Nt1310 Unit 3 Network Analysis Paper

Improved Essays
Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics.
Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network. It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface.
The last layer is called Application Layer which takes care of
…show more content…
North Bound Interface
Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14].
OpenFlow protocol provides an interface that allows a control software to program switches in the network. Basically, the controller can change the forwarding behaviour of a switch by altering the forwarding table. This is where network programming languages are required in order to ease and automate the configuration and management of the network.
The northbound API presents a network abstraction interface to the applications and management systems at the top of the SDN stack. The information from these applications is passed along through a southbound interface. The southbound interface allows a controller to define the behavior of switches at the bottom of the SDN "stack." Essentially, the northbound interface and southbound interface allow a particular network component to communicate with a higher- or lower-level network component, respectively

Related Documents

  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    135.46.57.14 Using the first 22 bits of the above IP address as a network address, we have 135.45.56.0. This matches the network address of the first row. The packet will be forwarded to interface…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    I have also referred to this link on how to setup my ether channel on my network. I have used PAGP protocol and same settings on both switches involved in the ether channel link. refer to(http://www.mcmcse.com/cisco/guides/etherchannel.shtml) Francisco third year student very helpful attitude through https://www.cctmoodle.com/mod/forum/view.php?id=13260 ether channel on these ports will load balance traffic between links this means that each link is responsible for the same transferring of information instead of just loading one link with a lot of traffic. Refer to(http://www.techrepublic.com/blog/data-center/increase-network-bandwidth-using-ciscos-etherchannel/)…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    It handles data errors. Switches operate on this…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    2.9.5 Run controller and Mininet Run the Mininet from the terminal of Ubuntu and run Xterm window for controller and switches and host. And run the two applications in Ryu Xterm window for more details about how to run this application see chapter four. And put the version of OpenFlow for the network in Xterm of switches in this thesis using OpenFlow version three. And put the queue for a network by send the orders from to switches see chapter four ,here must be to open two Xterm windows ,first to run the applications and second for send the order for switches. 2.9.6 Send and receive…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    Configuring DirectAccess Understanding How DirectAccess Works The following steps, taken from the Microsoft white papers, shows how DirectAccess operates. 1) The Windows 7 DirectAccess client determines whether the machine is connected to a network or to the Internet. 2) The Windows 7 DirectAccess computer tries to connect to the web server specified during the DirectAccess setup configuration. 3) The Windows 7 DirectAccess client computer connects to the Windows Server 2008 R2 DirectAccess server using IPv6 and IPsec. 4)…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    Sources Used: (Rouse, 2015) (Describe The Function of TCP/IP Protocol in easy words, 2015) The application layer remains the single one that immediately connects with the user used for communication protocols across the network. The application layer protocols are HTTP, HTTPS and SMTP. HTTP, this is where it will transmit out a request for the web client to be able to transfer the data across to the website. The HTTPS is where it will use a secure connection such as using paid methods online and e-commerce.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    This will require the ability to perform certain automated tasks: “Deploy appropriate management systems that can support the provision of the services within the appropriate resources; Setting up VPNs on demand, depending on the user and network’s context; Support for automatic vertical handover to ensure the best possible access to the network; Support for the management communication overlays’ setting up with uniform distribution of traffic load; Reaction to Quality of Service degradations identifying their causes and restoring the services concerned in a transparent manner” (Davy, Steven, 2010, p. 106). Using the strongest possible encryption method for VPN access is also a way to continue to improve the security of the VPN. As additional encryption methods are introduced they need to be worked in to the VPN…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Switch to PC or server 3. Hub to PC or server. Cross-over technology was used to connect these devices 1. Switch to hub 2. Hub to hub 3.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays