Create a network topology using mininet

Assignment Help Computer Networking
Reference no: EM132373357

Assessment - Software Defined Controllers

Purpose of the assessment (with ULO Mapping)

The main purpose of this assignment is to enable students to understand, demonstrate, and evaluate POX controllers, which is in line with learning outcomes of this unit as follows:
1. Plan, configure and troubleshoot controllers and SDN networks
2. Apply and evaluate security challenges in the SDN paradigm
3. Evaluate the emerging SDN applications

Routers in traditional networks respond to Address Resolution Protocol (ARP) requests, for this, they also maintain cache. However, in Software Defined Networks (SDN) this is not the case, and router is not an intelligent device, rather a central controller handles ARP requests. So SDN controller such as POX controller sends back ARP reply upon receiving ARP requests.

For the first part of this assignment, create a network topology using Mininet that can demonstrate following parts of the assignment i.e. second and third part.

For the second part of this assignment, perform following tasks:

1. Identify the ARP structure and its fields in a POX controller.
2. Configure the POX controller that replies ARP requests.

Hint [check the sample code for load balancer to get an example showing how to handle ARP packets.]

Similarly, Internet Control Management Protocol (ICMP) is used to handle error message. One of the possible error can be to receive a packet whose destination address i.e. the host does not exist in the network. The router sends [ICMP: Host Unreachable] message in traditional network, here the controller needs to send the same message.

For the third part of this assignment, read the ICMP protocol to figure out the error management options and select at least two errors. For an error the controller may receive the ICMP packets such as host unreachable error, write a routine to entertain such messages.

In the created scenario one should be able to:

• Ping the routers
• Ping all the other hosts.
• Tracing a host
• ICMP message if a host does not exist

Finally explain at least two attacks and their impact on Software defined network.

Assignment 2 report should contain following sections:

• Containing (Draw) a network topology along with sub-nets and IP addresses assigned to networking devices and hosts.
• Write all of the activities to achieve ARP requests and ICMP error message implementations.
• Demonstration to show connectivity between all the hosts by ping command (Screen shots or video)
• Demonstration to show an error message when a host is not reachable or the destination IP address is in a sub-net that is not connected to the network (Screen shots or Video)
• Explanation of at least two attacks and their impact on SDN.

Reference no: EM132373357

Questions Cloud

How much will the new certificate be worth 2 years from now : How much will the new certificate be worth 2 years from now?
Reviewed medical informatics with historical examples : Reviewed medical informatics with historical examples of medical AI and CDSS domain and system resources in general and focus on a real-world project
Developed to measure risk mitigation effectiveness : The metrics you have developed to measure risk mitigation effectiveness must also be used for audit purposes.
Discuss shared technology vulnerabilities in the cloud : Discuss Shared technology vulnerabilities in the cloud, Which is better for security server virtualization or application isolation? Why?
Create a network topology using mininet : MN622 - Software Defined Networking - Melbourne Institute of Technology - Software Defined Controllers - Write all of the activities to achieve ARP requests
What is the relationship between a bank capital ratio : What is the relationship between a bank's capital ratio and the risks and returns faced by (i) its shareholders and (ii) its creditors? Explain your answers.
Flow of money within the circular flow model : Describe how microeconomics and macroeconomics affect the flow of money within the Circular Flow Model?
Variance and standard deviation for project alfa and beta : Calculate the expectation, variance and standard deviation for project Alfa and Beta.
Describe the issues raised over audit quality : For Former Australian Securities and Investments Commission (ASIC) chairman Greg Medcraft, "audit quality has been a concern for a number of years now"

Reviews

len2373357

9/20/2019 2:21:34 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD > 80% DI 70-79% Excellent Very Good Topology /5 An appropriate topology is clearly and precisely drawn in the report and created in the VM An appropriate topology is clearly drawn in the report and created in the VM ARP requests implementatio n /10 How ARP is implemented in the POX or some other controller is explained exceptionally well How ARP is implemented in the POX or some other controller is explained well ICMP error message implementatio n /10 How ICMP is implemented in the POX or some other controller is explained exceptionally well How ICMP is implemented in the POX or some other controller is explained well Router connectivity and demonstration /15 Demonstrates of the connectivity and error messages clearly and precisely Demonstrates of the connectivity and error messages clearly

len2373357

9/20/2019 2:21:17 AM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Topology is drawn and created An appropriate topology is drawn in the report and created in the VM. 5 ARP requests implementation in the controller Explaining how ARP is implemented in the POX or some other controller of your choice. 10 ICMP error message implementation in the controller Explaining how ICMP is implemented in the POX or some other controller of your choice. 10 Router connectivity verification Demonstration of the connectivity of the network by ping command 5 Demonstration Demonstration of error messages by tracing route to hosts 10 Attacks on SDN Two attacks explanation 5 Attacks impacts on SDN Analysis of the two attacks 5 Total 50

len2373357

9/20/2019 2:20:48 AM

• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available

len2373357

9/20/2019 2:20:41 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd