2.5 Proposed Architectures For Sdn In SDN Case Study

Great Essays
2.5 Proposed Architectures for SDN in WSN
The novel idea of exploiting OpenFlow technology to address reliability issues in sensor networks was presented by (Arif Mahmud and Rahim Rahmani, 2011) at the IEEE International Conference on Computer Science and Network Technology while the first architectural proposal was presented by (Luo et al., 2012) in the form of Software Defined Wireless Sensor Network (SD-WSN). Up until now, very limited research work is carried out in this area. Some of the notable, proposed architectures for using SDN in WSN are:
• Software Defined Wireless Sensor Network (SD-WSN)
• TinySDN
• Service-centric networking for URban-scale Feedback Systems (SURF)
• Software Defined Networking in WIreless Sensor nEtworks (SDN-WISE)
…show more content…
This allows the VM to connect to the internet but in order to form a direct link between the VM and the host machine we need another Adapter Figure 15: Mininet-VM Network Settings

• Select Adapter and in the Attached to: field select the Host-only Adapter. The name for the adapter will automatically set to the newly created Host-only network. Click OK and start the VM. The username and password are both mininet

Figure 16: Mininet-VM Terminal

Step3: Configuring a new virtual interface
• This command will show the current available interfaces: mininet@mininet-vm:~$ ifconfig

Figure 17: Mininet-VM Terminal (ifconfig)

• To view all interfaces, even the ones that are down use the following command: mininet@mininet-vm:~$ ifconfig

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In this section the fast-recovery algorithm that makes TCP NewReno[1] perform better than the Reno[3], is described. During congestion avoidance if the sender receives triple duplicate ACKs, then it performs fast-retransmission and enters into fast-recovery. In fast-retransmit the sender retransmits the lost segment,sets the threshold value for slow-start as ssthresh = cwnd/2, and sets congestion window, cwnd = ssthresh+3 segments. In fast-recovery, the sender increases its congestion window by one segment for each subsequent duplicate ACK received that indicates a segment is reaching the destination. It can transmit new segments if permitted by its congestion window.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    Suited for small operations that don’t require large amounts of storage space. Also suited for operations that are critical requiring high availability and no downtime. 1. Improved…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    North Bound Interface Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14]. OpenFlow protocol provides an interface that allows a control software to program switches in the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    In the future, load balancing should be implemented in order to spread the processing across multiple servers providing the same services such as DHCP. Introducing load balancing will allow performance to increase, as there will be multiple servers capable of handling requests and fulfilling them in the most effective way. Load balancers will also act as backup servers for their respective services because if the primary machine goes down, the secondary device can take over and the network can remain operational. The following services should be included in load balancing: DHCP, DNS, and…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    NT1330 Unit 1 Lab Report

    • 1743 Words
    • 7 Pages

    1. Goal The main purpose of this lab is to introduce us to the RLES vCloud system, begin setting up a network with a router VM and a main Redhat VM, and configure some baseline features for the continuation of our work in future labs. This included configuring DNS forwarding and NTP on the PFSense router VM, and configuring a wiki on the redhat VM alongside monitoring software such as Zabbix or Opsview. When configuring the router, all was fairly straightforward and without any major setbacks. The web panel was very helpful in configuring the various NAT, DNS, and NTP settings.…

    • 1743 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    The services will be configured and adapted for the development of virtual lab realizations. Therefore, they will be installed as separate components, embedded in other end user tools or centrally used as web services. The communication with other component are developed through various protocols/API, whereas with web services strictly using REST API. Regardless of the underlying communication protocols used, a coherent higher level API are uniformly defined and supported by all…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Paxos is theoretical achievement but not necessarily suited to build practical distributed systems. Log management is simplified in Raft while Paxos do not care about log replication. Paxos algorithm does not guarantee the progress but Raft in fact is more promising when it comes to progress. Though raft protocol is complex but it is prescriptive about the timeouts in electing a…

    • 959 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    This will require the ability to perform certain automated tasks: “Deploy appropriate management systems that can support the provision of the services within the appropriate resources; Setting up VPNs on demand, depending on the user and network’s context; Support for automatic vertical handover to ensure the best possible access to the network; Support for the management communication overlays’ setting up with uniform distribution of traffic load; Reaction to Quality of Service degradations identifying their causes and restoring the services concerned in a transparent manner” (Davy, Steven, 2010, p. 106). Using the strongest possible encryption method for VPN access is also a way to continue to improve the security of the VPN. As additional encryption methods are introduced they need to be worked in to the VPN…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As the number of IoT devices in the future increases there will be an overwhelming amount of data that needs to be processed, analyzed and transferred back to the end device. For this a robust architecture is needed that is capable of processing high amount of data in real time in a very fast and orderly process. The storage of such huge data also must be taken into consideration. This is because there should be a centralized data management system.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The amount of data that must be transmitted through the Internet increases exponential, new applications such as RealAudio, Real Video, Internet Phone software and videoconferencing systems need a lot more bandwidth than the applications that were used in the early years of the Internet, this means that without any bandwidth control, the quality of these real-time streams depends on the bandwidth that is just available. Low bandwidth or better unstable bandwidth causes bad quality in real-time transmissions, for instance dropouts and hangs [9]. The quality of a service (QoS) is a vague term and can encompass a number of attributes. To some people a good service is one with a low end-to-end delay and high bandwidth, to some people a good service is an extremely reliable one with very few packet drops, while others would enjoy a predictable service regardless of the bandwidth or the end-to-end delay [10]. Various QoS characteristics are divided in two groups, technology- and user-based QoS parameters.…

    • 493 Words
    • 2 Pages
    Improved Essays