Preview

Open flow

Better Essays
Open Document
Open Document
1178 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Open flow
1. Introduction.
Open flow is a new kind of protocol designed to run on Switches and routers. It’s built on a separated base between the forwarding plane and control plane joined through a secure channel. The controller, within the control plane, handles the management of the tables and traffic flow through updating, deleting and adding of flows while the forwarding plane handles traffic forwarding. Open Flow is designed in a way that the devices can separate research traffic from the normal operations traffic within a network. In this protocol a user or researcher can control his/her traffic directly through attaching the routes, actions and how it should be handled. So the ‘which traffic’ – type of traffic we are sending i.e. is it multicast, broadcast, echo requests etc, ‘where to’ – to which addresses are we sending it to ‘and how / what action’ – how should it be handled. These questions are important in running this protocol as they have to always be answered.

Open Flow propagation is based on the existing inflexibility of the available network devices in leaning towards testing new operations, protocols etc. A good example would be someone coming up with a new protocol example would be RIP v3 and would want to test it. So s/he would run it through the controller and picks the routes the traffic would have to take and also the actions to be carried out on the traffic. This can be done on all switches the traffic is to traverse while separating it from the traditional traffic in the network

Delving into those three basic parameters which should be well defined, its imperative to note that Open Flow devices should have a routing table, call it a Content Addressable Memory (CAM) table for the switches. In this table all entries should have packet headers that are used to guide the flow, an action tag on how traffic should be processed i.e. either let through or dumped and the counters that show amount of packets processed or passing through for

You May Also Find These Documents Helpful

  • Good Essays

    When the source will send the packets to destination if the destination will in different domain then controller send the test packet from their own domain to other domain for calculated the optimized whole path in the network.The Controller of the source domain will leave one inter-domain link…

    • 694 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    7.2.2 Data can be transmitted from different devices simultaneously. This topology can withstand high traffic; even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected and Expansion and modification in topology can be done without disrupting other nodes.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    OMNeT++ was designed to support network simulation on a large scale. It consists of modules that communicate with message passing. The active modules are the simple modules which are written in C++ using the simulation class library. Simple modules can be grouped into compound modules. Messages are sent via connections that span the modules or directly to their destination modules. The simple and compound modules are instances of module types. The user creates a system module as a network module which is a special compound module without gates to the external world. These modules can be reused with the help of model frameworks like INET framework and Mobility framework.…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    36. (T or F) Broadcast routing enables a single node to send a copy of a packet to a predetermined subset of destination network nodes.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NETW320 WEEK1 PAPER

    • 624 Words
    • 3 Pages

    In this paper, my purpose is to educate the reader and by the end of this paper, you will be more informed on these following concepts; what the RFC is what an Internet Draft is, as well as the organization that produces the documents and lastly, the process that allows the documents to be produced. This paper will briefly tour the history behind these concepts and show how they are affecting our Internet usage.…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Finding Flow

    • 714 Words
    • 2 Pages

    In “Finding Flow: The Psychology of Engagement with Everyday Life,” Mihaly Csikszentmihalyi explains that happiness is not attained through leisure or relaxation, but through the fulfillment of flow. Flow is not exactly happiness, but a supreme feeling after accomplishing a demanding task. This feeling has been termed as being on top of one’s game, yet Csikszentmihalyi actually describes how to reach this “place” in a person’s everyday life, claiming that this is the goal for having a good and virtuous life. He reasons that true happiness is attained through reaching a state of flow- where a task completely immerses one’s thoughts and abilities, requiring one to have a lucid objective, equilibrium between demands and abilities, and instantaneous reaction to the task.…

    • 714 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    10. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Currently, the relationship between OTT with still a push-pull operators. On the one hand, operators need OTT as a reason to use for customers to use data access, which is currently the operator, must continue to invest to develop a network with high investment. On the other hand, OTT require operators to acquire customers and access to services, but this time…

    • 327 Words
    • 1 Page
    Satisfactory Essays