fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00e4kitalo, Niko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ylitalo, Waltteri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-05T20:01:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-05T20:01:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98844", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma toteuttaa kuvailevan kirjallisuuskatsauksen ohjelmisto-ohjattuihin verkkoihin. Ohjelmisto-ohjatut verkot ovat uusi ohjelmistopohjainen vaihtoehto tietoverkkojen toteuttamiseen. Ohjelmisto-ohjatut verkot erottavat verkon hallinnan ja data siirron toisistaan. T\u00e4m\u00e4 erottelu mahdollistaa verkkojen korkean joustavuuden sek\u00e4 keskitetyn verkkojen hallinnan. Keskeisen\u00e4 elementtin\u00e4 ohjelmisto-ohjattujen verkkojen joustavuuden ja dynaamisuuden mahdollistajana toimii mallin ohjelmistopohjaisuus, mik\u00e4 mahdollistaa verkkojen r\u00e4\u00e4t\u00e4l\u00f6innin sek\u00e4 kustomoinnin. Tutkielman tulokset osoittavat, ett\u00e4 SDN teknologiaa voidaan hy\u00f6dynt\u00e4\u00e4 palvelinkeskuksissa, esineiden internetin verkoissa, verkon funktioiden virtualisoinnissa sek\u00e4 ajoneuvojen langattomissa verkoissa. Kyseiset k\u00e4ytt\u00f6kohteet tarjoavat ratkaisuja niin suurille organisaatioille esimerkiksi pilvipalveluiden tehokkaalle keskitetylle hallinnalle kuin yksitt\u00e4isille loppuk\u00e4ytt\u00e4jille \u00e4lykotien hallintaan. Tutkielman tulokset osoittavat my\u00f6s, ett\u00e4 mallin arkkitehtuuri sis\u00e4lt\u00e4\u00e4n useita haavoittuvuuksia jokaisella mallin kerroksella. Monet haavoittuvuuksista johtuvat puutteellisista tunnistautumis- sek\u00e4 verifikaatiomenetelmist\u00e4. Lis\u00e4ksi tutkielman tulokset osoittavat, ett\u00e4 ohjelmisto-ohjatut verkot voivat olla haavoittuvaisia erilaisilla menetelmill\u00e4 toteutetuille palvelunestohy\u00f6kk\u00e4yksille. Tutkielman tulokset osoittavat lis\u00e4ksi, ett\u00e4 merkitt\u00e4v\u00e4 osa aihepiiri\u00e4 k\u00e4sittelev\u00e4st\u00e4 kirjallisuudesta on keskittynyt k\u00e4sittelem\u00e4\u00e4n aihepiiri\u00e4 rajallisten tutkimusasetelmien kautta. Merkitt\u00e4v\u00e4 osa tutkimusasetelmista on toteutettu hy\u00f6dynt\u00e4en keskitettyj\u00e4 malleja, jotka k\u00e4ytt\u00e4v\u00e4t perinteisimpi\u00e4 protokollia. T\u00e4m\u00e4n seurauksena tulevaisuudessa kirjallisuutta tulisi laajentaa toteuttamalla tutki-muksia useammilla verkkojen malleilla sek\u00e4 testaamalla malleja k\u00e4yt\u00e4nn\u00f6n k\u00e4ytt\u00f6kohteissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis performs a descriptive literature review on software-defined networking. SD-networks are a new software-based networking approach where the control and data transmission mechanisms are separated. This separation alongside a software-based approach allows the network to become highly flexible and efficient to manage through centralized control features. A key reason behind SDNs flexibility is formed by the emphasis on using software which enables the paradigm to be tailored and customized to fit various different types of networks. This thesis finds that SDN can be applied to various applications such as data centers, internet of things networks, NFVs, and VANETs. These applications offer solutions for both large organizations such as cloud service providers through efficient control tools as well as individual end users through smart home network management. The results of this thesis also find that SDN suffers from multiple security issues that reside in each of the architectures layers. Many of the issues are caused by insufficient authentication and verification features. Additionally, results show that SDN can be prone to service denial attacks through flooding, injections and communication channel overloading. Finally, this thesis finds that a significant portion of existing literature focuses on mainly theoretical settings with models using primarily centralized models and de facto protocols. As a result, future body of research should be expanded by creating a wider range of research settings which are applied to real life environments.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-12-05T20:01:28Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-05T20:01:28Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "84", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Software-defined networking, current state, applicability and security", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412057659", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|