Yunchul Choi

  • Citations Per Year
Learn More
In this paper, we address the inefficient implementation of Service Function Chaining, which comes from the use of a single flow table. It is because the number of flow entries in the flow table significantly increases according to the increment of the number of service chains. So the switch should look up larger flow table to process packets, and this also(More)
In this paper, we present evaluation results of Service Function Chaining implementation scheme using multiple flow tables of OpenFlow. With a single flow table in the implementation, the number of flow entries in the flow table significantly increases as the number of service chains increases. This results in looking up larger flow table and higher(More)
Network Functions Virtualization (NFV) offers a new way to design, deploy and manage network services. NFV relocates network functions from dedicated hardware appliances to generic servers, so they can run in software. Also, it is designed to consolidate and deliver the network components needed to support a virtualized infrastructure including virtual(More)
In this paper, we address the communication overhead problem between OpenFlow controllers and switches due to table-miss in a flow table. For dealing with table-miss, the switch informs the controller by sending a packet-in message to make the controller perform further actions. However, this packet-in procedure to deal with table-miss may cause a(More)
Near Field Communication (NFC) is a wireless communication technology using 13.56 MHz to support 2-way communications between two devices within ~10 cm. Such a short communication range may be considered as a shortcoming, but at the same time, this enables a secure data transfer within the connectivity region when compared to Bluetooth Low Energy (BLE) or(More)
Typically, wireless sensor networks (WSNs) provide application-specific networking schemes based on restricted resources. For the reasons, WSN-based routing algorithms can be variously designed for applications. Even if two different WSN applications (e.g., target tracking and temperature monitoring) coexist in a network, the two applications can use(More)
  • 1