |
OpenFlow is one of the most well-known communications protocols. It gives a right of entry to the promoting plane of a network switch as well as a network router. OpenFlow communications protocol is based on queuing theory. This article is focused on a novel analytical performance model. An OpenFlow network is based on queuing theory. We build a queuing model of OpenFlow networks in terms of packet forwarding performance. The OpenFlow networks can solve its closed-form expression of average packet break time. The OpenFlow networks can also solve their corresponding probability density function. At the end of this analysis, the numerical analysis performed to assess our proposed presentation model with dissimilar parameter principles. In this paper, the new technology is OpenFlow-based software-defined networks. The key role of this equipment is to forward the packets of its OpenFlow switches as well as the packet-in communication information processing of its SDN controller as per the queuing system. The special feature of this equipment: by this, we can solve its average packet break time as well as the probability density function by closed-form expression. |
When it comes to the market, then the price of this product will be around 150,000 USD. All information technology, network communication business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It has a lower operating cost. It provides less network downtime and decreases human errors. I have learned several things from this new technology. I think when this product will come in the market then all the network communication business will improve. |
Article 10
Huang, H., Guo, S., Wu, J., & Li, J. (2016). Green datapath for TCAM-based software-defined networks. IEEE Communications Magazine, 54(11), 194-201. |
A TCAM-based table flow is a popular type of power-hungry hardware that access high-speed memory and searches its total stuffing in a particular clock cycle. It can deliver high-speed call on operations for networks based on packet switching techniques. The proposed SDN controlling module along with the DVFS-enabled switches is devised for the control plane. This is devised in a data plane also. A structure for energy-efficient direction-finding algorithms is also urbanized under the projected architecture. This is also evaluated by widespread simulations using 3 traffic preparation schemes. In this paper, the new technology is the TCAM-Based Software-Defined Network. The key role of this equipment is to find energy-efficient map-reading ways for interchange sessions in SDN communications. The special feature of this equipment: SDN controlling unit, as well as DVFS, permitted switches are worked out for the organize plane along with the data plane. |
When it comes to the market, then the price of this product will be around 6.5 billion USD. All information technology, network communication business will get befitted by this product. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides high security in the network system. It also delivers high-speed lookup operations. I have learned several things from this new technology. I think when this product will come in the market then all communication and network business will improve. |
Article 11
Masoudi, R., & Ghaffari, A. (2016). Software defined networks: A survey. Journal of Network and computer Applications, 67, 1-25. |
The growth of the internet, as well as ICT (information-centric technology), advances including mobile devices, cloud computing, social networking site, big data technology, multimedia as well as the propensity towards a digital society, the organization as well as pattern of them, have become extremely compound, challenging, and time-consuming. It is also access to high-speed bandwidth; extendibility, as well as dynamic management, is of critical implication. It is particularly applicable when network devices are perpendicularly incorporated. In this paper, the researchers have shown the survey regarding the expansion of the internet with information-centric technology. The key role of the establishment of the result is to observe the mobile and cloud networking. The result shows that the configuration of the internet and ICT becomes complex and challenging. So the author said that predefined line commands or firmware can be used to overcome the issues. |
The key role of the line commands and the structured designed software-defined network is to simplify and improve network management. It also separates the control and data plane improves the flexibility of the network. This survey result is so important that it can be used for future researches for their further implementation. It will also help researchers to understand the software-defined networks properly. It will also help the researcher to apply software-defined networks in real-life applications. I have learned several things from this new type of research paper and that will improve people’s knowledge skills. |
Article 12
Molina, E., & Jacob, E. (2018). Software-defined networking in cyber-physical systems: A survey. Computers & Electrical Engineering, 66, 407-419. |
Cyber-Physical Systems (CPS) is a popular system that providing integration of computation, networking, as well as physical processes. It relies on networks that be linked with sensors. In this paper, the new technology is Software-Defined Networks of cyber-physical systems. The key role of this equipment is to create ways between sensors as well as actuators. These all are related to bandwidth, latency, redundancy, and safety considerations. The special feature of this equipment: by this, we can review the circumstances of the art of SDN techniques practical to mission-critical software. An SDN regulator is able to create paths between sensors as well as actuators. Both sensors, as well as actuators, are calculated based on bandwidth, latency, redundancy, and safety considerations. So, the objective of this paper is to appraisal the condition of the art of SDN tactics applied to mission-critical applications. This goal can be achieved by identifying trends, challenges as well as opportunities for the possible growth of software-defined cyber-physical networks. |
When it comes to the market, then the price of this product will be around 5.9 billion USD. All information technology and network business will get befitted by this system. I think this technology will benefit because it helps businesses to communicate efficiently with clients. It provides safer as well as more consistent systems. It decreased the building as well as the costs of the operations system. I have learned several things from this new technology. I think when this product will come in the market then all communication, electronics; information technology and network business will improve. |
Self-Evaluation Report on Originality (100-150 words)
Self-Evaluation Report
In this report, I have written 12 annotated bibliography topics based on the software-defined network. The main topic of the software-defined network is Telecommunication Equipment Delays. According to that, I have reviewed 12 articles. The main goal of that software-defined network is to eliminate the time delay from the network. All authors said that this software-defined network is not at all hard to operate.
Every operation and regulation is very easy and operated by the switch as well as the controller. But the cost of this kind of software is very high, nearly 1 billion USD. Cost is depending on the features of the software and services. But businesses will improve by the use of this software. It has lots of advantages. By this technology/service/product all communication, electronics sector, information technology, and network business will get benefited.
TASK 2 10% – Write a 120-200 word Journal Synopsis paper based on your
Task 1 results
AIM OF THE PROJECT
This paper aimed to evaluate the delay of the telecommunication equipment in software-defined networks.
METHOD
Here we build software-defined network’s switch & controller models mathematically that will execute the time delay of the telecommunication equipment. The estimated time delays depending on the switch and the controller and that the main equipment also has significant effects on the time delay.
RESULTS
As a result, it can be said that the incoming flow intensity ratio of packet processing is directly proportional to the total time delay in the software-defined networks.
DISCUSSION
In this paper, the average message dwell time of any software-defined radio has been studied. The dependency of the dwell time has been calculated based on the logical packet processing processor. The software-defined radio formation responses have also been obtained by this study. We found the number of the logical core message processor is inversely proportional to the switch requests generation. Hence the time delay in the software-defined network decreases (Kosugiyama et al., 2017)
CONCLUSION
By our obtained results software-defined networks can be created that have several informational impacts on the telecommunication system. This software-defined network impacts the quality of service.
IV. REFERENCES:
Kosugiyama, T., Tanabe, K., Nakayama, H., Hayashi, T., & Yamaoka, K. (2017, May). A flow aggregation method based on end-to-end delay in SDN. In 2017 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
ITC571-
Project Proposal and Plan
Full Name |
|||
Student ID |
|||
Subject |
ITC571 – Emerging Technology and Innovations |
||
Assignment No |
Project Proposal and Plan | ||
Due Date |
|||
Lecturer’s Name |
Evaluation of Telecommunication Equipment Delays in Software Defined Networks
Quality service has characteristics of usability, availability, integrity, continuity and secure services. When considering the quality of telecommunication equipment, we can see there are time delays. Therefore, when designing SDN with different input flows of information with considering quality services it is important to evaluate the time delays in telecommunication (Buzhin & Mironov, 2019). Operations on SDN switches with various data transmission process controlling its capabilities that will lead to a significant delay.
1. INTRODUCTION
Currently there many tasks of session and application levels within the telecommunication networks that are superimposed on the telecommunication equipment of the transport and channel levels. Due to the existing scenario, separating the control functions and data transfer functions among various telecommunication equipment is crucial (Kreutz, Ramos & Verissimo, 2013). The same need has led to the development of technology software-defined networks (SDN). In the contemporary communication networks, there’s high demand on the quality of telecommunication service when it comes to communication exposure. Communication service’s quality is dependent on the quality of the functioning of the network that characterizes the capability of meeting the needs of consumers. Quality of service thus becomes the indicator as to how much the user is satisfied (Sezer et al., 2013). The delay created by the telecommunication service can also be considered as a part of consumer service. Therefore, when developing a software-defined network that are aligned with the different informational impact, with a given level of quality of service, it is necessary to evaluate time delays in telecommunications equipment.
2.
RATIONALE
The main reason behind the use of SDN is to isolated the traffic transfer functions from the control functions. The isolation is made possible due to the existence of a special software controlled by the network administrator and capable of separating the server. Routers and switches are merged under the control of Network Operating System(SOS) (Kreutz, Ramos & Verissimo, 2013). The SOS provides applications with access to network management and further monitors the configuration of network facilities on a constant basis. When SDN is developed the core of its creation is the network operating system. additionally, the presence of the software defined network is crucial because the technology behind the software-defined networks makes the operation and maintenance of the network connections simpler. This is the technology that is widely used for internet.
A network operating system plays the role of defining the interconnection of the upper level protocol group that provide the basic network functions like service operation, object addressing, data security, and network management. In this case, SOS will be applicable and the traditional use of SOS changes from SOS as an operating system to SOS as a software system that offers monitoring, resource management and access (Boero, Marchese & Patrone, 201
8
). It is through this definition that SOS changes meaning when it comes to this scenario and hence it is considered as an SDN controller. The operating system on the other hand provides a program interface instead of managing the network. Thus the solution to network management as a task is left to the application implemented depending on the network operating system API. Software – defined networks has a technology that simplified the network connection maintenance and operations in an automated manner. Furthermore, this technology is popular and it is expected that it will contribute to increasing communication, sharing of information and interaction among business participants.
3. Supervisor Approval – Yes
4. Research Questions
The propose research project will be aimed at examining the time delays in telecommunication equipment network. One significant factor is that the mathematical models of the switch controllers to the software defined networks are created based on the formulas that are derived from estimating the time delays.
Determining the time delays in the telecommunication equipment of these networks is expected to be crucial since the time delays are dependent on the switch and the controller on the main equipment parameters, which in turn have a fundamental influence on the delays. The researcher hopes to use a mathematical model of the functioning of the SDN switch and the SDN controller. Using the models, the researcher will obtain the formulas that will be used to obtain the effects that the delays will have on the software. Consequently, the obtained results will help in designing a software-configured network that can function based on the various information impacts and have a given level of quality of service.
5. Conceptual or Theoretical Framework
To solve the separation of the level of control as well as data transfer, the entire process will take place in SDN framework. This is because within this SDN switch, data transfer levels are the only processes that are implemented. It is however worth noting that the controller does not manage the network, instead it only offers an API for the management (Kreutz, Ramos & Verissimo, 2013). The SDN controller further extracts data on the state of all network resources and provides access to them for network management applications.
A deeper understanding of the switch reveals that the switch is armed with a set of flow tables that together make up the addressing pipeline also called pipeline. These pipelines comprise of one or several tables that are connected by serials. Then there is the package header that is made up of several fields. There is a common rule that the fields should indicate the identifiers of the network protocols (Sezer et al., 2013). The addressing table carries with it flows records and instructions needed when applying actions to a packet. It is significant to realise that the packet headers contain information that will begin to match. In case matches are identified the corresponding action is then transferred to packet. The controller for its part will manage the contents of the addressing tables belonging to the subordinate switches (Shin & Gu, 2013). The switch will the process every single message it gets from the controller and in many cases there will be a possibility of forming a response if need arises. Finally, there is the OpenFlow protocol that gives reliable information delivery processing, even though it does not provide automated order processing of information or auto-information delivery.
For the project to be successful it will be important to create a mathematical model that will show the functioning of the SDN switch and also the SDN controller. Using this model, the researcher expects to obtain the formulas that can be used to estimate the delays that arise in the telecommunication equipment of the software-defined networks (Sezer et al., 2013). The quality of the telecommunication services will be found in the combination of services and properties determined by the quality of the network as it is functioning. This will thus show how much the users are being satisfied. It is noteworthy that when designing a network communication, its main purpose is to ensure there is quality of communication that comes with it. One of the key factors that will impact on the quality of service (QoS) is the delays (Shin & Gu, 2013). In other words, the time that it will take for messages to be sent and to reach their destination will determine how the quality is judged or rated.
The model of the switch is also crucial and in this case, the SDN will be used as a queuing network that is composed of two significant segments. The first segment of this switch is the input queue of the switch of the device used to read information coming from the packet headers. The second part is the part that flows the addressing table (Boero, Marchese & Patrone, 2018). Two independent Poisson flows of intensity λ1 and λ2 requests come to the input of the queuing network. Consequently, any requests coming from the intensity λ1 will correspond to the message packets received at the control port of the switch, requests with intensity λ2 correspond to the remaining packets received from the networks at the switch.
6. Methodology
Method
There are formulas used to measure the waiting time for the queue in switch operation model which are; and also as second part of the switch model is estimated as;
Finally, the total delays are calculated as; w
= w1 + w2 + w3
The linear queuing system with
r
waiting places used for the algorithm for the functioning of SDN controller and at the same time the time of service of every application with any device C is expanded with a parameter .
The delay for stationary distribution of a message will be estimated in this model. To measure the total probability, the formula used with considering the distribution function of the stationary which showed as
Wcon(x)
as the waiting time of the message for the maintenance which is mentioned below;
Based on the formulas they have constructed graphs to explain the delays of telecommunication equipment of software defined networks.
Conclusion
In this article the researcher is interested in investigating the time delays in the telecommunication equipment since this is what determines the level of user satisfaction. The researcher expects that he will extract formula from the time delays in the telecommunication equipment software-defined networks, namely, in the SDN switch and the SDN controller. Furthermore, the researcher is also expecting to obtain the dependence of the time delay in the SDN switch on the ratio of the intensity of the incoming flow to the intensity of packet processing. The researcher hypothesizes that an increase in the ratio of the intensity of the incoming flow to the intensity of packet processing will increase the total delay in the SDN switch. Additionally, the researcher expects that the dependence of the average message dwell time in the SDN controller on the number of logical cores of the packet processing processor and the formation of responses by the SDN switch was obtained. As a result, it was found that with an increase in the number of logical cores of the message processing processor and the generation of responses to switch requests, the time delay in the SDN controller decreases.
7. Project Plan
1. Deliverables
The outcome of this research is depending on what cause delays in telecommunication equipment of software defined networks and how to calculate these delays. The main consequence for the delays in the software defined networks switch through input stream in depth, the rate of processing of incoming packets and number of entries in the addressing table. Parameter value has been taken through plotting the dependencies from datasheet. Considering the following graph, we can see total delay in the SDN switch has increased (Buzhin & Mironov, 2019).
2. Gantt chart
3. Duration – Weekly tasks
Week |
Task |
1 |
Read Research papers and try to understand the purpose of the researches. |
2 |
Selected a research paper and got approval from the lecturer when attending to the class. |
3 |
Analyzed the research paper and completed the Abstract to submitted to the turnitin as the first assignment. |
4 |
Worked for project proposal. Tried to understand the calculations done by the researcher and presented as I understood. |
5 |
Completed project proposal and plan and showed to the lecturer when attending to the lecturers. Add some points as told by lecturer and submitted as the second assignment. |
6 |
I should search the other research articles that will be matching to my research topic done by different authors |
7 |
I need to gather more information about methodologies. |
8 |
Try to develop new ideas according to my topic. |
9 |
Need to work for next assignment annotated bibliography and journal synopsis according last two weeks information gathering and new creations. |
10 |
Complete the assignment and need to show it to the lecturer before submit. |
11 |
Need to do corrections if have to according to the lecturer’s comments and marks gave for last assignments. |
12 |
Need to develop the project for final submission. |
8. REFERENCES
Boero, L., Marchese, M., & Patrone, F. (2018). The impact of delay in software-defined integrated terrestrial-satellite networks. China Communications, 15(8), 11-21.
Buzhin, I. G., & Mironov, Y. B. (2019, March). Evaluation of Telecommunication Equipment Delays in Software-Defined Networks. In 2019 Systems of Signals Generating and Processing in the Field of on-Board Communications (pp. 1-6). IEEE.
Kreutz, D., Ramos, F., & Verissimo, P. (2013, August). Towards secure and dependable software-defined networks. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (pp. 55-60). ACM.
Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., … & Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36-43.
Shin, S. W., & Gu, G. (2013, August). Attacking software-defined networks: A first feasibility study. In ACM SIGCOMM workshop on Hot topics in software defined networking (pp. 165-166). SIGCOMM.
8
[footnoteRef:
1
][1: ]
Table of Contents (example)
Table of Contents
I. INTRODUCTION 2
II. MATERIALS AND METHODS 2
A. Data Collection 2
B. Analysis of the raw data 2
III. Results 2
IV. Conclusion 2
Appendix 3
References (apa STYLE) 3
**Please keep all the highlighted text when you submit your Final report to Turnitin – this is just a guide .
Final Report and Presentation- Value: 40%
Length: (1500-2000 words approx.)
Full Name |
|
Student ID |
|
Subject |
ITC571 – Emerging Technology and Innovations |
Assignment No |
Capstone Project Report |
Due Date |
03-Feb-2020 |
Lecturer’s Name |
Malka N. Halgamuge |
1
Abstract—These instructions give you guidelines for preparing papers for IEEE Transactions and Journals. Use this document as a template if you are using Microsoft Word 6.0 or later. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at IEEE. Paper titles should be written in uppercase and lowercase letters, not all uppercase. Avoid writing long formulas with subscripts in the title; short formulas that identify the elements are fine (e.g., “Nd–Fe–B”). Do not write “(Invited)” in the title. Full names of authors are preferred in the author field but are not required. Put a space between authors’ initials. The abstract must be a concise yet comprehensive reflection of what is in your article. In particular, the abstract must be self-contained, without abbreviations, footnotes, or references. It should be a microcosm of the full article. The abstract must be between 150–250 words. Be sure that you adhere to these limits; otherwise, you will need to edit your abstract accordingly. The abstract must be written as one paragraph and should not contain displayed mathematical equations or tabular material. The abstract should include three or four different keywords or phrases, as this will help readers to find it. It is important to avoid over-repetition of such phrases as this can result in a page being rejected by search engines. Ensure that your abstract reads well and is grammatically correct.
– The abstract should summarize the approach and the article’s major scientific contributions, emphasizing the importance and significance of the results. The abstract should not contain literature citations or allusions to the illustrations.
– Define all non-standard symbols and abbreviations. Use running text only and avoid equations
1. AIM OF THE PROJECT (1 sentence or 15 words)
2. METHOD (2 sentences or 30 words)
3. RESULTS (1-2 sentences or 15 to 30 words)
4. DISCUSSION (2 sentences or 30 words)
5. CONCLUSION (1 sentence or 15 words)
Key Words— Natural hazards, large flood events, flood risk assessment metrics, flood hazards
The Blockchain is a trending technology today. It was originally introduced as an implementation…..
“YOUR SUMMARIES from the Annotated Bibliography Assignment COME HERE and then re-organise”
CSU expect 12-15 references for this section.
The Introduction section should contain literature citations to discuss other similar proposals.
Below is the rough guide to follow the structure of the Bibliography (Introduction).
Please also follow the Introduction section of the attached papers from HD students of this subject.
Rough Guide to the Structure of the Annotated Bibliography (Introduction), as follows:
Background
Motivation
The main contributions of this paper
Structure of paper
Example
* PS – You should not write any of these questions in your assignment, this is just a guide .
The methods should be adequately explained, how the research was conducted.
What are you going to propose to solve the problem that is existing in the current/existing solutions; (Mention the initial solution here). You can use a diagram to clarify that with writing text.
How you are going to do your research (step by step methodology is needed).
Events of large flood information collected ……….
B. Data Inclusion Criteria
Certain attributes such as reference number…….
Your results should be included here.
4. Discussion
“Some of Your Critiques from the Annotated Bibliography Assignment could come here and then re-organise.”
The discussion is the productive, creative and innovative part of writing a paper. It is the thinking about the implications of the results that you got, and the literature search for a comparable or contradictive paper that you learn something.
– You should not refer tables or figures here, instead only the overall results without referring figure or table numbers.
– You should indicate how your results relate to expectations and to earlier research?
Reviewers may look => Are the claims in this section supported by the results, do they seem reasonable? Have you indicated how the results relate to expectations and to earlier research?
FUTURE DIRECTIONS
Please write in Bullet form with sub-titles
Example:
Conclusion
Please write the key conclusions of your research.
– Please do not use citations.
Example
In this work, we propose the FogBus framework that can integrate different IoT-enabled systems to both Fog and Cloud infrastructures. The framework is lightweight and can harness both edge and remote resources for IoT application deployment, monitoring and management. FogBus is developed in cross platform programming languages that helps to overcome the heterogeneity of the infrastructure during application execution and end-to-end interaction. Additionally, the FogBus framework functions as a Platform-as-a-Service (PaaS) model for integrated Fog Cloud environment that not only assists application developers to build different types of IoT applications but also supports users to customize the services, and service providers to manage the resources according to the context of the system. Since some IoT-enabled systems such as health monitoring and utility service metering deal with sensitive data, FogBus applies authentication for data privacy and Blockchain for data integrity. To procure data transfer across less secure network, encryption techniques are applied in FogBus. Based on the principles of FogBus, a cost efficient prototype for Sleep Apnea analysis is also developed in this work. Applying different FogBus settings on the prototype, it is demonstrated that FogBus performs well even when large number of tasks are required to be processed, the execution of tasks are latency sensitive, network resources are not abundant, energy usage is restricted and computing instances are not resource enriched.
Appendix
Appendixes, if needed, appear before the acknowledgment.
Most of the mathematical explanation should go to the Appendix section. Too many equations distract the flow of the work. Qualitative descriptions or graphs are preferred mechanism for explaining relationships. Derivation of the formula should go to the Appendix.
References (apa STYLE, minimum 15 references)
Arumugam, S. S., Umashankar, V., Narendra, N. C., Badrinath, R., Mujumdar, A. P., & Jan Holler, A. H. (2018). IOT Enabled Smart Logistics Using Smart Contracts. In 2018 8th International Conference on Logistics, Informatics and Service Sciences (pp. 1-6). IEEE.
Bahga, A., & Madisetti, V. K. (2016). Blockchain Platform for Industrial Internet of Things. Journal of Software Engineering and Application, 533-546.
Caro, M. P., Ali, M. S., Vecchio, M., & Giaffreda, R. (2018). Blockchain-based traceability in Agri-Food supply chain management: A practical implementation. 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany), 1-4
Weekly Progress Report
– Value:
1
5%
Full Name |
|
Student ID |
|
Subject |
ITC571 – Emerging Technology and Innovations |
Assignment No |
Weekly Progress Report |
Due Date |
03-Feb- 2020 |
Lecturer’s Name |
Web link of your blog/website: http://thinkspace.csu.edu.au/
http//……….
Example:
Week 2:
NAME: |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROJECT TITLE: |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WEEK NO: |
DATE: |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PLANNING |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
MILESTONE: |
PLANNED: |
ACTUAL: |
COMMENT: |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
ISSUES |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
DESCRIPTION: |
DATE: |
ACTION/RESULTS: |
FINISHED (Y/N) |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Week 3:
Week 4:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 5:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 6:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 7:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 8:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 9:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 10:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 11:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
Week 12:
NAME:
PROJECT TITLE:
WEEK NO:
DATE:
PLANNING
MILESTONE:
PLANNED:
ACTUAL:
COMMENT:
ISSUES
DESCRIPTION:
DATE:
ACTION/RESULTS:
FINISHED (Y/N)
1
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
ITC571
Emerging Technologies & Innovation
Research
Seminar Presentation
<
<
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Introduction
Topic selection
Research domain & justification
Methodology
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Literature Review
Key relevant literature elements from journal articles/annotated bibiigraphy
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Results/Findings
Research findings
Conclusions
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Results/Findings
Research findings
Conclusions
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Reflection
Lessons learnt from ITC571
Demonstrate “capstone” linkages with other subjects
DO NOT PLACE ANY TEXT
OR GRAPHICS ABOVE
THE GUIDELINE SHOWN
DO NOT PLACE ANY TEXT
OR GRAPHICS BELOW
THE GUIDELINE SHOWN
TO EDIT GRAPHICS IN THE MASTER SELECT:
VIEW > SLIDE MASTER
TO APPLY PAGE STYLES
RIGHT CLICK YOUR PAGE
>LAYOUT
School of Computing & Mathematics
TO EDIT THE FOOTER IN
THE MASTER SELECT:
VIEW > SLIDE MASTER
Refernces
Reference only the elements used in the Literature review slides (In APA format)
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.