Nt1310 Unit 3 Network Analysis Paper

Improved Essays
Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics.
Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network. It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface.
The last layer is called Application Layer which takes care of
…show more content…
North Bound Interface
Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14].
OpenFlow protocol provides an interface that allows a control software to program switches in the network. Basically, the controller can change the forwarding behaviour of a switch by altering the forwarding table. This is where network programming languages are required in order to ease and automate the configuration and management of the network.
The northbound API presents a network abstraction interface to the applications and management systems at the top of the SDN stack. The information from these applications is passed along through a southbound interface. The southbound interface allows a controller to define the behavior of switches at the bottom of the SDN "stack." Essentially, the northbound interface and southbound interface allow a particular network component to communicate with a higher- or lower-level network component, respectively

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    The Southbridge is also referred to as the, Input/Output Controller Hub (ICH). Northbridge – This allows the CPU to communicate with the Graphics Card as well as the RAM. This…

    • 751 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    It handles data errors. Switches operate on this…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    After this, a data packet is typically forwarded, to reach its destination node. Then, it directs the packet to the next station (network) on its journey by using information in its routing table/routing policy. This creates an overlay internetwork.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Data Encryption and Decryption 4. Data compression Data Transcription: Networks has the ability to connect many servers on the same single network. The presentation layer is constructed for uncertainty while transferring data between networked systems. Data Conversion: Presentation layer also implement bit order reversal functions. It converts carriage return data to carriage return with line feed data and it also converts integers to floating point numbers.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Switch to PC or server 3. Hub to PC or server. Cross-over technology was used to connect these devices 1. Switch to hub 2. Hub to hub 3.…

    • 884 Words
    • 4 Pages
    Great Essays