Traditional networks rely on network devices to make forwarding and routing decisions by implementing hardware tables that are embedded to the device itself, such as a bridge and router. As well, traffic rules such as filtering, and prioritizing are implemented locally in the device. However, software-defined networks (SDN) brought advancement in networking by addressing simplicity, as it aims to reduce the design complexity involved in implementing both the hardware and software of network devices.
The basic concept of SDN is to remove the controllability from network devices and allow one central device, i.e., control unit to control and manage. The control unit is capable of observing the entire network and making decisions regarding forwarding and routing, whereas the task of forwarding is handled by network hardware devices in addition to filtering and traffic prioritization [1]. OpenFlow is a well-known SDN design that follows its basic architecture of decoupling control from the data plane where the controller and switches are communicating through OpenFlow protocols. Switches, on the other hand, contain flow tables and flow entries such as matching fields, counters and sets of actions, while the controller is capable of performing sets of actions on flow entries, such as update, delete and add [2].
Even though cloud computing is a powerful technology, there are some issues and challenges that are still open, such as network mobility, scalability and security issues; thereafter, the possibility to extend software-defined networks in cloud computing has been investigated [3]. Although fog computing brought solutions to handle IoT applications that requires less latency and a higher bandwidth to process data from cloud server to end devices. However, end devices have limited resources that conflict with high demands, besides heterogeneity, which is another challenge introduced in fog computing [4]. Therefore, the current studies are developed for the sake of bringing advantages of SDN to both cloud and fog computing in order to overcome the above-mentioned issues by offering flexible and intelligent resources management solutions.
https://encyclopedia.pub/entry/9260
_____
_____
Fog computing security: a review of current applications and security solutions
Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
An Open-Source Simulator for Edge Computing, Fog Computing and IoT:
iFogSim enables the modelling and simulation of fog computing to evaluate resource management and scheduling policies across edge and cloud resources under different scenarios.
Typically, within any organization, numerous devices and gadgets are connected via advanced wireless technologies for different applications like communication, surveillance, security, messaging, social media, defense, etc. These deployments are traditionally associated with different paradigms including the Internet of Things (IoT), fog computing, edge computing and cloud computing. All these deployments, which need effective and high-performance network environments and aware communications, have opened up areas of research.
IoT refers to the smart objects and gadgets that are connected using wireless technologies for real-time communication and transmission of signals. Different research reports predict that there will be more than 30 billion connected devices by 2020. In addition, the IoT market is expected to grow to over US$ 8 trillion by that year.
One option is to check out the NetSim SDN library, which has a range of features to help you simulate and analyze the behavior of software-defined networks. Additionally, there are several projects on network security available on the NetSim website at the following URL: https://tetcos.com/file-exchange.html. These projects provide resources to model and simulate some recent developments and techniques in network security