Software Defined Networking (SDN) Challenges, issues and Solution
DOI:
https://doi.org/10.26438/ijcse/v7i1.884889Keywords:
SDN, OPENFLOW, Performance, Security, CDDAAbstract
IT infrastructure and its maintenance processes are changing in different organizations by the advent of cloud computing and may be able to eliminate their existing hardware. In traditional way of configuring a switch or routers may error-prone and cannot fully utilize the capability of existing network infrastructure. SDN is a way of providing programmability for network application development by its distinguished features decoupling the control plane from the data plane. In this paper we focused on the new concept in computer networking field, software defined network (SDN) and its challenges, issues, solutions. First, we provided and cover its basic model and software used to build a computer network with the help of software defined network mechanism then software tools used are listed, challenges and issues are described.
References
[1] https://www.ibm.com/services/network/software-defined.
[2] https://www.webopedia.com/TERM/S/software_defined_networking.html.
[3] Ashton, Metzler, and Associates, Ten Things to Look for in an SDNController, Technical Report, 2013.
[4] P. Vizarreta, K. Trivedi, B. Helvik, P. Heegaard, W. Kellerer and C. M. Machuca, "An empirical study of software reliability in SDN controllers," 2017 13th International Conference on Network and Service Management (CNSM), Tokyo, 2017, pp. 1-9.
[5] https://cdn.ttgtmedia.com/rms/editorial/HowSDNWorks-SoftwareDefinedNetworks-Ch4.pdf S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012.
[6] Manar Jammala1, TaranpreetSingha, AbdallahShamia, RasoolAsalb, and YimingLic,” Software-Defined Networking. State of the Art and Research Challenges,” In Computer Networks, vol. 72, pp. 74–98, 2014.
[7] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E. Rothenberg, S. Azodolmolky and S. Uhlig, "Software-Defined Networking: A Comprehensive Survey," in Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76, Jan. 2015.R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[8] W. Xia, Y. Wen, C. H. Foh, D. Niyato and H. Xie, "A Survey on Software-Defined Networking," in IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 27-51, First quarter 2015.M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001.
[9] Bob Lantz, Brandon Heller, Nick McKeown, “A Network in a Laptop: Rapid Prototyping for Software-Defined Networks,” in Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks Article No. 19.
[10] Bruno NunesAstuto, Marc Mendonça, Xuan Nam Nguyen, Katia Obraczka, ThierryTurletti, ” A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks,”Communications Surveys and Tutorials, IEEE Communications Society, Institute of Electrical and Electronics Engineers, 2014, 16 (3), pp.1617 - 1634.
[11] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. Ramos-Munoz, J. Lorca, and J. Folgueira, “Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges,” IEEE Communications Magazine, vol. 55, pp. 80-87, 2017.
[12] Vishal Kadam1, Makhan Kumbhkar , Security in Cloud Environment, International Journal of Scientific Research in Computer Science and Engineering uter Science and Engineering uter Science and Engineering, vol-2,issue-3, June-2014
[13] Seema Rani, Kumari. (2018). Open Source Software: A Prominent Requirement of Information Technology. International Journal of Scientific Research in Network Security and Communication. 6. 24-29. 10.26438/ijsrnsc/v6i2.2429.
[14] Ashish Dhondiyal, Shiv & Singh Rana, Deeepak. (2018). Sleeping Mode MODLEACH Protocol for WSN. IJARCCE. 7. 112-116. 10.17148/IJARCCE.2018.7823.
[15] Rana, Deepak & Garg, Naveen & Chamoli, Sushil. (2012). A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations. International Journal of Computer Technology and Applications. Vol 3 (4), 1476-1480
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
