SlideShare uma empresa Scribd logo
1 de 18
Presentation by:-
Ankita Vinod Mandekar (13MIT0108)
1st year MTech IT(Networking),
School of Information Technology and Engineering,
VIT University
Guided by:-
Dr. Krishna Chandramouli
Associate Professor,
Division of Enterprise and Cloud Computing,
School of Information Technology and Engineering,
VIT University
VIT,Vellore
Outline:
1. Traditional Network
2. Centralized network
3. Architecture
4. Software Defined Testbed Cloud
5. Network Virtualization Tunnelling Protocol
6. Conclusion
7. References
router
router
server
172.16.68.1
tracert vit.ac.in
115.248.50.1
218.100.48.152
182.19.48.240
Traditional Network
‱ Distributed Routing
‱ High latency
‱ Reduced throughput
‱ Unmanageable Network
‱ Ossification of network
‱ Congestion
‱ Network Infrastructure
complexities
Controller
Network Devices
Distributed Network
Centralized Network
Architecture of Software Defined Network Test
Bed
Components of SDT
1. SDT Cloud
2. Client Network
1. SDT Cloud
1. 1 Domain Name Server
‱ Domain “sdt.sdntestbed.com”
‱ The Domain Controller and DNS is
on the Host_SDT_1
‱ Active Directory Domain System
Menu Bar of Server Manger
with DNS, AD DS, Hyper-V on
Host_SDT_1
Online System on
the domain
sdt.sdntestbed.com
1.2 Hyper Visor
‱ Hyper-V is the software on the top of the operating
system of the server
‱ Software Based of Data link layer of Network
‱ In SDT cloud, on
Host_SDT_1,Host_SDT_2,Host_SDT_5,Host_SDT_6.
Microsoft Windows 2012 R2
server Hyper Visor
Virtual
Machine
1.3 System Centre Virtual Machine Manager
VM_Client_1 VM_Client_2
SDT_Host_2
Cleint_1 VM Network
Client_2 VM Network
Customers Virtual
Machine on the
SDT cloud
Menu Bar SCVMM Showing the
topology of Virtual Machine
‱ Virtual Machine Manager
‱ Centralize the Cloud Network
‱ View Network Topology-
Maintenance
‱ Management
‱ Security
‱ Resource Management
1.4 Open Flow Switch
‱ Separation of control plane from the
data plane
‱ Enabled with OpenFlow Protocol
with parameters:-
1. Header fields
2. Counters
3. Action
2. Client Network
‱ Two Client Network Client_1 and Client_2
‱ Internet Service Provider with Following IP provided to cloud and customers
Host IP addresses
ONF_SDT_2 131.107.0.1
Host_SDT_3 131.107.0.30
Host_SDT_4 131.107.0.40
Host_SDT_5 131.107.0.2
Host_SDT_6 131.107.0.5
Methodology Used
1. Software Defined Network
‱ Centralizes the Cloud Network
‱ Flow based Forwarding using Open Flow Enabled Network Devices
‱ SCVMM Controller Manages, Maintains the Private Network Topology
‱ Access Control Plugin on Controller
2. Network Virtualization Generic Routing Encapsulation
‱ Virtual Private Network
‱ Virtualization GRE tunnelling protocol
‱ Unique Virtual Subnet ID
‱ Unique Client ID
‱ Encapsulation at source
‱ Original Packet retrieval at Destination
Results
Software Defined Network
‱ Centralized Network on the
Single host Host_SDT_2 in
SDT cloud
‱ Secure from Single point
‱ Flow based Forwarding
using OpenFlow Protocol
‱ Manageable Virtual
Machine hosted in the
cloud
Virtual Private Network with NVGRE tunnelling protocol
‱ Successful reachable from Clients private
Network to the Virtual Machine hosted on SDT
Cloud
‱ Ping to the expected Virtual Machine
‱ Unique Client ID for Client identity
‱ Unique Subnet ID for the Private IP of Clients
Private Network
Conclusion
1. Centralized programmable device SCVMM Controller manages, monitor the physical as
well as virtual systems in the cloud.
2. The OpenFlow enabled Switch have flow table with attributes as matches, ingress port,
and decision flow. The traffic from same source and destination follows same topology.
Thus, the flow based forwarding increasing throughput.
3. Using this technology, the proper distribution of bandwidth is made to provide the
uniform and fast access to virtual Operating System located on the server.
4. Operating System Virtualization results in less infrastructure requirement which is cost
effective.
5. The NVGRE tunnelling protocol provides secure and specific reachability to the
destination on virtual network of cloud.
References
1. In Open Network Foundation: OpenFlow Switch Specification version 1.3.1 (wire
protocol) September 2012.
[https://www.opennetworking.org/images/stories/downloads/sdn-
resources/onf-specifications/openflow/openflow-spec-v1.3.1.pdf]
2. Enterasys Secure Network: Software Defined Network (SDN) in the Enterprise”,
June 2013.
[http://www.npgusa.com/images/Enterasys_Software_Defined_Networks.pdf]
3. Oren Laadan, Jason Nieh, “Operating System Virtualization: Practice and Experience,
May 2010.
[http://www.cs.columbia.edu/~orenl/papers/systor2010_osvirt.pdf]
4. Oren Laadan, Jason Nieh Test Lab Guide: “Windows Server 2012 R2Hyper-V Network
Virtualization with System
Center 2012 R2 VMM Operating System Virtualization: Practice and Experience.
[http://www.systemcentercentral.com/test-lab-guide-windows-server-2012-r2-hyper-
v-network-virtualization-with-system-center-2012-r2-vmm-2/]
5. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling
Innovation in Campus Network” , December 2008.
[http://archive.openflow.org/documents/openflow-wp-latest.pdf]
Software Defined Network Implementation and Virtual Private Network Using NVGRE

Mais conteĂșdo relacionado

Mais procurados

Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Shumon Huque
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on querieskavidhapr
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesswathi78
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...Frederico Martins Pedroso Junior
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)IAESIJEECS
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)Will Shen
 

Mais procurados (11)

Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for interaction ...
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Semelhante a Software Defined Network Implementation and Virtual Private Network Using NVGRE

Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenetAboo Thahir
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdfGVNSK Sravya
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar reportSKS
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
IzoT platform presentation
IzoT platform presentationIzoT platform presentation
IzoT platform presentationEchelon Corporation
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Abed Matini
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptxDixonSunny2
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884Nisha Qazi
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.comULLPTT
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introductionYadvendra bedi
 

Semelhante a Software Defined Network Implementation and Virtual Private Network Using NVGRE (20)

Finalpresentation
FinalpresentationFinalpresentation
Finalpresentation
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
IzoT platform presentation
IzoT platform presentationIzoT platform presentation
IzoT platform presentation
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptx
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
2.pdf
2.pdf2.pdf
2.pdf
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
 

Último

Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night StandCall Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Standamitlee9823
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Último (20)

Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night StandCall Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 đŸ„” Book Your One night Stand
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Software Defined Network Implementation and Virtual Private Network Using NVGRE

  • 1. Presentation by:- Ankita Vinod Mandekar (13MIT0108) 1st year MTech IT(Networking), School of Information Technology and Engineering, VIT University Guided by:- Dr. Krishna Chandramouli Associate Professor, Division of Enterprise and Cloud Computing, School of Information Technology and Engineering, VIT University VIT,Vellore
  • 2. Outline: 1. Traditional Network 2. Centralized network 3. Architecture 4. Software Defined Testbed Cloud 5. Network Virtualization Tunnelling Protocol 6. Conclusion 7. References
  • 3. router router server 172.16.68.1 tracert vit.ac.in 115.248.50.1 218.100.48.152 182.19.48.240 Traditional Network ‱ Distributed Routing ‱ High latency ‱ Reduced throughput ‱ Unmanageable Network ‱ Ossification of network ‱ Congestion ‱ Network Infrastructure complexities
  • 5. Architecture of Software Defined Network Test Bed
  • 6. Components of SDT 1. SDT Cloud 2. Client Network
  • 7. 1. SDT Cloud 1. 1 Domain Name Server ‱ Domain “sdt.sdntestbed.com” ‱ The Domain Controller and DNS is on the Host_SDT_1 ‱ Active Directory Domain System Menu Bar of Server Manger with DNS, AD DS, Hyper-V on Host_SDT_1 Online System on the domain sdt.sdntestbed.com
  • 8. 1.2 Hyper Visor ‱ Hyper-V is the software on the top of the operating system of the server ‱ Software Based of Data link layer of Network ‱ In SDT cloud, on Host_SDT_1,Host_SDT_2,Host_SDT_5,Host_SDT_6. Microsoft Windows 2012 R2 server Hyper Visor Virtual Machine
  • 9. 1.3 System Centre Virtual Machine Manager VM_Client_1 VM_Client_2 SDT_Host_2 Cleint_1 VM Network Client_2 VM Network Customers Virtual Machine on the SDT cloud Menu Bar SCVMM Showing the topology of Virtual Machine ‱ Virtual Machine Manager ‱ Centralize the Cloud Network ‱ View Network Topology- Maintenance ‱ Management ‱ Security ‱ Resource Management
  • 10. 1.4 Open Flow Switch ‱ Separation of control plane from the data plane ‱ Enabled with OpenFlow Protocol with parameters:- 1. Header fields 2. Counters 3. Action
  • 11. 2. Client Network ‱ Two Client Network Client_1 and Client_2 ‱ Internet Service Provider with Following IP provided to cloud and customers Host IP addresses ONF_SDT_2 131.107.0.1 Host_SDT_3 131.107.0.30 Host_SDT_4 131.107.0.40 Host_SDT_5 131.107.0.2 Host_SDT_6 131.107.0.5
  • 12. Methodology Used 1. Software Defined Network ‱ Centralizes the Cloud Network ‱ Flow based Forwarding using Open Flow Enabled Network Devices ‱ SCVMM Controller Manages, Maintains the Private Network Topology ‱ Access Control Plugin on Controller
  • 13. 2. Network Virtualization Generic Routing Encapsulation ‱ Virtual Private Network ‱ Virtualization GRE tunnelling protocol ‱ Unique Virtual Subnet ID ‱ Unique Client ID ‱ Encapsulation at source ‱ Original Packet retrieval at Destination
  • 14. Results Software Defined Network ‱ Centralized Network on the Single host Host_SDT_2 in SDT cloud ‱ Secure from Single point ‱ Flow based Forwarding using OpenFlow Protocol ‱ Manageable Virtual Machine hosted in the cloud
  • 15. Virtual Private Network with NVGRE tunnelling protocol ‱ Successful reachable from Clients private Network to the Virtual Machine hosted on SDT Cloud ‱ Ping to the expected Virtual Machine ‱ Unique Client ID for Client identity ‱ Unique Subnet ID for the Private IP of Clients Private Network
  • 16. Conclusion 1. Centralized programmable device SCVMM Controller manages, monitor the physical as well as virtual systems in the cloud. 2. The OpenFlow enabled Switch have flow table with attributes as matches, ingress port, and decision flow. The traffic from same source and destination follows same topology. Thus, the flow based forwarding increasing throughput. 3. Using this technology, the proper distribution of bandwidth is made to provide the uniform and fast access to virtual Operating System located on the server. 4. Operating System Virtualization results in less infrastructure requirement which is cost effective. 5. The NVGRE tunnelling protocol provides secure and specific reachability to the destination on virtual network of cloud.
  • 17. References 1. In Open Network Foundation: OpenFlow Switch Specification version 1.3.1 (wire protocol) September 2012. [https://www.opennetworking.org/images/stories/downloads/sdn- resources/onf-specifications/openflow/openflow-spec-v1.3.1.pdf] 2. Enterasys Secure Network: Software Defined Network (SDN) in the Enterprise”, June 2013. [http://www.npgusa.com/images/Enterasys_Software_Defined_Networks.pdf] 3. Oren Laadan, Jason Nieh, “Operating System Virtualization: Practice and Experience, May 2010. [http://www.cs.columbia.edu/~orenl/papers/systor2010_osvirt.pdf] 4. Oren Laadan, Jason Nieh Test Lab Guide: “Windows Server 2012 R2Hyper-V Network Virtualization with System Center 2012 R2 VMM Operating System Virtualization: Practice and Experience. [http://www.systemcentercentral.com/test-lab-guide-windows-server-2012-r2-hyper- v-network-virtualization-with-system-center-2012-r2-vmm-2/] 5. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling Innovation in Campus Network” , December 2008. [http://archive.openflow.org/documents/openflow-wp-latest.pdf]