Modeling and Simulation on Securing of Software Defined Network Overlays

: Security is one of the key technologies with which DX (Digital Transformation) supported. A sent data was sometimes noise for this nonlinear programming technique to have the restrictions which won't be more than 1 for the value of the amplified bit, without the most suitable functions can be found. It wasn't possible to build the large-scale network of which high security including authentication is requested. The same problem generated the algorithm which does a weighting of each antenna it became stable, and to secure high-speed transmission of a time zone cord at a multiple-input multiple-out (MIMO) channel by the Wireless environment equally. The purpose of this system is here to achieve to develop the technology for which security is secured by also utilizing the algorithm which will improve the algorithm which selects the filtering technique and the filtering which are the multiplex technology when a network transmits at high speed, and select the filtering later for a weighting of each antenna by time zone coding at the MIMO channel which is high-speed transmission technology by the wireless society and build the large-scale network environment that advantage convenience guaranteed high security highly freely and easily.


Introduction
This paper is concerned with network access management technology using filtering technique and the technology which estimates that the access management give prior evaluation.
Such as coding data, establishing a fire wall and doing garble prevention of the data which sends and receives a network by a bond to secure security of a network, it's the mainstream to put a security measure into effect by establishing software according to the network environment separately. Therefore, advantage convenience was high by conventional technology, and it was difficult to build the network environment that high security was guaranteed easily freely.
The purpose of this paper is here to achieve to develop the technology for which security is secured by also utilizing the algorithm which will improve the algorithm which selects the coding at the MIMO channel which is high-speed transmission technology by the wireless society and build the large-scale network environment that advantage convenience guaranteed high security highly freely and easily. [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] Filtering technique and the filtering which are the multiplex technology when a network transmits at high speed, and select the filtering later for a weighting of each antenna by time zone coding at the MIMO channel which is high-speed transmission technology by the wireless society and build the large-scale network environment that advantage convenience guaranteed high security highly freely and easily. [21][22][23]

Reflection
It's explained in detail based on a drawing about the implementation form of this research in the following. Figure 1 is the illustrative embodiment network access management system configuration diagram. Figure 2 is the illustrative embodiment network access management system function hierarchy diagram.    Figure 4 is the illustrative embodiment the gateway part members' data DB data configuration diagram. Figure 5 is the illustrative embodiment IC card data configuration diagram.        Figure 8 is the flow chart which indicates a process of filtering control unit in gateway. filtering control unit receives an access request from client through Network and specific filter. An access request is one of a login request or other data reception. In case of a login request, an access request incidental to IC card information. In case of other data reception, IC card identifying information is added to the head of the data. In a wireless environment, after the access request goes on the directionality analysis to be hereinafter described, change over the filtering control unit via the filtering process. Next filtering control unit searches for Filter control table based on IC card identifying information. When there is no IC card identifying information which comes under Filter control table, a record of filter administrative information with relevant IC card identifying information is generated. This record is a blank column outside the field of IC card identifying information.
Next in case of a login request, filtering control unit sets the filter administrative information in which the IC card identifying information relevant. Or Member ID, Login ID and Password are set as Certificate information in relevant filter administrative information respectively. When it isn't a login request, we skip this step. Next refer to accessible flag updated status in relevant filter administrative information. When renewal status of accessible flag updated status isn't renewed, we go to (4) of the member authentication part with relevant filter administrative information of IC card identifying information. And when renewal status of accessible flag updated status is already renewed, we hand to the member authentication part with the IC card identifying information and request to retrieve member management DB. The member authentication part searches for a relevant record, and notifies access control unit of presence or absence of the member information, this content If there is member information. If there is no member information, we go to (6) of the member authentication part. If there is member information, we judge whether relevant filter administrative information accessible flag updated date and accessible flag updated time is newer than member information was received date and member information was received time, or not. If the former isn't newer than the latter, we go to (4) of the member authentication part. If the former is newer than the latter, I go to (5) of the member authentication part. Figure 9 is the flow chart which indicates a process of the member authentication part in gateway. The member authentication part retrieves for member management DB based on received IC card identifying information. This member information transmission is requested to the Member management part in the Center server over the network. We receive the result and save to the member management DB in the member authentication part in gateway.
Then present date and time are set as member information was received date and member information was received time.
The member authentication part in gateway monitors accessible flag updated date and Accessible flag updated time from each filter administrative information in Filter control table.
Even if the fixed hour passes, filter gathers dust, we destruct this filter. Figure 10 is the flow chart indicating a process of the member management part which replies to a members' data transmission request. Figure 11 is the flow chart indicating a process of the member management part which registrant and renews members' data. Figure 12 is the flow chart indicating a process of the filtering part. The filtering function part accepts input IC card information through IC card reader or IC card input part. And the Login ID and Password are accepted input from the input device such as the keyboard.
The ratio of the signaling and the noise of the signal vector which is received from M antennas is maximized in the realm of possibility M antennas receive d the signal vector: The condition, as follows.: weighting of media resource control with communicate It's restricted by the following condition The eigenvector which maximizes the agential value of ( ) ∶ ( ) Figure 13 is the transition diagram of the indication screen with filtering function part procedure.
As observed above, in one embodiment when the member authentication performed by an application layer is NG, we make relevant filter which belongs to a physical layer become extinct. Figure 14 is the illustrative embodiment network access management system configuration diagram in the wireless environment.
The contents which are being described to Figure 14 from Figure 2 become possible by solution of high accuracy executing the algorithm which is proposed in this paper, and Network access control technique using filtering technology which can specify the channel where data is sent. This filtering technology is expressed in Figure 27 from Figure 23. Figure 15 is the explanatory diagram which explains radio aim and a method of an electric power density distribution of receiving side and a directivity analysis. The arrival corner distribution causes an arrival radio wave as well as radio arrival delay forms, so when an arrival corner -time plane is taken for a xy plane, the electric power density can be the price of the z axial direction and indicate the distribution by a contour line. Figure 16 is the data configuration diagram which indicates the illustrative embodiment received signal control table. Figure 17 is the data configuration diagram which indicates the directivity analysis result control table.            Figure 18 is the data configuration diagram which indicates the committed constraint condition to memory control table.
To Figure 22 from Figure 19 are the flow chart which expresses the flow of processing of directionality analysis part. Figure 19 is the flow chart expressing a process of the illustrative embodiment directivity analysis part. (1/4) Figure 20 is the flow chart expressing a process of the illustrative embodiment directivity analysis part. (2/4) Figure 21 is the flow chart expressing a process of the illustrative embodiment directivity analysis part. (3/4) Figure 22 is the flow chart expressing a process of the illustrative embodiment directivity analysis part. (4/4) A each antenna of the MIMO channel resource control media receiving weight determine as high as reasonably achievable the signaling-the noise ratio of the signal vector which is received by a MIMO channel When this expression also replace each antenna with each communication channel, it can be used as the expression to decide about the strength of the transmission bit which sort into different communication channel.
(1) Summary of the method We propose the advanced constrained simplex method. What solves problem within constrained condition, and it does not depend on the figure of object function or initial point.
The equality constrained nonlinear programming problem is Where x=(x1, xn) T, n>m, and both f (x) and gi (x) are Assumed to have continuous second partial derivatives.
Step 1) we decide a first point, which can be satisfied constraint function.
Step 2) Decide n points which is produced by random function.
Step 3) if m (m =< n) the value is not sufficient constraint function, 1 through to the (m -1) the point of middle point m the point moves half distance to the middle point of the 1 through to the (m -1) the point.
Step 4) above n + 1 points are estimated by object function.
Step 5) the point A is the middle point of the n points without the best value point. The point B is the middle point of the n points without the worst value point.
Step 6) There is the point C at the opposite side of point A with point B. And point C to point B is 2 times longer than point A to point B.
Step 7) if point C is not satisfied constrains function; next point C is middle of point C and B. If point C is not satisfied until distance of point C and point B is less than 0.000001, point B is point C.
Step 8) a method that has been the subject of much recent research for the solution of (1) is the sequential quadratic programming (SQP) technique.
A current estimate ( ) k x to the minimized * x is known, and a search direction ( ) c s is generated to solve the quadratic programming problem Subject to to the optimal Lagrange multipliers * λ .     Step 9) in step 8, we find a new point. And this point is estimated object function. If this new point is not good more than old C point, and n+1 points are not within 0.000001, then we add to new constraint function that it is point B to point C line function. And now the best point is decided original point. Go to step 2. If this new point is good more than old C point, then this new point is new C point. Go to step 5. If this new point is not good more than old C point, and n+1 points are within 0.000001, then this research has finished. We continue the iterative procedure a new estimate to the minimized. Figure 23 is the figure of a multiplied data block which passes filter equipment apart and broke down into a network of the different channels.

Evaluation
We evaluate three cases on the simulation. Case 1; Object function and constraint function are normal. And the existing method can solve that. Case 2; There are two object functions in the research field. In this case, the complex method cannot solve this problem.
The advanced constrained simplex method, can solve this problem.

Case 1
Case 2 the classical simplex method [24] 36 -This complex method 20 75 Figure 27 is described the following. The starting point after getting an analysis result once, which ties the first starting point a and point C of the value of the analysis result, and makes them revolve around first starting point a clockwise 90 times centering on point C of the value of the analysis result, and is the 2nd time, the figure which is being analyzed once again as point a.
Security is one of the key technologies with which DX (Digital Transformation) supported. Service of a block chain requires robust Secure network. Not security service at conventional one dimension and two dimensions, but the space which is security is requested of a block-chain technology.

Conclusions
In this paper, we proposed MIMO systems in Network access management technology using filtering technique. This paper has three main contributions. First, we can confirm networking factor of Network access management technology using filtering technique for MIMO systems. Second, we describe advanced constrained simplex method. Finally, advanced constrained simplex method is described how to resolve the problem of the multiple-input multiple-out. When A MIMO system calculates the weight of each antenna, we cluster about the strength of the radio wave in the radio reception territory and next search optimum solution in clustering. Therefore, to need much calculated amount, when getting weight of the correct most suitable antenna, the feature of the MIMO system couldn't be utilized. This proposed method is searching for the optimum solution while clustering. This can achieve more compact than the conventional Quantum network environment.
Therefore, this advanced constrained simplex method can reduce calculated amount, when getting weight of the correct most suitable antenna, the feature of the MIMO system in Network access management technology using filtering technique could be utilized. And, the algorithm proposed this time achieves network access management using filtering technique by demanding the most optimum value of expression.