Software Defined Networks: Architecture and Applications
- Length: 576 pages
- Edition: 1
- Language: English
- Publisher: Wiley-Scrivener
- Publication Date: 2022-06-28
- ISBN-10: 1119857309
- ISBN-13: 9781119857303
- Sales Rank: #4078524 (See Top 100 Books)
SOFTWARE DEFINED NETWORKS
Software defined networking suggests an alternative worldview, one that comes with a new software stack to which this book is organized, with the goal of presenting a top-to-bottom tour of SDN without leaving any significant gaps that the reader might suspect can only be filled with magic or proprietary code.
Software defined networking (SDN) is an architecture designed to make a network more flexible and easier to manage. SDN has been widely adopted across data centers, WANs, and access networks and serves as a foundational element of a comprehensive intent-based networking (IBN) architecture. Although SDN has so far been limited to automated provisioning and configuration, IBN now adds “translation” and “assurance” so that the complete network cycle can be automated, continuously aligning the network to business needs.
In 14 chapters, this book provides a comprehensive understanding of an SDN-based network as a scalable distributed system running on commodity hardware. The reader will have a one-stop reference looking into the applications, architectures, functionalities, virtualization, security, and privacy challenges connected to SDN.
Audience
Researchers in software, IT, and electronic engineering as well as industry engineers and technologists working in areas such as network virtualization, Python network programming, CISCO ACI, software defined network, and cloud computing.
Cover Half-Title Page Series Page Title Page Copyright Page Contents Preface 1 Introduction to Software Defined Networking 1.1 Introduction 1.2 Terminology and Architecture 1.2.1 Infrastructure Layer 1.2.2 Southbound Interfaces Layer 1.2.3 Network Hypervisors Layer 1.2.4 Controller Layer 1.2.5 Northbound Interfaces 1.3 The Role of Network Operating Systems 1.4 SDN Versus NFV 1.5 The Role of NFV into SDN-Based IoT Systems 1.6 Challenges and Future Directions 1.7 Applications of SDN in IT Industries 1.8 Conclusion and Future Scope References 2 Software-Defined Networks: Perspectives and Applications 2.1 Introduction 2.2 SDN Architecture 2.2.1 Key Takeaways of SDN Architecture 2.2.2 Open Flow 2.3 Functionalities of SDN 2.3.1 SDN Benefits 2.4 SDN vs. Traditional Hardware-Based Network 2.5 Load Balancing in SDN 2.5.1 SDN-Based Load Balancer in Cloud Computing 2.5.2 SDN Without Cloud Computing 2.6 SDN Security 2.6.1 Security Threats and Attacks 2.7 SDN Applications 2.8 Research Directions 2.9 Conclusion References 3 Software-Defined Networks and Its Applications 3.1 Introduction 3.2 SDN vs Traditional Networks 3.3 SDN Working: A Functional Overview 3.4 Components and Implementation Architecture 3.4.1 Components of an SDN 3.4.1.1 SDN Application 3.4.1.2 SDN Controller 3.4.1.3 SDN Datapath 3.4.1.4 SDN Control to Data-Plane Interface (CDPI) 3.4.1.5 SDN Northbound Interfaces (NBI) 3.4.1.6 SDN Control Plane: Incorporated-Hierarchical-Distributed 3.4.1.7 Controller Placement 3.4.1.8 OpenFlow and Open Source in SDN Architecture 3.4.2 SDN Design 3.4.2.1 Northward APIs 3.4.2.2 Southward APIs 3.4.2.3 Orchestrator 3.4.2.4 Controller 3.4.2.5 Compute 3.5 Implementation Architecture 3.6 Pros and Cons of SDN 3.6.1 SDN Misconceptions 3.6.2 Pros of SDN 3.6.2.1 Centralized Network Provisioning 3.6.2.2 Holistic Enterprise Management 3.6.2.3 More Granular Security 3.6.2.4 Lower Operating Costs 3.6.2.5 Hardware-Savings and Reduced Capital Expenditures 3.6.2.6 Cloud Abstraction 3.6.2.7 Guaranteed Content Delivery 3.6.3 Cons of SDN 3.6.3.1 Latency 3.6.3.2 Maintenance 3.6.3.3 Complexity 3.6.3.4 Configuration 3.6.3.5 Device Security 3.7 SDN Applications 3.7.1 SDN Environment for Applications 3.7.1.1 Internal SDN Applications 3.7.1.2 External SDN Applications 3.7.1.3 Security Services 3.7.1.4 Network Monitoring and Intelligence 3.7.1.5 Data Transmission Management 3.7.1.6 Content Availability 3.7.1.7 Guideline and Compliance-Bound Applications 3.7.1.8 Elite Applications 3.7.1.9 Circulated Application Control and Cloud Integration 3.7.2 Common Application of SDN in Enterprise Networks 3.7.2.1 Further Developed Security 3.7.2.2 Diminished Working Expenses 3.7.2.3 A Superior Client Experience 3.7.3 SDN Drives in the Enterprise 3.7.3.1 Bringing Together and Improving on the Administration Plane 3.7.3.2 Accomplishing Programmability of the Control Plane 3.7.3.3 Simple Client Onboarding 3.7.3.4 Simple Endpoint Security 3.7.3.5 Simple Traffic Checking 3.7.3.6 SES Client Onboarding 3.7.3.7 Client Onboarding 3.7.3.8 SES Simple Endpoint Security: Distinguishing Dubious Traffic 3.7.3.9 SES Simple Traffic Observing 3.7.3.10 Synopsis 3.7.4 SDN Stream Sending (SDN) 3.7.4.1 Proactive Versus Reactive Versus Hybrid 3.7.4.2 DMN 3.7.4.3 SD-WAN 3.7.4.4 SD-LAN 3.7.4.5 Security Using the SDN Worldview 3.7.5 Security Utilizing the SDN Paradigm 3.7.6 Gathering Data Delivery Using SDN 3.7.7 Relationship of SDN to NFV 3.8 Future Research Directions of SDN 3.9 Conclusion & Future Scope References 4 Latency-Based Routing for SDN-OpenFlow Networks 4.1 Introduction to Generations of Networks 4.2 Features of 5G Systems 4.3 Software-Defined Networking (SDN) 4.4 Proposed Work 4.4.1 Path Selection Algorithm 4.4.2 Optimized Path Selection 4.4.2.1 Forwarding Node Selection 4.4.2.2 Priority Scheduling 4.4.2.3 Priority Classification 4.5 Experimentation and Results 4.5.1 Implementation of Traffic Streaming 4.6 Performance Analysis 4.7 Conclusion and Future Scope References 5 QoS Improvement Evaluation With An Effective Switch Assignment to the Controller in Real-Time SDN Environment 5.1 Introduction 5.1.1 Objectives 5.2 Architecture of SDN 5.2.1 Data Plane 5.2.2 Southbound (SB) APIs 5.2.3 NB API 5.2.4 Management Plane 5.2.5 Control Plane 5.3 Controller Placement Effect on the QoS 5.4 Communication between the Control and Data Planes 5.5 Related Works 5.6 Parameters for Computing E2E Delay 5.6.1 Path Discovery Delay (PD) 5.6.2 Actual Delay (AD) 5.7 Clustering Based on the Latency of the Emulated Mininet Network 5.8 Results and Discussion 5.9 Conclusion and Future Directions References 6 An Insight into Traffic Engineering in Software-Defined Networks 6.1 Introduction 6.2 Related Works 6.3 Review on Traffic Engineering Techniques in SDN 6.4 Review on Traffic Engineering Techniques in Hybrid SDN 6.5 Review on Traffic Matrix Estimation and Measurement Techniques in SDN 6.6 Analysis and Research Direction 6.7 Conclusion and Future Scope References 7 Network Functions Virtualization and SDN 7.1 Introduction 7.2 Types of Virtualizations 7.2.1 Server Virtualization 7.2.2 Network Virtualization 7.2.3 Application Virtualization 7.2.4 Desktop Virtualization 7.2.5 Storage Virtualization 7.3 Wireless Network Virtualization 7.3.1 Radio Spectrum Resources 7.3.2 Wireless Network Infrastructure 7.3.3 Wireless Virtual Resources 7.3.3.1 Spectrum-Level Slicing 7.3.3.2 Infrastructure-Level Slicing 7.3.3.3 Network-Level Slicing 7.3.3.4 Flow-Level Slicing 7.3.4 Wireless Virtualization Controller 7.4 Network Functions Virtualization and Software-Defined Network 7.4.1 Network Virtualization 7.4.2 Network Functions Virtualization 7.4.2.1 Network Functions Virtualization Infrastructure 7.4.2.2 Virtual Network Functions 7.4.2.3 Network Functions Virtualization Management and Orchestration 7.4.2.4 NFV Challenges 7.4.3 Benefits of NFV 7.4.3.1 Coexistence of Dissimilar Network 7.4.3.2 Encouraging Network Innovation 7.4.3.3 Deployment of Agile Network Capabilities 7.4.3.4 Provisioning of Independent and Diverse Networks 7.4.3.5 Resource Optimization 7.4.3.6 Deployment of Distinct Network Services 7.4.4 Software-Defined Networking (SDN) 7.4.4.1 Traditional Networks 7.4.4.2 Need for New Network Architecture 7.4.4.3 Introduction to SDN 7.4.4.4 SDN Implementation 7.4.4.5 SDN Design 7.4.4.6 SDN Operation 7.4.5 Open Flow 7.4.5.1 Open Flow Architecture 7.4.5.2 Defining Flow in Open Flow 7.4.5.3 Flow and Group Table 7.4.6 SDN Benefits 7.4.6.1 Centralized Network 7.4.6.2 Programmability of the Network 7.4.6.3 Rise of Virtualization 7.4.6.4 Lower Operating Cost 7.4.6.5 Device Configuration and Troubleshooting 7.4.7 SDN Challenges 7.4.7.1 Reliability 7.4.7.2 Scalability 7.4.7.3 Performance Under Latency Constraints 7.4.7.4 Use of Low-Level Interface Between the Controller and the Network Device 7.4.7.5 Controller Placement Problem 7.4.7.6 Security 7.4.8 SDN versus Traditional Network 7.4.9 Network Function Virtualization versus SDN 7.5 SDN Architecture 7.5.1 Data Plane 7.5.2 Control Plane 7.5.3 Application Layer 7.6 Software-Defined Networking Application 7.6.1 Adaptive Routing 7.6.2 Load Balancing 7.6.3 Boundless Roaming 7.6.4 Network Maintenance 7.6.5 Network Security 7.6.6 SDN for Cloud Computing 7.6.7 Internet of Things 7.7 Conclusion and Future Scope References 8 SDN-Enabled Network Virtualization and Its Applications 8.1 Introduction 8.2 Traditional Cloud Data Centers 8.2.1 SDN for Enabling Innovative Traffic Engineering Tasks in Cloud Data Centers 8.2.1.1 Optimal Routing Mechanisms 8.2.1.2 Flexible Traffic Steering During Network Failure Recovery 8.2.1.3 Improved Topology Management Mechanisms 8.2.1.4 Innovative Traffic Analysis and Monitoring Mechanisms 8.2.1.5 General Challenges in Adopting SDN 8.2.2 SDN Role in Flexible Network Virtualization 8.2.2.1 Sharing of Physical Infrastructure and Enforcing Multiple Customer Policies 8.2.2.2 Strict Customer Policies Enforcement and Service Level Agreements (SLA) Guarantee 8.2.2.3 Failures of Devices or Links 8.2.2.4 Optimal Utilization of Cloud Resources 8.3 Importance of SDN in Network Function Virtualization (NFV) 8.3.1 Network Service Chaining (NSC) 8.3.2 Importance of NFs Placement in a Cloud Environment 8.3.3 Importance of NF Placement and Scaling in NSC 8.4 SDN and Network Virtualization Role in Evolution of Next-Generation Wi-Fi and Mobile Networks 8.4.1 Software-Defined Solutions for Enterprise Wireless LANs (WLANs) 8.4.1.1 Software-Defined APs 8.4.1.2 SDN Switches and Controller 8.4.2 Software-Defined Mobile Networks and Telecommunication Clouds 8.4.3 Necessity and Importance of Telecommunication Clouds 8.4.3.1 SDN- and NFV-Enabled Cloud Environments 8.4.3.2 Lightweight Virtualization Technologies 8.4.3.3 Novel Application Architecture, Such as Cloud Native Applications and Microservices 8.5 SDN and NFV Role in 5G and Smart Cities 8.5.1 SDN and NFV Role in Designing Deployment Environment for IoT Applications 8.5.2 Cloud-Fog-Edge Computing Environments 8.5.3 SDN- and NFV-Enabled 5G and Network Slicing Deployment 8.6 Conclusions and Future Scope References 9 Software-Defined Networking: Recent Developments and Potential Synergies 9.1 Introduction 9.2 Characteristics of Software-Defined Networking 9.2.1 Open Standards and Vendor Neutral 9.2.2 Centrally Managed 9.2.3 Decoupled 9.2.4 Dynamic/Agile 9.2.5 Flow-Based Management 9.2.6 Programmable 9.3 Applications of Software-Defined Networking 9.3.1 Specific Purposes 9.3.1.1 Network Management 9.3.1.2 Middle-Box 9.3.2 Security 9.3.3 Networks 9.3.3.1 Optical Network 9.3.3.2 Home Network 9.3.3.3 Wireless Network 9.4 Security Issues in Software-Defined Networking 9.4.1 Authentication and Authorization 9.4.2 Access Control and Accountability 9.4.3 Threats from Applications 9.4.4 Threats Due to Scalability 9.4.5 Denial of Service (DoS) Attacks 9.4.6 Challenges in Distributed Control Plane 9.5 Potential Attacks in Software-Defined Networking 9.5.1 Spoofing 9.5.2 ARP Spoofing 9.5.2.1 IP Spoofing 9.5.3 Tampering 9.5.4 Repudiation 9.5.5 Information Disclosure 9.5.6 DoS 9.5.7 Elevation of Privilege 9.6 Solutions to Security Issues and Attacks in Software-Defined Networking 9.6.1 Spoofing 9.6.1.1 ARP Spoofing 9.6.1.2 IP Spoofing 9.6.2 Tampering 9.6.3 Repudiation 9.6.3.1 Nonrepudiation Verification 9.6.3.2 Accountability 9.6.4 Information Disclosure 9.6.4.1 Scanning-Based Solutions 9.6.4.2 Information Disclosure Countermeasure 9.6.5 Denial of Service (DoS) 9.6.6 Elevation of Privilege 9.7 Software-Defined Networking Framework 9.7.1 Global Flow Table 9.7.2 VNGuard 9.8 Security Enhancement Using the Software-Defined Networking Framework 9.8.1 SDN Firewall 9.8.2 Access Control 9.8.3 Intrusion Detection System/Intrusion Prevention System (IDS/IPS) 9.8.4 SDN Policies 9.8.5 Monitoring and Auditing 9.8.6 Privacy Protection 9.8.7 SDN WiFi Networks 9.8.8 Mobile SDN 9.8.9 BYOD 9.8.10 SDN Open Labs 9.9 Open Challenge 9.9.1 Interaction Between Different Controllers and Switches 9.9.2 Controller Security 9.9.3 Managing Heterogenous Controllers 9.9.4 Standard Protocol for Controller 9.9.5 Standard Protocol Between Control and Management Plane 9.9.6 Managing the Load Between Controllers 9.10 Recommended Best Practices 9.10.1 Authentication 9.10.2 Access Control 9.10.3 Data Confidentiality 9.10.4 Nonrepudiation 9.10.5 Data Integrity 9.10.6 Communication Security 9.10.7 Privacy 9.10.8 Availability 9.11 Conclusion and Future Scope References 10 Security Challenges and Analysis for SDN-Based Networks 10.1 Introduction 10.2 Threat Model 10.2.1 Spoofing 10.2.2 Tampering 10.2.3 Repudiation 10.2.4 Information Disclosure 10.2.5 Denial of Service 10.2.6 Elevation of Privileges 10.2.7 Threats in SDN Networks 10.2.7.1 Attack Surface in SDN 10.2.7.2 Security Issues in SDN 10.2.7.3 Addressing SDN Security Matters 10.2.7.4 Attack to the SDN Architecture 10.2.8 Policy-Based SDN Security Architecture 10.3 Control Plane Security of SDN 10.3.1 Application Coexistence 10.3.2 Flow Constraints vs. Flow Circuits 10.3.3 An Application Permission Model 10.3.4 Application Accountability 10.3.5 Toward a Security-Enhanced Control Layer 10.4 Security Analysis 10.5 Network-Wide Security in SDN 10.5.1 Security Systems Development 10.5.2 Flow Sampling 10.5.3 Traffic Monitoring 10.5.4 Access Control 10.5.5 Content Inspection 10.5.6 Network Resilience 10.5.7 Security Middle Boxes 10.5.8 Security Challenges in SDN 10.6 SDN-Based Virtual and Cloud Networks Security 10.6.1 Virtual Networks Security 10.6.2 Cloud Networks Security 10.7 SDN-Based Secure IoT Frameworks 10.8 Conclusion and Future Scope References 11 A Novel Secure SDN Architecture for Reliable Data Transmission in 5G Networks 11.1 Introduction 11.1.1 Organization of the Chapter 11.2 Related Work 11.3 SDN-5G Networks—What Does the Future Hold? 11.4 Layers in SDN-5G Networks 11.5 Security Threats 11.5.1 Control Plane 11.5.2 Data Plane 11.5.3 Application Plane 11.6 SDN-5G Networks—Possible Attacks and Threats 11.6.1 Distributed Denial of Services (DDoS) 11.6.2 Solution for DDoS—To Analyze User’s Behavior via Detection Through Entropy 11.6.3 Solution for Packet Sniffing 11.6.4 Steps in the Handshake Process 11.6.5 ARP Spoofing Attack 11.6.5.1 ARP Authentication 11.6.5.2 Operating System Patching 11.6.5.3 API Exploitation 11.6.5.4 Password Guessing or Brute Force 11.7 Proposed Methodology 11.7.1 Strong Security Architecture for SDN-Based 5G Networks 11.8 Security Analysis 11.8.1 IP Spoofing 11.8.2 MITM Attack 11.8.3 Replay Attack 11.9 Conclusion and Future Scope References 12 Security and Privacy Issues in 5G/6GAssisted Software-Defined Networks 12.1 Introduction 12.1.1 SDN Applications 12.1.2 Security and Privacy Issues in SDN 12.1.3 Chapter Contributions 12.1.4 Chapter Organization 12.2 Security and Functionality Requirements in SDN 12.3 Network and Threat Models 12.3.1 Network Model 12.3.2 Adversary Model 12.4 Taxonomy of Security Protocols in SDN 12.5 Security Solutions in SDN 12.5.1 Authentication 12.5.2 Access Control 12.5.3 Key Management 12.5.4 Intrusion Detection 12.5.5 Blockchain-Based Security Solution 12.6 Comparative Analysis 12.6.1 Comparative Analysis on Communication and Computational Costs 12.6.2 Comparative Analysis on Security Features 12.7 Conclusion and Future Scopes References 13 Evolving Requirements and Application of SDN and IoT in the Context of Industry 4.0, Blockchain and Artificial Intelligence 13.1 Introduction 13.2 Objectives of the Chapter 13.3 Organization of the Chapter 13.4 Software-Defined Network Architecture 13.4.1 SDN Planes 13.4.1.1 Control Plane 13.4.1.2 Data Plane 13.4.1.3 Application/Management Plane 13.4.2 QoS: Quality of Service 13.4.2.1 Jitter 13.4.2.2 Packet Loss 13.4.2.3 Bandwidth 13.4.2.4 Latency 13.4.3 OpenQoS 13.4.4 Secondnet 13.4.5 OpenQFlow 13.4.6 CloudNaaS 13.4.7 Scalable QoS and Automated Control for Network Convergence 13.5 Security 13.5.1 Fresco 13.5.2 NetFuse 13.5.3 Scalability 13.5.4 DIFANE 13.5.5 DevoFlow 13.5.6 Maestro 13.5.7 Load Balancing 13.5.8 AsterX 13.5.9 OpenFlow-Based Server Load Balancing Gone Wild 13.6 Software-Defined Network (SDN) With IoT 13.7 SDN-Based IoT Architecture 13.7.1 IoT’s Architecture With Software Programming Functions 13.7.2 SDN Controllers 13.7.3 Gateways/Routers 13.7.4 Sinks 13.7.5 Data Center 13.7.6 Design Principles 13.7.7 Dynamic Deployment of Security Policies 13.8 Role of SDN and IoT in Industry 4.0 13.8.1 Industry 4.0 Explained 13.8.1.1 Mass Customization 13.8.1.2 Flexibility 13.8.1.3 Additive Manufacturing 13.8.1.4 Better Decision Making 13.8.1.5 Simulation and Digital Twins 13.8.1.6 Integrated Supply Chain 13.8.1.7 Energy Management 13.8.1.8 Creating Value from Big Data 13.8.1.9 Cyber-Physical Systems 13.8.2 Brokerage Services 13.8.3 Man4Ware 13.8.4 Security 13.8.5 Additional Advanced Service Alternatives 13.8.6 Interconnection and Integration Between IoT and Industry 4.0 13.9 Work in Related Domains of IoT 13.10 IoT Computing and Management With SDN 13.10.1 Edge Computing 13.10.2 Convergence of NFV and Edge Computing 13.10.3 Use of Artificial Intelligence (AI) in Software-Defined Networks (SDN) 13.10.4 SDN Network Structure and OpenFlow (OF) Protocol 13.11 Scope of Blockchain to Secure IoT Using SDN 13.11.1 The Architecture of Blockchain-Based SDN 13.11.2 Workflow of BC-SDN and Smart Contracts 13.11.2.1 Key Components of Workflow 13.12 SDN in Various Emerging Areas of IoT 13.13 Conclusion and Future Scope References 14 SDN-Based Cloud Combining Edge Computing for IoT Infrastructure 14.1 Introduction 14.1.1 Architecture of SDN vs. Traditional Networks 14.1.2 SDN/NFV Tiers 14.1.3 Objective of Chapter 14.1.4 Organization of Chapter 14.2 Challenges with SDN-Based Cloud and NFV Technologies for IoT 14.3 Literature Survey 14.4 Knowledge-Driven SDN-Based IoT Architecture That Leverages Edge Cloud 14.5 Discussion and Future Recommendation 14.6 Conclusion References Index EULA
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.