SlideShare a Scribd company logo
1 of 32
Basic Packet-Switching Terminology
Wide area network (WAN)
A wide area network (WAN) is a network that covers a
broad geographical area, usually larger than a single
metropolitan area.
Local area network (LAN)
• A local area network (LAN) is a network that covers a limited
geographical area usually not more than a few thousand square
meters in area.
• Electrical or Optical connection between network devices.
Metropolitan area network (MAN)
• A metropolitan area network (MAN) is a network that fills the gap
between LANs and WANs.
• This term came into use because LANs and WANs were originally
distinguished not only by their geographical areas of coverage but
also by the transmission technologies and speeds that they used.
• With the advent of technologies resembling LANs in terms of speed
and access control, but with the capability of serving a large portion of
a city, the term MAN came into use to distinguish these networks as a
new entity distinct from large LANs and small WANs.
Physical layer
• The physical layer is the lowest layer of the seven-layer
Open Systems Interconnection model of computer
networking .
• It consists of the basic hardware transmission technology
to move bits of data on a network.
Data link layer
• mechanisms to detect sequencing errors or bit errors that
may occur during transmission
• some mechanism of flow control between the sender and
receiver across that network segment
• a multiplexing ability that allows multiple network
protocols to use the same communications medium.
This is the layer that provides the capability to
transfer data from one device to another on a single
network segment
Medium access control
• Media Access Control (MAC) is the part of the data link layer that
controls when a shared medium may be accessed and provides addressing
in the case that multiple receivers will receive the data, yet only one
should process it.
• The MAC layer is part of the data link layer.
Network layer
• The network layer provides the functions and processes that allow data to
be transmitted from sender to receiver across multiple intermediate
networks. To transit each intermediate network involves the data link
layer.
• The network layer is responsible for stitching together those discrete
processes such that the data correctly makes its way from the sender to the
intended receiver.
PORT
• A port is a connection to a single communications medium, including
the set of data link layer and physical layer mechanisms necessary to
correctly transmit and received at a overthat link.
• This link may be of any feasible media type.
Frame
• A frame is the unit of data
transferred over a layer two
network
Packet
• A packet is the unit of data
transferred over a layer three
network.
• Sometimes this term is used more
generally to refer to the units of
data transferred over either a layer
two network(frames) as well,
without distinguishing between
layers two and three.
• When the distinction is important,
a packet is always the payload of a
frame.
• A MAC address is a unique value that globally identifies a piece of networking
equipment. Though these addresses are globally unique, they serve as layer two
addresses, identifying a device on a layer two network topology.
• An IP address is anominally unique value assigned to each host in a computer
network that uses the Internet Protocol for layer three addressing.
• An IPv4 address is an IP address that is a 32-bit integer value conforming to the
rules of Internet Protocol Version 4. This 32-bit integer is frequently represented in
dotted notation, with each of the 4 bytes comprising the address represented by a
decimal number from 0 to 255, separated by periods (e.g., 192.168.1.2).
• An IPv6 address is an IP address that is a128-bit integer conforming to the rules of
Internet Protocol Version 6, introducing a much larger address space than IPv4.
Circuit switch
• A circuit switch is a switch where by
contextual information specifying
where to forward the data belonging
to a circuit (i.e., a connection) is
maintained in the switch for a
prescribed duration, which may span
lapses of time when no data
belonging to that connection is being
processed.
• This context is established either by
configuration or by some call setup or
connection setup procedure specific
to the type of circuit switch.
Packet switch
• A packet switch is a switch
whereby the data comprising the
communication between two or
more entities is treated as
individual packets that each make
their way independently through
the network toward the
destination.
• Packet switches may be of the
connection-oriented or
connectionless type.
connection-oriented model
• In the connection-oriented
model, data transits a network
where there is some context
information residing in each
intermediate switch that allows
the switch to forward the data
toward its destination.
• The circuit switch described
above is a good example of the
connection-oriented paradigm..
connectionless model
• In the connectionless model,
data transits a network and
there is sufficient data in each
packet such that each
intermediate switch can forward
the data toward its destination
without any a priori context
having been established about
that data
ROUTER
• A router is a packet switch used to separate subnets.
• A subnet is a network consisting of a set of hosts that share the same network
prefix.
• A network prefix consists of the most significant bits of the IP address.
• The prefix may be of varying lengths. Usually all of the hosts on a subnet reside
on the same LAN.
• The term router is now often used interchangeably with layer three switch.
• A home wireless access point typically combines the functionality of WiFi, layer
two switch and router into a singlebox.
FLOOD:
To flood a packet is to transmit it on all ports of as witch except
for the port on which it was received.
PACKET:
To broadcast a packet is the same as flooding it.
LINE RATE
• Line rate refers to the bandwidth of the communications medium
connected to a port on a switch.
• On modern switches this bandwidth is normally measured in
megabits per second (Mbps) or gigabits per second (Gbps).
• When we say that a switch handles packets at line rate, this means it
is capable of handling a continuous stream of packets arriving on that
port at that bandwidth.
DATA PLANE
• The data plane consists of the various ports that are used for the reception and
transmission of packets and a forwarding table with its associated logic.
• The data plane assumes responsibility for packet buffering, packet scheduling,
header modification and forwarding.
• If an arriving data packet’s header information is found in the forwarding table
it may be subject to some header field modifications and then will be forwarded
without any intervention of the other two planes.
• Not all packets can be handled in that way, sometimes simply because their
information is not yet entered into the table, or because they belong to a control
protocol that must be processed by the control plane
CONTROL PLANE
• The control plane is involved in many activities.
• Its principal role is to keep current the information in the forwarding table so that the
data plane can independently handle as high a percentage of the traffic as possible.
• The control plane is responsible for processing a number of different control
protocols that may affect the forwarding table, depending on the configuration and
type of switch.
• These control protocols are jointly responsible for managing the active topology of
the network.
OPEN FLOW(2008)
• The controller populates the switch with flow table entries.
• The switch evaluates incoming packets and finds a matching
flow, then performs the associated action.
• If no match is found, the switch forwards the packet to the
controller for instructions on how to deal with the packet.
• Typically the controller will update the switch with new flow
entries as new packet patterns are received, so that the switch can
deal with them locally.
• It is also possible that the controller will program wildcard rules
that will govern many flows at once.
Data centers
• East-West traffic is composed of packets sent by one host in a data
center to another host in that same data center.
• 80% of the traffic in data centers will be East-West traffic
• North-South traffic is traffic entering (leaving) the data center
from(to) the outside world
DENIAL OF SERVICE
DATA OFFLOADING
• Data offloading, is the use of complementary network technologies
for delivering data originally targeted for cellular networks.
• Offloading reduces the amount of data being carried on the cellular
bands, freeing bandwidth for other users.
• It is also used in situations where local cell reception may be poor,
allowing the user to connect via wired services with better
connectivity.
VIRTUAL MACHINE MIGIRATION
• When one physical host gets overloaded, it may be required to dynamically
transfer certain amount of its load to another machine with minimal
interruption to the users.
• This process of moving a virtual machine from one physical host to another
is termed as migration
DISTRIBUTED DENIAL OF SERVICE
Spoofing Attacks
Spoofing attacks are kind of attacks in which attacker
uses the identity of a legitimate user to inject fake
packets and malicious applications into the network
Different approaches for energy saving
through SDN implementation
SDN in WAN
• The usage of SDN in WAN gained significant attention with Google
deploying it for managing their data centers.
• Google employed traffic engineering schemes and were able to get benefits
such as fault tolerance, active link utilization up to 100% promoting energy
efficiency .
SDN IN CELLULAR NETWORKS
• SDN in Cellular Networks offers centralized control for cost-effective solutions for
reducing Capital expenditures (CAPEX) and operating expenses (OPEX) of the
cellular network.
• Combination of cellular networking technologies and SDN can offer high data rate
and better QoS to the users .
• switching between different wireless technologies to provide better connectivity
and coverage .
• Failure recovery, availability, dependability and security can be improved in
cellular system
SDN FOR WIFI NETWORK
• SDN for Wi-Fi Network effectively guarantees airtime shares to
network slices using a Time Division Multiple Access (TDMA) like
airtime scheduling .
• SDN provides the flexibility for the deployment of Wi-Fi
infrastructure in the rural areas where the traditional networks are
hard to deploy and manage
SDN IN TRAFFIC MANAGEMENT
• SDN can be used for efficient traffic management to improve the overall
network performance and resource utilization, and reduce the energy
consumption of the network.
• Upgrading in traditional networks is not only associated with a cost of replacing
the entire network but also involves the chance of losing important information.
• SDN is capable of upgrading the data-centers without loosing the information,
changing the overall work flow in the network and degrading the overall
performance

More Related Content

What's hot

switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5hz3012
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolShweta Sharma
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocolsRama Raman
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networksNt Arvind
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Message switched
Message switchedMessage switched
Message switchedHawkarOsman
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 

What's hot (20)

switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Internet introduction
Internet introductionInternet introduction
Internet introduction
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Chap 03
Chap 03Chap 03
Chap 03
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Routing
RoutingRouting
Routing
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
11 circuit-packet
11 circuit-packet11 circuit-packet
11 circuit-packet
 
Message switched
Message switchedMessage switched
Message switched
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 

Similar to SOFTWARE DEFINED NETWORKING

new_Networking 27-10-2023.pptx for leaning netwoeking
new_Networking 27-10-2023.pptx for leaning netwoekingnew_Networking 27-10-2023.pptx for leaning netwoeking
new_Networking 27-10-2023.pptx for leaning netwoekingdomaron20
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingAashif Raza
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptAmanyaLaban
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxsameernsn1
 
Computer network
Computer networkComputer network
Computer networkSimran Kaur
 

Similar to SOFTWARE DEFINED NETWORKING (20)

new_Networking 27-10-2023.pptx for leaning netwoeking
new_Networking 27-10-2023.pptx for leaning netwoekingnew_Networking 27-10-2023.pptx for leaning netwoeking
new_Networking 27-10-2023.pptx for leaning netwoeking
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Switch networking
Switch networking Switch networking
Switch networking
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
chapter 5.2.pptx
chapter 5.2.pptxchapter 5.2.pptx
chapter 5.2.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.ppt
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Network devices
Network devicesNetwork devices
Network devices
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Lan wan
Lan wanLan wan
Lan wan
 
Computer network
Computer networkComputer network
Computer network
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

SOFTWARE DEFINED NETWORKING

  • 2. Wide area network (WAN) A wide area network (WAN) is a network that covers a broad geographical area, usually larger than a single metropolitan area.
  • 3. Local area network (LAN) • A local area network (LAN) is a network that covers a limited geographical area usually not more than a few thousand square meters in area. • Electrical or Optical connection between network devices.
  • 4. Metropolitan area network (MAN) • A metropolitan area network (MAN) is a network that fills the gap between LANs and WANs. • This term came into use because LANs and WANs were originally distinguished not only by their geographical areas of coverage but also by the transmission technologies and speeds that they used. • With the advent of technologies resembling LANs in terms of speed and access control, but with the capability of serving a large portion of a city, the term MAN came into use to distinguish these networks as a new entity distinct from large LANs and small WANs.
  • 5. Physical layer • The physical layer is the lowest layer of the seven-layer Open Systems Interconnection model of computer networking . • It consists of the basic hardware transmission technology to move bits of data on a network.
  • 6. Data link layer • mechanisms to detect sequencing errors or bit errors that may occur during transmission • some mechanism of flow control between the sender and receiver across that network segment • a multiplexing ability that allows multiple network protocols to use the same communications medium. This is the layer that provides the capability to transfer data from one device to another on a single network segment
  • 7. Medium access control • Media Access Control (MAC) is the part of the data link layer that controls when a shared medium may be accessed and provides addressing in the case that multiple receivers will receive the data, yet only one should process it. • The MAC layer is part of the data link layer.
  • 8. Network layer • The network layer provides the functions and processes that allow data to be transmitted from sender to receiver across multiple intermediate networks. To transit each intermediate network involves the data link layer. • The network layer is responsible for stitching together those discrete processes such that the data correctly makes its way from the sender to the intended receiver.
  • 9. PORT • A port is a connection to a single communications medium, including the set of data link layer and physical layer mechanisms necessary to correctly transmit and received at a overthat link. • This link may be of any feasible media type.
  • 10. Frame • A frame is the unit of data transferred over a layer two network Packet • A packet is the unit of data transferred over a layer three network. • Sometimes this term is used more generally to refer to the units of data transferred over either a layer two network(frames) as well, without distinguishing between layers two and three. • When the distinction is important, a packet is always the payload of a frame.
  • 11. • A MAC address is a unique value that globally identifies a piece of networking equipment. Though these addresses are globally unique, they serve as layer two addresses, identifying a device on a layer two network topology. • An IP address is anominally unique value assigned to each host in a computer network that uses the Internet Protocol for layer three addressing. • An IPv4 address is an IP address that is a 32-bit integer value conforming to the rules of Internet Protocol Version 4. This 32-bit integer is frequently represented in dotted notation, with each of the 4 bytes comprising the address represented by a decimal number from 0 to 255, separated by periods (e.g., 192.168.1.2). • An IPv6 address is an IP address that is a128-bit integer conforming to the rules of Internet Protocol Version 6, introducing a much larger address space than IPv4.
  • 12. Circuit switch • A circuit switch is a switch where by contextual information specifying where to forward the data belonging to a circuit (i.e., a connection) is maintained in the switch for a prescribed duration, which may span lapses of time when no data belonging to that connection is being processed. • This context is established either by configuration or by some call setup or connection setup procedure specific to the type of circuit switch. Packet switch • A packet switch is a switch whereby the data comprising the communication between two or more entities is treated as individual packets that each make their way independently through the network toward the destination. • Packet switches may be of the connection-oriented or connectionless type.
  • 13. connection-oriented model • In the connection-oriented model, data transits a network where there is some context information residing in each intermediate switch that allows the switch to forward the data toward its destination. • The circuit switch described above is a good example of the connection-oriented paradigm.. connectionless model • In the connectionless model, data transits a network and there is sufficient data in each packet such that each intermediate switch can forward the data toward its destination without any a priori context having been established about that data
  • 14. ROUTER • A router is a packet switch used to separate subnets. • A subnet is a network consisting of a set of hosts that share the same network prefix. • A network prefix consists of the most significant bits of the IP address. • The prefix may be of varying lengths. Usually all of the hosts on a subnet reside on the same LAN. • The term router is now often used interchangeably with layer three switch. • A home wireless access point typically combines the functionality of WiFi, layer two switch and router into a singlebox.
  • 15. FLOOD: To flood a packet is to transmit it on all ports of as witch except for the port on which it was received. PACKET: To broadcast a packet is the same as flooding it.
  • 16. LINE RATE • Line rate refers to the bandwidth of the communications medium connected to a port on a switch. • On modern switches this bandwidth is normally measured in megabits per second (Mbps) or gigabits per second (Gbps). • When we say that a switch handles packets at line rate, this means it is capable of handling a continuous stream of packets arriving on that port at that bandwidth.
  • 17. DATA PLANE • The data plane consists of the various ports that are used for the reception and transmission of packets and a forwarding table with its associated logic. • The data plane assumes responsibility for packet buffering, packet scheduling, header modification and forwarding. • If an arriving data packet’s header information is found in the forwarding table it may be subject to some header field modifications and then will be forwarded without any intervention of the other two planes. • Not all packets can be handled in that way, sometimes simply because their information is not yet entered into the table, or because they belong to a control protocol that must be processed by the control plane
  • 18. CONTROL PLANE • The control plane is involved in many activities. • Its principal role is to keep current the information in the forwarding table so that the data plane can independently handle as high a percentage of the traffic as possible. • The control plane is responsible for processing a number of different control protocols that may affect the forwarding table, depending on the configuration and type of switch. • These control protocols are jointly responsible for managing the active topology of the network.
  • 19. OPEN FLOW(2008) • The controller populates the switch with flow table entries. • The switch evaluates incoming packets and finds a matching flow, then performs the associated action. • If no match is found, the switch forwards the packet to the controller for instructions on how to deal with the packet. • Typically the controller will update the switch with new flow entries as new packet patterns are received, so that the switch can deal with them locally. • It is also possible that the controller will program wildcard rules that will govern many flows at once.
  • 20. Data centers • East-West traffic is composed of packets sent by one host in a data center to another host in that same data center. • 80% of the traffic in data centers will be East-West traffic • North-South traffic is traffic entering (leaving) the data center from(to) the outside world
  • 22. DATA OFFLOADING • Data offloading, is the use of complementary network technologies for delivering data originally targeted for cellular networks. • Offloading reduces the amount of data being carried on the cellular bands, freeing bandwidth for other users. • It is also used in situations where local cell reception may be poor, allowing the user to connect via wired services with better connectivity.
  • 23. VIRTUAL MACHINE MIGIRATION • When one physical host gets overloaded, it may be required to dynamically transfer certain amount of its load to another machine with minimal interruption to the users. • This process of moving a virtual machine from one physical host to another is termed as migration
  • 25.
  • 26. Spoofing Attacks Spoofing attacks are kind of attacks in which attacker uses the identity of a legitimate user to inject fake packets and malicious applications into the network
  • 27.
  • 28. Different approaches for energy saving through SDN implementation
  • 29. SDN in WAN • The usage of SDN in WAN gained significant attention with Google deploying it for managing their data centers. • Google employed traffic engineering schemes and were able to get benefits such as fault tolerance, active link utilization up to 100% promoting energy efficiency .
  • 30. SDN IN CELLULAR NETWORKS • SDN in Cellular Networks offers centralized control for cost-effective solutions for reducing Capital expenditures (CAPEX) and operating expenses (OPEX) of the cellular network. • Combination of cellular networking technologies and SDN can offer high data rate and better QoS to the users . • switching between different wireless technologies to provide better connectivity and coverage . • Failure recovery, availability, dependability and security can be improved in cellular system
  • 31. SDN FOR WIFI NETWORK • SDN for Wi-Fi Network effectively guarantees airtime shares to network slices using a Time Division Multiple Access (TDMA) like airtime scheduling . • SDN provides the flexibility for the deployment of Wi-Fi infrastructure in the rural areas where the traditional networks are hard to deploy and manage
  • 32. SDN IN TRAFFIC MANAGEMENT • SDN can be used for efficient traffic management to improve the overall network performance and resource utilization, and reduce the energy consumption of the network. • Upgrading in traditional networks is not only associated with a cost of replacing the entire network but also involves the chance of losing important information. • SDN is capable of upgrading the data-centers without loosing the information, changing the overall work flow in the network and degrading the overall performance