A Comparative Study on Software-Defined Network with Traditional Networks

TEM Journal Pub Date : 2024-02-27 DOI:10.18421/tem131-17
Berty Smitha Evelin Zoraida, Ganesan Indumathi
{"title":"A Comparative Study on Software-Defined Network with Traditional Networks","authors":"Berty Smitha Evelin Zoraida, Ganesan Indumathi","doi":"10.18421/tem131-17","DOIUrl":null,"url":null,"abstract":"The emergence of a technological age, in which nearly everything is linked and accessible from anywhere, is largely due to the Internet. Hence, traditional Networks continue to be difficult and complex to operate despite their widespread deployment. As a consequence, it is challenging to set up the networks in accordance with the established protocols and respond to variations in load and defects by reconfiguring the structure. The data and control layers are packaged together in the contemporary systems, further complicating problems by vertically integrating them. Because of their limited resources and unsecured transmission channel, wireless sensor networks (WSNs) are particularly vulnerable to persistent security attacks. Many hundreds of self-organized and resource-constrained sensor nodes make up the WSN. It is possible to build an ad-hoc network of sensors without a specified architecture or centralised control because these sensor nodes are often organised in a scattered form. The underlying problem is to strengthen the privacy enforcement in these systems because WSNs will have power over real-time applications, where unauthorized conduct might lead to significant harm. In order to address this issue, the software-defined network (SDN) technology was developed. With the creation of SD, network operators now have more legitimacy and influence over the networks. Based on a global perspective and centralised management of the network topology, SDN has increased the rigour of its enhancing security. This study describes the software-defined network, outlining its fundamental ideas, how it differs from conventional networking, and its architectural tenets. Also, it highlighted the key benefits of SDN while emphasizing availability, maliciousness, packet delivery and duplication ratio, and efficiency.","PeriodicalId":515899,"journal":{"name":"TEM Journal","volume":"58 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"TEM Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18421/tem131-17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The emergence of a technological age, in which nearly everything is linked and accessible from anywhere, is largely due to the Internet. Hence, traditional Networks continue to be difficult and complex to operate despite their widespread deployment. As a consequence, it is challenging to set up the networks in accordance with the established protocols and respond to variations in load and defects by reconfiguring the structure. The data and control layers are packaged together in the contemporary systems, further complicating problems by vertically integrating them. Because of their limited resources and unsecured transmission channel, wireless sensor networks (WSNs) are particularly vulnerable to persistent security attacks. Many hundreds of self-organized and resource-constrained sensor nodes make up the WSN. It is possible to build an ad-hoc network of sensors without a specified architecture or centralised control because these sensor nodes are often organised in a scattered form. The underlying problem is to strengthen the privacy enforcement in these systems because WSNs will have power over real-time applications, where unauthorized conduct might lead to significant harm. In order to address this issue, the software-defined network (SDN) technology was developed. With the creation of SD, network operators now have more legitimacy and influence over the networks. Based on a global perspective and centralised management of the network topology, SDN has increased the rigour of its enhancing security. This study describes the software-defined network, outlining its fundamental ideas, how it differs from conventional networking, and its architectural tenets. Also, it highlighted the key benefits of SDN while emphasizing availability, maliciousness, packet delivery and duplication ratio, and efficiency.
软件定义网络与传统网络的比较研究
科技时代的出现,几乎所有的东西都被联系起来,从任何地方都可以访问,这在很大程度上要归功于互联网。因此,尽管传统网络得到了广泛应用,但其操作仍然十分困难和复杂。因此,按照既定协议建立网络,并通过重新配置结构来应对负载和缺陷的变化,是一项具有挑战性的工作。在当代系统中,数据层和控制层被打包在一起,通过垂直整合使问题更加复杂。由于资源有限且传输通道不安全,无线传感器网络(WSN)特别容易受到持续性安全攻击。数以百计的自组织和资源受限的传感器节点组成了 WSN。由于这些传感器节点通常是以分散的形式组织起来的,因此可以在没有指定架构或集中控制的情况下建立一个由传感器组成的临时网络。根本问题在于如何加强这些系统中的隐私保护,因为 WSN 对实时应用具有控制权,未经授权的行为可能会导致重大损害。为了解决这一问题,软件定义网络(SDN)技术应运而生。随着 SD 的诞生,网络运营商现在对网络有了更多的合法性和影响力。基于全球视角和对网络拓扑结构的集中管理,SDN 提高了其增强安全性的严格程度。本研究介绍了软件定义网络,概述了其基本思想、与传统网络的区别及其架构原则。此外,它还强调了 SDN 的主要优势,同时强调了可用性、恶意性、数据包交付和重复率以及效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信