SDN Controller

Author(s):  
Sujitha S. ◽  
Manikandan M. S. K. ◽  
Ashwini G.

Designing and organizing networks has become extra innovative over the past few years with the assistance of SDN (software-defined networking). The software implements network protocols that undergo years of equivalence and interoperability testing. Software-defined networking (SDN) is a move toward computer networking that allows network administrators to programmatically initialize, manage, alter, and direct network behavior dynamically through open interfaces and abstraction of lower-level functionality. SDN controller is an application in software-defined networking (SDN) that manages run control to permit clever networking. SDN controllers are based on protocols, such as OpenFlow, that permit servers to inform switches where to send packets. This chapter explores SDN controllers.

2018 ◽  
Vol 28 (11n12) ◽  
pp. 1657-1677
Author(s):  
Huiwen Wang ◽  
Huibiao Zhu ◽  
Lili Xiao ◽  
Yuan Fei

Software-Defined Networking (SDN) is an emerging architecture of computer networking. OpenFlow is considered as the first and currently most popular standard southbound interface of SDN. It is a communication protocol which enables the SDN controller to directly interact with the forwarding plane, which makes the network more flexible and programmable. The promising and widespread use makes the reliability of OpenFlow important. The OpenFlow bundle mechanism is a new mechanism proposed by OpenFlow protocol to guarantee the completeness and consistency of the messages transmitted between SDN devices like switches and controllers. In this paper, we use Communication Sequential Processes (CSP) to formally model the OpenFlow bundle mechanism. By adopting the models into the model checker Process Analysis Toolkit (PAT), we verify the relevant properties of the mechanism, including deadlock freeness, parallelism, atomicity, order property and schedulability. Our formalization and verification show that the mechanism can satisfy these properties, from which we can conclude that the mechanism offers a better way to guarantee the completeness and consistency.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 46646-46658 ◽  
Author(s):  
Sikandar Ejaz ◽  
Zeshan Iqbal ◽  
Peer Azmat Shah ◽  
Bilal Haider Bukhari ◽  
Armughan Ali ◽  
...  

2021 ◽  
Vol 5 (1) ◽  
pp. 20-27
Author(s):  
Israa T. Aziz ◽  
Ihsan H. Abdulqadder

Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.


2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772868 ◽  
Author(s):  
Tri-Hai Nguyen ◽  
Myungsik Yoo

The Internet of Things is a network of physical devices consisting of embedded systems and sensors that interact with each other and connect to the Internet, and the quick growth of the Internet of Things industry has resulted in complex inter-networking on the Internet. Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. In this article, we investigate the vulnerability of the software-defined Internet of Things platform device manager, which monitors the connected Internet of Things devices in the network. Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.


Author(s):  
Anurag Tiwari ◽  
Suneet Gupta

The idea of software-defined networking (SDN) is a paradigm shift in computer networking. There are various advantages of SDN (e.g., network automation, fostering innovation in network using software, minimizing the CAPEX and OPEX cost with minimizing the power consumption in the network). SDN is one of the recently developed network-driven methodologies where the core of all lower-level services is operated by one centralized device. Developers tried to develop such approaches to make it easy for an administrator to control information flow from one node to another node. To obtain these services, lower-level static architecture is decoupled for the higher level. This chapter introduces a new approach that is based on complex network processing and forecasting for an event.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


A novel anomaly detection-based NIDS is main demand in the computer networking security for discriminating malicious software attack at the early stage. It monitors and analyzes network traffics, checking abnormal behaviors or attack signatures. The detection rate or accuracy is the prerequisite in the network intrusion detection models, also, developing adaptive and flexible model is a critical challenge regarding to unseen attack. This search paper included the deep neural network (DNN) as anomaly detection model can be used within software defined networking (SDN). Dropout technique is used to prevent DNN model from overfitting. Six features have information about the flow were chosen from NSL-KDD dataset to fit and evaluate this model, these data features could be matched to packet-in message header values, also, these features enable the model to be a good generative, and well perform on intrusion recognition issue with a subset of the data. Cross entropy loss function with SoftMax output layer were used for getting the differences between the two different distribution and mapping to multiple class classification covered five class labels, one is normal and the others are attacks (Dos, R2L, U2L and Probe). Accuracy is a comparative metric utilized for assessing the model performance. The results are promising, where accuracy achieved 92.65%.


Author(s):  
Vishal Kaushik ◽  
Ajay Sharma ◽  
Ravi Tomar

Software-defined networking (SDN) is an emerging network architecture that facilitates the network administrator to control and manage network behavior dynamically. Different from traditional networks, software-defined networks support dynamic and scalable computing. The dynamic behavior is achieved by decoupling or disassociating the system. The swing of control from tightly bound individual networks to assessable computing devices enables infrastructure abstraction. Due to the abstraction, the network can be considered as a logical or virtual entity. In this chapter, relation between network function virtualization (NFV) and software-defined networking (SDN) has been outlined. This chapter focuses on describing the pros and cons of NFV technologies. network functions virtualization (NFV) was founded under the work of the European Telecommunications Standards Institute (ETSI).


Sign in / Sign up

Export Citation Format

Share Document