SlideShare a Scribd company logo
SOFTWARE DEFINED
NETWORKING(SDN)
PRESENTED BY
RUKESH K
2023614034
Router
1
Router
3
Router
2
Traditional Routing
-
Internet Service Provider
Each Router Consist of Data and Control Plane. Data Plane is used to
forward the packets and control plane is used for decision making. In every
Router it will choose the path and decision making.
Traditional Network
Software Defined Networking(SDN)
• In SDN there is only one Centralised administrator or control plane.All
communications based on control plane.
• SDN can improve data flows, minimize network bandwidth, and boost
latency. It can also improve network agility and flexibility.
• SDN separates a single physical network into multiple virtual networks that
share the same network infrastructure.
• This logical separation splits networks into customizable slices, enabling
operators to deliver services based on each customer's needs.
Networking module:
• Data plane(I/O module ):responsible for forwarding of network traffic
and moving packets from one network device to another based on the
instruction provided by control plane.
• Control plane (brain of the module):responsible for making decision
about how traffic should be routed and managed.
• Management plane(monitor all devices):network monitering, bandwidth
utilization, customer billing.
Seperation of control and data layer
• In SDN ,command and controll are given by the controller(central
node)
• The centalized controller decides traffic routing and data
plane(forwarding plane) is used to forward the packets from payload
to destination-DECOUPLING
• SDN provides central view of efficient resource allocation and
keeping end to end eye on network
Features of SDN
• Makes networking & IP routing flexible
• Decoupling control &data plane
• Offloads brain to centralized controller
• Programmable network,centrally managed
Frame work of SDN
• SDN architecture typically comprises three layers: the application layer,
the control layer, and the infrastructure layer.
• These layers communicate using northbound and southbound application
programming interfaces (APIS).
• Open flow protocol is key to entire SDN topology
Frame work of SDN
• Southbound APIs (Application Programming Interfaces):Interfaces between the SDN
controller and network devices (routers, switches, etc.).
• Allows the controller to communicate and manage these devices, typically using protocols like
OpenFlow
• Infrastructure Layer:
– Data Plane (Forwarding Devices):
• Physical or virtual network devices (switches, routers, etc.) that forward traffic based
on instructions received from the SDN controller.
• These devices follow the rules and policies set by the controller.
• Northbound APIs:
– Interfaces between the SDN controller and the applications or systems in the application
layer.
– Allows SDN applications to communicate with the controller, enabling network
programmability and automation.
Control layer
• Centralized brain of the SDN architecture responsible for making decisions
about how data should flow through the network.
• Receives information from applications and translates it into network
policies.
• Enforces policies by instructing the data plane devices.
Application layer
• These are the software applications or services that utilize the SDN
controller's capabilities to manage the network. Examples include traffic
engineering, security applications, network monitoring, etc.
SDN OPERATION
SDN OPEARATION
• In this scenario, an SDN Controller (SDNC) is in charge of operating three
different OpenFlow Switches.
• Connected to OpenFlow Switch no. 1 are two information generators.
Generator A generates ‘production grade’ information (i.e. regular traffic)
whose destination is Consumer A, whereas Generator B is used for testing a
new protocol.
• In this example, when traffic from Generator B reaches Switch no. 1, the
Controller is contacted using the OpenFlow protocol.
• The controller, through preconfigured knowledge of the network topology,
is able to determine that the final destination for that kind of traffic should
be Consumer B, instead of Consumer A.
• The SDNC takes charge by sending a series of commands using OpenFlow.
• For Switch no. 1,The controller configures the switch via software to add a
virtual tag to all packets with origin at Generator B.
• For Switch no. 2, it instructs the switch to forward any packet with this
special tag arriving at port 12 to port 8, instead of the usual port 6.
SDN control for authentication
traffic redirection
• Here openflow is used to capture or inject 802.1X authentication messages
• Allowing the controller to act as a 802.1X authenticator and radius client,
in a user‐specific way.
• 802.1X – NETWORK AUTHENTICATION PROTOCOL
Remote Authentication Dial-In
User Service(Radius) Server
Request
Network function virtualization(NVF)
• Network Function Virtualization (NFV) refers to the virtualization of
network services traditionally performed by dedicated hardware appliances.
It aims to replace these specialized physical devices with software-based
virtual instances running on standard hardware infrastructure.
• NFV decouples network functions, such as firewalls, routers, load
balancers, and intrusion detection systems, from proprietary hardware.
Instead, these functions are implemented as software-based Network
Functions Virtual(NFV) that can run on general-purpose servers, switches,
or storage devices.
Network Function Virtualization
Network Function Virtualization
Physical resources layer:
• The operator leverages its underlying networking, processing and memory
resources
• In this layer, these resources appear as just raw aggregates of computational and
networking elements
• By using reservation interfaces, these resources can be requested, via a
virtualisation execution environment, and reserved onto the hardware
Virtual substrate layer:
• Able to employ a logic ordering on different hardware resources, made
available by the physical resources layer
Network Function Virtualization
• In this way, such resources can be logically aggregated into one or several
virtual machines (i.E. Composing a virtual type of computational element where
functions can be stored and operated) as well as virtual networks (i.E. Providing
the necessary structured connectivity for the virtualised machines, taking into
consideration different routing and business policies).
Virtualised function layer:
• Virtualised resources further provides a virtualisation interface, allowing
different virtualised functions to be deployed.
• As such, the core hardware provided by the operator can be virtualised into a
logical structure, both in terms of network and processing, into which different
services and functions can be virtualised.
THANK YOU

More Related Content

Similar to SDN & NFV.pptx

sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptx
AamirMaqsood8
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
Prof. Dr. Noman Islam
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
APNIC
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
Study materials for software defined networks
Study materials for software defined networksStudy materials for software defined networks
Study materials for software defined networks
tguna21
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
arihantelehyb
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
Pradeep Kumar TS
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
Aadarsh Sharma
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined Networking
APNIC
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Shreeya Shah
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
JonathanWallace46
 
SDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptx
Sandeep Maurya
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015
Deborah Porchivina
 
C2C communication
C2C communicationC2C communication
C2C communication
Soumya Ranjan Parida
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys Corporation
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
Kingston Smiler
 

Similar to SDN & NFV.pptx (20)

sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptx
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Study materials for software defined networks
Study materials for software defined networksStudy materials for software defined networks
Study materials for software defined networks
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined Networking
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
 
SDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptx
 
Sdn
SdnSdn
Sdn
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015
 
C2C communication
C2C communicationC2C communication
C2C communication
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

SDN & NFV.pptx

  • 2. Router 1 Router 3 Router 2 Traditional Routing - Internet Service Provider Each Router Consist of Data and Control Plane. Data Plane is used to forward the packets and control plane is used for decision making. In every Router it will choose the path and decision making.
  • 4. Software Defined Networking(SDN) • In SDN there is only one Centralised administrator or control plane.All communications based on control plane. • SDN can improve data flows, minimize network bandwidth, and boost latency. It can also improve network agility and flexibility. • SDN separates a single physical network into multiple virtual networks that share the same network infrastructure. • This logical separation splits networks into customizable slices, enabling operators to deliver services based on each customer's needs.
  • 5. Networking module: • Data plane(I/O module ):responsible for forwarding of network traffic and moving packets from one network device to another based on the instruction provided by control plane. • Control plane (brain of the module):responsible for making decision about how traffic should be routed and managed. • Management plane(monitor all devices):network monitering, bandwidth utilization, customer billing.
  • 6. Seperation of control and data layer • In SDN ,command and controll are given by the controller(central node) • The centalized controller decides traffic routing and data plane(forwarding plane) is used to forward the packets from payload to destination-DECOUPLING • SDN provides central view of efficient resource allocation and keeping end to end eye on network Features of SDN • Makes networking & IP routing flexible • Decoupling control &data plane • Offloads brain to centralized controller • Programmable network,centrally managed
  • 7. Frame work of SDN • SDN architecture typically comprises three layers: the application layer, the control layer, and the infrastructure layer. • These layers communicate using northbound and southbound application programming interfaces (APIS). • Open flow protocol is key to entire SDN topology
  • 8. Frame work of SDN • Southbound APIs (Application Programming Interfaces):Interfaces between the SDN controller and network devices (routers, switches, etc.). • Allows the controller to communicate and manage these devices, typically using protocols like OpenFlow • Infrastructure Layer: – Data Plane (Forwarding Devices): • Physical or virtual network devices (switches, routers, etc.) that forward traffic based on instructions received from the SDN controller. • These devices follow the rules and policies set by the controller. • Northbound APIs: – Interfaces between the SDN controller and the applications or systems in the application layer. – Allows SDN applications to communicate with the controller, enabling network programmability and automation.
  • 9. Control layer • Centralized brain of the SDN architecture responsible for making decisions about how data should flow through the network. • Receives information from applications and translates it into network policies. • Enforces policies by instructing the data plane devices. Application layer • These are the software applications or services that utilize the SDN controller's capabilities to manage the network. Examples include traffic engineering, security applications, network monitoring, etc.
  • 11. SDN OPEARATION • In this scenario, an SDN Controller (SDNC) is in charge of operating three different OpenFlow Switches. • Connected to OpenFlow Switch no. 1 are two information generators. Generator A generates ‘production grade’ information (i.e. regular traffic) whose destination is Consumer A, whereas Generator B is used for testing a new protocol. • In this example, when traffic from Generator B reaches Switch no. 1, the Controller is contacted using the OpenFlow protocol. • The controller, through preconfigured knowledge of the network topology, is able to determine that the final destination for that kind of traffic should be Consumer B, instead of Consumer A. • The SDNC takes charge by sending a series of commands using OpenFlow. • For Switch no. 1,The controller configures the switch via software to add a virtual tag to all packets with origin at Generator B. • For Switch no. 2, it instructs the switch to forward any packet with this special tag arriving at port 12 to port 8, instead of the usual port 6.
  • 12. SDN control for authentication traffic redirection • Here openflow is used to capture or inject 802.1X authentication messages • Allowing the controller to act as a 802.1X authenticator and radius client, in a user‐specific way. • 802.1X – NETWORK AUTHENTICATION PROTOCOL Remote Authentication Dial-In User Service(Radius) Server Request
  • 13. Network function virtualization(NVF) • Network Function Virtualization (NFV) refers to the virtualization of network services traditionally performed by dedicated hardware appliances. It aims to replace these specialized physical devices with software-based virtual instances running on standard hardware infrastructure. • NFV decouples network functions, such as firewalls, routers, load balancers, and intrusion detection systems, from proprietary hardware. Instead, these functions are implemented as software-based Network Functions Virtual(NFV) that can run on general-purpose servers, switches, or storage devices.
  • 15. Network Function Virtualization Physical resources layer: • The operator leverages its underlying networking, processing and memory resources • In this layer, these resources appear as just raw aggregates of computational and networking elements • By using reservation interfaces, these resources can be requested, via a virtualisation execution environment, and reserved onto the hardware Virtual substrate layer: • Able to employ a logic ordering on different hardware resources, made available by the physical resources layer
  • 16. Network Function Virtualization • In this way, such resources can be logically aggregated into one or several virtual machines (i.E. Composing a virtual type of computational element where functions can be stored and operated) as well as virtual networks (i.E. Providing the necessary structured connectivity for the virtualised machines, taking into consideration different routing and business policies). Virtualised function layer: • Virtualised resources further provides a virtualisation interface, allowing different virtualised functions to be deployed. • As such, the core hardware provided by the operator can be virtualised into a logical structure, both in terms of network and processing, into which different services and functions can be virtualised.