SDN Technology Advantages And Disadvantages

Decent Essays
The project uses this SDN technology due to its vast number of applications. The administrator to program the network in any way they want can utilize SDN. It can be used to virtualize the network and divide a single network into many virtual networks, thereby isolating various areas in a single network. These individual virtual networks can then be configured by the administrator for any purpose he feels good. SDN comprises of many more advantages and applications that would be discussed in the rest of the project. The aim of this Master’s project is to find various defense mechanisms that can protect a network against most commonly occurring network attacks. Due to the advantages and features discussed above about the SDN, it would …show more content…
Network Monitoring Tools: A switch has the capability of forwarding the packets to and fro in a network. It can be used to follow a set of rules, however, it cannot be used to analyze a network behavior. In this project, we are detecting an attack on a network by analyzing the behavior of the network. This has to be done by using a network-monitoring tool.

Network monitoring tools are nothing but the tools that keep a tab on each and every packet flowing through a network. By doing this they build a graph that shows the overall statistics of the network. These tools react accordingly based on the given threshold limits by the administrator. Once any of these limits has been crossed, the analyzer sends an alarm, alerting the administrator of the anomaly. There are quite a few network-monitoring tools that can be used for various applications. For this project sFlow is chosen, as it was the best possible choice.

sFlow is an asynchronous sFlow analytics engine that delivers real-time metrics of traffic flow in an SDN stack. It also enables other performance aware SDN applications such as Load-Balancing and DDoS mitigation
…show more content…
The advantages include:
• The usage of sFlow effectively detects the malicious traffic compared to other network monitoring tools. It uses comparatively less amount of system resources.
• sFlow can monitor tens of thousands of switch ports simultaneously.
• Links of up to 10Gbps can be monitored through sFlow.
• The controller can uniformly distribute the flow rules.

C. Mininet – Network Emulator: Mininet [4] is a network emulator that runs a collection of switches, routers and end-systems on a single Linux kernel. This software works as a standalone Operating System just like a real machine. User can SSH into it and run different programs that can send and receive packets like a real Ethernet interface. Mininet allows the user to create network topologies consisting of hosts and switches that can communicate with remote controller, thus making it an SDN environment. A user can easily interact with the network, customize it, share it with others and deploy it on a real hardware.
Some of the advantages of Mininet are:
• Ease of creating a network topology
• Fast and efficient
• Run real programs
• Customize packet forwarding
• Runs on any platform (Virtual or Native

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    From that day, he eventually developed and perfected the Kali Linux distribution. As stated previously, Kali comes bundled with a variety of features and one of the main networking analysis tools included is Wireshark. Wireshark is an open source GUI based packet analyzer with features such as the ability to live capture of packets as…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Investigating threats, once a laborious task involving multiple devices, was now a simple and straight forward process of filtering logs and viewing reports. According to Chris, “not knowing which applications were running on the network is a big hole—particularly when it is at a remote site where there is typically less control. With the Palo Alto Networks firewall, we are able to identify the exact application running on the network, all the way down to the user identity. And as needed, we can implement policy controls to protect the network.” Chris concludes, “we have deployed a single security appliance where we had originally planned on using multiple disparate devices and that has reduced the management complexity significantly, without compromising our…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    The result of this project is the graph generated with the following specifications. The Graph displays the parameters of each of the node present in the respective server. The X-Axis represents the number of nodes of each server. The Y-Axis represents the parameters. Each Legend of the graph.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    " This information security challenge is why Gartner predicted that micro-segmentation technologies will be one of the must-haves for enterprise security in 2016. The research firm explained that by cryptographically isolating workloads and encrypting network traffic end-to-end, organizations can prevent lateral "east/west" hacker movement, contain breaches and better secure…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Study Guide

    • 809 Words
    • 4 Pages

    Route poisoning 3. Hold-down timer Explain two of the above techniques briefly with diagrams. SOLUTION…

    • 809 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Monitoring solutions can be used to monitor all kinds of information on the network including. According to http://www.opsview.com/why-opsview the features of opsview include being able to see the entire connected device on the network and what resources they are taking. Viewing different devices can give the system administrator more information about the status of the network. This is important because it allows the system administrator to have an up to the minute view of the overall health of the network and inspect and fix any part that is damaging the system. Having good monitoring can help prevent downtime and decrease the response time in intrusion detection.…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With my background in networking, if I could learn new technologies like ML, the combined skill set will provide me a unique skill set to solve new problems and create positive impact. At Juniper Networks, I am working on a vision to create networks that can configure, monitor and maintain themselves. The idea is to harness the power of data, automation, and ML to reduce human intervention in the management of the network, thereby preventing human errors and improve reliability. Security is central to…

    • 616 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays