Academic literature on the topic 'Northbound interface'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Northbound interface.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Northbound interface"

1

Layeghy, Siamak, Farzaneh Pakzad, and Marius Portmann. "A New QoS Routing Northbound Interface for SDN." Australian Journal of Telecommunications and the Digital Economy 5, no. 1 (2017): 92. http://dx.doi.org/10.18080/ajtde.v5n1.91.

Full text
Abstract:
In this paper, we introduce SCOR (Software-defined Constrained Optimal Routing), a new Software Defined Networking (SDN) Northbound Interface for QoS routing and traffic engineering. SCOR is based on constraint-programming techniques and is implemented in the MiniZinc modelling language. It provides a powerful, high-level abstraction layer, consisting of 10 basic constraint-programming predicates. A key feature of SCOR is that it is declarative, where only the constraints and utility function of the routing problem need to be expressed, and the complexity of solving the problem is hidden from the user, and handled by a powerful generic solver. We show that the interface (set of predicates) of SCOR is sufficiently expressive to handle all the known and relevant QoS routing problems. We further demonstrate the practicality and scalability of the approach via a number of example scenarios, with varying network topologies, network sizes and number of flows.
APA, Harvard, Vancouver, ISO, and other styles
2

Layeghy, Siamak, Farzaneh Pakzad, and Marius Portmann. "A New QoS Routing Northbound Interface for SDN." Journal of Telecommunications and the Digital Economy 5, no. 1 (2017): 92–115. http://dx.doi.org/10.18080/jtde.v5n1.91.

Full text
Abstract:
In this paper, we introduce SCOR (Software-defined Constrained Optimal Routing), a new Software Defined Networking (SDN) Northbound Interface for QoS routing and traffic engineering. SCOR is based on constraint-programming techniques and is implemented in the MiniZinc modelling language. It provides a powerful, high-level abstraction layer, consisting of 10 basic constraint-programming predicates. A key feature of SCOR is that it is declarative, where only the constraints and utility function of the routing problem need to be expressed, and the complexity of solving the problem is hidden from the user, and handled by a powerful generic solver. We show that the interface (set of predicates) of SCOR is sufficiently expressive to handle all the known and relevant QoS routing problems. We further demonstrate the practicality and scalability of the approach via a number of example scenarios, with varying network topologies, network sizes and number of flows.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Chenhui, Hong Ni, and Lei Liu. "An Enhanced Message Distribution Mechanism for Northbound Interfaces in the SDN Environment." Applied Sciences 11, no. 10 (2021): 4346. http://dx.doi.org/10.3390/app11104346.

Full text
Abstract:
Software-Defined Network (SDN), which is recommended as a new generation of the network, a substitute for TCP/IP network, has the characteristics of separation of data plane and control plane. Although the separation of the control plane brings a high degree of freedom and simple operation and maintenance, it also increases the cost of north–south communication. There are many additional modules for SDN to modify and enhance the basic functions of SDN. This paper proposes a message queue-based northbound communication mechanism, which pre-categorizes messages from the data plane and accurately pushes them to the apps potentially interested. This mechanism improves the efficiency of northbound communication and apps’ execution. Furthermore, it supports both OpenFlow and the protocol-independent southbound interface, and it has strong compatibility. Experiments have proved that this mechanism can reduce the control-response latency by up to 41% when compared with the normal controller northbound communication system, and it also improves the network situation of the data plane, such as real-time bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
4

Bolla, Raffaele, Roberto Bruschi, Franco Davoli, et al. "A northbound interface for power management in next generation network devices." IEEE Communications Magazine 52, no. 1 (2014): 149–57. http://dx.doi.org/10.1109/mcom.2014.6710077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rauf, Bilal, Haider Abbas, Muhammad Usman, et al. "Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3453648.

Full text
Abstract:
Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.
APA, Harvard, Vancouver, ISO, and other styles
6

He, Yu Jun, Yu He, Peng Peng, and Ran Chen. "Electric Power Communication Network Alarm Data Acquisition System Based on CORBA Northbound Interface." Advanced Materials Research 989-994 (July 2014): 4175–78. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4175.

Full text
Abstract:
With the development of communication technology, the increasing scale of power communication network is bigger and bigger. Based on the important significance of electric power communication network to establish an alarm information acquisition system is necessary. CORBA, as a distributed processing environment interconnect solutions in hardware and software, is widely used in the field of network management for its high versatility. In this paper we use real-time CORBA platform TAO as a network management platform to develop a kind of electric power communication network alarm acquisition system.
APA, Harvard, Vancouver, ISO, and other styles
7

Weng, Jia-Si, Jian Weng, Yue Zhang, Weiqi Luo, and Weiming Lan. "BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET." IEEE Transactions on Vehicular Technology 68, no. 1 (2019): 822–31. http://dx.doi.org/10.1109/tvt.2018.2880238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tang, Xiao Tian, Ming Gao, Wei Ming Wang, and Li Gang Dong. "The Analysis of Calculation in SDN Service Deployment." Applied Mechanics and Materials 687-691 (November 2014): 2938–43. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2938.

Full text
Abstract:
SDN is the current hot research topic in the network area. It becomes high-profile because of being considered as the direction of next-generation network. Service deployment is the core content of northbound interface and the focus for researchers in SDN. So far, there are still rare successful SDN application cases, the relevant researches on service deployment are even fewer. Based on the concept of service deployment, we bring up a service deployment framework in SDN, build a service deployment model, and then study the problem of price calculation during the process of service deployment and present some corresponding optimization algorithms.
APA, Harvard, Vancouver, ISO, and other styles
9

李, 星南. "The Research of Data Collection for Communication Equipment Based on Device Direct Connection and Northbound Interface." Smart Grid 08, no. 05 (2018): 465–71. http://dx.doi.org/10.12677/sg.2018.85051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hoang, Doan. "Software Defined Networking – Shaping up for the next disruptive step?" Australian Journal of Telecommunications and the Digital Economy 3, no. 4 (2015): 48. http://dx.doi.org/10.18080/ajtde.v3n4.28.

Full text
Abstract:
Software-Defined Networking (SDN) has emerged as a networking paradigm that can remove the limitations of current network infrastructures by separating the control plane from the data forwarding plane. As an immediate result, networks can be managed cost effectively and autonomously through centralising the decision-making capability at the control plane and the programmability of network devices on the data plane. This allows the two planes to evolve independently and open up separate horizontal markets on simplified network devices and programmable controllers. More importantly, it opens up markets for infrastructure providers to provision and offer network resources on-demand to multiple tenants and for service providers to develop and deploy their services on shared infrastructure resources cost-effectively. This paper provides an essential understanding of the SDN concept and architecture. It discusses the important implications of the control/data plane separation on network devices, management and applications beyond the scope of the original SDN. It also discusses two major issues that may help to bring the disruptive technology forward: the intent northbound interface and the cost-effective SDN approaches for the industry.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Northbound interface"

1

Aflatoonian, Amin. "Outsourcing Network Services via the NBI of the SDN." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0032/document.

Full text
Abstract:
Au cours des dernières décennies, les fournisseurs de services (SP) ont eu à gérer plusieurs générations de technologies redéfinissant les réseaux et nécessitant de nouveaux modèles économiques. Cette évolution continue du réseau offre au SP l'opportunité d'innover en matière de nouveaux services tout en réduisant les coûts et en limitant sa dépendance auprès des équipementiers. L'émergence récente du paradigme de la virtualisation modifie profondément les méthodes de gestion des services réseau. Ces derniers évoluent vers l'intégration d'une capacité « à la demande » dont la particularité consiste à permettre aux clients du SP de pouvoir les déployer et les gérer de manière autonome et optimale. Pour offrir une telle souplesse de fonctionnement, le SP doit pouvoir s'appuyer sur une plateforme de gestion permettant un contrôle dynamique et programmable du réseau. Nous montrons dans cette thèse qu'une telle plate-forme peut être fournie grâce à la technologie SDN (Software-Defined Networking). Nous proposons dans un premier temps une caractérisation de la classe de services réseau à la demande. Les contraintes de gestion les plus faibles que ces services doivent satisfaire sont identifiées et intégrées à un modèle abstrait de leur cycle de vie. Celui-ci détermine deux vues faiblement couplées, l'une spécifique au client et l'autre au SP. Ce cycle de vie est complété par un modèle de données qui en précise chacune des étapes. L'architecture SDN ne prend pas en charge toutes les étapes du cycle de vie précédent. Nous introduisons un Framework original qui encapsule le contrôleur SDN, et permet la gestion de toutes les étapes du cycle de vie. Ce Framework est organisé autour d'un orchestrateur de services et d'un orchestrateur de ressources communiquant via une interface interne. L'exemple du VPN MPLS sert de fil conducteur pour illustrer notre approche. Un PoC basé sur le contrôleur OpenDaylight ciblant les parties principales du Framework est proposé.Nous proposons de valoriser notre Framework en introduisant un modèle original de contrôle appelé BYOC (Bring Your Own Control) qui formalise, selon différentes modalités, la capacité d'externaliser un service à la demande par la délégation d'une partie de son contrôle à un tiers externe. Un service externalisé à la demande est structurée en une partie client et une partie SP. Cette dernière expose à la partie client des API qui permettent de demander l'exécution des actions induites par les différentes étapes du cycle de vie. Nous illustrons notre approche par l'ouverture d'une API BYOC sécurisée basée sur XMPP. La nature asynchrone de ce protocole ainsi que ses fonctions de sécurité natives facilitent l'externalisation du contrôle dans un environnement SDN multi-tenant. Nous illustrons la faisabilité de notre approche par l¿exemple du service IPS (système de prévention d'intrusion) décliné en BYOC<br>Over the past decades, Service Providers (SPs) have been crossed through several generations of technologies redefining networks and requiring new business models. The ongoing network transformation brings the opportunity for service innovation while reducing costs and mitigating the locking of suppliers. Digitalization and recent virtualization are changing the service management methods, traditional network services are shifting towards new on-demand network services. These ones allow customers to deploy and manage their services independently and optimally through a well-defined interface opened to the SP¿s platform. To offer this freedom to its customers, the SP must be able to rely on a dynamic and programmable network control platform. We argue in this thesis that this platform can be provided by Software-Defined Networking (SDN) technology.We first characterize the perimeter of this class of new services. We identify the weakest management constraints that such services should meet and we integrate them in an abstract model structuring their lifecycle. This one involves two loosely coupled views, one specific to the customer and the other one to the SP. This double-sided service lifecycle is finally refined with a data model completing each of its steps.The SDN architecture does not support all stages of the previous lifecycle. We extend it through an original Framework allowing the management of all the steps identified in the lifecycle. This Framework is organized around a service orchestrator and a resource orchestrator communicating via an internal interface. Its implementation requires an encapsulation of the SDN controller. The example of the MPLS VPN serves as a guideline to illustrate our approach. A PoC based on the OpenDaylight controller targeting the main parts of the Framework is proposed. We propose to value our Framework by introducing a new and original control model called BYOC (Bring Your Own Control) which formalizes, according to various modalities, the capability of outsourcing an on-demand service by the delegation of part of its control to an external third party. An outsourced on-demand service is divided into a customer part and an SP one. The latter exposes to the former APIs which allow requesting the execution of the actions involved in the different steps of the lifecycle. We present an XMPP-based Northbound Interface (NBI) allowing opening up a secured BYOC-enabled API. The asynchronous nature of this protocol together with its integrated security functions, eases the outsourcing of control into a multi-tenant SDN framework. We illustrate the feasibility of our approach through a BYOC-based Intrusion Prevention System (IPS) service example
APA, Harvard, Vancouver, ISO, and other styles
2

Pitzus, Antonio. "SDN : Software Defined Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14006/.

Full text
Abstract:
In un periodo in cui tutto si evolve rapidamente, il settore delle telecomunicazioni sta assistendo alla crescita esponenziale del numero di dispositivi mobili costantemente connessi alla rete; ciò richiede la necessità di un nuovo modo di gestire le reti. La nuova visione che sta maturando in questi ultimi tempi è quella di adottare un modello di rete dinamico, flessibile e soprattutto affidabile e che non richieda grossi sforzi di manutenzione o l’installazione di ulteriori hardware da parte degli operatori. Una rete con queste caratteristiche può essere sviluppata grazie ad un modello architetturale innovativo come il Software Defined Networking (SDN) e ad un nuovo modo di sfruttare le funzionalità degli apparati di rete come la Network Function Virtualization (NFV), la quale è a sua volta un processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Questi due concetti sono strettamente legati tra loro e possono comportare particolari vantaggi se applicati contemporaneamente, ma sono di per sè indipendenti. Software Defined Networking (SDN) è un’ architettura utilizzata per la realizzazione di reti di telecomunicazione nelle quali il piano di controllo della rete e quello del trasporto dei dati sono separati logicamente. La Network Function Virtualization (NFV) è il processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Un ultimo aspetto da trattare riguarda la comunicazione del controller SDN di alto e basso livello. La comunicazione di alto livello, ovvero quella con i software applicativi è consentita grazie alle NBI (North-Bound Interfaces), mentre quella di basso livello, ovvero con i dispositivi hardware è consentita grazie alle SBI (South-Bound Interfaces). Queste due interfacce riescono a soddisfare le richieste del controller SDN grazie all' applicazione del paradigma Intent NBI, di tipo dichiarativo, non prescrittivo e indipendente dal fornitore.
APA, Harvard, Vancouver, ISO, and other styles
3

Frankeline, Tanyi. "Attack Modeling and Risk Assessments in Software Defined networking (SDN)". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806.

Full text
Abstract:
Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. At the core of SDN, the control plane is physically and logically separated from the data plane. The controller is connected to the application layer through an interface known as the northbound interface and to the data plane through another interface known as the southbound interface. The centralized control plane uses APIs to communicate through the northbound and southbound interface with the application layer and the data plane layer respectively. By default, these APIs such as Restful and OpenFlow APIs do not implement security mechanisms like data encryption and authentication thus, this introduces new network security threats to the SDN architecture. This report presents a technique known as threat modeling in SDN. To achieve this technique, attack scenarios are created based on the OpenFlow SDN vulnerabilities. After which these vulnerabilities are defined as predicates or facts and rules, a framework known as multihost multistage vulnerability analysis (MulVAL) then takes these predicates and rules to produce a threat model known as attack graph. The attack graph is further used to performed quantitative risk analysis using a metric to depict the risks associated to the OpenFlow SDN model
APA, Harvard, Vancouver, ISO, and other styles
4

Tu, Tung-Liang, and 塗棟樑. "A Northbound Security Enforcement Interface Architecture for Software-Defined Network Control Plane." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/9uur7p.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>103<br>The software-defined network (SDN) enables a centralized controller to rapidly and adaptively allocate network resources in the data plane based on the demands of applications. However, the SDN’s programmability also brings up new security issues that demand promising solutions. One of the security issues is secure communications between applications and the controller. Because programmers can flexibly change controller configuration by developing applications, some applications and attackers can accidentally or deliberately do abnormal behaviors to the controller, such as flooding legal requests to reduce controller performance and forging legal requests to modify controller configuration. Thus, these abnormal behaviors may severely affect the SDN’s availability and reliability. However, recent research only focused on maintaining the correctness of the data plane, e.g. avoiding malicious routing policies and detecting abnormal flows, not the correctness of the controller plane. In this thesis, we propose a northbound security enforcement interface (NSEI) architecture that provides modules such as AAA (authentication, authorization and accounting), communication, behavior logs, controller adapter, anomaly detection, and anomaly recovery, to protect the control plane by detecting unexpected behaviors of applications. In addition, based on the proposed NSEI architecture, we also propose an abnormal behavior detection (ABD) method, which consists of anomaly detection and anomaly recovery. Simulation results show that the proposed NSEI can detect abnormal behaviors for a routing application with low false negative rate of 0.26% and low false positive rate of 6.01%. The proposed NSEI can enhance the stableness of the SDN by resolving security problems of the control plane and enhance the SDN’s security. In addition, the proposed NSEI is applicable for other SDN applications.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Northbound interface"

1

Aflatoonian, Amin, Ahmed Bouabdallah, Vincent Catros, Karine Guillouard, and Jean-Marie Bonnin. "An Orchestrator-Based SDN Framework with Its Northbound Interface." In Lecture Notes in Computer Science. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13488-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Duy, Phan The, Do Thi Thu Hien, Nguyen Van Vuong, Nguyen Ngoc Hai Au, and Van-Hau Pham. "Toward a Trust-Based Authentication Framework of Northbound Interface in Software Defined Networking." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30149-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Northbound interface"

1

Arozarena, Pablo, David Ortega, and Bertrand Baesjou. "Assessing the Madeira NorthBound Interface." In NOMS 2008 - 2008 IEEE Network Operations and Management Symposium. IEEE, 2008. http://dx.doi.org/10.1109/noms.2008.4575189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pritchard, Sean W., Reza Malekian, Gerhard P. Hancke, and Adnan M. Abu-Mahfouz. "Improving northbound interface communication in SDWSN." In IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2017. http://dx.doi.org/10.1109/iecon.2017.8217468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Banse, Christian, and Sathyanarayanan Rangarajan. "A Secure Northbound Interface for SDN Applications." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Layeghy, Siamak, Farzaneh Pakzad, and Marius Portmann. "SCOR: Constraint Programming-based Northbound Interface for SDN." In 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2016. http://dx.doi.org/10.1109/atnac.2016.7878788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tairaku, Tsumugi, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, and Masato Oguchi. "Social Data Driven SDN Network Operation using Northbound Interface." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Yongni, Song Hu, Wei Tao, and Baiyi Li. "Research on the industrial network architecture of northbound interface." In 2017 Chinese Automation Congress (CAC). IEEE, 2017. http://dx.doi.org/10.1109/cac.2017.8243949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bai, Wenqi, Yihong Hu, Guochu Shou, and Yaqiong Liu. "Implementation of Northbound Interface in Multi-domain Coordinate Control Framework." In 2018 Asia Communications and Photonics Conference (ACP). IEEE, 2018. http://dx.doi.org/10.1109/acp.2018.8595921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ruixue Gong, Guochu Shou, Yihong Hu, Zhigang Guo, Guoying Zhang, and Hui Ding. "Interoperability test of northbound interface for a transport SDON prototype." In 2015 Opto-Electronics and Communications Conference (OECC). IEEE, 2015. http://dx.doi.org/10.1109/oecc.2015.7340338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Niemiec, Marcin, Piotr Jaglarz, Marcin Jekot, Piotr Cholda, and Piotr Borylo. "Risk Assessment Approach to Secure Northbound Interface of SDN Networks." In 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2019. http://dx.doi.org/10.1109/iccnc.2019.8685486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

King, D., C. Rotsos, I. Busi, F. Zhang, and N. Georgalas. "Transport Northbound Interface: The need for Specification and Standards coordination." In 2017 International Conference on Optical Network Design and Modeling (ONDM). IEEE, 2017. http://dx.doi.org/10.23919/ondm.2017.7958527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!