Nt1310 Unit 3 Network Analysis Paper

Improved Essays
Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics.
Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network. It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface.
The last layer is called Application Layer which takes care of
…show more content…
North Bound Interface
Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14].
OpenFlow protocol provides an interface that allows a control software to program switches in the network. Basically, the controller can change the forwarding behaviour of a switch by altering the forwarding table. This is where network programming languages are required in order to ease and automate the configuration and management of the network.
The northbound API presents a network abstraction interface to the applications and management systems at the top of the SDN stack. The information from these applications is passed along through a southbound interface. The southbound interface allows a controller to define the behavior of switches at the bottom of the SDN "stack." Essentially, the northbound interface and southbound interface allow a particular network component to communicate with a higher- or lower-level network component, respectively

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Web server A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web. HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content. A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application. LAN – (Local Area Network) A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    SDN is the concept to decouple the control plane from the Specific device (router, Switches etc) and given the authority of control plan to the Controller and left the devices is only for data plane. Controller also monitor the whole data traffic view of network and install the forwarding rules on switches according to the data traffic and topology of the network. It is essential to limiting the broadcast and avoids loops with OpenFlow devices. Therefore, on the data layer if one SDN domain egress switches can only have exactly one connection to any other ingress domain switch, which will limit the scalabiltity when deploying SDN networks. There is at least two inter-domain connection necessary to improve scalability for end-to-end services…

    • 241 Words
    • 1 Pages
    Decent Essays