494 research outputs found

    Implementing quality of service for the software defined networking enabled future internet

    Get PDF
    Achieving ever-growing Quality of Service (QoS) requirements for business customers is a major concern over the current Internet. However, presently, its architecture and infrastructures are inflexible to meet the demand of increased QoS requirements. OpenFlow, OF-Config (OpenFlow Configuration and Management protocol), and OVSDB (Open vSwitch Database Management protocol) protocols are well-known software defined networking (SDN) technologies for the Future Internet, enabling flexibility by decoupling the control plane from networking devices. In this paper, we propose a QoS framework using the SDN technologies and test the framework in failure-conditions using single and multiple autonomous system scenarios of the current Internet. We show that an effectively high QoS can be achieved for business customers using our framework

    The QueuePusher: enabling queue management in OpenFlow

    Get PDF

    A Survey on the Contributions of Software-Defined Networking to Traffic Engineering

    Get PDF
    Since the appearance of OpenFlow back in 2008, software-defined networking (SDN) has gained momentum. Although there are some discrepancies between the standards developing organizations working with SDN about what SDN is and how it is defined, they all outline traffic engineering (TE) as a key application. One of the most common objectives of TE is the congestion minimization, where techniques such as traffic splitting among multiple paths or advanced reservation systems are used. In such a scenario, this manuscript surveys the role of a comprehensive list of SDN protocols in TE solutions, in order to assess how these protocols can benefit TE. The SDN protocols have been categorized using the SDN architecture proposed by the open networking foundation, which differentiates among data-controller plane interfaces, application-controller plane interfaces, and management interfaces, in order to state how the interface type in which they operate influences TE. In addition, the impact of the SDN protocols on TE has been evaluated by comparing them with the path computation element (PCE)-based architecture. The PCE-based architecture has been selected to measure the impact of SDN on TE because it is the most novel TE architecture until the date, and because it already defines a set of metrics to measure the performance of TE solutions. We conclude that using the three types of interfaces simultaneously will result in more powerful and enhanced TE solutions, since they benefit TE in complementary ways.European Commission through the Horizon 2020 Research and Innovation Programme (GN4) under Grant 691567 Spanish Ministry of Economy and Competitiveness under the Secure Deployment of Services Over SDN and NFV-based Networks Project S&NSEC under Grant TEC2013-47960-C4-3-

    OSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds)

    Full text link
    The introduction of SDN in IP backbones requires the coexistence of regular IP forwarding and SDN based forwarding. The former is typically applied to best effort Internet traffic, the latter can be used for different types of advanced services (VPNs, Virtual Leased Lines, Traffic Engineering...). In this paper we first introduce the architecture and the services of an "hybrid" IP/SDN networking scenario. Then we describe the design and implementation of an Open Source Hybrid IP/SDN (OSHI) node. It combines Quagga for OSPF routing and Open vSwitch for OpenFlow based switching on Linux. The availability of tools for experimental validation and performance evaluation of SDN solutions is fundamental for the evolution of SDN. We provide a set of open source tools that allow to facilitate the design of hybrid IP/SDN experimental networks, their deployment on Mininet or on distributed SDN research testbeds and their test. Finally, using the provided tools, we evaluate key performance aspects of the proposed solutions. The OSHI development and test environment is available in a VirtualBox VM image that can be downloaded.Comment: Final version (Last updated August, 2014

    In-band control, queuing, and failure recovery functionalities for openflow

    Get PDF
    In OpenFlow, a network as a whole can be controlled from one or more external entities (controllers) using in-band or out-of-band control networks. In this article, we propose in-band control, queuing, and failure recovery functionalities for OpenFlow. In addition, we report experimental studies and practical challenges for implementing these functionalities in existing software packages containing different versions of OpenFlow. The experimental results show that the in-band control functionality is suitable for all types of topologies. The results with the queuing functionality show that control traffic can be served with the highest priority in in-band networks and hence, data traffic cannot affect the communication between the controller and networking devices. The results with the failure recovery functionality show that traffic can be recovered from failures within 50 ms

    Deployment of a GPON-SDN solution in a server using Docker

    Get PDF
    The research carried out in this Project focuses on the transformation of a GPON network to an SDN network using the OpenFlow protocol (SDN-GPON). With this we achieve a dissociation between the control plane in charge of routing the packets and the data plane in the access network. For this, a Linux-based router has been implemented in the central computer and several OVS (Open Virtual Switch) virtual switches have been installed that can use the OpenFlow protocol and communicate with an OpenFlow central controller, in our case OpenDayLight and ONOS located in the backbone. Through this new SDN network scenario we will be able to configure and manage services and subscriber profiles in the access network through OpenFlow. During the project we tried to virtualize most of the applications we needed using the Docker technology, some of the virtualizations were forced upon us because of the unforeseen circumstances (Covid-19, unable to access the labs) but in the end we managed to make it work as much the circumstances allowed us to.Grado en Ingeniería de Tecnologías Específicas de TelecomunicaciónGrado en Ingeniería de Tecnologías de Telecomunicació

    Green IT - dynamic network topologies

    Get PDF
    All engineering disciplines are influenced by the global focus on energy consumption reduction and sustainability. Due to its resident inefficiency, The ICT sector is of particular concern, and there has been extensive work to develop sustainability enhancements to networks and/or network devices. Previous work presented dynamic topology concepts in which the behaviour and topology of the devices and the network react dynamically in response to traffic demands, with the intent of placing devices into standby states to reduce energy consumption. The key aim of this study is to develop a dynamic topology mechanism implementation; it proposes a testbed environment and corresponding dynamic topology mechanism that makes use of two programs: one running on a centralised controller, and one running on the network nodes. The former determines the optimal topology based on energy consumption reductions and network traffic, while the latter uses MPLS to implement the topology. The testbed is used to determine the dynamic topology mechanism’s effectiveness and impact on network performance, and does so by subjecting it to controlled variations in network traffic. Quantitative measurements of the dynamic topology mechanism’s network performance metrics are presented and analysed relative to baseline measurements. The analysis shows that the dynamic topology mechanism is quite effective, as the effect on network performance is mostly minimal and the reaction to network traffic variations is sufficiently swift. The system takes approximately 30 seconds to react to traffic variations and implement topology changes, and has negligible effect on jitter, packet loss, and the number of out of order packets. However, it produces an average increase in delay of 8 ms, the source of which requires further investigation. This study proves the feasibility of dynamic topology mechanism implementation, and provides a framework for further development and eventual widespread deployment

    A Federated Architecture for Heuristics Packet Filtering in Cloud Networks

    Get PDF
    The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation. Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall protection is the combination of both hardware and cloud firewall. In this thesis, we implemented and configured a federated architecture using both firewalls, the Cisco ASA 5510 and Vyatta VC6.6 Cloud Based Firewall. Performance evaluation of both firewalls were conducted and analyzed based on two scenarios; spike and endurance test. Throughputs were also compared, along with some mathematical calculations using statistics. Different forms of packets were sent using a specialized tool designed for load testing known as JMeter. After collecting the results and analyzing it thoroughly, this thesis is concluded by presenting a heuristics method on how packet filtering would fall back to the cloud based firewall when the hardware based firewall becomes stressed and over loaded, thus allowing efficient packet flow and optimized performance. The result of this thesis can be used by Information Security Analyst, students, organizations and IT experts to have an idea on how to implement a secured network architecture to protect digital information
    corecore