FIOT UNIT 4 Pagenumber
FIOT UNIT 4 Pagenumber
• All traditional networking devices like router and switches uses distributed
control plane. But newer model of networking i.e., Software-defined
Networking (SDN) uses centralized control plane.
• Distributed control plane means that control plane of all networking devices
lies within the device itself.
• Each device have their own control plane to control data plane.
• In Centralized control plane system, there is a device which contains control
plane of all devices.
• This device control the activities of data plane of all networking devices
simultaneously.
• This device is called Controller or SDN controller.
1
1. Southbound Interface:
In SDN, all networking devices must be connected to controller so that it can
regulate data planes of all devices. When drawing architecture of network,
usually the network architect places networking devices below controller. Now
according to map conventions, interface between controller and networking
devices lies to south of controller. Hence, these interfaces are
called Southbound Interface.
2. Northbound Interface :
Controller need to know many information regarding network so that it can
control data plane of networking devices All these information are provided by
Network Programmer. Network Programmer provide essential information to
controller through various software or script about what functions it has to do.
Again these softwares/scripts are placed above controller in network
architecture. This placement of software/script makes interfaces between
controller and software in north direction, according to map conventions.
Hence, Interfaces between controller and softwares are called Northbound
Interface. These interfaces enable programmability of network.
2
3. All interfaces we discussed above are program based interfaces. These
interfaces in a broader sense are called Application Program Interface (API).
An API is an interface through which two program can exchange data between
them.
In order to understand software defined networks, we need to understand the
various planes involved in networking.
Dataplane:
All the activities involving as well as resulting from data packets sent by the end
user belong to this plane. This includes:
• Forwarding of packets
• Segmentation and reassembly of data
• Replication of packets for multicasting
Control plane:
All activities necessary to perform data plane activities but do not involve end
user data packets belong to this plane. In other words, this is the brain of the
network. The activities of the control plane include:
• Making routing tables
• Setting packet handling policies
In a traditional network, each switch has its own data plane as well as control
plane. The control plane of various switches exchange topology information and
hence construct a forwarding table which decides where an incoming data packet
has to be forwarded via the data plane.
3
Advantages of SDN:
• Network is programmable hence can easily be modified via the controller
rather than individual switches.
• Switch hardware becomes cheaper since each switch only needs a data plane.
• Hardware is abstracted, hence applications can be written on top of controller
independent of switch vendor.
• Provides better security since the controller can monitor traffic and deploy
security policies. For example, if the controller detects suspicious activity in
network traffic, it can reroute or drop the packets.
Disadvantages of SDN:
The central dependency of the network means single point of failure, i.e. if the
controller gets corrupted, the entire network will be affected.
4
SDN Architecture
• Application layer:
It contains the typical network applications like intrusion detection, firewall,
and load balancing
• Control layer:
It consists of the SDN controller which acts as the brain of the network. It
also allows hardware abstraction to the applications written on top of it.
• Infrastructure layer:
This consists of physical switches which forms the data plane and carries out
actual movement of data packets.
5
The layers communicate via a set of interfaces called the northbound
APIs(between application and control layer) and southbound APIs(between
control and infrastructure layer).
Challenges
✓ Rule placement
✓ Controller placement
Rule placement
✓ Each rule has a specific format, which is also defined by a protocol (e.g.,
OpenFlow).
6
✓ The controller decides a suitable flow-rule for the request.
OpenFlow Protocol
✓ It has different versions – 1.0, 1.1, 1.2, 1.3, etc. – to have different
number of match-fields.
7
✓ Different match-fields
▪ Source IP
▪ Destination IP
▪ Source Port
▪ Priority
▪ etc.
✓ Hard timeout
✓ Soft timeout
8
▪ SDN is a technology/concept
Controller Placement
9
✓ Typically, a controller can handle 200 requests in a second (through a
single thread).
Flat Architecture
So, one architecture the basic architecture is called the flat architecture, and here
basically the switch and the controller they are just logically one hop away the
switch sends a packet in message to the controller if the switch already does not
have this flow rule for the particular flow that it has received.
10
So, it will set a send a packet in message to the controller and the controller is
going to send back the flow rule corresponding to that to that particular. That
means, how it is at how the switch is going to treat it you know that particular
instruction is going to be sent by the controller the controller knows it the
controller knows how the different flows how the different packets are going to
be handled this is the assumption in this particular technology SDN technology.
Hierarchical (tree) Architecture
This is the hierarchical or the tree architecture and these I do not need to
elaborate further, but it is quite obvious we have these different switches and
hierarchically they are placed within the controllers are placed and connected to
these different switches in a tree like fashion.
And we have this packet in message and the corresponding flow rule coming
11
back for each of these connectivity’s.
Ring Architecture
In the ring architecture we have a similar kind of thing, but we have to keep in
mind that in the ring architecture. So, basically these controllers are placed in a
ring like fashion we have multiple controllers like this placed in ring like fashion,
but a particular switch is connected to only one controller in this version.
12
when the packet in request has to be sent this PACKET-IN request will be sent to
a single controller only not that it can be sent to any of the other controllers in the
ring it will be sent to a single controller and the low rule is going to be sent to
this particular switch that has
requested the rule, and then we have the mesh architecture mesh as we know
increases the reliability. And as you can see over here for instance we have 2
different switches who can be connected to a single controller. So, if this one
goes down there is the other one which can take over and so on. requested the
rule, and then we have the mesh architecture mesh as we know increases the
reliability. And as you can see over here for instance we have 2 different
switches who can be connected to a single controller. So, if this one goes down
there is the other one which can take over and so on.
Control Mechanisms
✓ Distributed
13
▪ The control decisions can be taken in a distributed manner
▪ Ex: each subnetwork is controlled by different controller
✓ Centralized
▪ The control decisions are taken in a centralized manner.
▪ Ex: A network is controlled by a single controller.
Backup Controller
SDN one can have enhanced level of security in the network and in this
particular case we will be talking help of the firewall proxy,http, and the IDS
and these can have improved security with respect to this technology.
So, just as a very brief you know here we are not going to discuss about you
know improving security with SDN and in much detail, but just as a brief you
know this is the this is this is a this is a paper which was published in
SIGCOMM in 2013 very recently; that means, which is talking about the
simplifying protocol for policy enforcement.
So, what it does? So, you know let us look at this particular figure. So, it is an
example of a potential data plane ambiguity to implement the policy chain this
chain firewall IDS proxy in this particular topology and the sequence of flow of
instructions is like this. So, it will this is from the http when a http request comes
then it is sent from one switch to another switch. This particular switch then it
14
goes to the IDS comes back goes to the proxy and the forwarding and the
firewall.
And then finally, to this particular switch and then to the then finally, out of the
network. So, this is how you know security is implemented and enhanced using
SDN. So, we are not talking about as I mentioned already I just wanted to show
you that security can indeed be improved with the help of SDN. And we do not
want to discuss anything further on this particular issue.
✓ Simulator/Emulator
▪ Local
Switch Deployment
✓ Mininet
15
SDN for IOT
16
Now, if we look at this particular figure in front of us we have these different
devices the IoT devices in different sub networks maybe and these devices
through mobile axis or fixed axis channels this data from these devices they can
be acquired and be transmitted to the data aggregator. Here all these data
aggregation are going to be done of the data that is received from these different
IoT devices. And then it passes through a transport network and from the
transport network it goes to the different gateways and the packet segregation is
going to bedone using this.
So, this is basically the simplified view of an IoT network now what happens is
when we want to integrate SDN what we are trying to do is we are going to use
17
the SDN controller. So, what the SDN controller is going to do is it is going to
control each of these different things different aspects and also it is you know it
is going to improve the orchestration between the different devices between the
different protocols that are running, etcetera, etcetera in this network and overall
it is going to improve the service logic that is behind it. So, this is going to be
improved.
Now with the SDN with the implementation of the SDN the control of these n
devices IoT devices which includes sensors actuators RF id tags and any other
IoT device. So, you know the centralized control is made possible then here as
we can see this part can take care of the rule placement, because we have these
access devices over here the rule placement while considering issues like
mobility etcetera and the heterogeneity of the n devices this can be implemented
here.
And the rule placement and traffic engineering and backbone networks can be
taken care of at the transport network and flow classification and enhanced
security are taken care of at the data center networks.
18
Data handling is the process of ensuring that research data is stored, archived or
disposed off in a safe and secure manner during and after the conclusion of a
research project. This includes the development of policies and procedures to
manage data handled electronically as well as through non-electronic means .
Issues that should be considered in ensuring integrity of data handled include the
following:
19
• Collection of data sets so large and complex that it becomes difficult to
process using on-hand database management tools or traditional data
processing applications .
• “Big Data” is the data whose scale, diversity, and complexity require new
architecture, techniques, algorithms, and analytics to manage it and extract
value and hidden knowledge from it.
• ‘Big Data’ is similar to ‘small data’, but bigger in size
• An aim to solve new problems or old problems in a better way.
• Big Data generates value from the storage and processing of very large
quantities of digital information that cannot be analyzed with traditional
computing techniques.
Types of Data:
✓ Structured data
✓ Data that can be easily organized.
✓ Usually stored in relational databases.
✓ Structured Query Language (SQL) manages structured data in
databases.
✓ It accounts for only 20% of the total available data today in the world.
✓ Unstructured data
✓ Information that do not possess any pre‐defined model.
✓ Traditional RDBMSs are unable to process unstructured data.
✓ Enhances the ability to provide better insight to huge datasets.
✓ It accounts for 80% of the total data available today in the world.
20
Characteristics of Big Data:
✓ Volume
✓ Velocity
✓ Variety
✓ Variability
✓ Veracity (Accuracy)
✓ Visualization
✓ Value
❖ Volume
o Example of volume ‐
❖ Velocity
21
o Data processing time decreasing day‐by‐day in order to provide
real‐time services
o Example of velocity –
❖ Variety
o Example of variety –
▪ Pure text, images, audio, video, web, GPS data, sensor data,
SMS, documents, PDFs, flash etc.
❖ Variability
o Example:
22
▪ Language processing, Hashtags, Geo‐spatial data,
Multimedia, Sensor events
❖ Veracity
❖ Value
❖ Cloud computing
▪ Resource pooling
▪ Rapid elasticity
23
▪ Measured service
▪ Infrastructure‐as‐a‐Service (IaaS)
▪ Platform‐as‐a‐Service (PaaS)
▪ Software‐as‐a‐Service (SaaS)
24
o Develop business oriented strategic solutions from big data.
Flow of Data
Data Sources:
✓ Enterprise data
✓ IoT data
✓ Medical‐care data,
25
✓ Data from public departments, and families.
✓ Bio‐medical data
✓ Other fields
Data Acquisition:
✓ Data collection
✓ Data transmission
✓ Data pre‐processing
26
✓ Integration is combining data from various sources and provides users
with a uniform view of data.
Data Storage
✓ File system
✓ Databases
27
Apache Hadoop's Map Reduce and Hadoop Distributed File System (HDFS)
components originally derived respectively from Google's MapReduce and
Google File System (GFS).
✓ Hadoop Common
✓ MapReduce
✓ Centralized node
28
✓ Namenode
✓ Distributed node
✓ Datanode
✓ Namenode
✓ Datanode
✓ Data nodes can talk to each other to rebalance and replicate data
✓ Job Tracker –
29
✓ Decides on where to run each mapper (concept of locality)
✓ Task Tracker –
✓ Master
✓ Slave
✓ Serves read and write requests from the file system’s clients.
30
✓ Performs block creation, deletion, and replication as instructed by the
Namenode.
✓ “Data analytics (DA) is the process of examining data sets in order to draw
conclusions about the information they contain, increasingly with the aid of
specialized systems and software. Data analytics technologies and
techniques are widely used in commercial industries to enable
organizations to make more‐ informed business decisions and
researchers to verify or disprove scientific models, theories and
hypotheses.”
31
✓ Qualitative Analysis
✓ Quantitative Analysis
Qualitative Analysis
✓ Data can be gathered by many methods such as interviews, videos and audio
recordings, field notes
✓ Notice things
✓ Collect things
Quantitative Analysis
32
✓ The following are often involved with quantitative analysis:
✓ Statistical models
✓ Analysis of variables
✓ Data dispersion
✓ Regression analysis
✓ Statistical significance
✓ Precision
✓ Error limits
Comparison:
33
Advantages
✓ Can be viewed in a visual manner, which leads to faster and better decisions.
Statistical models
✓ Complete models
✓ Incomplete models
34
✓ An incomplete model does not have the same number of variables as
the number of equations
✓ Data Gathering
✓ Descriptive Methods
✓ Building of model
Analysis of variance
✓ Independence of case
35
✓ There should not be any pattern in the selection of the sample
✓ Normality
✓ Homogeneity
✓ One fixed factor (levels set by investigator). Factors: age, gender, etc.
✓ K‐way analysis
✓ F –ratio
36
✓ Helps to understand the ratio of variance between two data sets
✓ The F ratio is approximately 1.0 when the null hypothesis is true and
is greater than
F=Msbetween/MSwithin
✓ Degree of freedom
Data dispersion
✓ Range
✓ Range
37
✓ The average absolute deviation (or mean absolute deviation) of a data
set is the average of the absolute deviations from the mean.
✓ Variance
✓ Standard deviation
38
Regression analysis:
✓ Regression analysis is widely used for prediction and forecasting, where its
use has substantial overlap with the field of machine learning
Statistic al significance
✓ Statistical significance level reflects the risk tolerance and confidence level
✓ There are two key variables that go into determining statistical significance:
✓ Sample size
39
✓ Effect size
✓ The larger your sample size, the more confident you can be in the result of
the experiment (assuming that it is a randomized sample)
✓ The effect size is just the standardized mean difference between the two
groups
✓ Precision refers to how close estimates from different samples are to each
other.
✓ When the standard error is small, estimates from different samples will be
close in value and vice versa.
✓ The limits of error are the maximum overestimate and the maximum
underestimate from the combination of the sampling and the non‐sampling
errors
40
✓ Critical value: Determines the tolerance level of error.
✓ The limits of error are the maximum overestimate and the maximum
underestimate from the combination of the sampling and the non‐sampling
errors
41