SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3175
Web-Based User Interface for the Floodlight SDN
Controller
Hakan Akcay
Department of Computer Engineering, Istanbul University, Istanbul
Email: hknakcay@gmail.com
Derya Yiltas-Kaplan
Department of Computer Engineering, Istanbul University, Istanbul
Email : deryayiltas@gmail.com
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
Software Defined Networking (SDN) was born as a solution for next-generation network design. Due to its flexible
architecture, SDN promises to make network devices simpler while giving better centralized control ability over
network and improving parameters such as flexibility, resilience, reliability, and security. In this paper, we briefly
introduce the SDN architecture and the Floodlight Controller that is one of the popular SDN controllers. We build
a web-based user interface for the Floodlight Controller by using REST API. This application is the first program
in the Floodlight SDN Controller literature to view the controller upon several properties such as device
connections and flow tables.
Keywords – Floodlight Controller, OpenFlow, Programmable Networks, SDN Web, Software-Defined Network.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 14, 2017 Date of Acceptance: March 22, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
INTRODUCTION
The increase in the number of devices connected to the
Internet, makes it very difficult to control the network.
Problems such as configuration errors, lack of capacity of
routing tables, security leaks are more common than ever
before. Controlling the network by an administrator has
become highly complex because of the inflexible behavior
of the network components from switches and routers to
firewalls, network address translators, load balancers, and
intrusion detection systems.
In this context, Software Defined Networking (SDN) is
a new way to design and manage networks [1]. SDN is a
network programming framework that allows developers
to program the network services with making it more
intelligence and enhancing the performance of the network
[1]. SDN is an agile, simple to implement and not costly
architecture that decouples the data level from the control
level [2].
SDN is being contributed by many prominent vendors
like Cisco, Google, HP, Big Switch Networks, etc. [1].
The rest of this paper organized as follows: Section 2
introduces traditional networks. Section 3 describes SDN
in more detail. Section 4 is about Floodlight Controller
and finally Section 5 presents the conclusions.
1. TRADITIONAL NETWORKS
In the traditional networks, all network elements are
defined by OSI (Open Systems Interconnection) model.
This model has 7 layers that can have multiple protocols
individually [3]. Each layer operates depending on its own
lower layer and serves the upper layer. There are simple
network devices on the lower layers of the OSI model
while more complicated devices work on the upper layers.
Therefore, operating the devices on the upper layers is
more complicated than that on lower layers [3]. Switches
are layer 2 elements and also the simplest devices in
present networks. Routers are more complex, because they
manage network traffic based on the forwarding decisions
with using the routing tables which are constructed
manually.
According to the traditional network approach, most of
the network functionalities are implemented in a dedicated
manner such as configuration of routers and switches,
delivery of network applications using a hardware such as
ASIC (Application Specific Integrated Circuit) [4]. Data
flow is managed by routers and switches by using certain
protocols.
We represent a traditional network architecture in Fig.1
by including the data, control, and management planes
together.
Fig. 1. Traditional network management
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3176
The limitations of the traditional networks are
becoming more important. In addition, they are not agile,
slow to implement and takes too long to market [2].
In the traditional network approach, network
administrators typically configure individual network
devices by using the vendor based configuration
interfaces. Network operators are responsible for
configuring policies and implement many complex
protocols to a wide range of network applications [5].
They have to apply these high-level policies into low-level
configuration commands manually to configure network
elements. They have very limited tools to perform these
complex tasks [5].
However, internet applications and services become
more complex and difficult to control day by day [5]. The
idea of “Programmable Networks” emerged to facilitate
network evolution. In particular, SDN is a new network
design that promises to simplify network management and
enable network innovation and evolution [5].
2. SOFTWARE-DEFINED NETWORKING
SDN is changing the way of design and management of
the networks. SDN is a result of long work to make
computer networks more programmable and flexible [6].
SDN has two important characteristics. First, SDN
separates the control plane and the data plane of the
network elements. Second, SDN centralizes the control
plane with a single software called SDN Controller that
manages the entire network and its components, such as
OpenFlow switches, routers, and other middleboxes, via
Application Programming Interfaces (API) [6]. An SDN
Controller uses a protocol called OpenFlow to control
switches and routers from the controller software. We
represent a simplified view of the SDN architecture in Fig.
2.
Fig. 2. Simplified view of the SDN architecture.
With the separation of control and data planes, network
components return to the simple forwarding devices and
the control of these elements is implemented in the
logically centralized controller software [7]. The SDN
Controller directly controls the forwarding elements via
well-defined APIs. The mostly used one of these APIs is
OpenFlow. An OpenFlow switch has one or more flow
table inside and each table consists of some flow rules.
Each rule of table matches a subset of the traffic actions
such as dropping, forwarding, and modifying. The
controller software has the ability of inserting, modifying,
and deleting the rules of a flow table of switch. Therefore,
an OpenFlow switch can be instructed by a controller and
behaves like a router, firewall or performs other roles like
load balancer [7].
2.1. SDN CONTROLLERS
SDN works on five fundamental traits: plane separation, a
simplified network device, centralized control, network
automation, and openness [8].
SDN Controllers fulfill the task of centralized control.
The Controller is the main component of the network
operation system (NOS) and the SDN networks.
Controllers take the responsibility of establishing every
flow in the network by modifying flow entries on the
network devices [9]. Controllers must perform
management of the network state and also the distribution
of this state. A controller may involve a database to store
information about network elements and the related
softwares. A Controller software must provide a modern,
commonly RESTful (Representational state transfer) API
to an external application [10]. The communication
between a controller and all network devices must be
provided via a secure TCP control session. Additionally, a
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3177
device and topology discovery mechanism and a service
management system must be provided.
3. FLOODLIGHT CONTROLLER
Floodlight is Java-based, open source and one of the most
popular SDN controllers supporting physical and virtual
OpenFlow compatible switches. It has a number of
packages denoted by org.openlow [8]. Floodlight is based
on Bacon controller from Standford University [10].
The Floodlight architecture is modular with including
device management module, topology module, learning
switch, load balancer, Web Graphical User Interface (Web
GUI) for web access, counter module for statistics.
Floodlight controller presents a RESTful API allowing
some applications to learn and get the state of the
controller and network [10]. It uses LLDP protocol to
discover network topology. Floodlight Provider module
called as core module, handles I/O from network devices
and turns incoming OpenFlow messages into Floodlight
events.
Floodlight controller uses event listeners for receive
notifications. Most important listeners are: SwitchListener,
DeviceListener, MessageListener.
SwitchListener is used to receive notifications
whenever a switch is connected or disconnected to the
internet or has a change in its port status. DeviceListener is
notified whenever a device (generally an end-user node)
has been added, removed, moved or has changed its IP
address or VLAN address [8].
MessageListener gets notifications whenever a packet
has been received by the controller. When a packet is
received, the application processes the packet and takes
the appropriate action [8].
Floodlight controller provides both reactive and
proactive applications: Java APIs for reactive and
RESTful APIs for proactive application style. Proactive
Floodlight applications can use the RESTful APIs to get
information about the network state. Floodlight RESTful
API uses the Restlet framework and includes a small web
server inside that allows external applications to
communicate with the SDN controller. Floodlight
Controller Structure is shown in Fig.3.
Fig. 3. Floodlight controller structure [11]
3.1. FLOODLIGHT REST API
In the early days of commercial Internet, setting
configuration parameters of devices has been possible only
using methods such as CLI, TL1, NETCONF, SNMP, TR-
069 [10]. These mechanisms are available now and have
been rarely used with SDN. But they are slow and difficult
to maintain [10]. Furthermore, they are not suitable for
today’s data centers because that the data centers are
required dynamic, frequent, and automated management
tasks.
In the last few years, newer methods have been
developed to make remote configuration changes on the
network devices. The most popular and common one is the
REST API. REST has been developed to make API calls
across networks and uses Hypertext Transfer Protocol
(HTTP) which is commonly used to pass the web traffic
[10]. They are simple and extensible and use a standard
TCP port and thus do not require any special configuration
to allow API calls to pass through firewalls [10]. SDN
Controller northbound API is shown in Fig. 4.
Fig. 4. SDN controller northbound API
The web-based REST mechanism is based on some
methods such as HTTP GET, PUT, POST, and DELETE.
It is very easy to make these REST calls secure by using
HTTPS (Secure HTTP) protocol instead of HTTP. The
Floodlight Web GUI is built on the REST API.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3178
3.2. FLOODLIGHT WEB GUI
In this section, we mention our Floodlight Web GUI in
detail. This GUI provides a way for users to view the
controller’s state information, to connect switches via
inter-switch links and the hosts to the network, to monitor
the flow tables of the switches and the network topology
[11]. Most of the statistics can be queried and displayed in
an easy-to-read and tabular fashion by using this web GUI.
Additionally, several modules of the Floodlight Controller
can be exposed to the end users via this web GUI. For
example, the Static Flow Pusher module has this GUI to
insert the flows easily [11].
We develop the Floodlight Web GUI’s home page as
the controller’s dashboard as in Fig. 5. Here, network
administrators can monitor the status, uptime, selected role
of the controller, connected switches count, connected
hosts count, and the links between the switches.
Also, the details about the controller’s memory
consumption, the storage tables, and all loaded modules
can be monitored. All of these parts of the GUI uses the
REST API calls of the Floodlight Controller.
Fig. 5. Home page of the controller
One of the most important module of the GUI is the
switches module that gives some detailed information of
the connected switches such as flow count, packet count,
buffer size, flow table count, vendor, hardware, and
software version (see Fig. 6). Additionally, the
administrators can change the role of a switch to Master,
Slave or Equal by using this module.
Fig. 6. Flow summary table of a switch
It is possible to add static flow entries to the flow table
of a switch (see Fig. 7) and to monitor the port table of this
switch.
Fig.7. Flow table of a switch
Web GUI presents a list of the hosts connected to the
network with the information of the MAC address of a
host, IPV4 address, IPV6 address, MAC address of the
connected switch, connected port of the switch, and last
seen time.
All links between the switches can be monitored via
GUI. Properties such as the direction of links, source
switch and its port, destination switch and its port, and
type of the link (internal, external) are the information
provided.
Floodlight controller comes with a firewall module. A
network administrator can change the status of the
firewall, can enable/disable the firewall and change subnet
mask of the firewall by using this module as in Fig. 8.
Also, new firewall rules can be added or deleted.
Fig. 8. Firewall module of GUI
While adding a firewall rule, the parameters that must
be provided are switch id, source port, source mac address,
destination mac address, source IP address, destination IP
address, protocol type (TCP, UDP or ICMP), priority, and
action (ALLOW, DENY) [11].
Floodlight contains an application that enforces Access
Control Lists (ACL) in a reactive way. It is a firewall
application that monitors Packet-in messages and then
pushes appropriate flow entries [11]. In a proactive way,
without being requested by the switch, the controller
enforces ACL rules to switches too. Thus, the controller
prevents additional delays [11].
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3179
Fig. 9 represents the record insertion to the ACL and
Table 1 gives the properties of an ACL rule.
Fig.9. Adding a record to the ACL
Table 1. Properties of an ACL rule
Key Value Notes
nw-
proto
string "TCP" or "UDP" or
"ICMP" (ignoring case)
src-ip IPv4
address[/mask]
Either src-ip or dst-ip
must be specified.
dst-ip IPv4
address[/mask]
Either src-ip or dst-ip
must be specified.
tp-dst number Valid when nw-proto ==
"TCP" or "UDP".
action string "DENY" or "ALLOW"
(ignoring case), set to
"DENY" if not specified.
Topology discovering module of the Floodlight uses
LLDP protocol. And GUI calls the related RESTful API
method of this module. Topology view of network is
based on DIRECT and TUNNEL links discovered based
on LLDP packets [11]. Our sample SDN topology built in
the GUI is represented in Fig. 10.
Fig.10. SDN topology view in the GUI
4. CONCLUSION
The traditional network architecture cannot fulfill today’s
network requirements efficiently and the popularity of
SDN is increasing day by day.
SDN is the new network paradigm and can be easily
implemented to the classical networks. The Floodlight
controller and GUI provide many useful tools and a
programmable network framework. SDN is just a new tool
for developing new applications to solve network-
management problems more easily. To support more
widely ranged network services, SDN applications would
require much more complex methods to analyze and
control the network traffic, and programmable hardware.
Before developing an SDN application, the developer
must decide between two general styles of SDN
applications: reactive or proactive. In case of the reactive
SDN applications, the output of the communication
between the switch and the controller is usually a new
flow entry in the switch’s flow table. Reactive applications
can program multiple switches parallelly. On the other
hand, the proactive SDN applications require less
communication from switch to controller. The proactive
SDN applications program switches connected to the
network with the flow entries that are appropriate to
control and manage the incoming traffic before it arrives at
the switch.
The reactive type is more useful when the connectivity
to the controller is lost but less additional latency is
provided with the proactive programming.
REFERENCES
[1] A. Shahid, J. Fiaidhi and S. Mohammed,
Implementing Innovative Routing Using Software
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290
3180
Defined Networking (SDN), International Journal
of Multimedia and Ubiquitous Engineering, 11(2),
2016, 159-172.
[2] G. Wiley, Software networks, virtualization, sdn, 5g
and security (Great Britain: ISTE Ltd and John
Wiley & Sons, 2015).
[3] K. Ahokas, Software-defined networking, Aalto
University CSE-E4430 Methods and Tools for
Network Systems, Finland, Autumn 2014.
[4] Pooja, M. Sood, SDN and Mininet: Some Basic
Concepts, Int. J. Advanced Networking and
Applications, 07(02), 2015, 2690-2693.
[5] B. A. A. Nunes, M. Mendonca, X. N. Nguyen, K.
Obraczka and T. Turletti, A Survey of Software-
Defined Networking: Past, Present, and Future of
Programmable Networks, IEEE Communications
Surveys & Tutorials, 16(3), 1617-1634.
[6] N. Feamster, J. Rexford, and E. Zegura, The road to
SDN: an intellectual history of programmable
networks, SIGCOMM Comput. Commun, 44(2),
2014, 87-98.
[7] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E.
Rothenberg, S. Azodolmolky and S. Uhlig,
Software-Defined Networking: A Comprehensive
Survey, in Proceedings of the IEEE, 103(1), 2015,
14-76.
[8] P. Göransson, C. Black, Software defined networks
(USA: Morgan Kaufmann, 2014).
[9] Y. Jarraya, T. Madi and M. Debbabi, A Survey and a
Layered Taxonomy of Software-Defined
Networking, IEEE Communications Surveys &
Tutorials, 16(4), 2014, 1955-1980.
[10] T. D. Nadeau, K. Gray, SDN: software defined
networks (USA: O’Reilly, 2013).
[11] R. Izard (administrator), H. Akcay (GUI developer),
(2017). Floodlight WEB GUI. [online]
Floodlight.atlassian.net. Available at:
https://floodlight.atlassian.net/wiki/spaces/floodlight
controller/pages/40403023/Web+GUI [Accessed 17
Mar. 2017].

More Related Content

What's hot

ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
Ken Ott
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
SolarWinds
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Ranjan K.M.
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
middleware
middlewaremiddleware
middleware
rajeswarimca
 
Industrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary PresentationIndustrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary Presentation
Panduit
 
Distributed system
Distributed systemDistributed system
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
saigandham1
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
Vishal Verma
 
CCNA Icnd110 s01l05
CCNA Icnd110 s01l05CCNA Icnd110 s01l05
CCNA Icnd110 s01l05
computerlenguyen
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET Journal
 
middleware in embedded systems
middleware in embedded systemsmiddleware in embedded systems
middleware in embedded systems
Akhil Kumar
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
Prof Ansari
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...
journalBEEI
 
Software defined network
Software defined networkSoftware defined network
Software defined network
Deeptiman Mallick
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
John Bernal
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
russelbanalnal
 
Windows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theWindows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of the
eSAT Publishing House
 
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Eswar Publications
 

What's hot (20)

ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
ABB Corporate Research: Overview of Wired Industrial Ethernet Switching Solut...
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
middleware
middlewaremiddleware
middleware
 
Industrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary PresentationIndustrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary Presentation
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
CCNA Icnd110 s01l05
CCNA Icnd110 s01l05CCNA Icnd110 s01l05
CCNA Icnd110 s01l05
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
middleware in embedded systems
middleware in embedded systemsmiddleware in embedded systems
middleware in embedded systems
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
 
Windows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theWindows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of the
 
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
 

Similar to Web-Based User Interface for the Floodlight SDN Controller

SDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsSDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic Concepts
Eswar Publications
 
journal of mathematics research
journal of mathematics researchjournal of mathematics research
journal of mathematics research
rikaseorika
 
journalism research paper
journalism research paperjournalism research paper
journalism research paper
rikaseorika
 
journal in research
journal in researchjournal in research
journal in research
rikaseorika
 
journal to publish research paper
journal to publish research paperjournal to publish research paper
journal to publish research paper
rikaseorika
 
research on journaling
research on journalingresearch on journaling
research on journaling
rikaseorika
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
IOSR Journals
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
TELKOMNIKA JOURNAL
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Shreeya Shah
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
IRJET Journal
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
University of Technology - Iraq
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
Aalok Shah
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
IJCNCJournal
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
IJCNCJournal
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDN
Vikas Shokeen
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
 
Security of software defined networks: evolution and challenges
Security of software defined networks: evolution and challengesSecurity of software defined networks: evolution and challenges
Security of software defined networks: evolution and challenges
International Journal of Reconfigurable and Embedded Systems
 
Software defined optical communication
Software defined optical communicationSoftware defined optical communication
Software defined optical communication
Ronak Vyas
 
Sdn Networking
Sdn NetworkingSdn Networking
Sdn Networking
Mhd Khaled Alhalai
 

Similar to Web-Based User Interface for the Floodlight SDN Controller (20)

SDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsSDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic Concepts
 
journal of mathematics research
journal of mathematics researchjournal of mathematics research
journal of mathematics research
 
journalism research paper
journalism research paperjournalism research paper
journalism research paper
 
journal in research
journal in researchjournal in research
journal in research
 
journal to publish research paper
journal to publish research paperjournal to publish research paper
journal to publish research paper
 
research on journaling
research on journalingresearch on journaling
research on journaling
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDN
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
Security of software defined networks: evolution and challenges
Security of software defined networks: evolution and challengesSecurity of software defined networks: evolution and challenges
Security of software defined networks: evolution and challenges
 
Software defined optical communication
Software defined optical communicationSoftware defined optical communication
Software defined optical communication
 
Sdn Networking
Sdn NetworkingSdn Networking
Sdn Networking
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Web-Based User Interface for the Floodlight SDN Controller

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3175 Web-Based User Interface for the Floodlight SDN Controller Hakan Akcay Department of Computer Engineering, Istanbul University, Istanbul Email: hknakcay@gmail.com Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, Istanbul Email : deryayiltas@gmail.com ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- Software Defined Networking (SDN) was born as a solution for next-generation network design. Due to its flexible architecture, SDN promises to make network devices simpler while giving better centralized control ability over network and improving parameters such as flexibility, resilience, reliability, and security. In this paper, we briefly introduce the SDN architecture and the Floodlight Controller that is one of the popular SDN controllers. We build a web-based user interface for the Floodlight Controller by using REST API. This application is the first program in the Floodlight SDN Controller literature to view the controller upon several properties such as device connections and flow tables. Keywords – Floodlight Controller, OpenFlow, Programmable Networks, SDN Web, Software-Defined Network. --------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: March 14, 2017 Date of Acceptance: March 22, 2017 --------------------------------------------------------------------------------------------------------------------------------------------------- INTRODUCTION The increase in the number of devices connected to the Internet, makes it very difficult to control the network. Problems such as configuration errors, lack of capacity of routing tables, security leaks are more common than ever before. Controlling the network by an administrator has become highly complex because of the inflexible behavior of the network components from switches and routers to firewalls, network address translators, load balancers, and intrusion detection systems. In this context, Software Defined Networking (SDN) is a new way to design and manage networks [1]. SDN is a network programming framework that allows developers to program the network services with making it more intelligence and enhancing the performance of the network [1]. SDN is an agile, simple to implement and not costly architecture that decouples the data level from the control level [2]. SDN is being contributed by many prominent vendors like Cisco, Google, HP, Big Switch Networks, etc. [1]. The rest of this paper organized as follows: Section 2 introduces traditional networks. Section 3 describes SDN in more detail. Section 4 is about Floodlight Controller and finally Section 5 presents the conclusions. 1. TRADITIONAL NETWORKS In the traditional networks, all network elements are defined by OSI (Open Systems Interconnection) model. This model has 7 layers that can have multiple protocols individually [3]. Each layer operates depending on its own lower layer and serves the upper layer. There are simple network devices on the lower layers of the OSI model while more complicated devices work on the upper layers. Therefore, operating the devices on the upper layers is more complicated than that on lower layers [3]. Switches are layer 2 elements and also the simplest devices in present networks. Routers are more complex, because they manage network traffic based on the forwarding decisions with using the routing tables which are constructed manually. According to the traditional network approach, most of the network functionalities are implemented in a dedicated manner such as configuration of routers and switches, delivery of network applications using a hardware such as ASIC (Application Specific Integrated Circuit) [4]. Data flow is managed by routers and switches by using certain protocols. We represent a traditional network architecture in Fig.1 by including the data, control, and management planes together. Fig. 1. Traditional network management
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3176 The limitations of the traditional networks are becoming more important. In addition, they are not agile, slow to implement and takes too long to market [2]. In the traditional network approach, network administrators typically configure individual network devices by using the vendor based configuration interfaces. Network operators are responsible for configuring policies and implement many complex protocols to a wide range of network applications [5]. They have to apply these high-level policies into low-level configuration commands manually to configure network elements. They have very limited tools to perform these complex tasks [5]. However, internet applications and services become more complex and difficult to control day by day [5]. The idea of “Programmable Networks” emerged to facilitate network evolution. In particular, SDN is a new network design that promises to simplify network management and enable network innovation and evolution [5]. 2. SOFTWARE-DEFINED NETWORKING SDN is changing the way of design and management of the networks. SDN is a result of long work to make computer networks more programmable and flexible [6]. SDN has two important characteristics. First, SDN separates the control plane and the data plane of the network elements. Second, SDN centralizes the control plane with a single software called SDN Controller that manages the entire network and its components, such as OpenFlow switches, routers, and other middleboxes, via Application Programming Interfaces (API) [6]. An SDN Controller uses a protocol called OpenFlow to control switches and routers from the controller software. We represent a simplified view of the SDN architecture in Fig. 2. Fig. 2. Simplified view of the SDN architecture. With the separation of control and data planes, network components return to the simple forwarding devices and the control of these elements is implemented in the logically centralized controller software [7]. The SDN Controller directly controls the forwarding elements via well-defined APIs. The mostly used one of these APIs is OpenFlow. An OpenFlow switch has one or more flow table inside and each table consists of some flow rules. Each rule of table matches a subset of the traffic actions such as dropping, forwarding, and modifying. The controller software has the ability of inserting, modifying, and deleting the rules of a flow table of switch. Therefore, an OpenFlow switch can be instructed by a controller and behaves like a router, firewall or performs other roles like load balancer [7]. 2.1. SDN CONTROLLERS SDN works on five fundamental traits: plane separation, a simplified network device, centralized control, network automation, and openness [8]. SDN Controllers fulfill the task of centralized control. The Controller is the main component of the network operation system (NOS) and the SDN networks. Controllers take the responsibility of establishing every flow in the network by modifying flow entries on the network devices [9]. Controllers must perform management of the network state and also the distribution of this state. A controller may involve a database to store information about network elements and the related softwares. A Controller software must provide a modern, commonly RESTful (Representational state transfer) API to an external application [10]. The communication between a controller and all network devices must be provided via a secure TCP control session. Additionally, a
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3177 device and topology discovery mechanism and a service management system must be provided. 3. FLOODLIGHT CONTROLLER Floodlight is Java-based, open source and one of the most popular SDN controllers supporting physical and virtual OpenFlow compatible switches. It has a number of packages denoted by org.openlow [8]. Floodlight is based on Bacon controller from Standford University [10]. The Floodlight architecture is modular with including device management module, topology module, learning switch, load balancer, Web Graphical User Interface (Web GUI) for web access, counter module for statistics. Floodlight controller presents a RESTful API allowing some applications to learn and get the state of the controller and network [10]. It uses LLDP protocol to discover network topology. Floodlight Provider module called as core module, handles I/O from network devices and turns incoming OpenFlow messages into Floodlight events. Floodlight controller uses event listeners for receive notifications. Most important listeners are: SwitchListener, DeviceListener, MessageListener. SwitchListener is used to receive notifications whenever a switch is connected or disconnected to the internet or has a change in its port status. DeviceListener is notified whenever a device (generally an end-user node) has been added, removed, moved or has changed its IP address or VLAN address [8]. MessageListener gets notifications whenever a packet has been received by the controller. When a packet is received, the application processes the packet and takes the appropriate action [8]. Floodlight controller provides both reactive and proactive applications: Java APIs for reactive and RESTful APIs for proactive application style. Proactive Floodlight applications can use the RESTful APIs to get information about the network state. Floodlight RESTful API uses the Restlet framework and includes a small web server inside that allows external applications to communicate with the SDN controller. Floodlight Controller Structure is shown in Fig.3. Fig. 3. Floodlight controller structure [11] 3.1. FLOODLIGHT REST API In the early days of commercial Internet, setting configuration parameters of devices has been possible only using methods such as CLI, TL1, NETCONF, SNMP, TR- 069 [10]. These mechanisms are available now and have been rarely used with SDN. But they are slow and difficult to maintain [10]. Furthermore, they are not suitable for today’s data centers because that the data centers are required dynamic, frequent, and automated management tasks. In the last few years, newer methods have been developed to make remote configuration changes on the network devices. The most popular and common one is the REST API. REST has been developed to make API calls across networks and uses Hypertext Transfer Protocol (HTTP) which is commonly used to pass the web traffic [10]. They are simple and extensible and use a standard TCP port and thus do not require any special configuration to allow API calls to pass through firewalls [10]. SDN Controller northbound API is shown in Fig. 4. Fig. 4. SDN controller northbound API The web-based REST mechanism is based on some methods such as HTTP GET, PUT, POST, and DELETE. It is very easy to make these REST calls secure by using HTTPS (Secure HTTP) protocol instead of HTTP. The Floodlight Web GUI is built on the REST API.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3178 3.2. FLOODLIGHT WEB GUI In this section, we mention our Floodlight Web GUI in detail. This GUI provides a way for users to view the controller’s state information, to connect switches via inter-switch links and the hosts to the network, to monitor the flow tables of the switches and the network topology [11]. Most of the statistics can be queried and displayed in an easy-to-read and tabular fashion by using this web GUI. Additionally, several modules of the Floodlight Controller can be exposed to the end users via this web GUI. For example, the Static Flow Pusher module has this GUI to insert the flows easily [11]. We develop the Floodlight Web GUI’s home page as the controller’s dashboard as in Fig. 5. Here, network administrators can monitor the status, uptime, selected role of the controller, connected switches count, connected hosts count, and the links between the switches. Also, the details about the controller’s memory consumption, the storage tables, and all loaded modules can be monitored. All of these parts of the GUI uses the REST API calls of the Floodlight Controller. Fig. 5. Home page of the controller One of the most important module of the GUI is the switches module that gives some detailed information of the connected switches such as flow count, packet count, buffer size, flow table count, vendor, hardware, and software version (see Fig. 6). Additionally, the administrators can change the role of a switch to Master, Slave or Equal by using this module. Fig. 6. Flow summary table of a switch It is possible to add static flow entries to the flow table of a switch (see Fig. 7) and to monitor the port table of this switch. Fig.7. Flow table of a switch Web GUI presents a list of the hosts connected to the network with the information of the MAC address of a host, IPV4 address, IPV6 address, MAC address of the connected switch, connected port of the switch, and last seen time. All links between the switches can be monitored via GUI. Properties such as the direction of links, source switch and its port, destination switch and its port, and type of the link (internal, external) are the information provided. Floodlight controller comes with a firewall module. A network administrator can change the status of the firewall, can enable/disable the firewall and change subnet mask of the firewall by using this module as in Fig. 8. Also, new firewall rules can be added or deleted. Fig. 8. Firewall module of GUI While adding a firewall rule, the parameters that must be provided are switch id, source port, source mac address, destination mac address, source IP address, destination IP address, protocol type (TCP, UDP or ICMP), priority, and action (ALLOW, DENY) [11]. Floodlight contains an application that enforces Access Control Lists (ACL) in a reactive way. It is a firewall application that monitors Packet-in messages and then pushes appropriate flow entries [11]. In a proactive way, without being requested by the switch, the controller enforces ACL rules to switches too. Thus, the controller prevents additional delays [11].
  • 5. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3179 Fig. 9 represents the record insertion to the ACL and Table 1 gives the properties of an ACL rule. Fig.9. Adding a record to the ACL Table 1. Properties of an ACL rule Key Value Notes nw- proto string "TCP" or "UDP" or "ICMP" (ignoring case) src-ip IPv4 address[/mask] Either src-ip or dst-ip must be specified. dst-ip IPv4 address[/mask] Either src-ip or dst-ip must be specified. tp-dst number Valid when nw-proto == "TCP" or "UDP". action string "DENY" or "ALLOW" (ignoring case), set to "DENY" if not specified. Topology discovering module of the Floodlight uses LLDP protocol. And GUI calls the related RESTful API method of this module. Topology view of network is based on DIRECT and TUNNEL links discovered based on LLDP packets [11]. Our sample SDN topology built in the GUI is represented in Fig. 10. Fig.10. SDN topology view in the GUI 4. CONCLUSION The traditional network architecture cannot fulfill today’s network requirements efficiently and the popularity of SDN is increasing day by day. SDN is the new network paradigm and can be easily implemented to the classical networks. The Floodlight controller and GUI provide many useful tools and a programmable network framework. SDN is just a new tool for developing new applications to solve network- management problems more easily. To support more widely ranged network services, SDN applications would require much more complex methods to analyze and control the network traffic, and programmable hardware. Before developing an SDN application, the developer must decide between two general styles of SDN applications: reactive or proactive. In case of the reactive SDN applications, the output of the communication between the switch and the controller is usually a new flow entry in the switch’s flow table. Reactive applications can program multiple switches parallelly. On the other hand, the proactive SDN applications require less communication from switch to controller. The proactive SDN applications program switches connected to the network with the flow entries that are appropriate to control and manage the incoming traffic before it arrives at the switch. The reactive type is more useful when the connectivity to the controller is lost but less additional latency is provided with the proactive programming. REFERENCES [1] A. Shahid, J. Fiaidhi and S. Mohammed, Implementing Innovative Routing Using Software
  • 6. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3175-3180 (2017) ISSN: 0975-0290 3180 Defined Networking (SDN), International Journal of Multimedia and Ubiquitous Engineering, 11(2), 2016, 159-172. [2] G. Wiley, Software networks, virtualization, sdn, 5g and security (Great Britain: ISTE Ltd and John Wiley & Sons, 2015). [3] K. Ahokas, Software-defined networking, Aalto University CSE-E4430 Methods and Tools for Network Systems, Finland, Autumn 2014. [4] Pooja, M. Sood, SDN and Mininet: Some Basic Concepts, Int. J. Advanced Networking and Applications, 07(02), 2015, 2690-2693. [5] B. A. A. Nunes, M. Mendonca, X. N. Nguyen, K. Obraczka and T. Turletti, A Survey of Software- Defined Networking: Past, Present, and Future of Programmable Networks, IEEE Communications Surveys & Tutorials, 16(3), 1617-1634. [6] N. Feamster, J. Rexford, and E. Zegura, The road to SDN: an intellectual history of programmable networks, SIGCOMM Comput. Commun, 44(2), 2014, 87-98. [7] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E. Rothenberg, S. Azodolmolky and S. Uhlig, Software-Defined Networking: A Comprehensive Survey, in Proceedings of the IEEE, 103(1), 2015, 14-76. [8] P. Göransson, C. Black, Software defined networks (USA: Morgan Kaufmann, 2014). [9] Y. Jarraya, T. Madi and M. Debbabi, A Survey and a Layered Taxonomy of Software-Defined Networking, IEEE Communications Surveys & Tutorials, 16(4), 2014, 1955-1980. [10] T. D. Nadeau, K. Gray, SDN: software defined networks (USA: O’Reilly, 2013). [11] R. Izard (administrator), H. Akcay (GUI developer), (2017). Floodlight WEB GUI. [online] Floodlight.atlassian.net. Available at: https://floodlight.atlassian.net/wiki/spaces/floodlight controller/pages/40403023/Web+GUI [Accessed 17 Mar. 2017].