Tuesday, January 7, 2020

Software Defined Networking A Literature Review

SOFTWARE DEFINED NETWORKING A Literature Review Presented to Prof. Sharmin Khan Department of Computer Science San Jose State University In Partial Fulfillment Of the Requirements for the class CS200W By Hina Mohare April 2016 ABSTRACT Software Defined Networking (SDN) is a rapidly growing technology which has received lot of attention. It addresses some of the long-standing challenges in the field of computer networks. It simplifies and makes it easier to management network. The core idea behind SDN is to pull out the intelligence from network devices like switch and router so that entire network can be controlled from a centralized single controller. The SDN controller has the global view of entire network devices. The controller can be customized by the network administrators or by the engineers as per the need of the business. The SDN technology makes the network programmable, agile, dynamic, scalable, flexible and centrally controlled. This paper initially focuses on the need of SDN. In the later part consists of architecture of the SDN enabled network, its different applications, challenges in implementing SDN. Table of Contents 1. Introduction 1 2. Need of SDN 4 3. Architecture of SDN 4 4. Open flow 5 5. Applications of SDN 7 6. Challenges 8 7. Conclusion 10 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 1. INTRODUCTION Today, every modern business uses computer networks whether it is on premise, could-based or a combination ofShow MoreRelatedSoftware Defined Network For File Sharing867 Words   |  4 Pages Software Defined Networking Name: Nasrin, Mst. Sayma ID: 12-21985-2 Sec: B Introduction: We use Networks for file sharing, printer or peripheral sharing, Internet telephone service, multi-player games and many more. But, Normal networks are more complex. Configuring network devices requires a lot of effort and generally has to be done manually by devoted admin. If a network file server promotes a fault, then many users may not be able to run applicationRead MoreAs The World Is Growing, The Social Media Network Is Growing1721 Words   |  7 PagesTwitter. Similarly, if we investigate, there would more other social media sites that the people have been using in their daily life. Social networking sites which are part of social media are playing a very vital role for the companies and their growth. Social networking sites are helping the companies reach from smaller scale to larger scale. Social networking sites are being advantageous for many companies while disadvantageous for some of the companies. They are mainly being used the companies forRead MoreThe Emergence Of The Internet And Social Media1079 Words   |  5 Pagesimpact on the theory and practice of advertising, public relations and marketing disciplines. Advertising spending on the Internet has outpaced all other traditional media (Center for Media Research, 2004). In the last two years, the number of social networking tools and the number of people using those tools have exploded, thus the rules are constantly changing and there is considerable uncertainty on how to employ these tools from a strategic perspective. Professionals in the industry have enduUHGWKH ³WULDOEILUH ´Read MoreAbstract: We Extensively Review The Literature On Mitm1035 Words   |  5 PagesAbstract: We extensively review the literature on MITM to analyze and categories the scope of MITM attacks, considering both a reference model, such as the Open Systems Interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classificationRead MoreSDN Controllers Essay858 Words   |  4 PagesSoftware Defined Network (SDN) Controllers are software applications that are able to perform network functions in an independent manner. They work as the brain of the network and take decisions based on fixed policies and the load present on the networ k, just like physical switches and network modules. SDNs are the technology of the future, and researchers around the world are eager to produce applications that employ them in various applications. Currently, researchers are finding out the importantRead MoreProject Management Scheduling1657 Words   |  7 PagesTitle Successful Project Management Scheduling outcomes: A Theoretical Comparative Analysis of networking techniques between Event, Chain with other traditional methodologies Research Question Why it is important to conduct a comparative analysis of Event, Chain with other traditional methodologies and investigate how it contributes in being Successful scheduling techniques in Project Management discipline? Introduction to Dissertation Nowadays, Project scheduling plays lot of benefactorRead MoreInformation, Network And Cyber Security1455 Words   |  6 PagesTITLE: INFORMATION, NETWORK AND CYBER SECURITY SEMINAR TUTOR: DR. PETE BURNAP ESSAY TITLE / COURSEWORK: COURSEWORK WORD COUNT: 1500 Review of Existing Literature: The most important goal of any access control model is to provide a verifiable system that guarantees the protection of any information from being accessed by an unauthorised party; in line with some defined security policies (Ausanka-crues 2006). Many access control models have evolved over time that manage access to resources in the organisationRead MoreLiterature Review On Security Of Internet Of Things1519 Words   |  7 PagesLiterature Review on security of Internet of Things Department of Electronics and Telecommunication Engineering, College of Engineering, Pune, India Abstract The concept of the internet of things is that every physical of object in the real world has a virtual component on the internet that can produce and consume services .Such super connected objects would be of great convivences but they would require novel approaches to ensure security and ethical uses. While internet of things is more thanRead MoreEmerging Technologies And Social Media1818 Words   |  8 PagesAbstract Emerging technologies in the past 10 years have allowed for business to take advantage of these technologies for the benefit of enhancing their brand. Current literature has been examined on how business have used Web 2.0 technologies and social media to give them a completive advantage within their markets. This research provides insight into why business are using Web 2.0 technologies and which components of Web 2.0 and social media are utalised by businesses in today society, from smallRead MoreBenefits And Applications Of The Software Defined Networking3320 Words   |  14 Pagesenhancement in the security of the network will mitigate the attacks like Denial of Service attacks. 2) It will also help in controlling the data and control plane of the networking devices, which will enable more options to enhance the security. The project focusses on using the advantages and applications of the Software Defined Networking (SDN) technology. By implementing Security measures in SDN, one can develop a network that will be free from several network attacks like ping attack, TCP SYN attack

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.