SDN for End-Nodes: Scenario Analysis and Architectural Guidelines
نویسندگان
چکیده
The advent of SDN has brought a plethora of new architectures and controller designs for many use-cases and scenarios. Existing SDN deployments focus on campus, datacenter and WAN networks. However, little research efforts have been devoted to the scenario of effectively controlling a full deployment of end-nodes (e.g. smartphones) that are transient and scattered across the Internet. In this paper, we present a rigorous analysis of the challenges associated with an SDN architecture for end-nodes, show that such challenges are not found in existing SDN scenarios, and provide practical design guidelines to address them. Then, and following these guidelines we present a reference architecture based on a decentralized, distributed and symmetric controller with a connectionless pulloriented southbound and an intent-driven northbound. Finally, we measure a proof-of-concept deployment to assess the validity of the analysis as well as the architecture.
منابع مشابه
Traffic Engineering Model and Algorithm Based on Bi-level Programming in Hybrid Software Defined Network
-With the rapid development of Internet, the complexity of the network and control difficulty has increased dramatically. For the problem of fossilization network is more and more prominent, SDN (software defined network) arises at the historic moment. Due to SDN controller centralized control and the characteristics of shunt on SDN network equipment, this paper puts forward that part of nodes ...
متن کاملBenefits brought by the use of OpenFlow / SDN in the AmLight intercontinental research and education network
Operating unprotected network links for international collaboration between research and education communities, subject to a high-availability production service requirement, is challenging. Provisioning circuits, maintaining a loop-free network topology, and configuring multi-path redundancy to provide high availability are complex processes, which involve extensive coordination between, and m...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks
Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN ...
متن کاملPerformance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018