SlideShare a Scribd company logo
1 of 17
SOFTWARE DEFINED
NETWORKING(SDN)
PRESENTED BY
RUKESH K
2023614034
Router
1
Router
3
Router
2
Traditional Routing
-
Internet Service Provider
Each Router Consist of Data and Control Plane. Data Plane is used to
forward the packets and control plane is used for decision making. In every
Router it will choose the path and decision making.
Traditional Network
Software Defined Networking(SDN)
• In SDN there is only one Centralised administrator or control plane.All
communications based on control plane.
• SDN can improve data flows, minimize network bandwidth, and boost
latency. It can also improve network agility and flexibility.
• SDN separates a single physical network into multiple virtual networks that
share the same network infrastructure.
• This logical separation splits networks into customizable slices, enabling
operators to deliver services based on each customer's needs.
Networking module:
• Data plane(I/O module ):responsible for forwarding of network traffic
and moving packets from one network device to another based on the
instruction provided by control plane.
• Control plane (brain of the module):responsible for making decision
about how traffic should be routed and managed.
• Management plane(monitor all devices):network monitering, bandwidth
utilization, customer billing.
Seperation of control and data layer
• In SDN ,command and controll are given by the controller(central
node)
• The centalized controller decides traffic routing and data
plane(forwarding plane) is used to forward the packets from payload
to destination-DECOUPLING
• SDN provides central view of efficient resource allocation and
keeping end to end eye on network
Features of SDN
• Makes networking & IP routing flexible
• Decoupling control &data plane
• Offloads brain to centralized controller
• Programmable network,centrally managed
Frame work of SDN
• SDN architecture typically comprises three layers: the application layer,
the control layer, and the infrastructure layer.
• These layers communicate using northbound and southbound application
programming interfaces (APIS).
• Open flow protocol is key to entire SDN topology
Frame work of SDN
• Southbound APIs (Application Programming Interfaces):Interfaces between the SDN
controller and network devices (routers, switches, etc.).
• Allows the controller to communicate and manage these devices, typically using protocols like
OpenFlow
• Infrastructure Layer:
– Data Plane (Forwarding Devices):
• Physical or virtual network devices (switches, routers, etc.) that forward traffic based
on instructions received from the SDN controller.
• These devices follow the rules and policies set by the controller.
• Northbound APIs:
– Interfaces between the SDN controller and the applications or systems in the application
layer.
– Allows SDN applications to communicate with the controller, enabling network
programmability and automation.
Control layer
• Centralized brain of the SDN architecture responsible for making decisions
about how data should flow through the network.
• Receives information from applications and translates it into network
policies.
• Enforces policies by instructing the data plane devices.
Application layer
• These are the software applications or services that utilize the SDN
controller's capabilities to manage the network. Examples include traffic
engineering, security applications, network monitoring, etc.
SDN OPERATION
SDN OPEARATION
• In this scenario, an SDN Controller (SDNC) is in charge of operating three
different OpenFlow Switches.
• Connected to OpenFlow Switch no. 1 are two information generators.
Generator A generates ‘production grade’ information (i.e. regular traffic)
whose destination is Consumer A, whereas Generator B is used for testing a
new protocol.
• In this example, when traffic from Generator B reaches Switch no. 1, the
Controller is contacted using the OpenFlow protocol.
• The controller, through preconfigured knowledge of the network topology,
is able to determine that the final destination for that kind of traffic should
be Consumer B, instead of Consumer A.
• The SDNC takes charge by sending a series of commands using OpenFlow.
• For Switch no. 1,The controller configures the switch via software to add a
virtual tag to all packets with origin at Generator B.
• For Switch no. 2, it instructs the switch to forward any packet with this
special tag arriving at port 12 to port 8, instead of the usual port 6.
SDN control for authentication
traffic redirection
• Here openflow is used to capture or inject 802.1X authentication messages
• Allowing the controller to act as a 802.1X authenticator and radius client,
in a user‐specific way.
• 802.1X – NETWORK AUTHENTICATION PROTOCOL
Remote Authentication Dial-In
User Service(Radius) Server
Request
Network function virtualization(NVF)
• Network Function Virtualization (NFV) refers to the virtualization of
network services traditionally performed by dedicated hardware appliances.
It aims to replace these specialized physical devices with software-based
virtual instances running on standard hardware infrastructure.
• NFV decouples network functions, such as firewalls, routers, load
balancers, and intrusion detection systems, from proprietary hardware.
Instead, these functions are implemented as software-based Network
Functions Virtual(NFV) that can run on general-purpose servers, switches,
or storage devices.
Network Function Virtualization
Network Function Virtualization
Physical resources layer:
• The operator leverages its underlying networking, processing and memory
resources
• In this layer, these resources appear as just raw aggregates of computational and
networking elements
• By using reservation interfaces, these resources can be requested, via a
virtualisation execution environment, and reserved onto the hardware
Virtual substrate layer:
• Able to employ a logic ordering on different hardware resources, made
available by the physical resources layer
Network Function Virtualization
• In this way, such resources can be logically aggregated into one or several
virtual machines (i.E. Composing a virtual type of computational element where
functions can be stored and operated) as well as virtual networks (i.E. Providing
the necessary structured connectivity for the virtualised machines, taking into
consideration different routing and business policies).
Virtualised function layer:
• Virtualised resources further provides a virtualisation interface, allowing
different virtualised functions to be deployed.
• As such, the core hardware provided by the operator can be virtualised into a
logical structure, both in terms of network and processing, into which different
services and functions can be virtualised.
THANK YOU

More Related Content

Similar to SDN & NFV.pptx

sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxAamirMaqsood8
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...APNIC
 
Study materials for software defined networks
Study materials for software defined networksStudy materials for software defined networks
Study materials for software defined networkstguna21
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfarihantelehyb
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)Pradeep Kumar TS
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDNAadarsh Sharma
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingAPNIC
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stallingJonathanWallace46
 
SDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSandeep Maurya
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Deborah Porchivina
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys Corporation
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & EcosystemKingston Smiler
 

Similar to SDN & NFV.pptx (20)

sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptx
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Study materials for software defined networks
Study materials for software defined networksStudy materials for software defined networks
Study materials for software defined networks
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined Networking
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
 
SDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptx
 
Sdn
SdnSdn
Sdn
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015
 
C2C communication
C2C communicationC2C communication
C2C communication
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

SDN & NFV.pptx

  • 2. Router 1 Router 3 Router 2 Traditional Routing - Internet Service Provider Each Router Consist of Data and Control Plane. Data Plane is used to forward the packets and control plane is used for decision making. In every Router it will choose the path and decision making.
  • 4. Software Defined Networking(SDN) • In SDN there is only one Centralised administrator or control plane.All communications based on control plane. • SDN can improve data flows, minimize network bandwidth, and boost latency. It can also improve network agility and flexibility. • SDN separates a single physical network into multiple virtual networks that share the same network infrastructure. • This logical separation splits networks into customizable slices, enabling operators to deliver services based on each customer's needs.
  • 5. Networking module: • Data plane(I/O module ):responsible for forwarding of network traffic and moving packets from one network device to another based on the instruction provided by control plane. • Control plane (brain of the module):responsible for making decision about how traffic should be routed and managed. • Management plane(monitor all devices):network monitering, bandwidth utilization, customer billing.
  • 6. Seperation of control and data layer • In SDN ,command and controll are given by the controller(central node) • The centalized controller decides traffic routing and data plane(forwarding plane) is used to forward the packets from payload to destination-DECOUPLING • SDN provides central view of efficient resource allocation and keeping end to end eye on network Features of SDN • Makes networking & IP routing flexible • Decoupling control &data plane • Offloads brain to centralized controller • Programmable network,centrally managed
  • 7. Frame work of SDN • SDN architecture typically comprises three layers: the application layer, the control layer, and the infrastructure layer. • These layers communicate using northbound and southbound application programming interfaces (APIS). • Open flow protocol is key to entire SDN topology
  • 8. Frame work of SDN • Southbound APIs (Application Programming Interfaces):Interfaces between the SDN controller and network devices (routers, switches, etc.). • Allows the controller to communicate and manage these devices, typically using protocols like OpenFlow • Infrastructure Layer: – Data Plane (Forwarding Devices): • Physical or virtual network devices (switches, routers, etc.) that forward traffic based on instructions received from the SDN controller. • These devices follow the rules and policies set by the controller. • Northbound APIs: – Interfaces between the SDN controller and the applications or systems in the application layer. – Allows SDN applications to communicate with the controller, enabling network programmability and automation.
  • 9. Control layer • Centralized brain of the SDN architecture responsible for making decisions about how data should flow through the network. • Receives information from applications and translates it into network policies. • Enforces policies by instructing the data plane devices. Application layer • These are the software applications or services that utilize the SDN controller's capabilities to manage the network. Examples include traffic engineering, security applications, network monitoring, etc.
  • 11. SDN OPEARATION • In this scenario, an SDN Controller (SDNC) is in charge of operating three different OpenFlow Switches. • Connected to OpenFlow Switch no. 1 are two information generators. Generator A generates ‘production grade’ information (i.e. regular traffic) whose destination is Consumer A, whereas Generator B is used for testing a new protocol. • In this example, when traffic from Generator B reaches Switch no. 1, the Controller is contacted using the OpenFlow protocol. • The controller, through preconfigured knowledge of the network topology, is able to determine that the final destination for that kind of traffic should be Consumer B, instead of Consumer A. • The SDNC takes charge by sending a series of commands using OpenFlow. • For Switch no. 1,The controller configures the switch via software to add a virtual tag to all packets with origin at Generator B. • For Switch no. 2, it instructs the switch to forward any packet with this special tag arriving at port 12 to port 8, instead of the usual port 6.
  • 12. SDN control for authentication traffic redirection • Here openflow is used to capture or inject 802.1X authentication messages • Allowing the controller to act as a 802.1X authenticator and radius client, in a user‐specific way. • 802.1X – NETWORK AUTHENTICATION PROTOCOL Remote Authentication Dial-In User Service(Radius) Server Request
  • 13. Network function virtualization(NVF) • Network Function Virtualization (NFV) refers to the virtualization of network services traditionally performed by dedicated hardware appliances. It aims to replace these specialized physical devices with software-based virtual instances running on standard hardware infrastructure. • NFV decouples network functions, such as firewalls, routers, load balancers, and intrusion detection systems, from proprietary hardware. Instead, these functions are implemented as software-based Network Functions Virtual(NFV) that can run on general-purpose servers, switches, or storage devices.
  • 15. Network Function Virtualization Physical resources layer: • The operator leverages its underlying networking, processing and memory resources • In this layer, these resources appear as just raw aggregates of computational and networking elements • By using reservation interfaces, these resources can be requested, via a virtualisation execution environment, and reserved onto the hardware Virtual substrate layer: • Able to employ a logic ordering on different hardware resources, made available by the physical resources layer
  • 16. Network Function Virtualization • In this way, such resources can be logically aggregated into one or several virtual machines (i.E. Composing a virtual type of computational element where functions can be stored and operated) as well as virtual networks (i.E. Providing the necessary structured connectivity for the virtualised machines, taking into consideration different routing and business policies). Virtualised function layer: • Virtualised resources further provides a virtualisation interface, allowing different virtualised functions to be deployed. • As such, the core hardware provided by the operator can be virtualised into a logical structure, both in terms of network and processing, into which different services and functions can be virtualised.