StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Most Common Software-Defined Networks - Essay Example

Cite this document
Summary
The paper "The Most Common Software-Defined Networks" describes that the software is installed on an existing host operating system acting as an application; the host application allows guest operating systems, known as guest OS, to be run and loaded, if many each with an own virtual environment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
The Most Common Software-Defined Networks
Read Text Preview

Extract of sample "The Most Common Software-Defined Networks"

?Software defined networks (SDN) The most common software defined networks (SDN) definition revolves around splitting the data plane or the Ethernet switch forwarding hardware from its control plane or the logic involved in the packet flowing to egress from ingress. The SDN definition based upon Open Flow offers a standard based Application Programming Interface (API) that links a controller and an Ethernet switch. From an architectures point of view, what is along side or on top of the controller is another set of APIs or API that virtualizes networking like what VMware does for serves (Greene, K, 2009.). According to capability and application definition SDN seeks to provide a standard based application development platform and commoditize network hardware. This includes taking most of the functionality and features that exist in custom proprietary software then directing it in to an open SDN space. An in-depth on how SDN is implemented is that the system is incorporated in underutilized servers that information technology organizations already operate and own. In summary, the firmware of routers and network switches that has for a long time remained under the control of the companies that manufacture this equipment is been changed by making this remotely modifiable and remotely accessible through third party software clients, making use of open flow an example an open protocol. SDN allows for external access to the innards of routers and switches that were formally proprietary and closed and also for quick optimization and experimenting of routing or switching policies. The switching fabric of conventional Layer 2/3 networks serves as a routing and switching fabric for the blade center server chassis. These switches have the capability of layer 2 switching and layer three routing providing security and flexible traffic management in the chassis. The layer 2/3 fiber GbE and Copper switching modules provides full layer 2 switching making capabilities available such as link aggregation control, Cisco Ether channel, advanced spanning tree protocols and 802.1Q VLANs, Internet Group Management Protocol (IGMP), performance features and application delivery such as granular QOS, multicasting and snooping (‘Nortel Networks Layer 2/3 Gbe Switch Module’ 2004). The open flow technology showcases network programmability through the remote control application. This is all about remotely and directly programming a network switch to handle traffic dynamically in a particular way making use of the CLI type of commands. An example, to achieve the forward flow to a particular switch port, ensure other flows are blocked, while the switch is programmed to make such actions alternate in a predefined manner i.e. time interval of say 40 seconds. Use this demonstration using a number of servers that are to listen to the same multicast address while the switch is being programmed to allow a single server to give air play to a single client in the case of video servers. This application is applicable in the context of software defined networking as it empowers the operator, user and administrator to have an own definition of treating traffic. This, in a way, resembles the activities and operations of a TV remote control where one is able to switch through channels only that in this case it is automatic. This is transparent to the end host in that clients and video servers are unaware of the switch managing or controlling the traffic (Anderson, c, et al, 2009 Remote Control SDN). A command line interface (CLI) is a dialog or an interface where two programs or the user and the program pass a command line in SDN it is an essential key aspect. Such command lines used in software defined networks are some of the windows shell and OS/2 presentation manager these graphical interfaces helps programs and users communicate with their execution strategies such as opening programs and documents. The registry or the graphical shell is where these commands are stored. In SDN standard input/output interface (stdin $ stdout) can be employed to look for console hacks allowed in order to store and edit commands in software (Pike, R and Kerninghan, B, 1984). In a disaster recovery scenario where it is found necessary for the migration of machines from the live data centers to a hot/warm standby, the evaluation deployment of an application stack known as LAMP (Linux, Apache, MySQL, and PHP) that uses Xen open source software can be incorporated. The hypervisor or virtual machine monitor is software that allows for multiplexing and migration of virtual machines from one physical system to another (Clark, C et al, 2005). This software creates a virtual hardware platform regardless of the physical system. Live migration can be achieved without interfering with the execution of the guest OS on the virtual machine. Live migration has benefits such as system management events, dynamic relocation of OS in response to performance needs. In this example of live data migration environment, the Linux and Xen hypervisor software are the key components used. The hypervisor is an open source software package that manages and creates partitions for multiple virtual machines. In this virtualization, the guest OS are aware of the fact that they are running in a virtualized environment (Barham, P, et al, 2003, p 164-177). Xen uses a virtualization architecture known as para-virtualization, with para-virtualization the guest OS is enabled to make hyper calls to the hypervisor privileged operations, instead of the regular system calls in unmodified OS. Another of migration of migration of virtual machines from the live data centers to a hot/warm standby is Virtual box, which is, a type 2 hypervisor that runs with a conventional operating system environment. With the second software level acting as the hypervisor layer, the guest operating system runs at the third level which is above the hardware. Virtual box is an x86 virtualization package that is developed by Oracle Corporation as part of its virtualization products. The software is installed on an existing host operating system acting as an application; the host application allows gust operating systems, known as guest OS, to be run and loaded, if many each with an own virtual environment. Oracle VM virtual box supports hosts operating systems such as Mac OS X, Solaris, and Windows vista, Linux, Windows XP, Windows 7 and Open Solaris. It also supports a number of guest operating systems which include derivations and versions of Linux, Windows, OS/2, BSD and Solaris. In the absence of hardware based assisted, virtualization, a software based virtualization approach is adopted by Virtual Box. A 32 bit guest OS, which run in ring 3 and 0 of the Intel ring architecture, is supported by this mode. In hardware, assisted virtualization virtual box supports both AMD’s AMD-V and Intel’s VT-x hardware virtualizations. Virtual Box can run each guest virtual machine in its own separate address space; some of the guests including SMP guests and certain proprietary, 64 bit guests are only supported by Virtual Box if their hosts have hardware assisted virtualization ((Travostino, F, et al, 2006, p 901-907). References Anderson, C, et al, 2009, Remote Control SDN, Practical symposium forum. Barham, P, et al, 2003, p 164-177, Xen and the Art of Virtualization. In Proc, SOSP. Clark, C. et al, 2005, Live Migration of Virtual Machines, 2nd Symposium on Networked Systems Design and Implementation (NSDI). Greene, K, 2009, Software Defined Networking, technology review. Nortel Networks Layer 2/3 Gbe Switch Module for IBM, 2004, server Blade Center, Installation Guide, First Ed. Travostino, F, et al, 2006, p 901-907, Seamless Live Migration of Virtual Machines over the MAN/LAN. Future Gener, Comput, Syst. Pike, R and Kerninghan, B, 1984, the UNIX Programming Environment: Command Lines, Acorn Computers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software Defined Networks (SDN) Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Software Defined Networks (SDN) Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1450667-how-software-defined-networks-sdn-differ-from-the
(Software Defined Networks (SDN) Essay Example | Topics and Well Written Essays - 1000 Words)
Software Defined Networks (SDN) Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1450667-how-software-defined-networks-sdn-differ-from-the.
“Software Defined Networks (SDN) Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1450667-how-software-defined-networks-sdn-differ-from-the.
  • Cited: 2 times

CHECK THESE SAMPLES OF The Most Common Software-Defined Networks

Network Security

In order to sufficiently comprehend the rules and traits of network security, it is imperative that an individual has some basic knowledge of computer networks.... Therefore, it is customary to briefly discuss the foundations of computer networking before moving over to the popular networks and their security.... Computer networks have a similar way to function.... Some Popular networks: A lot of networks have been identified and employed over the last 2....
9 Pages (2250 words) Research Paper

Network Intrusion Detection and Forensics

The paper tells that computers have come to assume in all aspects of our lives, and the lack of reliable networks in modern computing environments in plainly inconceivable.... The supremacy of information technology in running many modern systems hinges on the continued reliability of computer networks.... Malicious use of computer networks would completely compromise our computing experience and the utilization of these indispensable network tools....
26 Pages (6500 words) Dissertation

Network Architecture Selection

In considering the most appropriate system or network architecture, several factors need to be considered.... Basically, selecting the network's architecture entails answering several questions which each play a part in determining the most appropriate choice.... In more ways than one, designing the architecture of a network is parallel to planning and building a house or physical structure. ...
5 Pages (1250 words) Essay

Evaluating benefits of networks and performing network management responsibilities

the most popular network topologies are:Bus topology provides the simplest network connection.... Local Area networks (LAN) can be described in various configurations and layouts referred to as Network Topology.... Local Area networks (LAN) can be described in various configurations and layouts referred to as Network Topology.... Advantages & Disadvantages of networks in an OrganizationThe following advantages follow from installing and managing efficiently, a LAN in an organization....
7 Pages (1750 words) Essay

Risk Management (Firms and organisations within the healthcare sector)

3 Risk AssessmentRisk is commonly defined as the product of probability and severity of adverse effects, and the most common approach to quantify risk is a single figure - its expected value [Hai98, p.... Firms and organisations within the healthcare sector store highly sensitive information on their networks and databases.... As a direct outcome of the aforementioned, healthcare firms and organizations have adopted risk assessment and risk management strategies for the explicit purpose of securitizing the information stored on their networks. ...
4 Pages (1000 words) Essay

Network Management Issues

In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs).... They will often provide means for internetworking of local networks.... Metropolitan area networks can span up to 50km, devices used are modem and wire/cable ... Using DQDB, networks can be up to 30 miles long and operate at speeds of 34 to 155 Mbit/s.... Metro Ethernet) in most areas....
24 Pages (6000 words) Essay

Current Federal Government Initiatives

Cooperation between government and the public sector is essential and regional-level networks need to include harmonization (Conn).... he Office for the National Coordinator for Information Technology was established in 2004 to coordinate IT expenses, encourage the creation of new National health information networks and promote the creation of local facilitation of clinical data exchange while encouraging the growth of regional health information networks (Halamka)....
3 Pages (750 words) Essay

Virus Detection Software

In terms of discussions, the paper starts by giving a discussion on an architecture of modern computer networks.... In essence, people categorize networks depending on a variety of traits.... Such mechanisms define the architecture of modern computer networks.... According to research, categorizations of different forms of networks exist according to the regions covered such as MAN, LAN, and WAN (Debashis, 2003, P.... Consequently, it is considerate to know concerning the modern network architecture as networks play an extremely important position in today's humanity....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us