Nt1310 Unit 3 Network Analysis Paper

Improved Essays
Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics.
Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network. It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface.
The last layer is called Application Layer which takes care of
…show more content…
North Bound Interface
Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14].
OpenFlow protocol provides an interface that allows a control software to program switches in the network. Basically, the controller can change the forwarding behaviour of a switch by altering the forwarding table. This is where network programming languages are required in order to ease and automate the configuration and management of the network.
The northbound API presents a network abstraction interface to the applications and management systems at the top of the SDN stack. The information from these applications is passed along through a southbound interface. The southbound interface allows a controller to define the behavior of switches at the bottom of the SDN "stack." Essentially, the northbound interface and southbound interface allow a particular network component to communicate with a higher- or lower-level network component, respectively

Related Documents

  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    135.46.57.14 Using the first 22 bits of the above IP address as a network address, we have 135.45.56.0. This matches the network address of the first row. The packet will be forwarded to interface…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In order to provide reliability and quality of service (QoS) rules or policies that prioritize packets for outbound port queue will be in implement to meet the bank management requirement. The Internet and WAN connection will use multi-protocol label…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    It handles data errors. Switches operate on this…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    2.9.5 Run controller and Mininet Run the Mininet from the terminal of Ubuntu and run Xterm window for controller and switches and host. And run the two applications in Ryu Xterm window for more details about how to run this application see chapter four. And put the version of OpenFlow for the network in Xterm of switches in this thesis using OpenFlow version three. And put the queue for a network by send the orders from to switches see chapter four ,here must be to open two Xterm windows ,first to run the applications and second for send the order for switches. 2.9.6 Send and receive…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    This will require the ability to perform certain automated tasks: “Deploy appropriate management systems that can support the provision of the services within the appropriate resources; Setting up VPNs on demand, depending on the user and network’s context; Support for automatic vertical handover to ensure the best possible access to the network; Support for the management communication overlays’ setting up with uniform distribution of traffic load; Reaction to Quality of Service degradations identifying their causes and restoring the services concerned in a transparent manner” (Davy, Steven, 2010, p. 106). Using the strongest possible encryption method for VPN access is also a way to continue to improve the security of the VPN. As additional encryption methods are introduced they need to be worked in to the VPN…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    Sources Used: (Rouse, 2015) (Describe The Function of TCP/IP Protocol in easy words, 2015) The application layer remains the single one that immediately connects with the user used for communication protocols across the network. The application layer protocols are HTTP, HTTPS and SMTP. HTTP, this is where it will transmit out a request for the web client to be able to transfer the data across to the website. The HTTPS is where it will use a secure connection such as using paid methods online and e-commerce.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays