Academic literature on the topic 'SOFTWARE DEFINED NETWORK (SDN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SOFTWARE DEFINED NETWORK (SDN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Mustafa, Firas M. "Software Defined Networking Based Optical Network: A review." Academic Journal of Nawroz University 9, no. 2 (June 29, 2020): 139. http://dx.doi.org/10.25007/ajnu.v9n2a718.

Full text
Abstract:
In the field of networking, software-defined networking (SDN) has obtained a lot of concentration from both academic and industry, and it aims to provide a flexible and programmable level of control, beside obtain efficient control and management of network systems. For such reasons, the software-defined networks (SDN) can be deemed as an essential task to accomplish these requirements. In the datacenters and networks, the SDN is used to allow the administrators of the networks to start programming, controlling, changing, and managing dynamically the network behavior with open interfaces and a reflection of lower-level functionality because the need for SDN-like switching technology has become evident for many users of network equipment, especially in large data centers. There are many algorithms and applications that have been considered in SDN such as (FP-MA), EON, (EQUAL-APP) (VONCR-APP), and (T-SDN) as use cases for approval purposes because the SDN provides several focal points to the power, operation, and administration of extensive range networks. This paper aims to review Optical Network using SDN, where many types of research papers are present techniques to improve near-optimal traffic engineering and management; measurement and monitoring of the significant parameters of the optical networks and manage the cross-layer issues such as debugging and testing.
APA, Harvard, Vancouver, ISO, and other styles
2

Waseem, Quadri, Sultan S. Alshamrani, Kashif Nisar, Wan Isni Sofiah Wan Din, and Ahmed Saeed Alghamdi. "Future Technology: Software-Defined Network (SDN) Forensic." Symmetry 13, no. 5 (April 28, 2021): 767. http://dx.doi.org/10.3390/sym13050767.

Full text
Abstract:
The software-defined networking (SDN) paradigm has recently emerged as a trend to build various protocols, develop more reliable networks, enhance the data flow controlling, and provide security in a much simpler and flexible way. SDN helps to ease management and handle asymmetric connectivity across various nodes. It solves the problems of network and cloud security and hence provides the best solution for the safety of data on the network. Therefore, we feel the urge to research more and provide the basics of SDN forensics, mention its advantages in network especially in the cloud, and present its elaborate prospects in context with Network Forensic (NF) and Cloud Forensic (CF). In this research article, we explained in detail the NF and CF with emphasis on Network security (NS) and Cloud Security (CS). The paper also provided the various security approaches and categories. Then, an overview of the software-defined networking (SDN) is mentioned. We also discussed the use of SDN in Network Forensic and Cloud Forensic. Furthermore, to aid the SDN forensic, we presented the advantages, challenges, and issues along with future research directions of SDN in network forensic and cloud forensic, and at last, we thus express and explore the need for security in forensic based on the SDN paradigm in the form of a set of suggested recommendations.
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Nan, and Ping Zhang. "Software defined network intrusion detection in wireless sensor network." MATEC Web of Conferences 232 (2018): 04062. http://dx.doi.org/10.1051/matecconf/201823204062.

Full text
Abstract:
Software Defined Network (SDN) realizes the separation of control functions from data planes and network programming. It lays the foundation for centralized and refined control and has greater advantages over traditional networks. At present, the research on SDN mainly focuses on wired network and data center, while software definition is proposed in some studies, but only in the stages of models and concepts. According to the characteristics of wireless sensor networks, this paper takes anomaly intrusion detection as the main research content. The sensor network is defined based on OpenFlow software combined with SDN, and intrusion detection technology is studies on the basis of this. It is easier for the system to control the network and its resources in SDN architecture. The Network traffic shows self-similarity in large time scale. In this paper, it can distinguish between the normal situation and the attack by observing the change of the self-similarity coefficient of the network, so as to realize the intrusion detection.
APA, Harvard, Vancouver, ISO, and other styles
4

Hussain, Mudassar, Nadir Shah, Rashid Amin, Sultan S. Alshamrani, Aziz Alotaibi, and Syed Mohsan Raza. "Software-Defined Networking: Categories, Analysis, and Future Directions." Sensors 22, no. 15 (July 25, 2022): 5551. http://dx.doi.org/10.3390/s22155551.

Full text
Abstract:
Software-defined networking (SDN) is an innovative network architecture that splits the control and management planes from the data plane. It helps in simplifying network manageability and programmability, along with several other benefits. Due to the programmability features, SDN is gaining popularity in both academia and industry. However, this emerging paradigm has been facing diverse kinds of challenges during the SDN implementation process and with respect to adoption of existing technologies. This paper evaluates several existing approaches in SDN and compares and analyzes the findings. The paper is organized into seven categories, namely network testing and verification, flow rule installation mechanisms, network security and management issues related to SDN implementation, memory management studies, SDN simulators and emulators, SDN programming languages, and SDN controller platforms. Each category has significance in the implementation of SDN networks. During the implementation process, network testing and verification is very important to avoid packet violations and network inefficiencies. Similarly, consistent flow rule installation, especially in the case of policy change at the controller, needs to be carefully implemented. Effective network security and memory management, at both the network control and data planes, play a vital role in SDN. Furthermore, SDN simulation tools, controller platforms, and programming languages help academia and industry to implement and test their developed network applications. We also compare the existing SDN studies in detail in terms of classification and discuss their benefits and limitations. Finally, future research guidelines are provided, and the paper is concluded.
APA, Harvard, Vancouver, ISO, and other styles
5

Nagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.

Full text
Abstract:
Software Defined Networking and programmability on network have established themselves as current trends in IT by bringing autonomous operation with dynamic flow to network. Networks must be programmable, and it must be aware of the application in order to operate autonomously. Networks need to evolve to catch up with the current trends without losing their current status and operation, reliability, robustness, or security, and without distorting current investments. SDN is a transpiring network architecture where network control plane is distinguished from data plane and by that the network is directly programmable. This control, was initially bound in every network devices, enabled in the network to be abstracted for applications and services. Security is a major challenge for organizational and campus networks. The future of Internet depends on virtualization which is to provide numerous networks hosted the same physical hardware. This proposal takes a great advantage of the programmability provided by SDN to utilize Intrusion Detection System.
APA, Harvard, Vancouver, ISO, and other styles
6

Jararweh, Yaser, Mahmoud Al-Ayyoub, Ahmad Doulat, Ahmad Al Abed Al Aziz, Haythem A. Bany Salameh, and Abdallah A. Khreishah. "Software Defined Cognitive Radio Network Framework." International Journal of Grid and High Performance Computing 7, no. 1 (January 2015): 15–31. http://dx.doi.org/10.4018/ijghpc.2015010102.

Full text
Abstract:
Software defined networking (SDN) provides a novel network resource management framework that overcomes several challenges related to network resources management. On the other hand, Cognitive Radio (CR) technology is a promising paradigm for addressing the spectrum scarcity problem through efficient dynamic spectrum access (DSA). In this paper, the authors introduce a virtualization based SDN resource management framework for cognitive radio networks (CRNs). The framework uses the concept of multilayer hypervisors for efficient resources allocation. It also introduces a semi-decentralized control scheme that allows the CRN Base Station (BS) to delegate some of the management responsibilities to the network users. The main objective of the proposed framework is to reduce the CR users' reliance on the CRN BS and physical network resources while improving the network performance by reducing the control overhead.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Yi Fan, Yong Li, and De Peng Jin. "Dynamical Traffic Engineering in Software-Defined Network." Applied Mechanics and Materials 610 (August 2014): 954–58. http://dx.doi.org/10.4028/www.scientific.net/amm.610.954.

Full text
Abstract:
Software-Defined Networks (SDN), as newly proposed network architecture, has a great potential in optimizing network traffics. In SDN, the control plane is separated from the data plane. With the help of the centralized controller, we can gather information of the network in real time. In this work, we propose a practical two-stage approach for traffic engineering that takes advantages of SDN. The approach not only assures every newly injected flow gets a suitable route that does not have too much payload on it, but also schedules the overall flows so that they are distributed more equally in the network. Furthermore, we demonstrate its efficiency in terms of port speed and compared it with port speed under the default routing decision. We also use linear programming to find the optimal solution and compare it with our result.
APA, Harvard, Vancouver, ISO, and other styles
8

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Mashadani, Abdulrahman Khalid Abdullah, and Muhammad Ilyas. "Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network." Webology 19, no. 1 (January 20, 2022): 4129–44. http://dx.doi.org/10.14704/web/v19i1/web19272.

Full text
Abstract:
The network security and how to keep it safe from malicious attacks now days is attract huge interest of the developers and cyber security experts (SDN) Software- Defined Network is simple framework for network that allow programmability and monitoring that enable the operators to manage the entire network in a consistent and comprehensive manner also used to detect and alleviate the DDoS attacks the SDN now is the trending of network security evolution there many threats that faces the networks one of them is the distributed Denial of Service (DDoS) because of the architecture weakness in traditional network SDN use new architecture and the point of power in it is the separation of control and data plane the DDoS attack prevent the users from access into resource of the network or make huge delays in the network this paper shows the impact of DDoS attacks on SDN, and how to use SDN applications written in Python and by using OpenFlow protocol to automatically detect and resist attacks with average time to response to the attack between 95-145 second.
APA, Harvard, Vancouver, ISO, and other styles
10

Czachórski, Tadeusz, Erol Gelenbe, Godlove Suila Kuaban, and Dariusz Marek. "Time-Dependent Performance of a Multi-Hop Software Defined Network." Applied Sciences 11, no. 6 (March 10, 2021): 2469. http://dx.doi.org/10.3390/app11062469.

Full text
Abstract:
It has been recently observed that Software Defined Networks (SDN) can change the paths of different connections in the network at a relatively frequent pace to improve the overall network performance, including delay and packet loss, or to respond to other needs such as security. These changes mean that a network that SDN controls will seldom operate in steady state; rather, the network may often be in transient mode, especially when the network is heavily loaded and path changes are critically important. Hence, we propose a transient analysis of such networks to better understand how frequent changes in paths and the switches’ workloads may affect multi-hop networks’ performance. Since conventional queueing models are difficult to solve for transient behaviour and simulations take excessive computation time due to the need for statistical accuracy, we use a diffusion approximation to study a multi-hop network controlled by SDN. The results show that network optimization should consider the transient effects of SDN and that transients need to be included in the design of algorithms for SDN controllers that optimize network performance.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Wiklund, Petter. "SDN : Software defined networks." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-91891.

Full text
Abstract:
This report is a specialization in Software defined networking. SDN really comes to revolutionize the industry and it’s under constant development. But is the technology ready to be launched into operation yet? The report would initially involve a number of problems that today's network technology is facing. It then follows a deeper description of what this software-based networking technology really is and how it works. Further, the technique is being tested in a lab assignment, using a program that builds a test virtual network with support for SDN, called Mininet. The final part summarizes and analyzes this information to see what it really means for today's networking technology and those who work with it.
APA, Harvard, Vancouver, ISO, and other styles
2

Pitzus, Antonio. "SDN : Software Defined Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14006/.

Full text
Abstract:
In un periodo in cui tutto si evolve rapidamente, il settore delle telecomunicazioni sta assistendo alla crescita esponenziale del numero di dispositivi mobili costantemente connessi alla rete; ciò richiede la necessità di un nuovo modo di gestire le reti. La nuova visione che sta maturando in questi ultimi tempi è quella di adottare un modello di rete dinamico, flessibile e soprattutto affidabile e che non richieda grossi sforzi di manutenzione o l’installazione di ulteriori hardware da parte degli operatori. Una rete con queste caratteristiche può essere sviluppata grazie ad un modello architetturale innovativo come il Software Defined Networking (SDN) e ad un nuovo modo di sfruttare le funzionalità degli apparati di rete come la Network Function Virtualization (NFV), la quale è a sua volta un processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Questi due concetti sono strettamente legati tra loro e possono comportare particolari vantaggi se applicati contemporaneamente, ma sono di per sè indipendenti. Software Defined Networking (SDN) è un’ architettura utilizzata per la realizzazione di reti di telecomunicazione nelle quali il piano di controllo della rete e quello del trasporto dei dati sono separati logicamente. La Network Function Virtualization (NFV) è il processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Un ultimo aspetto da trattare riguarda la comunicazione del controller SDN di alto e basso livello. La comunicazione di alto livello, ovvero quella con i software applicativi è consentita grazie alle NBI (North-Bound Interfaces), mentre quella di basso livello, ovvero con i dispositivi hardware è consentita grazie alle SBI (South-Bound Interfaces). Queste due interfacce riescono a soddisfare le richieste del controller SDN grazie all' applicazione del paradigma Intent NBI, di tipo dichiarativo, non prescrittivo e indipendente dal fornitore.
APA, Harvard, Vancouver, ISO, and other styles
3

Tseng, Yuchia. "Securing network applications in software defined networking." Electronic Thesis or Diss., Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCB036.

Full text
Abstract:
Suite à l'introduction de divers services Internet, les réseaux informatiques ont été reconnus ‏comme ayant joué un rôle essentiel dans la vie moderne au cours du dernier demi-siècle. Le ‏développement rapide et la convergence des technologies informatiques et de communication ‏créent le besoin de connecter divers périphériques avec différents systèmes d'exploitation ‏et protocoles. Il en résulte de nombreux défis pour fournir une intégration transparente ‏d'une grande quantité de dispositifs physiques ou d'entités hétérogènes. Ainsi, les réseaux ‏définis par logiciel (Software Defined Networks, SDN) en tant que paradigme émergent ont ‏le potentiel de révolutionner la gestion des réseaux en centralisant le contrôle et la visibilité ‏globale sur l'ensemble du réseau. Cependant, les problèmes de sécurité demeurent une préoccupation ‏importante et empêchent l'adoption généralisée du SDN.‏‏ Pour identifier les menaces, nous avons effectué une analyse en 3 dimensions pour évaluer ‏la sécurité de SDN. Dans cette analyse, nous avons repris 9 principes de sécurité pour ‏le contrôleur SDN et vérifié la sécurité des contrôleurs SDN actuels avec ces principes. ‏Nous avons constaté que les contrôleurs SDN, ONOS et OpenContrail sont relativement plus ‏sécurisés que les autres selon notre méthodologie d'analyse. Nous avons également trouvé ‏le besoin urgent d'atténuer le problème d'injection d'applications malveillantes. Par conséquent, ‏nous avons proposé une couche d'amélioration de la sécurité (Security-enhancing layer, couche SE) ‏pour protéger l'interaction entre le plan de contrôle et le plan d’application. ‏‏Cette couche SE est indépendante du contrôleur et peut fonctionner avec OpenDaylight, ONOS, ‏Floodlight, Ryu et POX, avec une faible complexité de déploiement. Aucune modification de ‏leurs codes sources n'est requise dans leur mise en œuvre alors que la sécurité globale du ‏contrôleur SDN est améliorée. Le prototype I, Controller SEPA, protège le contrôleur ‏SDN avec l'authentification de l'application réseau, l'autorisation, l'isolation des ‏applications et le blindage de l'information avec un coût additionnel négligeable de moins ‏de 0,1% à 0,3%. Nous avons développé le prototype II de la couche SE, appelé Controller DAC, ‏qui rend dynamique le contrôle d'accès. Le controller DAC peut détecter l'utilisation ‏abusive de l'API en comptabilisant les opérations de l'application réseau avec un coût ‏additionnel inférieure à 0,5%.‏‏ Grâce à cette couche SE, la sécurité globale du contrôleur SDN est améliorée mais avec un ‏coût additionnel inférieure à 0,5%. De plus, nous avons tenté de fournir un framework de ‏déploiement d'application réseau sécurisé pour le contrôleur SDN avec un orchestrateur. ‏Tout d'abord, nous avons sécurisé le contrôleur SDN en utilisant la file d'attente de ‏messages pour remplacer les interfaces populaires actuelles, y compris les RESTful APIs ‏et les APIs internes, à l'aide d'une interface orientée événement décomposable. Avec cette ‏nouvelle interface northbound, l'orchestrateur peut déployer les applications réseau dans ‏le bac à sable(sanbox) avec contrôle des ressources et contrôle d'accès. Cette approche ‏peut efficacement protéger contre les menaces, qui incluent les attaques d'épuisement des ‏ressources (Resource exhaustion attacks) et le traitement des données sur le contrôleur SDN ‏actuel. Nous avons également implémenté une application réseau déployée par l'orchestrateur ‏pour détecter une attaque spécifique à OpenFlow, appelée attaque par contournement de priorité, ‏pour évaluer l'utilité de l'interface norttbound. À long terme, le temps de traitement d'un ‏message packet_in dans cette interface est inférieur à cinq millisecondes mais l'application ‏réseau peut être complètement découplée et isolée du contrôleur SDN.‏‏
The rapid development and convergence of computing technologies and communications ‏create the need to connect diverse devices with different operating systems and protocols.‏ This resulted in numerous challenges to provide seamless integration of a large amount of ‏heterogeneous physical devices or entities. Hence, Software-defined Networks (SDN), as an ‏emerging paradigm, has the potential to revolutionize the legacy network management and‏ accelerate the network innovation by centralizing the control and visibility over the network. ‏However, security issues remain a significant concern and impede SDN from being widely‏ adopted.‏‏To identity the threats that inherent to SDN, we conducted a deep analysis in 3 dimensions‏ to evaluate the security of the proposed architecture. In this analysis, we summarized 9‏security principles for the SDN controller and checked the security of the current well-known‏ SDN controllers with those principles. We found that the SDN controllers, namely ONOS ‏and OpenContrail, are relatively two more secure controllers according to our conducted ‏methodology. We also found the urgent need to integrate the mechanisms such as connection ‏verification, application-based access control, and data-to-control traffic control for securely ‏implementing a SDN controller. In this thesis, we focus on the app-to-control threats, which ‏could be partially mitigated by the application-based access control. As the malicious network ‏application can be injected to the SDN controller through external APIs, i.e., RESTful APIs, or ‏internal APIs, including OSGi bundles, Java APIs, Python APIs etc. In this thesis, we discuss ‏how to protect the SDN controller against the malicious operations caused by the network‏ application injection both through the external APIs and the internal APIs. ‏We proposed a security-enhancing layer (SE-layer) to protect the interaction between the‏ control plane and the application plane in an efficient way with the fine-grained access control, ‏especially hardening the SDN controller against the attacks from the external APIs. This‏ SE-layer is implemented in the RESTful-based northbound interfaces in the SDN controller‏ and hence it is controller-independent for working with most popular controllers, such as‏ OpenDaylight, ONOS, Floodlight, Ryu and POX, with low deployment complexity. No‏ modifications of the source codes are required in their implementations while the overall security ‏of the SDN controller is enhanced. Our developed prototype I, Controller SEPA, protects well‏ the SDN controller with network application authentication, authorization, application isolation,‏ and information shielding with negligible latency from less than 0.1% to 0.3% for protecting‏ SDN controller against the attacks via external APIs, i.e, RESTful APIs. We developed also‏ the SE-layer prototype II, called Controller DAC, which makes dynamic the access control.‏ Controller DAC can detect the API abuse from the external APIs by accounting the network‏ application operation with latency less than 0.5%. Thanks to this SE-layer, the overall security of the SDN controller is improved but with a latency of less than 0.5%. However, the SE-layer can isolate the network application to communicate the controller only through the RESTful APIs. However, the RESTful APIs is ‏insufficient in the use cases which needs the real-time service to deliver the OpenFlow messages. ‏Therefore, we proposed a security-enhancing architecture for securing the network application‏ deployment through the internal APIs in SDN, with a new SDN architecture dubbed SENAD. In‏ SENAD, we split the SDN controller in: (1) a data plane controller (DPC), and (2) an application ‏plane controller (APC) and adopt the message bus system as the northbound interface instead ‏of the RESTful APIs for providing the service to deliver the OpenFlow messages in real-time.‏ (...)
APA, Harvard, Vancouver, ISO, and other styles
4

Shahzad, Syed Amir. "Route aggregation in Software-defined Networks." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123977.

Full text
Abstract:
Software-defined Networking (SDN) is an emerging trend in communication networks that facilitates decoupling the control and data plane of multilayer switches. A logically centralized controller hosted on a server configures the forwarding tables (flow tables) of switches in order to route the various data flows.  To implement SDN, OpenFlow technology has been adopted by packet switching vendors as it provides increased flexibility for the control and management of a packet switched domain. OpenFlow technology provides flow based switching that is controlled by a network management control application running in an OpenFlow controller. In this thesis work we investigate how an OpenFlow Controller communicates with a legacy network via the OSPF routing protocol, how the size of the OpenFlow network effects the resources (memory and CPU) of a legacy router to whom the controller communicates. Also we examine bandwidth utilization of the link (between the OpenFlow network and legacy router). The main goal of this thesis is to find methods to reduce the consumption of resources of a legacy router. This study shows that the size of OpenFlow network directly affects the usage of the link’s bandwidth, and the memory and CPU usage of a legacy router. Aggregated information from the OpenFlow controller which is sent towards the legacy router can reduce the utilization of these resources. Finally we proposed several algorithms and design models that can be implemented for route aggregation in Software-defined Networks.  Implementation of the solutions suggested in this thesis will allow automatic route aggregation in SDN. ISPs deploying SDN architecture could benefit from the proposed design models and route aggregation solution.
Software-definierade nätverk (SDN) är en framväxande trend i kommunikationsnät som underlättar frikoppling kontroll och uppgifter plan flerskiktade switchar. Ett logiskt centraliserad styrenhet på en server konfigurerar vidarebefordran tabeller (flödestabeller) av växlar för att dirigera de olika dataflöden. För att genomföra SDN har OpenFlow teknik har antagits av paketförmedlande leverantörer eftersom det ger ökad flexibilitet för kontroll och förvaltning av en påslagen paket domän. OpenFlow teknik ger flöde baserad omkoppling som styrs av ett nätverk ledningens kontroll som körs i en OpenFlow controller. I detta examensarbete undersöker vi hur en OpenFlow Controller kommunicerar med ett äldre nätverk via OSPF routing protokoll, hur storleken på OpenFlow nätverkseffekter de resurser (minne och CPU) av en äldre router till vilken styrenheten kommunicerar.  Också vi undersöker bandbreddsutnyttjandet av sambandet (mellan OpenFlow nätverket och äldre router). Det huvudsakliga målet med detta examensarbete är att hitta metoder för att minska konsumtionen av resurser från en äldre router. Denna studie visar att storleken på OpenFlow nätverk direkt påverkar användningen av länkens bandbredd och minne och CPU-användning av en äldre router. Samlad information från OpenFlow styrenhet som sändes mot äldre router kan minska utnyttjandet av dessa resurser. Slutligen föreslog vi flera algoritmer och modeller konstruktion som kan genomföras för route aggregation i Software Defined-nätverk. Genomförandet av de lösningar som föreslås i denna avhandling kommer att möjliggöra automatisk route aggregation i SDN. Internetleverantörer distribuerar SDN arkitektur kunde dra nytta av den föreslagna utformningen modeller och route aggregation lösning.
APA, Harvard, Vancouver, ISO, and other styles
5

Andersson, Peter, and Robin Blomqvist. "Software Defined Network : Med openflow." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28597.

Full text
Abstract:
Detta projekt har haft som mål att skapa ett redundant SDN-nätverk som ska ligga som grund för ett fiktivt företag. Företeaget ska kunna använda nätverket som vi bygger upp för att vidareutveckla detta och anpassa det efter verksamhetens behov. Nätverket byggs upp med mininet som används för att simulera en nätverksmiljö. Det fiktiva företaget ska sedan bara kunna lyfta ut nätverket från mininet ut till ett riktigt nätverk. Nätverkets funktioner, såsom protokollen STP och LACP implementeras med hjälp av programmeringsspråket python.
The goal for this project is to setup a redundant Software Defined Network for a fictive company. The company should be able to use the network for future network extension. The network will be built in mininet. Mininet is a software that is used to simulate a real network environment. The company should also be able to take the simulated network in mininet and implement it in to a real network. The protocols STP and LACP are implemented in the network by means of the programming language python.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Hyojoon. "Facilitating dynamic network control with software-defined networking." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53939.

Full text
Abstract:
This dissertation starts by realizing that network management is a very complex and error-prone task. The major causes are identified through interviews and systematic analysis of network config- uration data on two large campus networks. This dissertation finds that network events and dynamic reactions to them should be programmatically encoded in the network control program by opera- tors, and some events should be automatically handled for them if the desired reaction is general. This dissertation presents two new solutions for managing and configuring networks using Software- Defined Networking (SDN) paradigm: Kinetic and Coronet. Kinetic is a programming language and central control platform that allows operators to implement traffic control application that reacts to various kinds of network events in a concise, intuitive way. The event-reaction logic is checked for correction before deployment to prevent misconfigurations. Coronet is a data-plane failure recovery service for arbitrary SDN control applications. Coronet pre-plans primary and backup routing paths for any given topology. Such pre-planning guarantees that Coronet can perform fast recovery when there is failure. Multiple techniques are used to ensure that the solution scales to large networks with more than 100 switches. Performance and usability evaluations show that both solutions are feasible and are great alternative solutions to current mechanisms to reduce misconfigurations.
APA, Harvard, Vancouver, ISO, and other styles
7

Tammana, Praveen Aravind Babu. "Software-defined datacenter network debugging." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31326.

Full text
Abstract:
Software-defined Networking (SDN) enables flexible network management, but as networks evolve to a large number of end-points with diverse network policies, higher speed, and higher utilization, abstraction of networks by SDN makes monitoring and debugging network problems increasingly harder and challenging. While some problems impact packet processing in the data plane (e.g., congestion), some cause policy deployment failures (e.g., hardware bugs); both create inconsistency between operator intent and actual network behavior. Existing debugging tools are not sufficient to accurately detect, localize, and understand the root cause of problems observed in a large-scale networks; either they lack in-network resources (compute, memory, or/and network bandwidth) or take long time for debugging network problems. This thesis presents three debugging tools: PathDump, SwitchPointer, and Scout, and a technique for tracing packet trajectories called CherryPick. We call for a different approach to network monitoring and debugging: in contrast to implementing debugging functionality entirely in-network, we should carefully partition the debugging tasks between end-hosts and network elements. Towards this direction, we present CherryPick, PathDump, and SwitchPointer. The core of CherryPick is to cherry-pick the links that are key to representing an end-to-end path of a packet, and to embed picked linkIDs into its header on its way to destination. PathDump is an end-host based network debugger based on tracing packet trajectories, and exploits resources at the end-hosts to implement various monitoring and debugging functionalities. PathDump currently runs over a real network comprising only of commodity hardware, and yet, can support surprisingly a large class of network debugging problems with minimal in-network functionality. The key contributions of SwitchPointer is to efficiently provide network visibility to end-host based network debuggers like PathDump by using switch memory as a "directory service" - each switch, rather than storing telemetry data necessary for debugging functionalities, stores pointers to end hosts where relevant telemetry data is stored. The key design choice of thinking about memory as a directory service allows to solve performance problems that were hard or infeasible with existing designs. Finally, we present and solve a network policy fault localization problem that arises in operating policy management frameworks for a production network. We develop Scout, a fully-automated system that localizes faults in a large scale policy deployment and further pin-points the physical-level failures which are most likely cause for observed faults.
APA, Harvard, Vancouver, ISO, and other styles
8

Liver, Toma, and Mohammed Darian. "Soft Migration from Traditional to Software Defined Networks." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-44265.

Full text
Abstract:
The concept of Software Defined Networking (SDN) may be a way to face the fast growing computer network infrastructure with its demands and requirements. The concept is attracting the interest of enterprises to expand their respective network infrastructures, but one has to consider the impacts of migrating from an existing network infrastructure to an SDN network. One way that could minimize the impacts is to proceed a soft migration from a traditional IP network to SDN, creating what is so called a heterogeneous network. Instead of fully replacing the network infrastructure and face the impacts of it, the idea of the soft migration is to replace a part of it with an environment of SDN and examine the performance of it. This thesis work will analyze the performance of a network consisting of a traditional IP network combined with SDN. It is essential during this work to identify the differences in performance when having a heterogeneous network in comparison with having a dedicated traditional IP network. Therefore, the questions that will be addressed during this thesis work is to examine how such a heterogeneous network can be designed and measure the performance of it in terms of throughput, jitter and packet losses. By the method of experimentation and the studying of related works of the SDN fundamentals, we hope to achieve our goals with this thesis work, to give us and the reader a clearer insight.
APA, Harvard, Vancouver, ISO, and other styles
9

Abou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.

Full text
Abstract:
La conception originale d'Internet n'a pas pris en compte les aspects de sécurité du réseau, l’objectif prioritaire était de faciliter le processus de communication. Par conséquent, de nombreux protocoles de l'infrastructure Internet exposent un ensemble de vulnérabilités. Ces dernières peuvent être exploitées par les attaquants afin de mener un ensemble d’attaques. Les attaques par déni de service distribué (DDoS) représentent une grande menace; DDoS est l'une des attaques les plus dévastatrices causant des dommages collatéraux aux opérateurs de réseau ainsi qu'aux fournisseurs de services Internet. Les réseaux programmables (SDN) ont émergé comme un nouveau paradigme promettant de résoudre les limitations de l’architecture réseau actuelle en découplant le plan de contrôle du plan de données. D'une part, cette séparation permet un meilleur contrôle du réseau et apporte de nouvelles capacités pour mitiger les attaques par DDoS. D'autre part, cette séparation introduit de nouveaux défis en matière de sécurité du plan de contrôle. L’enjeu de cette thèse est double. D'une part, étudier et explorer l’apport du SDN à la sécurité afin de concevoir des solutions efficaces qui vont mitiger plusieurs vecteurs d’attaques. D'autre part, protéger le SDN contre ces attaques. À travers ce travail de recherche, nous contribuons à la mitigation des attaques par déni de service distribué sur deux niveaux (intra et inter-domaine), et nous contribuons au renforcement de la sécurité dans le SDN
The original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Ani, Layth. "Integrating IP Protocol Into Optical Networks by Using Software-defined Network (SDN)." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/33010.

Full text
Abstract:
The Internet, with cloud computing, offers amazing services that require a fast, intelligent, reliable network connection. Current networks, electrical or optical, need to work together to provide the user with a high-quality connection. The IP protocol as Layer 3 and an optical network as Layer 2 need to talk to each other and help each other instead of working separately. Therefore, this thesis proposes using software-defined network (SDN) technology for integrating the IP protocol into an optical network to fill the gap between the two layers and to give the network more intelligence and flexibility for new connection requests, choosing the best route, and monitoring the network. A two-layer SDN centralized controller design has been used. The Layer 1 SDN controller is the centralized controller that connects and updates all Layer 2 SDN controllers which control traffic in each domain. New connection requests are processed in the SDN controller and the traffic is forwarded by the optical network. SDN technology and the integration of IP into the optical network promise to enhance network connectivity.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Italy) IEEE SDN for Future Networks and Services (2013 Trento. 2013 IEEE SDN for Future Networks and Services (SDN4FNS 2013): Trento, Italy, 11-13 November 2013. Piscataway, NJ: IEEE, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liyanage, Madhusanka, Andrei Gurtov, and Mika Ylianttila, eds. Software Defined Mobile Networks (SDMN). Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sheng, Cheng, Jie Bai, and Qi Sun. Software-Defined Wide Area Network Architectures and Technologies. First edition. | Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003144038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hilary, Lamaison, ed. Vertical product differentiation, network externalities and market-defined standards: Simulation of the PC spreadsheet software market. Uxbridge: Centre for Research into Innovation, Culture & Technology, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies. O'Reilly Media, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hares, Susan. SDN Distilled: A Brief Guide to Software Defined Networking. Pearson Education, Limited, 2025.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

SDN and NFV Simplified: A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization. Addison-Wesley Professional, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Network innovation through openflow and SDN : principles and design. CRC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

author, Szarkowicz Krzysztof Grzegorz, ed. MPLS in the SDN era: Interoperable scenarios to make networks scale to new services. 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Raj, Pethuru, and Anupama Raman. "Software-Defined Network (SDN) for Network Virtualization." In Software-Defined Cloud Centers, 65–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78637-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pujolle, Guy. "SDN (Software-Defined Networking)." In Software Networks, 15–48. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119005100.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Costa-Requena, Jose, Raimo Kantola, Jesús Llorente Santos, Vicent Ferrer Guasch, Maël Kimmerlin, Antti Mikola, and Jukka Manner. "LTE Architecture Integration with SDN." In Software Defined Mobile Networks (SDMN), 81–105. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hakiri, Akram, and Pascal Berthou. "Leveraging SDN for the 5G Networks." In Software Defined Mobile Networks (SDMN), 61–80. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cugini, Filippo, Piero Castoldi, Mayur Channegowda, Ramon Casellas, Francesco Paolucci, and Alberto Castro. "Software Defined Networking (SDN) in Optical Networks." In Optical Networks, 217–44. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30174-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Brian, Rob Gonzalez, and Brian Stanford. "Mobile Network History." In Software Defined Mobile Networks (SDMN), 11–19. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Röpke, Christian, and Thorsten Holz. "SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks." In Research in Attacks, Intrusions, and Defenses, 339–56. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Lin, and Ping Lin. "Software-Defined Networking (SDN) for Cloud Applications." In Computer Communications and Networks, 209–33. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10530-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abro, Ahmed Bux. "Software Defined Mobile Network Security." In Software Defined Mobile Networks (SDMN), 315–29. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eckert, Marcus, and Thomas Martin Knoll. "QoE Management Framework for Internet Services in SDN-Enabled Mobile Networks." In Software Defined Mobile Networks (SDMN), 247–64. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118900253.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Faujdar, Neetu, Aparna Sinha, Harsh Sharma, and Eshaan Verma. "Network Security in Software defined Networks (SDN)." In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE, 2020. http://dx.doi.org/10.1109/icstcee49637.2020.9277300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tatang, Dennis, Florian Quinkert, Joel Frank, Christian Ropke, and Thorsten Holz. "SDN-Guard: Protecting SDN controllers against SDN rootkits." In 2017 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN). IEEE, 2017. http://dx.doi.org/10.1109/nfv-sdn.2017.8169856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yakasai, Sadiq T., and Chris G. Guy. "FlowIdentity: Software-defined network access control." In 2015 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN). IEEE, 2015. http://dx.doi.org/10.1109/nfv-sdn.2015.7387415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdallah, Sarah, Ayman Kayssi, Imad H. Elhajj, and Ali Chehab. "Network convergence in SDN versus OSPF networks." In 2018 Fifth International Conference on Software Defined Systems (SDS). IEEE, 2018. http://dx.doi.org/10.1109/sds.2018.8370434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karmakar, Kallol Krishna, Vijay Varadharajan, and Udaya Tupakula. "Mitigating attacks in Software Defined Network (SDN)." In 2017 Fourth International Conference on Software Defined Systems (SDS). IEEE, 2017. http://dx.doi.org/10.1109/sds.2017.7939150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van Adrichem, Niels L. M., Farabi Iqbal, and Fernando A. Kuipers. "Backup rules in Software-Defined Networks." In 2016 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN). IEEE, 2016. http://dx.doi.org/10.1109/nfv-sdn.2016.7919495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Thomas, Joon-Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia. "Enabling SDN applications on Software-Defined Infrastructure." In NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2014. http://dx.doi.org/10.1109/noms.2014.6838226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Woesner, Hagen, and David Verbeiren. "SDN and NFV in telecommunication network migration." In 2015 European Workshop on Software Defined Networks (EWSDN). IEEE, 2015. http://dx.doi.org/10.1109/ewsdn.2015.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shome, Prithviraj, Muxi Yan, Sayedjalil Modares Najafabad, Nicholas Mastronarde, and Alex Sprintson. "CrossFlow: A cross-layer architecture for SDR using SDN principles." In 2015 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN). IEEE, 2015. http://dx.doi.org/10.1109/nfv-sdn.2015.7387403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ulema, Mehmet, Nirant Amogh, Raouf Boutaba, Cagatay Buyukkoc, Alex Clemm, Jiang Linda Xie, Mehmet C. Vuran, Antonio Manzalini, and Roberto Saracco. "IEEE Software Defined Network Initiative." In 2013 IEEE SDN for Future Networks and Services (SDN4FNS). IEEE, 2013. http://dx.doi.org/10.1109/sdn4fns.2013.6702543.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SOFTWARE DEFINED NETWORK (SDN)"

1

Denazis, S., J. Hadi Salim, D. Meyer, and O. Koufopavlou. Software-Defined Networking (SDN): Layers and Architecture Terminology. Edited by E. Haleplidis and K. Pentikousis. RFC Editor, January 2015. http://dx.doi.org/10.17487/rfc7426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Terminology for Benchmarking Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Benchmarking Methodology for Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marin-Lopez, R., G. Lopez-Millan, and F. Pereniguez-Garcia. A YANG Data Model for IPsec Flow Protection Based on Software-Defined Networking (SDN). RFC Editor, July 2021. http://dx.doi.org/10.17487/rfc9061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography