38th Annual IEEE Conference on Local Computer Networks 2013
DOI: 10.1109/lcn.2013.6761330
|View full text |Cite
|
Sign up to set email alerts
|

A framework to rapidly test SDN use-cases and accelerate middlebox applications

Abstract: Software-defined networking (SDN) is envisioned to provide a centralized interface to programmatically manage networking elements. However, despite its conceptual simplicity, current switch and SDN architectures have poor performance with little support to innovate and test novel SDN applications. We propose an application extensibility framework that allows researchers to build new SDN applications without requiring modification to the OpenFlow-based plumbing available today. We also employ both hardware and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Narayanan et al [96] suggest an application extensibility framework for deploying middlebox functionality (such as encryption) on programmable switches which is compatible with the OpenFlow protocol. Their solution abstracts the packet processing modules on the switch, and creates a virtual port on the switch.…”
Section: Beyond Openflow and Network Functions Virtualizationmentioning
confidence: 99%
“…Narayanan et al [96] suggest an application extensibility framework for deploying middlebox functionality (such as encryption) on programmable switches which is compatible with the OpenFlow protocol. Their solution abstracts the packet processing modules on the switch, and creates a virtual port on the switch.…”
Section: Beyond Openflow and Network Functions Virtualizationmentioning
confidence: 99%
“…The most dangerous situation that can occur is when the SDN controller is attacked, which can occur by exploiting the weaknesses of the processes and services implemented in the controller. As a result, the entire SDN network will be affected, and attackers will be able to take control of the entire network (Van Trung, et al, 2015, October, Narayanan, 2013.…”
Section: Introductionmentioning
confidence: 99%