Researchers in software, IT, and electronic engineering as well as industry engineers and technologists working in areas such as network virtualization, Python network programming, CISCO ACI, software defined network, and cloud computing.
Table of ContentsPreface
1. Introduction to Software Defined NetworkingSubhra Priyadarshini Biswal and Sanjeev Patel
1.1 Introduction
1.2 Terminology and Architecture
1.2.1 Infrastructure Layer
1.2.2 Southbound Interfaces Layer
1.2.3 Network Hypervisors Layer
1.2.4 Controller Layer
1.2.5 Northbound Interfaces
1.3 The Role of Network Operating Systems
1.4 SDN Versus NFV
1.5 The Role of NFV into SDN-Based IoT Systems
1.6 Challenges and Future Directions
1.7 Applications of SDN in IT Industries
1.8 Conclusion and Future Scope
References
2. Software-Defined Networks: Perspectives and ApplicationsInderjeet Kaur, Anupama Sharma, Amita Agnihotri and Charu Agarwal
2.1 Introduction
2.2 SDN Architecture
2.2.1 Key Takeaways of SDN Architecture
2.2.2 Open Flow
2.3 Functionalities of SDN
2.3.1 SDN Benefits
2.4 SDN vs. Traditional Hardware-Based Network
2.5 Load Balancing in SDN
2.5.1 SDN-Based Load Balancer in Cloud Computing
2.5.2 SDN Without Cloud Computing
2.6 SDN Security
2.6.1 Security Threats and Attacks
2.7 SDN Applications
2.8 Research Directions
2.9 Conclusion
References
3. Software-Defined Networks and Its ApplicationsRajender Kumar, Alankrita Aggarwal, Karun Handa, Punit Soni and Mukesh Kumar
3.1 Introduction
3.2 SDN vs Traditional Networks
3.3 SDN Working: A Functional Overview
3.4 Components and Implementation Architecture
3.4.1 Components of an SDN
3.4.1.1 SDN Application
3.4.1.2 SDN Controller
3.4.1.3 SDN Datapath
3.4.1.4 SDN Control to Data-Plane Interface (CDPI)
3.4.1.5 SDN Northbound Interfaces (NBI)
3.4.1.6 SDN Control Plane: Incorporated-Hierarchical-Distributed
3.4.1.7 Controller Placement
3.4.1.8 OpenFlow and Open Source in SDN Architecture
3.4.2 SDN Design
3.4.2.1 Northward APIs
3.4.2.2 Southward APIs
3.4.2.3 Orchestrator
3.4.2.4 Controller
3.4.2.5 Compute
3.5 Implementation Architecture
3.6 Pros and Cons of SDN
3.6.1 SDN Misconceptions
3.6.2 Pros of SDN
3.6.2.1 Centralized Network Provisioning
3.6.2.2 Holistic Enterprise Management
3.6.2.3 More Granular Security
3.6.2.4 Lower Operating Costs
3.6.2.5 Hardware-Savings and Reduced Capital Expenditures
3.6.2.6 Cloud Abstraction
3.6.2.7 Guaranteed Content Delivery
3.6.3 Cons of SDN
3.6.3.1 Latency
3.6.3.2 Maintenance
3.6.3.3 Complexity
3.6.3.4 Configuration
3.6.3.5 Device Security
3.7 SDN Applications
3.7.1 SDN Environment for Applications
3.7.1.1 Internal SDN Applications
3.7.1.2 External SDN Applications
3.7.1.3 Security Services
3.7.1.4 Network Monitoring and Intelligence
3.7.1.5 Data Transmission Management
3.7.1.6 Content Availability
3.7.1.7 Guideline and Compliance-Bound Applications
3.7.1.8 Elite Applications
3.7.1.9 Circulated Application Control and Cloud Integration
3.7.2 Common Application of SDN in Enterprise Networks
3.7.2.1 Further Developed Security
3.7.2.2 Diminished Working Expenses
3.7.2.3 A Superior Client Experience
3.7.3 SDN Drives in the Enterprise
3.7.3.1 Bringing Together and Improving on the Administration Plane
3.7.3.2 Accomplishing Programmability of the Control Plane
3.7.3.3 Simple Client Onboarding
3.7.3.4 Simple Endpoint Security
3.7.3.5 Simple Traffic Checking
3.7.3.6 SES Client Onboarding
3.7.3.7 Client Onboarding
3.7.3.8 SES Simple Endpoint Security: Distinguishing Dubious Traffic
3.7.3.9 SES Simple Traffic Observing
3.7.3.10 Synopsis
3.7.4 SDN Stream Sending (SDN)
3.7.4.1 Proactive Versus Reactive Versus Hybrid
3.7.4.2 DMN
3.7.4.3 SD-WAN
3.7.4.4 SD-LAN
3.7.4.5 Security Using the SDN Worldview
3.7.5 Security Utilizing the SDN Paradigm
3.7.6 Gathering Data Delivery Using SDN
3.7.7 Relationship of SDN to NFV
3.8 Future Research Directions of SDN
3.9 Conclusion & Future Scope
References
4. Latency-Based Routing for SDN-OpenFlow NetworksHima Bindu Valiveti, Meenakshi K, Swaraja K, Jagannadha Swamy Tata, Chaitanya Duggineni, Swetha Namburu and Sri Indrani Kotamraju
4.1 Introduction to Generations of Networks
4.2 Features of 5G Systems
4.3 Software-Defined Networking (SDN)
4.4 Proposed Work
4.4.1 Path Selection Algorithm
4.4.2 Optimized Path Selection
4.4.2.1 Forwarding Node Selection
4.4.2.2 Priority Scheduling
4.4.2.3 Priority Classification
4.5 Experimentation and Results
4.5.1 Implementation of Traffic Streaming
4.6 Performance Analysis
4.7 Conclusion and Future Scope
References
5. QoS Improvement Evaluation With An Effective Switch Assignment to the Controller in Real-Time SDN Environment Jehad Ali and Byeong-hee Roh
5.1 Introduction
5.1.1 Objectives
5.2 Architecture of SDN
5.2.1 Data Plane
5.2.2 Southbound (SB) APIs
5.2.3 NB API
5.2.4 Management Plane
5.2.5 Control Plane
5.3 Controller Placement Effect on the QoS
5.4 Communication between the Control and Data Planes
5.5 Related Works
5.6 Parameters for Computing E2E Delay
5.6.1 Path Discovery Delay (PD)
5.6.2 Actual Delay (AD)
5.7 Clustering Based on the Latency of the Emulated Mininet Network
5.8 Results and Discussion
5.9 Conclusion and Future Directions
References
6. An Insight into Traffic Engineering in Software-Defined Networks Prabu U. and Geetha V.
6.1 Introduction
6.2 Related Works
6.3 Review on Traffic Engineering Techniques in SDN
6.4 Review on Traffic Engineering Techniques in Hybrid SDN
6.5 Review on Traffic Matrix Estimation and Measurement Techniques in SDN
6.6 Analysis and Research Direction
6.7 Conclusion and Future Scope
References
7. Network Functions Virtualization and SDNPriyanka Kujur and Sanjeev Patel
7.1 Introduction
7.2 Types of Virtualizations
7.2.1 Server Virtualization
7.2.2 Network Virtualization
7.2.3 Application Virtualization
7.2.4 Desktop Virtualization
7.2.5 Storage Virtualization
7.3 Wireless Network Virtualization
7.3.1 Radio Spectrum Resources
7.3.2 Wireless Network Infrastructure
7.3.3 Wireless Virtual Resources
7.3.3.1 Spectrum-Level Slicing
7.3.3.2 Infrastructure-Level Slicing
7.3.3.3 Network-Level Slicing
7.3.3.4 Flow-Level Slicing
7.3.4 Wireless Virtualization Controller
7.4 Network Functions Virtualization and Software-Defined Network
7.4.1 Network Virtualization
7.4.2 Network Functions Virtualization
7.4.2.1 Network Functions Virtualization Infrastructure
7.4.2.2 Virtual Network Functions
7.4.2.3 Network Functions Virtualization Management and Orchestration
7.4.2.4 NFV Challenges
7.4.3 Benefits of NFV
7.4.3.1 Coexistence of Dissimilar Network
7.4.3.2 Encouraging Network Innovation
7.4.3.3 Deployment of Agile Network Capabilities
7.4.3.4 Provisioning of Independent and Diverse Networks
7.4.3.5 Resource Optimization
7.4.3.6 Deployment of Distinct Network Services
7.4.4 Software-Defined Networking (SDN)
7.4.4.1 Traditional Networks
7.4.4.2 Need for New Network Architecture
7.4.4.3 Introduction to SDN
7.4.4.4 SDN Implementation
7.4.4.5 SDN Design
7.4.4.6 SDN Operation
7.4.5 Open Flow
7.4.5.1 Open Flow Architecture
7.4.5.2 Defining Flow in Open Flow
7.4.5.3 Flow and Group Table
7.4.6 SDN Benefits
7.4.6.1 Centralized Network
7.4.6.2 Programmability of the Network
7.4.6.3 Rise of Virtualization
7.4.6.4 Lower Operating Cost
7.4.6.5 Device Configuration and Troubleshooting
7.4.7 SDN Challenges
7.4.7.1 Reliability
7.4.7.2 Scalability
7.4.7.3 Performance Under Latency Constraints
7.4.7.4 Use of Low-Level Interface Between the Controller and the Network Device 7.4.7.5 Controller Placement Problem
7.4.7.6 Security
7.4.8 SDN versus Traditional Network
7..4.9 Network Function Virtualization versus SDN
7.5 SDN Architecture
7.5.1 Data Plane
7.5.2 Control Plane
7.5.3 Application Layer
7.6 Software-Defined Networking Application
7.6.1 Adaptive Routing
7.6.2 Load Balancing
7.6.3 Boundless Roaming
7.6.4 Network Maintenance
7.6.5 Network Security
7.6.6 SDN for Cloud Computing
7.6.7 Internet of Things
7.7 Conclusion and Future Scope
References
8. SDN-Enabled Network Virtualization and Its Applications Anil Kumar Rangsietti and Siva Sairam Prasad Kodali
8.1 Introduction
8.2 Traditional Cloud Data Centers
8.2.1 SDN for Enabling Innovative Traffic Engineering Tasks in Cloud Data Centers
8.2.1.1 Optimal Routing Mechanisms
8.2.1.2 Flexible Traffic Steering During Network Failure Recovery
8.2.1.3 Improved Topology Management Mechanisms
8.2.1.4 Innovative Traffic Analysis and Monitoring Mechanisms
8.2.1.5 General Challenges in Adopting SDN
8.2.2 SDN Role in Flexible Network Virtualization
8.2.2.1 Sharing of Physical Infrastructure and Enforcing Multiple Customer Policies
8.2.2.2 Strict Customer Policies Enforcement and Service Level Agreements (SLA)
Guarantee
8.2.2.3 Failures of Devices or Links
8.2.2.4 Optimal Utilization of Cloud Resources
8.3 Importance of SDN in Network Function Virtualization (NFV)
8.3.1 Network Service Chaining (NSC)
8.3.2 Importance of NFs Placement in a Cloud Environment
8.3.3 Importance of NF Placement and Scaling in NSC
8.4 SDN and Network Virtualization Role in Evolution of Next-Generation Wi-Fi and Mobile Networks
8.4.1 Software-Defined Solutions for Enterprise Wireless LANs (WLANs)
8.4.1.1 Software-Defined APs
8.4.1.2 SDN Switches and Controller
8.4.2 Software-Defined Mobile Networks and Telecommunication Clouds
8.4.3 Necessity and Importance of Telecommunication Clouds
8.4.3.1 SDN- and NFV-Enabled Cloud Environments
8.4.3.2 Lightweight Virtualization Technologies
8.4.3.3 Novel Application Architecture, Such as Cloud Native Applications and Microservices
8.5 SDN and NFV Role in 5G and Smart Cities
8.5.1 SDN and NFV Role in Designing Deployment Environment for IoT Applications 8.5.2 Cloud-Fog-Edge Computing Environments
8.5.3 SDN- and NFV-Enabled 5G and Network Slicing Deployment
8.6 Conclusions and Future Scope
References
9. Software-Defined Networking: Recent Developments and Potential Synergies Jasminder Kaur Sandhu, Bhawna Singla, Meena Pundir, Sanjeev Rao and Anil Kumar Verma
9.1 Introduction
9.2 Characteristics of Software-Defined Networking
9.2.1 Open Standards and Vendor Neutral
9.2.2 Centrally Managed
9.2.3 Decoupled
9.2.4 Dynamic/Agile
9.2.5 Flow-Based Management
9.2.6 Programmable
9.3 Applications of Software-Defined Networking
9.3.1 Specific Purposes
9.3.1.1 Network Management
9.3.1.2 Middle-Box
9.3.2 Security
9.3.3 Networks
9.3.3.1 Optical Network
9.3.3.2 Home Network
9.3.3.3 Wireless Network
9.4 Security Issues in Software-Defined Networking
9.4.1 Authentication and Authorization
9.4.2 Access Control and Accountability
9.4.3 Threats from Applications
9.4.4 Threats Due to Scalability
9.4.5 Denial of Service (DoS) Attacks
9.4.6 Challenges in Distributed Control Plane
9.5 Potential Attacks in Software-Defined Networking
9.5.1 Spoofing
9.5.2 ARP Spoofing
9.5.2.1 IP Spoofing
9.5.3 Tampering
9.5.4 Repudiation
9.5.5 Information Disclosure
9.5.6 DoS
9.5.7 Elevation of Privilege
9.6 Solutions to Security Issues and Attacks in Software-Defined Networking
9.6.1 Spoofing
9.6.1.1 ARP Spoofing
9.6.1.2 IP Spoofing
9.6.2 Tampering
9.6.3 Repudiation
9.6.3.1 Nonrepudiation Verification
9.6.3.2 Accountability
9.6.4 Information Disclosure
9.6.4.1 Scanning-Based Solutions
9.6.4.2 Information Disclosure Countermeasure
9.6.5 Denial of Service (DoS)
9.6.6 Elevation of Privilege
9.7 Software-Defined Networking Framework
9.7.1 Global Flow Table
9.7.2 VNGuard
9.8 Security Enhancement Using the Software-Defined Networking Framework 9.8.1 SDN Firewall
9.8.2 Access Control
9.8.3 Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
9.8.4 SDN Policies
9.8.5 Monitoring and Auditing
9.8.6 Privacy Protection
9.8.7 SDN WiFi Networks
9.8.8 Mobile SDN
9.8.9 BYOD
9.8.10 SDN Open Labs
9.9 Open Challenge
9.9.1 Interaction Between Different Controllers and Switches
9.9.2 Controller Security
9.9.3 Managing Heterogenous Controllers
9.9.4 Standard Protocol for Controller
9.9.5 Standard Protocol Between Control and Management Plane
9.9.6 Managing the Load Between Controllers
9.10 Recommended Best Practices
9.10.1 Authentication
9.10.2 Access Control
9.10.3 Data Confidentiality
9.10.4 Nonrepudiation
9.10.5 Data Integrity
9.10.6 Communication Security
9.10.7 Privacy
9.10.8 Availability
9.11 Conclusion and Future Scope
References
10. Security Challenges and Analysis for SDN-Based Networks Priyanka Kujur, Subhra Priyadarshini Biswal and Sanjeev Patel
10.1 Introduction
10.2 Threat Model
10.2.1 Spoofing
10.2.2 Tampering
10.2.3 Repudiation
10.2.4 Information Disclosure
10.2.5 Denial of Service
10.2.6 Elevation of Privileges
10.2.7 Threats in SDN Networks
10.2.7.1 Attack Surface in SDN
10.2.7.2 Security Issues in SDN
10.2.7.3 Addressing SDN Security Matters
10.2.7.4 Attack to the SDN Architecture
10.2.8 Policy-Based SDN Security Architecture
10.3 Control Plane Security of SDN
10.3.1 Application Coexistence
10.3.2 Flow Constraints vs. Flow Circuits
10.3.3 An Application Permission Model
10.3.4 Application Accountability
10.3.5 Toward a Security-Enhanced Control Layer
10.4 Security Analysis
10.5 Network-Wide Security in SDN
10.5.1 Security Systems Development
10.5.2 Flow Sampling
10.5.3 Traffic Monitoring
10.5.4 Access Control
10.5.5 Content Inspection
10.5.6 Network Resilience
10.5.7 Security Middle Boxes
10.5.8 Security Challenges in SDN
10.6 SDN-Based Virtual and Cloud Networks Security
10.6.1 Virtual Networks Security
10.6.2 Cloud Networks Security
10.7 SDN-Based Secure IoT Frameworks
10.8 Conclusion and Future Scope
References
11. A Novel Secure SDN Architecture for Reliable Data Transmission in 5G Networks J. Sathiamoorthy, Usha M. and R. Bhagavath Nishant
11.1 Introduction
11.1.1 Organization of the Chapter
11.2 Related Work
11.3 SDN-5G Networks--What Does the Future Hold?
11.4 Layers in SDN-5G Networks
11.5 Security Threats
11.5.1 Control Plane
11.5.2 Data Plane
11.5.3 Application Plane
11.6 SDN-5G Networks--Possible Attacks and Threats
11.6.1 Distributed Denial of Services (DDoS)
11.6.2 Solution for DDoS—To Analyze User’s Behavior via Detection Through Entropy
11.6.3 Solution for Packet Sniffing
11.6.4 Steps in the Handshake Process
11.6.5 ARP Spoofing Attack
11.6.5.1 ARP Authentication
11.6.5.2 Operating System Patching
11.6.5.3 API Exploration
11.6.5.4 Password Guessing or Brute Force
11.7 Proposed Methodology
11.7.1 Strong Security Architecture for SDN-Based 5G Networks
11.8 Security Analysis
11.8.1 IP Spoofing
11.8.2 MITM Attack
11.8.3 Replay Attack
11.9 Conclusion and Future Scope
References
12. Security and Privacy Issues in 5G/6G-Assisted Software-Defined Networks Durbadal Chattaraj and Ashok Kumar Das
12.1 Introduction
12.1.1 SDN Applications
12.1.2 Security and Privacy Issues in SDN
12.1.3 Chapter Contributions
12.1.4 Chapter Organization
12.2 Security and Functionality Requirements in SDN
12.3 Network and Threat Models
12.3.1 Network Model
12.3.2 Adversary Model
12.4 Taxonomy of Security Protocols in SDN
12.5 Security Solutions in SDN
12.5.1 Authentication
12.5.2 Access Control
12.5.3 Key Management
12.5.4 Intrusion Detection
12.5.5 Blockchain-Based Security Solution
12.6 Comparative Analysis
12.6.1 Comparative Analysis on Communication and Computational Costs
12.6.2 Comparative Analysis on Security Features
12.7 Conclusion and Future Scopes
References
13. Evolving Requirements and Application of SDN and IoT in the Context of Industry 4.0, Blockchain and Artificial IntelligenceSunil Kr. Singh, Sunil Kr Sharma, Dipesh Singla and Shabeg Singh Gill
13.1 Introduction
13.2 Objectives of the Chapter
13.3 Organization of the Chapter
13.4 Software-Defined Network Architecture
13.4.1 SDN Planes
13.4.1.1 Control Plane
13.4.1.2 Data Plane
13.4.1.3 Application/Management Plane
13.4.2 QoS: Quality of Service
13.4.2.1 Jitter
13.4.3 OpenQoS
13.4.4 Secondnet
13.4.5 OpenQFlow
13.4.6 CloudNaaS
13.4.7 Scalable QoS and Automated Control for Network Convergence
13.5 Security
13.5.1 Fresco
13.5.2 NetFuse
13.5.3 Scalability
13.5.4 DIFANE
13.5.5 DevoFlow
13.5.6 Maestro
13.5.7 Load Balancing
13.5.8 AsterX
13.5.9 OpenFlow-Based Server Load Balancing Gone Wild
13.6 Software-Defined Network (SDN) With IoT
13.7 SDN-Based IoT Architecture
13.7.1 IoT’s Architecture With Software Programming Functions
13.7.2 SDN Controllers
13.7.3 Gateways/Routers
13.7.4 Sinks
13.7.5 Data Center
13.7.6 Design Principles
13.7.7 Dynamic Deployment of Security Policies
13.8 Role of SDN and IoT in Industry 4.0
13.8.1 Industry 4.0 Explained
13.5 Security
13.4.2.2 Packet Loss
13.4.2.3 Bandwidth
13.4.2.4 Latency
13.8.1.1 Mass Customization
13.8.1.2 Flexibility
13.8.1.3 Additive Manufacturing
13.8.1.4 Better Decision Making
13.8.1.5 Simulation and Digital Twins
13.8.1.6 Integrated Supply Chain
13.8.1.7 Energy Management
13.8.1.8 Creating Value from Big Data
13.8.1.9 Cyber-Physical Systems
13.8.2 Brokerage Services
13.8.3 Man4Ware
13.8.4 Security
13.8.5 Additional Advanced Service Alternatives
13.8.6 Interconnection and Integration Between IoT and Industry 4.0
13.9 Work in Related Domains of IoT
13.10 IoT Computing and Management With SDN
13.10.1 Edge Computing
13.10.2 Convergence of NFV and Edge Computing
13.10.3 Use of Artificial Intelligence (AI) in Software-Defined Networks (SDN) 13.10.4 SDN Network Structure and OpenFlow (OF) Protocol
13.11 Scope of Blockchain to Secure IoT Using SDN
13.11.1 The Architecture of Blockchain-Based SDN
13.11.2 Workflow of BC-SDN and Smart Contracts
13.11.2.1 Key Components of Workflow
13.12 SDN in Various Emerging Areas of IoT
13.13 Conclusion and Future Scope
References
14. SDN-Based Cloud Combining Edge Computing for IoT Infrastructure Jyoti Snehi, Manish Snehi, Devendra Prasad, Sarita Simaiya, Isha Kansal and Vidhu Baggan
14.1 Introduction
14.1.1 Architecture of SDN vs. Traditional Networks
14.1.2 SDN/NFV Tiers
14.1.3 Objective of Chapter
14.1.4 Organization of Chapter
14.2 Challenges with SDN-Based Cloud and NFV Technologies for IoT
14.3 Literature Survey
14.4 Knowledge-Driven SDN-Based IoT Architecture That Leverages Edge Cloud
14.5 Discussion and Future Recommendation
14.6 Conclusion
References
IndexBack to Top