Software defined networking or SDN is a typical approach towards the technology of cloud computing, which eventually facilitates the management of networking and also allows excellent configuration of network programmatically [5]. This network configuration is enabled for the improvement of network monitoring and performance. Moreover, SDN helps in addressing the typical fact that static architecture of any traditional network is more complex and decentralized, whereas, the architecture of the current network needs maximum flexibility and troubleshooting. Software defined networking centralizes the network intelligence in any one specific component of network by simply detaching the procedure of forwarding of any data packet from the process of routing [12]. This process of routing comprises of at least one controller, also known as the brain of any software defined network. The incorporation of network intelligence is done here. However, there are few disadvantages as well in the security of this network.
There are three distinct layers in software defined networking. They are as follows:
iii) Application Layer: This is the third layer of software defined networking. The applications of this particular layer mainly include the business applications, SDN applications and cloud orchestration [2]. These applications are typical programs, which can explicitly or directly communicate with the controller of SDN for the requirements of network.
The traditional network is different from the software defined networking. The comparison between the characteristics of SDN and traditional network are as follows:
Characteristics |
Traditional Networking |
Software Defined Networking |
1. Definition |
Traditional networks are the static as well as inflexible network. They cannot be utilized for the innovative business ventures [10]. Moreover, traditional networks possess extremely less flexibility and agility. |
Software defined network is the programmable network during time of deployment and in the later stage on the basis of requirement changing [14]. SDN is utilized for new business venture through the virtualization, agility and flexibility. |
2. Configuration |
Traditional network is configured by utilizing hardware appliances. |
Software defined network is configured by utilizing open software. |
3. Control Plane |
Traditional network comprises of control plane that is distributed [3]. |
Software defined network comprises of control plane that is logically centralized. |
4. Utilization |
Traditional network utilize custom FPGAs and ASICs. |
Software defined network utilize merchant silicon [8]. |
5. Working Procedure |
Traditional network works by utilizing protocols [13]. |
Software defined network utilize APIs for configuration as required. |
There are various advantages or benefits of software defined networking over traditional networks regarding security issues. They are as follows:
iii) Less Operating Costs: The overall operating costs of software defined network are extremely less than the traditional network. Thus, it is easily afforded by all organizations, irrespective of its size.
In spite of having such vast advantages, software defined network do comprises of various disadvantages over traditional network. They are as follows:
Software defined network or SDN is a technology that is utilized for the management of network and allows proper network configuration for the improvisation of performance as well as monitoring of network. It helps in centralizing the network and disassociation of data forwarding process [3]. The static architecture of all the traditional networks is absolutely decentralized and the software defined network is properly centralized and flexible. The security and the elasticity of SDN are main advantages of this particular network. However, there are some of the major issues in security in software defined network. They are as follows:
iii) Network Traffic Diversion: This is the third major security issue in software defined network. The traffic of the network is diversified by the hackers or the attackers and they do this changing the network destination [1]. This often creates major problem when the data packets are sent to some other location other than the destination.
The above mentioned security issues can be eradicated or mitigated with the help of various mitigation tools and techniques. The various mitigation techniques for the three mentioned security issues of software defined network are as follows:
iii) Mitigation of Network Traffic Diversion: The network traffic diversion can be easily eradicated with the help of strong encrypted communication channel [13]. This will eventually secure the entire network.
References
[1] Ali-Ahmad, Hassan, Claudio Cicconetti, Antonio de la Oliva, Vincenzo Mancuso, Malla Reddy Sama, Pierrick Seite, and Sivasothy Shanmugalingam. “An SDN-based network architecture for extremely dense wireless networks.” In Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, pp. 1-7. IEEE, 2013.
[2] Yan, Qiao, F. Richard Yu, Qingxiang Gong, and Jianqiang Li. “Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges.” IEEE Communications Surveys & Tutorials 18, no. 1 (2016): 602-622.
[3] Hu, Fei, ed. Network Innovation through OpenFlow and SDN: Principles and Design. CRC Press, 2014.
[4] Cui, Laizhong, F. Richard Yu, and Qiao Yan. “When big data meets software-defined networking: SDN for big data and big data for SDN.” IEEE network 30, no. 1 (2016): 58-65.
[5]Farhady, H., Lee, H. and Nakao, A. (2015). Software-Defined Networking: A survey. Computer Networks, 81, pp.79-95.
[6] Guan, Xinjie, Baek-Young Choi, and Sejun Song. “Reliability and scalability issues in software defined network frameworks.” In Research and Educational Experiment Workshop (GREE), 2013 Second GENI, pp. 102-103. IEEE, 2013.
[7] Karakus, Murat, and Arjan Durresi. “A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN).” Computer Networks 112 (2017): 279-293.
[8] Yan, Qiao, F. Richard Yu, Qingxiang Gong, and Jianqiang Li. “Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges.” IEEE Communications Surveys & Tutorials 18, no. 1 (2016): 602-622.
[9] Scott-Hayward, Sandra, Gemma O’Callaghan, and Sakir Sezer. “SDN security: A survey.” In Future Networks and Services (SDN4FNS), 2013 IEEE SDN For, pp. 1-7. IEEE, 2013.
[10] Dhamecha, Kapil, and Bhushan Trivedi. “Sdn issues-a survey.” International Journal of Computer Applications 73, no. 18 (2013).
[11] Dixit, Advait, Fang Hao, Sarit Mukherjee, T. V. Lakshman, and Ramana Kompella. “Towards an elastic distributed SDN controller.” In ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 7-12. ACM, 2013.
[12] Sezer, Sakir, Sandra Scott-Hayward, Pushpinder Kaur Chouhan, Barbara Fraser, David Lake, Jim Finnegan, Niel Viljoen, Marc Miller, and Navneet Rao. “Are we ready for SDN? Implementation challenges for software-defined networks.” IEEE Communications Magazine 51, no. 7 (2013): 36-43.
[13] Singla, Sanjoli, and Jasmeet Singh. “Cloud data security using authentication and encryption technique.” Global Journal of Computer Science and Technology (2013).
[14] Mihaljevi?, Miodrag J., and Hideki Imai. “Security issues of cloud computing and an encryption approach.” In Cloud Technology: Concepts, Methodologies, Tools, and Applications, pp. 1527-1547. IGI Global, 2015.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download