Misconceptions Of SDN Architecture

Great Essays
3.2. OS model: We all know about OS model as shown in figure (3). It has three basic layers:
• Applications
• OS
• Hardware

The OS can manage hardware for many application. OS separate between hardware and the applications giving advantage to programmers to innovate.
3. Control plane and Data plane separation

3.3. SDN separation of planes: SDN architecture looks like OS model as shown in figure (4). It consists of three layers:
• Application layer: we can run here many kinds of application such that:
 Cloud orchestration:
e.g. OpenStack, CloudStack…etc.
 Business applications
 SDN applications
 …etc.
• Control layer: it is one logically centralized controller.
• Forwarding layer: it is many forwarding devices. Here we call tradition
…show more content…
SDN controller communicates with forwarding devices using open interfaces (e.g. OpenFlow).

3.4. SDN misconceptions:
• The first misconception about the controller is that it must be physically centralized. In reality it is not required for example Onix and ONOS (OpenFlow OS) has physically distributed controllers (but logically centralized).
3. Control plane and Data plane separation

• The second misconception is that the first packet must go to controller for handling. Truly some past systems like Ethane worked like that for some security policies but it is not required in all systems.

• The third misconception is that SDN is OpenFlow. In fact, OpenFlow is a popular protocol but it is not the only one.

3.5. Why separation?
• Evolution of applications (software) is independent of hardware.
• More flexibility: can introduce new services more easily. No need to configure individual hardware.
• Increase innovation: not dependent on vendors and long standardization.
• Simpler management: control from high level control program.
• Fast adapt to changes in network world.
• Simpler and cheaper hardware.
• Increase reliability and security.
• Better end-user
…show more content…
Commercial SDN controllers: Commercial SDN controllers also exist such that:
• Cisco onePK controller
• HP Virtual Application Networks (VAN) SDN Controller…etc.

But we want to take a look on a heavy industry that standardize a new model which will make revolution in the market of SDN controllers.

OpenDaylight: More than 52 corporations we listed some below: They intended to build one single platform based on open source for SDN/NVF (Network Functions Virtualization) platform. It will not only support OpenFlow but they have more innovation and intelligent work to do. References

1. Course: Software Defined Networking by Nick Feamster, Princeton University. https://www.coursera.org/course/sdn1 http://noise.gatech.edu/classes/cs8803sdn/fall2014/
2. Books:
• “SDN: Software Defined Networks” by Thomas D. Nadeau and Ken Gray, O’Reilly 2013
• “Network Innovation through OpenFlow and SDN Principles and Design” Edited by FEI HU, CRC Press 2014
3. Papers:
• “The Road to SDN: An Intellectual History of Programmable Networks” by Nick Feamster, Jennifer Rexford, and Ellen Zegura
• “OpenFlow: Enabling Innovation in Campus Networks” by Nick McKeown Stanford University March 14, 2008
4.

Related Documents

  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    NT1330 Unit 1 Lab Report

    • 1743 Words
    • 7 Pages

    1. Goal The main purpose of this lab is to introduce us to the RLES vCloud system, begin setting up a network with a router VM and a main Redhat VM, and configure some baseline features for the continuation of our work in future labs. This included configuring DNS forwarding and NTP on the PFSense router VM, and configuring a wiki on the redhat VM alongside monitoring software such as Zabbix or Opsview. When configuring the router, all was fairly straightforward and without any major setbacks. The web panel was very helpful in configuring the various NAT, DNS, and NTP settings.…

    • 1743 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Besides, each simulator depends on its own methodology and models to model a real network. Whereas several network simulators exist in the software…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The application layer contains programs or processers that use transport layer protocols so that it delivers the data to the destination of the computers. The application layer has many protocols that programs use to communicate with the second layer which is called Transport layer. Some of the application layer protocols are: Simple mail transfer protocol (SMTP), File transfer protocol (FTP), Hypertext transfer protocol (HTTP) and Simple network management protocol (SNMP). Transport layer The second layer of TCP/IP protocol suite is the transport layer.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    VPNs are most often used by corporations to protect sensitive data being compromised by hackers. ¥ 1.4 Firewalls A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic. A firewall acts as a barrier between a trusted network and an untrusted network.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    SDN is the concept to decouple the control plane from the Specific device (router, Switches etc) and given the authority of control plan to the Controller and left the devices is only for data plane. Controller also monitor the whole data traffic view of network and install the forwarding rules on switches according to the data traffic and topology of the network. It is essential to limiting the broadcast and avoids loops with OpenFlow devices. Therefore, on the data layer if one SDN domain egress switches can only have exactly one connection to any other ingress domain switch, which will limit the scalabiltity when deploying SDN networks. There is at least two inter-domain connection necessary to improve scalability for end-to-end services…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Timely updation improves the quality of network services, without incurring extra…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Compared with normal two-tier client-server architecture, the three-tier client-server architecture has the following two important advantages: Better transparency. The servers within the application tier of the three-tier architecture allow an application to detach user interface from back-end resources and therefore provide better location and migration transparency. That is, the location or implementation of back-end resources can be changed without affecting the programs within the client…

    • 1122 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nawaf Alnafea INTEGRATIVE CASE 10.0 1. Discuss the organizational structure at Cisco Systems. Explain and discuss each one of the current structural dimensions. Explain and discuss each one of the current contingency factors. What type of structure is this?…

    • 1197 Words
    • 5 Pages
    Improved Essays