You are on page 1of 5

ABSTRACT

Developing a SDN based network solution is a big and complicated process. This project focuses
on exploring the design and development stages. The objects is to design the whole computing
based solution. We will include the steps involved in the designing of the SDN controlled
architecture. We will also include the tools we selected and what network configurations are
required to bring our project to life. We made sure that our development methodology is
coherent with our development methodology. Since we are using the structured methodology,
we must make sure that we create a full roadmap for implementing our solution.

Introduction
The development and design phases discussed in this report are for creating an SDN

based solution. Our SDN solution will be designed and developed in this stage. In this phase we

will try to propose a roadmap for implementing our SDN based solution. This project will

include how we will design our system and how it will serve the rest of the network. we will

design the network architecture. We will show what protocols we will use to make the network

function with optimal performance and reliability. Our development methodology is a structured

methodology so we will include the tools we used and our rational and we will discuss the

specific tools that we used. Our project will also include a picture of the network topology that

we propose. We will also include a structured chart to show breakdown of a system to its lowest

manageable levels.

6. Development
Through a centralized approach, SDN is expected to make networks easier to
manage administratively while also reducing their administrative complexity.
Other things you could anticipate from SDN include:
 Enable service assurance (closed/open loop) and provide visibility over the
state of the network.
 Modify the network dynamically or on demand to provide services or
adhere to established SLAs.
 Set the network up to allow or prohibit certain traffic patterns (i.e., traffic
steering).
 Configure the network to meet the requirements of new workloads and to
automatically enable connectivity between workloads.
 When a service is retired, remove the network configuration unique to that
service, and modify the impacted network components as necessary.
The road map for the development of this project is as follows:
1. Create the topology for the enterprise.
2. Configure the routing protocols
2.1. Network controller
A network controller will act as an intermediary between network devices and the
applications that control them. A is a tech specialist can monitor the overall
network infrastructure of an organization using this controller.
2.2. Wireless Controller
This controller enables wireless devices to connect to WLAN and manages
wireless access points in bulk.

2.3. BGP
BGP is made to allow independent systems on the Internet to share reachability
and routing data. A "peer" is a BGP speaker who communicates with other peers
by exchanging routing information in the form of network prefix announcements.
If one internet path goes down, BGP offers network stability because routers can
swiftly adapt to transmit messages through another link. Based on pathways,
rules, or network policies set up by a network administrator, BGP decides where
to route traffic. This will assist us in ensuring a dependable internet connection.
2.4. OSPF
Inside a single autonomous system, OSPF is an inner gateway protocol. that route
packets. The shortest-path-first (SPF) method is used by OSPF to calculate routes
based on link-state information. We will use OSPF as our interior gateway
protocol.
2.5. Ether-channel
EtherChannel is a port-channel architecture or port-link aggregation technology
that is predominantly utilized on Cisco switches. To provide fault-tolerance and
fast links between switches, routers, and servers, it enables grouping together
numerous physical Ethernet cables to create one logical Ethernet link. This will
help us increase the bandwidth of our network links.
2.6. STP
A Layer 2 network technique called Spanning Tree Protocol (STP) is used to stop
loops from forming inside a network topology. STP was developed to prevent the
issues that occur when computers exchange data over redundant channels in a
local area network (LAN). STP will help us ensure that our network is free of loops
that can bring our network performance to a halt.

You might also like