SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 475
Software Defined Network Based Internet on Thing Eco System For
Shopfloor
Avijit Deb Sarkar1
1TATA Consultancy Services & Saltlake Solution Architect
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Present day the manufacturing industries
are looking for solutions to achieve high availability (HA) and
secure platform for real-time data transfer process. The cost
efficient solution for this HA platform is Cloud Server. The
Software Defined Network (SDN) help cloud providers to
manage and program their network efficiently in flexible
manner. This type of network is agile andeasilyscalablebased
on business requirement. In advance manufacturing unit the
wireless sensors, actuators and mobile devices are integrated
with machines as IoT devices. Duetounstructureddataformat
the security implementation of IoT on SDN architecture is a
challenging task. In this article has proposed a secured
architecture for IoT devices in an SDN based network to
address HA, Security and Real-Time data transfer process.
Key Words: Software Define Network, Internet on Things,
Cloud Computing, Manufacturing Execution System.
1. INTRODUCTION
The next technological trends for manufacturing units are
IoT, Mobile Computation, Big Data, Social Media Integration.
This new computation techniques are leverage the
computational features of sensor nodes. In recent daysmost
of the sensors are connected with micro-computers. Those
sensor connected micro-computer nodes are capable of
transmitting data directly from machines to enterprise
databases. These inter-connected devices are transmitting
high definition multimedia, text files, audio, video etc. The
volume, velocity and verity [1] of data hasbeengeneratedby
the connected devices which requires high speed internet
connection with low power and secure computational
platform. Low power and efficient encryption methodology
is a primary consideration for security while data is being
transmitted across the devices. Additionally with the
development of latest Internet technology multiple Sensor
based devices are interfacing with other connected devices
and servers. The IoT devices exposedata ininsecuremanner
which leads to various potential threats.Anefficientsecurity
architecture has to be worked out in this paper for the IoT
platforms. In the conventional enterprise network different
security tools like Firewall, IntrusionDetectionSystem(IDS)
is deployed to increase the reliability of the entire network.
The new systems administration would be, the SDN offers
wide range of options to secure the system in a more
productive and adaptable way [2]. SDN architecture
separates the control plane from the data plane in the
network. In legacy network as per the built in instructions of
the switches, packets are moved to the same destination
along the same path. In SDN packet forwarding rules are
managed by the controller. This paper highlights the major
security challenges of IoT Devices and propose a secure
architecture for the IoT in the SDN platform.
2. SDN ARCHITECTURE
SDN architecture supports wide range of cloud
architectureandenablesscalable,automatedandon-demand
Information Technology (IT) Infrastructure platform. SDN
architecture defined based on open source software and
commodity hardware. In traditional network thecontroland
data plane elements are packaged together. In OpenFlow[3]
standard created in 2008, recognized as first SDN
architecture that separated the control plane and data plane
elements and they use OpenFlow protocol for
communication. The OpenFlow protocol is defined by Open
Network Foundation (ONF). However, there are other
standards and open-source organizations with SDN
resources, so OpenFlow is not the only protocol that makes
up SDN. The purpose of the SDN is to improve user
experience with minimum cost.
2.1 SDN Stacks
SDN make the network agile and flexible by separated the
control plane and data plane of the networking stack. The
working principle of SDN is to separation of responsibility.
The SDN Stack broadly divided into three different tires and
two types of interfaces:
a. Application
Encompasses solutions that focus on the expansion of
network services. These layer contain mainly software
applications that communicate with the controller.
b. Control Plane
Includes a logically-centralized SDN controller, which
maintains a global view of thenetwork. It also takes requests
through clearly defined APIs from application layer and
performs consolidated management and monitoring of
network devices via standard protocols.
c. Data Plane
Involves the physical networkequipment,includingEthernet
switches and routers. It provides programmatically
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 476
configurable and high performance hardware and software,
which is compliant with industry standards.
d. Northbound Interface and Southbound Interface
A northbound interfaces are used by a
particular network component to communicate with a
higher-level component, enable alarm notification,
performance report, configuration, security log, network
inventory details etc. Conversely, a southbound interface
allows a particular network component to communicateand
manage with a lower-level component.
Fig 1: SDN Architecture [4]
2.2 Pros and Cons of SDN
a. Advantages
The benefits of SDN is centralized network provisioning
capability. By abstracting the control plane and data plane
SDN can achieve more agility on provisioning virtual and
physical devices from central location. SDN controller
provides centralized security control as a result the security
policies are consistent across the enterprise. SDN controller
can run on low cost commodity hardware.
The IoT devices are the key driver for SDN. Given the
complexity and scale, it is really difficult to manage network
manually. SDN provides the cost-effective solutions to
manage the sensor network and the data on it. SDN
implementation help to optimize the bandwidth utilization
and maximize the efficiency of the applications and analytics
that use its data.
b. Disadvantages
In SDN the network device configuration is done using web
interface hosted in controller. The location of the controller
can be on premises or in physically distributed location. One
area of concern is the connection between the controller and
the communicated network devices. So all configuration
relatedcommunications arebased on HTTP or HTTPS.Ifthat
fails or becomes compromised, the entire network not only
lose the connectiontothecontrolleralsogoesdown.SDNalso
introduce new potential security called Distributed Denialof
Services (DDoSing).
2.3 Security Consideration of SDN
a. Single SDN Controller Approach
In single controller SDN environment the Denial of Service
(DoS) attack is a major threat. In this approach if the SDN
controller compromised by any attacker then they can take
full control over the network. Hence a single controller
environment has always a major risk for entire network.
Multiple controller approach is the solution for low risk and
enhance reliability to the network system.Inmulticontroller
environment for any failure of one controller, another
physically separated SDNcontrollercantakeoverthecontrol
to prevent the entire network failures.
b. Multiple SDN Controller Approach
It is observed that multiple controllers can
increase availability of the system.Thedefaultfeatureofhigh
availability(HA) is to make availableeitherofthetwosystem
if there is any failure happen. In practice it has observed that
multi controller SDN platform effects network performance.
In multi controller environment each controller has primary
responsibility to manage a particular network segment, so
controller has to compute the route to collaborate with each
other and exchange information which creates extra
computation overhead.
3. IoT Implementation in SDN
In present days most of the shopfloor machines are
connected with multiple sensors, PLC and OPCs are capable
to uploadand download machine data directlyfrommachine
to enterprise system. Hence thisIoTenablemachinesrequire
agile and cost effective network infrastructureandSDNisthe
solution for that. The IoT sensor nodes connects with each
other via IoT controller usingSDN capablenetworkasshown
in Fig 2. In this propose architecture the IoT controller is
responsible to establish the handshakingbetweenIoTsensor
nodes and enterprise system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 477
Fig 2: Connectivity of IoT in SDN Platform
a. IoT Sensor Node
It is responsible to sense, analyze and collect the information
from the machinesas production feedbackforbusinessusers
also downloads require data to machines based on response
generated from IoT controller. All the IoT Sensor Nodeneeds
to be registered in local IoT controller with the details like
Device Id, IP Address, Public Key, and Communication
Protocol.
b. IoT Controller Node
It takes the necessary decisionsbasedonthedataprovidedto
it by the IoT Sensor Nodes. These data are route to the Cloud
Servers using network devices via the SDN controller. IoT
controller receive the data from sensor nodeand processthe
same based on “IsProcessRequire” flag value. After
processing controller responsibilitytodecidethedestination
route of the data, if the processed data is require for other
connected devices then controller send theprocesseddatato
the intended devices else it transfer data to database hosted
in Cloud Server. The entirecommunicationismanagedbythe
SDN controller.
c. SDN Capable Heterogeneous Network
It has the responsibility to establish the communication path
between connected sensors and cloud server and
surrounding systems like Reporting System, SCM, and ERP
etc. Some of the surrounded systems responsible to display
production status in real-time based production feedback
received from IoT devices. InMESenvironmentdatavelocity,
verity, volume is always high because the sensor node
continuously sends data to enterprise system. The SDN
architecture is responsible to manage this high traffic
heterogeneous network environment. The SDN controller
also monitor the request and response data packets. It has
responsibility to manage the security protocols for IoT
network from different vulnerable attacks. In SDN platform
OpenFlow switches [4] contains the security policies for the
connected segment.
4. Proposed Security Framework
IoT network be made up of different resource constrained
sensor devices Android Mobile Phones, SoC board such as
Raspberry pi, Arduino, ATMeg32 based controller etc. Each
IoT devices are connected to local IoT Controller and it is
connected to cloud server via SDN. The entire IoT network is
segmented into multiple heterogeneous network. The local
IoT controller has enough computation capability resources.
The sensor node encrypt the data using its own private key
and send that to IoT Controller. The IoT controller is
responsible to process the data and forward to central
database to store and process further for enterprise use.
Whenever a new IoT based sensor node introduced then it
updates the details to controller similarly controller updates
that information to central server.Theflowchartisexplained
in Fig 3.
Fig 3: Flow Chart
5. DATA Structure for IoT Security Framework
In this proposed security framework RSA has been used for
data encryption. There are two sets of data structure has
designed to implement this security protocol.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 478
5.1 Data Structure for Controller Node
All connected IoT sensor node information will be stored in
“DeviceInforMaster” table. When a new node introduced in
the network then sensor node call REST service hosted in
controller and updateitsowndeviceinformation.Thecentral
server always scan this table for new information and based
on that its updates itself. IoTcontroller always executes ajob
in regular interval to read sensor data from device and save
that into “DeviceData” table. Also if that data contains target
machinedetails thencontrollerdecryptthatdataandencrypt
using controller private key and send to target device for
further processing.
Fig 4: DeviceInfoMaster Entity Details
Fig 5: DeviceData Entity Details
Fig 6: ControllerInfoMaster Entity Details
Fig 7: Data Structure of Key Management System in IoT
Controller
5.2 Data Structure for Sensor Node
Sensor node data structure consist of 4 tables one is for
controller information and remaining three for device
internal use. The controller table (“ControllerInfoDetails”) is
populated by sensor based on the exposed controller
information. REST protocol has used to expose the data.
Sensor node save the device id, device code, public key and
private key into local table “DeviceInfoLocal”. The operator
can map other device using REST based web service. The
mapping information kept in “DeviceMapping” table. All
sensor information saved into local table called“DeviceData”
and then send to controller for further processing. This table
automatically purge after 72 hours, however this schedule is
also configurable.
Fig 8: DeviceData Entity Details
Fig 9: ControllerInfoDetails Entity Description
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 479
Fig 10: DeviceInfoLocal Entity Description
Fig 11: Data Structure of Key Management System in IoT
Device
5.3 Key Management Logic & Application
The relationship among the Cloud Server, IoT Controller and
Sensor Node has been mentioned in section VII. This
architecture is platform and technology independent. The
Sensor Nodesare responsible to generate PrivateKey,Public
Key and Device Codefor the first timewhenever itconnected
to the network, similarly the IoT Controller is responsible to
generate Public Key for Data/Application Server and Sensor
Node.
The sensor node expose key and device code using REST
based web service.TheIoTcontrollernodeperiodicallycheck
the REST web service and insert the device code and public
key to “DeviceInfoMaster” table. Application administrator
can set change the frequency by which the key will be
updated by the sensor node. Using this functionality
application administrator can modify only public keyorboth
public and privatekey basedon securityneeds.MACAddress
has considered as unique DeviceId. The entire
communicationhasdonethroughRESTbasedwebservice,so
that all types of device can consume that data.
5.4 Data Transfer Mechanism
This paper has proposed push mechanism for data transfer
activity from sensor node to IoT controller node and pull
mechanism from IoT controller node to central server. The
relationship among the cloud server, IoT controller and
sensor node has been mentioned in section VII. The sensor
nodes always encrypts data using its own private key and
then controller public key. Once controller received the data
form sensor node it checks the target device filed and if that
field is blank then it decrypt the data usingitsprivatekeyand
then upload the encrypted data to central server hosted in
cloud. If the target device field non empty then it decrypt the
data using its own private key and then source sensor public
key and then perform required operation and finally before
send that data to destination sensor node again it encrypt
using its own private key and destination sensor public key
and then send. This implementation has been done in Steel
Manufacturing Industry for Material Transfer Module, Scrap
Weighing Module and Production Feedback Module. The
architecture in generic enough to implement in other
manufacturing industries.
Fig12: Architectural Diagram
In above Architectural Diagram (Fig 12) different units is
running in different network segment andeachsegmentsare
connecting among themselves via SDN. Each segment has its
own IoT controller which is connected to one or more IoT
sensor node. This design is platform and technology
independent.
6. Benefits and limitations
6.1 Benefits
a. This design is platform independent, so it can
implement with existing technology and no need to
change the technology platform.
b. The business continuity plan is addressed in this
design, for example if there is any failure in SDN
control plane or application plan then operationswill
not effect because IoT Controller is working as
abstraction betweenoperationsandexternal systems.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 480
c. All communicationsamongthesystemsareencrypted
based on asymmetric key encryption.
d. The push mechanism has been used to update the
sensor data in sensor node and IoT Controller Node.
This push mechanism is optimum solutions for
resource constrain systems.
e. Pull mechanism has beenusedinapplicationserverto
fetch data from IoT Controller node for further
processing at enterprise level.
6.2 Limitations
a. The proposed architecture may not match with old
legacy system because in practical scenario it is
identified that the few old systems are incompatible
to communicate with latest system.
b. Old PLC and Machine controllerswereusingtheSerial
port for upload and download machine data whereas
latest PLCs and OPC systems are using TCP/IP
protocol for the communication. So a separate data
extraction and transfer code is required to integrate
this architecture for oldlegacysystem.Sometimesitis
noticed that this extra layer increases the complicity
of the system which directly affect system
performance.
CONCLUSION
This paper I have proposed an architectureforMESplatform
for Steel Industry. This proposed architecture had been
implemented in client place and it is working as expected
without any glitch. Need to explore the scope and feasibility
to implement this architecture for other type of
manufacturing industries like car manufacturing, packet
manufacturing etc.
The major implementation challengeswastoimplementthis
system to upstream furnace area because that is most
hazardous environment. This implementation help client to
get return of investment within two months by reducing
human intervention at scrap weighing area.
ACKNOWLEDGEMENT
There have been many contributors for this to take shape
and I am thankful to each of them. I specifically would like to
thank my supervisors Mr. Sujan Das and Mr. Basudev
Acharya. The work has been partially implemented for one
of our customer’s manufacturing unit.
REFERENCES
[1] A Review Paper on Big Data and Hadoop :
http://www.ijsrp.org/research-paper-1014/ijsrp-
p34125.pdf
[2] Sood, Manu. ”Software defined networkArchitectures.”
Parallel, Distributed and Grid Computing (PDGC), 2014
International Conference on.IEEE, 2014.
[3] Openflow : https://www.opennetworking.org/sdn-
resources/openflow
[4] SDN Architecture Image
http://thenewstack.io/defining-software-defined-
networking-part-1/

More Related Content

What's hot

Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
 
Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system Mahesh Chandra Manav
 
What Every It Professional Should Know
What Every It Professional Should KnowWhat Every It Professional Should Know
What Every It Professional Should Knowdinobusalachi
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementVikram Nandini
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing ReviewIRJET Journal
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET Journal
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsReal-Time Innovations (RTI)
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edgeDESMOND YUEN
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareReal-Time Innovations (RTI)
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentConceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareSelena829218
 

What's hot (20)

Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
 
Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system Welcome new business year 2021 2022 with link vue system
Welcome new business year 2021 2022 with link vue system
 
What Every It Professional Should Know
What Every It Professional Should KnowWhat Every It Professional Should Know
What Every It Professional Should Know
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System Management
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
1678 1683
1678 16831678 1683
1678 1683
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edge
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentConceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 

Similar to Software Defined Network Based Internet on thing Eco System for Shopfloor

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfFernando Velez Varela
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...IRJET Journal
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesIRJET Journal
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...IRJET Journal
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingIRJET Journal
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pbIAESIJEECS
 

Similar to Software Defined Network Based Internet on thing Eco System for Shopfloor (20)

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
What is SDN.pdf
What is SDN.pdfWhat is SDN.pdf
What is SDN.pdf
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
 
1570272924-3
1570272924-31570272924-3
1570272924-3
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 

Software Defined Network Based Internet on thing Eco System for Shopfloor

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 475 Software Defined Network Based Internet on Thing Eco System For Shopfloor Avijit Deb Sarkar1 1TATA Consultancy Services & Saltlake Solution Architect ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Present day the manufacturing industries are looking for solutions to achieve high availability (HA) and secure platform for real-time data transfer process. The cost efficient solution for this HA platform is Cloud Server. The Software Defined Network (SDN) help cloud providers to manage and program their network efficiently in flexible manner. This type of network is agile andeasilyscalablebased on business requirement. In advance manufacturing unit the wireless sensors, actuators and mobile devices are integrated with machines as IoT devices. Duetounstructureddataformat the security implementation of IoT on SDN architecture is a challenging task. In this article has proposed a secured architecture for IoT devices in an SDN based network to address HA, Security and Real-Time data transfer process. Key Words: Software Define Network, Internet on Things, Cloud Computing, Manufacturing Execution System. 1. INTRODUCTION The next technological trends for manufacturing units are IoT, Mobile Computation, Big Data, Social Media Integration. This new computation techniques are leverage the computational features of sensor nodes. In recent daysmost of the sensors are connected with micro-computers. Those sensor connected micro-computer nodes are capable of transmitting data directly from machines to enterprise databases. These inter-connected devices are transmitting high definition multimedia, text files, audio, video etc. The volume, velocity and verity [1] of data hasbeengeneratedby the connected devices which requires high speed internet connection with low power and secure computational platform. Low power and efficient encryption methodology is a primary consideration for security while data is being transmitted across the devices. Additionally with the development of latest Internet technology multiple Sensor based devices are interfacing with other connected devices and servers. The IoT devices exposedata ininsecuremanner which leads to various potential threats.Anefficientsecurity architecture has to be worked out in this paper for the IoT platforms. In the conventional enterprise network different security tools like Firewall, IntrusionDetectionSystem(IDS) is deployed to increase the reliability of the entire network. The new systems administration would be, the SDN offers wide range of options to secure the system in a more productive and adaptable way [2]. SDN architecture separates the control plane from the data plane in the network. In legacy network as per the built in instructions of the switches, packets are moved to the same destination along the same path. In SDN packet forwarding rules are managed by the controller. This paper highlights the major security challenges of IoT Devices and propose a secure architecture for the IoT in the SDN platform. 2. SDN ARCHITECTURE SDN architecture supports wide range of cloud architectureandenablesscalable,automatedandon-demand Information Technology (IT) Infrastructure platform. SDN architecture defined based on open source software and commodity hardware. In traditional network thecontroland data plane elements are packaged together. In OpenFlow[3] standard created in 2008, recognized as first SDN architecture that separated the control plane and data plane elements and they use OpenFlow protocol for communication. The OpenFlow protocol is defined by Open Network Foundation (ONF). However, there are other standards and open-source organizations with SDN resources, so OpenFlow is not the only protocol that makes up SDN. The purpose of the SDN is to improve user experience with minimum cost. 2.1 SDN Stacks SDN make the network agile and flexible by separated the control plane and data plane of the networking stack. The working principle of SDN is to separation of responsibility. The SDN Stack broadly divided into three different tires and two types of interfaces: a. Application Encompasses solutions that focus on the expansion of network services. These layer contain mainly software applications that communicate with the controller. b. Control Plane Includes a logically-centralized SDN controller, which maintains a global view of thenetwork. It also takes requests through clearly defined APIs from application layer and performs consolidated management and monitoring of network devices via standard protocols. c. Data Plane Involves the physical networkequipment,includingEthernet switches and routers. It provides programmatically
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 476 configurable and high performance hardware and software, which is compliant with industry standards. d. Northbound Interface and Southbound Interface A northbound interfaces are used by a particular network component to communicate with a higher-level component, enable alarm notification, performance report, configuration, security log, network inventory details etc. Conversely, a southbound interface allows a particular network component to communicateand manage with a lower-level component. Fig 1: SDN Architecture [4] 2.2 Pros and Cons of SDN a. Advantages The benefits of SDN is centralized network provisioning capability. By abstracting the control plane and data plane SDN can achieve more agility on provisioning virtual and physical devices from central location. SDN controller provides centralized security control as a result the security policies are consistent across the enterprise. SDN controller can run on low cost commodity hardware. The IoT devices are the key driver for SDN. Given the complexity and scale, it is really difficult to manage network manually. SDN provides the cost-effective solutions to manage the sensor network and the data on it. SDN implementation help to optimize the bandwidth utilization and maximize the efficiency of the applications and analytics that use its data. b. Disadvantages In SDN the network device configuration is done using web interface hosted in controller. The location of the controller can be on premises or in physically distributed location. One area of concern is the connection between the controller and the communicated network devices. So all configuration relatedcommunications arebased on HTTP or HTTPS.Ifthat fails or becomes compromised, the entire network not only lose the connectiontothecontrolleralsogoesdown.SDNalso introduce new potential security called Distributed Denialof Services (DDoSing). 2.3 Security Consideration of SDN a. Single SDN Controller Approach In single controller SDN environment the Denial of Service (DoS) attack is a major threat. In this approach if the SDN controller compromised by any attacker then they can take full control over the network. Hence a single controller environment has always a major risk for entire network. Multiple controller approach is the solution for low risk and enhance reliability to the network system.Inmulticontroller environment for any failure of one controller, another physically separated SDNcontrollercantakeoverthecontrol to prevent the entire network failures. b. Multiple SDN Controller Approach It is observed that multiple controllers can increase availability of the system.Thedefaultfeatureofhigh availability(HA) is to make availableeitherofthetwosystem if there is any failure happen. In practice it has observed that multi controller SDN platform effects network performance. In multi controller environment each controller has primary responsibility to manage a particular network segment, so controller has to compute the route to collaborate with each other and exchange information which creates extra computation overhead. 3. IoT Implementation in SDN In present days most of the shopfloor machines are connected with multiple sensors, PLC and OPCs are capable to uploadand download machine data directlyfrommachine to enterprise system. Hence thisIoTenablemachinesrequire agile and cost effective network infrastructureandSDNisthe solution for that. The IoT sensor nodes connects with each other via IoT controller usingSDN capablenetworkasshown in Fig 2. In this propose architecture the IoT controller is responsible to establish the handshakingbetweenIoTsensor nodes and enterprise system.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 477 Fig 2: Connectivity of IoT in SDN Platform a. IoT Sensor Node It is responsible to sense, analyze and collect the information from the machinesas production feedbackforbusinessusers also downloads require data to machines based on response generated from IoT controller. All the IoT Sensor Nodeneeds to be registered in local IoT controller with the details like Device Id, IP Address, Public Key, and Communication Protocol. b. IoT Controller Node It takes the necessary decisionsbasedonthedataprovidedto it by the IoT Sensor Nodes. These data are route to the Cloud Servers using network devices via the SDN controller. IoT controller receive the data from sensor nodeand processthe same based on “IsProcessRequire” flag value. After processing controller responsibilitytodecidethedestination route of the data, if the processed data is require for other connected devices then controller send theprocesseddatato the intended devices else it transfer data to database hosted in Cloud Server. The entirecommunicationismanagedbythe SDN controller. c. SDN Capable Heterogeneous Network It has the responsibility to establish the communication path between connected sensors and cloud server and surrounding systems like Reporting System, SCM, and ERP etc. Some of the surrounded systems responsible to display production status in real-time based production feedback received from IoT devices. InMESenvironmentdatavelocity, verity, volume is always high because the sensor node continuously sends data to enterprise system. The SDN architecture is responsible to manage this high traffic heterogeneous network environment. The SDN controller also monitor the request and response data packets. It has responsibility to manage the security protocols for IoT network from different vulnerable attacks. In SDN platform OpenFlow switches [4] contains the security policies for the connected segment. 4. Proposed Security Framework IoT network be made up of different resource constrained sensor devices Android Mobile Phones, SoC board such as Raspberry pi, Arduino, ATMeg32 based controller etc. Each IoT devices are connected to local IoT Controller and it is connected to cloud server via SDN. The entire IoT network is segmented into multiple heterogeneous network. The local IoT controller has enough computation capability resources. The sensor node encrypt the data using its own private key and send that to IoT Controller. The IoT controller is responsible to process the data and forward to central database to store and process further for enterprise use. Whenever a new IoT based sensor node introduced then it updates the details to controller similarly controller updates that information to central server.Theflowchartisexplained in Fig 3. Fig 3: Flow Chart 5. DATA Structure for IoT Security Framework In this proposed security framework RSA has been used for data encryption. There are two sets of data structure has designed to implement this security protocol.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 478 5.1 Data Structure for Controller Node All connected IoT sensor node information will be stored in “DeviceInforMaster” table. When a new node introduced in the network then sensor node call REST service hosted in controller and updateitsowndeviceinformation.Thecentral server always scan this table for new information and based on that its updates itself. IoTcontroller always executes ajob in regular interval to read sensor data from device and save that into “DeviceData” table. Also if that data contains target machinedetails thencontrollerdecryptthatdataandencrypt using controller private key and send to target device for further processing. Fig 4: DeviceInfoMaster Entity Details Fig 5: DeviceData Entity Details Fig 6: ControllerInfoMaster Entity Details Fig 7: Data Structure of Key Management System in IoT Controller 5.2 Data Structure for Sensor Node Sensor node data structure consist of 4 tables one is for controller information and remaining three for device internal use. The controller table (“ControllerInfoDetails”) is populated by sensor based on the exposed controller information. REST protocol has used to expose the data. Sensor node save the device id, device code, public key and private key into local table “DeviceInfoLocal”. The operator can map other device using REST based web service. The mapping information kept in “DeviceMapping” table. All sensor information saved into local table called“DeviceData” and then send to controller for further processing. This table automatically purge after 72 hours, however this schedule is also configurable. Fig 8: DeviceData Entity Details Fig 9: ControllerInfoDetails Entity Description
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 479 Fig 10: DeviceInfoLocal Entity Description Fig 11: Data Structure of Key Management System in IoT Device 5.3 Key Management Logic & Application The relationship among the Cloud Server, IoT Controller and Sensor Node has been mentioned in section VII. This architecture is platform and technology independent. The Sensor Nodesare responsible to generate PrivateKey,Public Key and Device Codefor the first timewhenever itconnected to the network, similarly the IoT Controller is responsible to generate Public Key for Data/Application Server and Sensor Node. The sensor node expose key and device code using REST based web service.TheIoTcontrollernodeperiodicallycheck the REST web service and insert the device code and public key to “DeviceInfoMaster” table. Application administrator can set change the frequency by which the key will be updated by the sensor node. Using this functionality application administrator can modify only public keyorboth public and privatekey basedon securityneeds.MACAddress has considered as unique DeviceId. The entire communicationhasdonethroughRESTbasedwebservice,so that all types of device can consume that data. 5.4 Data Transfer Mechanism This paper has proposed push mechanism for data transfer activity from sensor node to IoT controller node and pull mechanism from IoT controller node to central server. The relationship among the cloud server, IoT controller and sensor node has been mentioned in section VII. The sensor nodes always encrypts data using its own private key and then controller public key. Once controller received the data form sensor node it checks the target device filed and if that field is blank then it decrypt the data usingitsprivatekeyand then upload the encrypted data to central server hosted in cloud. If the target device field non empty then it decrypt the data using its own private key and then source sensor public key and then perform required operation and finally before send that data to destination sensor node again it encrypt using its own private key and destination sensor public key and then send. This implementation has been done in Steel Manufacturing Industry for Material Transfer Module, Scrap Weighing Module and Production Feedback Module. The architecture in generic enough to implement in other manufacturing industries. Fig12: Architectural Diagram In above Architectural Diagram (Fig 12) different units is running in different network segment andeachsegmentsare connecting among themselves via SDN. Each segment has its own IoT controller which is connected to one or more IoT sensor node. This design is platform and technology independent. 6. Benefits and limitations 6.1 Benefits a. This design is platform independent, so it can implement with existing technology and no need to change the technology platform. b. The business continuity plan is addressed in this design, for example if there is any failure in SDN control plane or application plan then operationswill not effect because IoT Controller is working as abstraction betweenoperationsandexternal systems.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 480 c. All communicationsamongthesystemsareencrypted based on asymmetric key encryption. d. The push mechanism has been used to update the sensor data in sensor node and IoT Controller Node. This push mechanism is optimum solutions for resource constrain systems. e. Pull mechanism has beenusedinapplicationserverto fetch data from IoT Controller node for further processing at enterprise level. 6.2 Limitations a. The proposed architecture may not match with old legacy system because in practical scenario it is identified that the few old systems are incompatible to communicate with latest system. b. Old PLC and Machine controllerswereusingtheSerial port for upload and download machine data whereas latest PLCs and OPC systems are using TCP/IP protocol for the communication. So a separate data extraction and transfer code is required to integrate this architecture for oldlegacysystem.Sometimesitis noticed that this extra layer increases the complicity of the system which directly affect system performance. CONCLUSION This paper I have proposed an architectureforMESplatform for Steel Industry. This proposed architecture had been implemented in client place and it is working as expected without any glitch. Need to explore the scope and feasibility to implement this architecture for other type of manufacturing industries like car manufacturing, packet manufacturing etc. The major implementation challengeswastoimplementthis system to upstream furnace area because that is most hazardous environment. This implementation help client to get return of investment within two months by reducing human intervention at scrap weighing area. ACKNOWLEDGEMENT There have been many contributors for this to take shape and I am thankful to each of them. I specifically would like to thank my supervisors Mr. Sujan Das and Mr. Basudev Acharya. The work has been partially implemented for one of our customer’s manufacturing unit. REFERENCES [1] A Review Paper on Big Data and Hadoop : http://www.ijsrp.org/research-paper-1014/ijsrp- p34125.pdf [2] Sood, Manu. ”Software defined networkArchitectures.” Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on.IEEE, 2014. [3] Openflow : https://www.opennetworking.org/sdn- resources/openflow [4] SDN Architecture Image http://thenewstack.io/defining-software-defined- networking-part-1/