Software-Defined Networking

Author(s):  
Víctor M. López Millán

The connection of billions of devices to the internet poses numerous challenges to the networking infrastructure. The traditional networking paradigm is anticipated to be unable to cope with a scenario of myriad heterogenous devices connected through both wireless and wired links. The mobility and instability of a significant portion of the devices of the IoT demand a flexible and agile response of the network to adapt and keep the appropriate policies in effect. Software-defined networking (SDN) moves the intelligence of the network to a central controller with a global vision of the network capable of issuing timely instructions to the network nodes to accommodate the constant changes. This chapter presents the SDN paradigm, covering its architecture, functional blocks, interfaces, and protocols. The focus is put on the application of SDN to IoT environments supporting different applications, each with its specific difficulties, exploring current trends to tackle the identified challenges.

Author(s):  
V. Deeban Chakravarthy ◽  
B. Amutha

Due to the increase in the number of users on the internet and the number of applications that is available in the cloud makes Data Center Networking (DCN) has the backbone for computing. These data centre requires high operational cost and also experience the link failures and congestions often. Hence the solution is to use Software Defined Networking (SDN) based load balancer which improves the efficiency of the network by distributing the traffic across multiple paths to optimize the efficiency of the network. Traditional load balancers are very expensive and inflexible. These SDN load balancers do not require costly hardware and can be programmed, which it makes it easier to implement user-defined algorithms and load balancing strategies. In this paper, we have proposed an efficient load balancing technique by considering different parameters to maintain the load efficiently using Open FlowSwitches connected to ONOS controller.


2018 ◽  
pp. 240-250
Author(s):  
Michael Tierney

This article describes how the internet has come to play a central role in terrorist financing endeavours. Online channels allow terrorist financiers to network with like-minded individuals, in order to increase support, raise funds, and move wealth across the international system. For instance, the Islamic State, Hezbollah, and other groups have become adept at using these channels to finance their activities. Therefore, increased examination is required of the ways in which terrorists use the internet to raise and move funds. This study assesses some of the current trends and risks associated with online terrorist financing. Some policy options are also outlined, in order to reduce the threat of terrorist financing via the internet moving into the future.


YouTube is more than cute pet videos and aspiring musicians. Fully understanding YouTube and how it influences, reproduces, and changes our culture begins with accepting the role of media technologies inside and outside of YouTube. The history of the Internet and its core technologies provides one foundational proposition in this book. Two other propositions, regarding YouTube's reliance on Internet-based technology and historically relevant communication theories, specifically Cultural Studies and Medium Theory, are discussed, as well. In consideration of important historical and theoretical perspectives, YouTube is transformed in our minds from a simple user-generated content repository to a cultural change agent. The tools and technology associated with the Internet, richly integrated and manifest in YouTube, allow us to change the world around us. Understanding the function and design of Internet-specific technology and how we experience social networking can contextualize current trends and influences in our daily online experience. Essential to our understanding and ultimately our power over the technology that we create (in this case, YouTube) is informed through understanding the technologies presented as part of our shared history. Finally, grasping the technological concepts and terminology reveals a deeper perspective on our cultural and participatory experience with the Internet and YouTube far beyond cute pet videos.


Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


2019 ◽  
Vol 107 (2) ◽  
pp. 1273-1287
Author(s):  
A. Ruhan Bevi ◽  
P. Shakthipriya ◽  
S. Malarvizhi

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1533 ◽  
Author(s):  
Tuan Anh Tang ◽  
Lotfi Mhamdi ◽  
Des McLernon ◽  
Syed Ali Raza Zaidi ◽  
Mounir Ghogho ◽  
...  

Software Defined Networking (SDN) is developing as a new solution for the development and innovation of the Internet. SDN is expected to be the ideal future for the Internet, since it can provide a controllable, dynamic, and cost-effective network. The emergence of SDN provides a unique opportunity to achieve network security in a more efficient and flexible manner. However, SDN also has original structural vulnerabilities, which are the centralized controller, the control-data interface and the control-application interface. These vulnerabilities can be exploited by intruders to conduct several types of attacks. In this paper, we propose a deep learning (DL) approach for a network intrusion detection system (DeepIDS) in the SDN architecture. Our models are trained and tested with the NSL-KDD dataset and achieved an accuracy of 80.7% and 90% for a Fully Connected Deep Neural Network (DNN) and a Gated Recurrent Neural Network (GRU-RNN), respectively. Through experiments, we confirm that the DL approach has the potential for flow-based anomaly detection in the SDN environment. We also evaluate the performance of our system in terms of throughput, latency, and resource utilization. Our test results show that DeepIDS does not affect the performance of the OpenFlow controller and so is a feasible approach.


Sign in / Sign up

Export Citation Format

Share Document