In this project, we implemented an SDN network using OpenFlow, and Floodlight controller. By utilizing SDN, the next-generation networking technology that can overcome the limitations of traditional networks, we demonstrated how SDN can make network path setup, control, and complex operational management more convenient. This underscores that SDN can be a practical alternative.
In this project, we implemented an SDN network using OpenFlow, and Floodlight controller. By utilizing SDN, the next-generation networking technology that can overcome the limitations of traditional networks, we demonstrated how SDN can make network path setup, control, and complex operational management more convenient. This underscores that SDN can be a practical alternative.
We used Switch Hub to connect two Switches and a Wireless AP to the Controller, and a total of two Switches in the physical wired network. Each Switch is connected to three Raspberry Pi hosts and two Raspberry Pi hosts, respectively, through wired connections, and the Switches use OpenFlow Switch to transmit packets.
Snort:
Snort is open-source software that monitors network traffic, and checks the traffic against a set of rules for attacks. Snort has different parts, like a sniffer to gather traffic, and a detection engine to compare traffic to rules. If a rule matches, it logs the event; if not, it lets the traffic through. In an implemented network, when the controller designates Snort to process specific flows, Snort examines the Flow packets to gather information.
We used Switch Hub to connect two Switches and a Wireless AP to the Controller, and a total of two Switches in the physical wired network. Each Switch is connected to three Raspberry Pi hosts and two Raspberry Pi hosts, respectively, through wired connections, and the Switches use OpenFlow Switch to transmit packets.
Snort:
Snort is open-source software that monitors network traffic, and checks the traffic against a set of rules for attacks. Snort has different parts, like a sniffer to gather traffic, and a detection engine to compare traffic to rules. If a rule matches, it logs the event; if not, it lets the traffic through. In an implemented network, when the controller designates Snort to process specific flows, Snort examines the Flow packets to gather information.