SlideShare a Scribd company logo
Presentation by:-
Ankita Vinod Mandekar (13MIT0108)
1st year MTech IT(Networking),
School of Information Technology and Engineering,
VIT University
Guided by:-
Dr. Krishna Chandramouli
Associate Professor,
Division of Enterprise and Cloud Computing,
School of Information Technology and Engineering,
VIT University
VIT,Vellore
Outline:
1. Traditional Network
2. Centralized network
3. Architecture
4. Software Defined Testbed Cloud
5. Network Virtualization Tunnelling Protocol
6. Conclusion
7. References
router
router
server
172.16.68.1
tracert vit.ac.in
115.248.50.1
218.100.48.152
182.19.48.240
Traditional Network
• Distributed Routing
• High latency
• Reduced throughput
• Unmanageable Network
• Ossification of network
• Congestion
• Network Infrastructure
complexities
Controller
Network Devices
Distributed Network
Centralized Network
Architecture of Software Defined Network Test
Bed
Components of SDT
1. SDT Cloud
2. Client Network
1. SDT Cloud
1. 1 Domain Name Server
• Domain “sdt.sdntestbed.com”
• The Domain Controller and DNS is
on the Host_SDT_1
• Active Directory Domain System
Menu Bar of Server Manger
with DNS, AD DS, Hyper-V on
Host_SDT_1
Online System on
the domain
sdt.sdntestbed.com
1.2 Hyper Visor
• Hyper-V is the software on the top of the operating
system of the server
• Software Based of Data link layer of Network
• In SDT cloud, on
Host_SDT_1,Host_SDT_2,Host_SDT_5,Host_SDT_6.
Microsoft Windows 2012 R2
server Hyper Visor
Virtual
Machine
1.3 System Centre Virtual Machine Manager
VM_Client_1 VM_Client_2
SDT_Host_2
Cleint_1 VM Network
Client_2 VM Network
Customers Virtual
Machine on the
SDT cloud
Menu Bar SCVMM Showing the
topology of Virtual Machine
• Virtual Machine Manager
• Centralize the Cloud Network
• View Network Topology-
Maintenance
• Management
• Security
• Resource Management
1.4 Open Flow Switch
• Separation of control plane from the
data plane
• Enabled with OpenFlow Protocol
with parameters:-
1. Header fields
2. Counters
3. Action
2. Client Network
• Two Client Network Client_1 and Client_2
• Internet Service Provider with Following IP provided to cloud and customers
Host IP addresses
ONF_SDT_2 131.107.0.1
Host_SDT_3 131.107.0.30
Host_SDT_4 131.107.0.40
Host_SDT_5 131.107.0.2
Host_SDT_6 131.107.0.5
Methodology Used
1. Software Defined Network
• Centralizes the Cloud Network
• Flow based Forwarding using Open Flow Enabled Network Devices
• SCVMM Controller Manages, Maintains the Private Network Topology
• Access Control Plugin on Controller
2. Network Virtualization Generic Routing Encapsulation
• Virtual Private Network
• Virtualization GRE tunnelling protocol
• Unique Virtual Subnet ID
• Unique Client ID
• Encapsulation at source
• Original Packet retrieval at Destination
Results
Software Defined Network
• Centralized Network on the
Single host Host_SDT_2 in
SDT cloud
• Secure from Single point
• Flow based Forwarding
using OpenFlow Protocol
• Manageable Virtual
Machine hosted in the
cloud
Virtual Private Network with NVGRE tunnelling protocol
• Successful reachable from Clients private
Network to the Virtual Machine hosted on SDT
Cloud
• Ping to the expected Virtual Machine
• Unique Client ID for Client identity
• Unique Subnet ID for the Private IP of Clients
Private Network
Conclusion
1. Centralized programmable device SCVMM Controller manages, monitor the physical as
well as virtual systems in the cloud.
2. The OpenFlow enabled Switch have flow table with attributes as matches, ingress port,
and decision flow. The traffic from same source and destination follows same topology.
Thus, the flow based forwarding increasing throughput.
3. Using this technology, the proper distribution of bandwidth is made to provide the
uniform and fast access to virtual Operating System located on the server.
4. Operating System Virtualization results in less infrastructure requirement which is cost
effective.
5. The NVGRE tunnelling protocol provides secure and specific reachability to the
destination on virtual network of cloud.
References
1. In Open Network Foundation: OpenFlow Switch Specification version 1.3.1 (wire
protocol) September 2012.
[https://www.opennetworking.org/images/stories/downloads/sdn-
resources/onf-specifications/openflow/openflow-spec-v1.3.1.pdf]
2. Enterasys Secure Network: Software Defined Network (SDN) in the Enterprise”,
June 2013.
[http://www.npgusa.com/images/Enterasys_Software_Defined_Networks.pdf]
3. Oren Laadan, Jason Nieh, “Operating System Virtualization: Practice and Experience,
May 2010.
[http://www.cs.columbia.edu/~orenl/papers/systor2010_osvirt.pdf]
4. Oren Laadan, Jason Nieh Test Lab Guide: “Windows Server 2012 R2Hyper-V Network
Virtualization with System
Center 2012 R2 VMM Operating System Virtualization: Practice and Experience.
[http://www.systemcentercentral.com/test-lab-guide-windows-server-2012-r2-hyper-
v-network-virtualization-with-system-center-2012-r2-vmm-2/]
5. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling
Innovation in Campus Network” , December 2008.
[http://archive.openflow.org/documents/openflow-wp-latest.pdf]
Software Defined Network Implementation and Virtual Private Network Using NVGRE

More Related Content

What's hot

Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Shumon Huque
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
Sahil Bajaj
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
kavidhapr
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
swathi78
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET Journal
 
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Frederico Martins Pedroso Junior
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IAESIJEECS
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
Will Shen
 
Ppt 1
Ppt 1Ppt 1

What's hot (11)

Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Similar to Software Defined Network Implementation and Virtual Private Network Using NVGRE

Finalpresentation
FinalpresentationFinalpresentation
Finalpresentation
Ankita Mandekar
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
Aboo Thahir
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
Rick G. Garibay
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
GVNSK Sravya
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
RahulJain989779
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
SKS
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
IzoT platform presentation
IzoT platform presentationIzoT platform presentation
IzoT platform presentation
Echelon Corporation
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Abed Matini
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptx
DixonSunny2
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
Parth Akbari
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
NEEVEE Technologies
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
Nisha Qazi
 
2.pdf
2.pdf2.pdf
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
ULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
ULLPTT
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
Yadvendra bedi
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
DrFaridaAshrafAli
 

Similar to Software Defined Network Implementation and Virtual Private Network Using NVGRE (20)

Finalpresentation
FinalpresentationFinalpresentation
Finalpresentation
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
IzoT platform presentation
IzoT platform presentationIzoT platform presentation
IzoT platform presentation
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptx
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
2.pdf
2.pdf2.pdf
2.pdf
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
 

Recently uploaded

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 

Recently uploaded (20)

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 

Software Defined Network Implementation and Virtual Private Network Using NVGRE

  • 1. Presentation by:- Ankita Vinod Mandekar (13MIT0108) 1st year MTech IT(Networking), School of Information Technology and Engineering, VIT University Guided by:- Dr. Krishna Chandramouli Associate Professor, Division of Enterprise and Cloud Computing, School of Information Technology and Engineering, VIT University VIT,Vellore
  • 2. Outline: 1. Traditional Network 2. Centralized network 3. Architecture 4. Software Defined Testbed Cloud 5. Network Virtualization Tunnelling Protocol 6. Conclusion 7. References
  • 3. router router server 172.16.68.1 tracert vit.ac.in 115.248.50.1 218.100.48.152 182.19.48.240 Traditional Network • Distributed Routing • High latency • Reduced throughput • Unmanageable Network • Ossification of network • Congestion • Network Infrastructure complexities
  • 5. Architecture of Software Defined Network Test Bed
  • 6. Components of SDT 1. SDT Cloud 2. Client Network
  • 7. 1. SDT Cloud 1. 1 Domain Name Server • Domain “sdt.sdntestbed.com” • The Domain Controller and DNS is on the Host_SDT_1 • Active Directory Domain System Menu Bar of Server Manger with DNS, AD DS, Hyper-V on Host_SDT_1 Online System on the domain sdt.sdntestbed.com
  • 8. 1.2 Hyper Visor • Hyper-V is the software on the top of the operating system of the server • Software Based of Data link layer of Network • In SDT cloud, on Host_SDT_1,Host_SDT_2,Host_SDT_5,Host_SDT_6. Microsoft Windows 2012 R2 server Hyper Visor Virtual Machine
  • 9. 1.3 System Centre Virtual Machine Manager VM_Client_1 VM_Client_2 SDT_Host_2 Cleint_1 VM Network Client_2 VM Network Customers Virtual Machine on the SDT cloud Menu Bar SCVMM Showing the topology of Virtual Machine • Virtual Machine Manager • Centralize the Cloud Network • View Network Topology- Maintenance • Management • Security • Resource Management
  • 10. 1.4 Open Flow Switch • Separation of control plane from the data plane • Enabled with OpenFlow Protocol with parameters:- 1. Header fields 2. Counters 3. Action
  • 11. 2. Client Network • Two Client Network Client_1 and Client_2 • Internet Service Provider with Following IP provided to cloud and customers Host IP addresses ONF_SDT_2 131.107.0.1 Host_SDT_3 131.107.0.30 Host_SDT_4 131.107.0.40 Host_SDT_5 131.107.0.2 Host_SDT_6 131.107.0.5
  • 12. Methodology Used 1. Software Defined Network • Centralizes the Cloud Network • Flow based Forwarding using Open Flow Enabled Network Devices • SCVMM Controller Manages, Maintains the Private Network Topology • Access Control Plugin on Controller
  • 13. 2. Network Virtualization Generic Routing Encapsulation • Virtual Private Network • Virtualization GRE tunnelling protocol • Unique Virtual Subnet ID • Unique Client ID • Encapsulation at source • Original Packet retrieval at Destination
  • 14. Results Software Defined Network • Centralized Network on the Single host Host_SDT_2 in SDT cloud • Secure from Single point • Flow based Forwarding using OpenFlow Protocol • Manageable Virtual Machine hosted in the cloud
  • 15. Virtual Private Network with NVGRE tunnelling protocol • Successful reachable from Clients private Network to the Virtual Machine hosted on SDT Cloud • Ping to the expected Virtual Machine • Unique Client ID for Client identity • Unique Subnet ID for the Private IP of Clients Private Network
  • 16. Conclusion 1. Centralized programmable device SCVMM Controller manages, monitor the physical as well as virtual systems in the cloud. 2. The OpenFlow enabled Switch have flow table with attributes as matches, ingress port, and decision flow. The traffic from same source and destination follows same topology. Thus, the flow based forwarding increasing throughput. 3. Using this technology, the proper distribution of bandwidth is made to provide the uniform and fast access to virtual Operating System located on the server. 4. Operating System Virtualization results in less infrastructure requirement which is cost effective. 5. The NVGRE tunnelling protocol provides secure and specific reachability to the destination on virtual network of cloud.
  • 17. References 1. In Open Network Foundation: OpenFlow Switch Specification version 1.3.1 (wire protocol) September 2012. [https://www.opennetworking.org/images/stories/downloads/sdn- resources/onf-specifications/openflow/openflow-spec-v1.3.1.pdf] 2. Enterasys Secure Network: Software Defined Network (SDN) in the Enterprise”, June 2013. [http://www.npgusa.com/images/Enterasys_Software_Defined_Networks.pdf] 3. Oren Laadan, Jason Nieh, “Operating System Virtualization: Practice and Experience, May 2010. [http://www.cs.columbia.edu/~orenl/papers/systor2010_osvirt.pdf] 4. Oren Laadan, Jason Nieh Test Lab Guide: “Windows Server 2012 R2Hyper-V Network Virtualization with System Center 2012 R2 VMM Operating System Virtualization: Practice and Experience. [http://www.systemcentercentral.com/test-lab-guide-windows-server-2012-r2-hyper- v-network-virtualization-with-system-center-2012-r2-vmm-2/] 5. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling Innovation in Campus Network” , December 2008. [http://archive.openflow.org/documents/openflow-wp-latest.pdf]