Create a network topology using mininet

Assignment Help Computer Networking
Reference no: EM132373357

Assessment - Software Defined Controllers

Purpose of the assessment (with ULO Mapping)

The main purpose of this assignment is to enable students to understand, demonstrate, and evaluate POX controllers, which is in line with learning outcomes of this unit as follows:
1. Plan, configure and troubleshoot controllers and SDN networks
2. Apply and evaluate security challenges in the SDN paradigm
3. Evaluate the emerging SDN applications

Routers in traditional networks respond to Address Resolution Protocol (ARP) requests, for this, they also maintain cache. However, in Software Defined Networks (SDN) this is not the case, and router is not an intelligent device, rather a central controller handles ARP requests. So SDN controller such as POX controller sends back ARP reply upon receiving ARP requests.

For the first part of this assignment, create a network topology using Mininet that can demonstrate following parts of the assignment i.e. second and third part.

For the second part of this assignment, perform following tasks:

1. Identify the ARP structure and its fields in a POX controller.
2. Configure the POX controller that replies ARP requests.

Hint [check the sample code for load balancer to get an example showing how to handle ARP packets.]

Similarly, Internet Control Management Protocol (ICMP) is used to handle error message. One of the possible error can be to receive a packet whose destination address i.e. the host does not exist in the network. The router sends [ICMP: Host Unreachable] message in traditional network, here the controller needs to send the same message.

For the third part of this assignment, read the ICMP protocol to figure out the error management options and select at least two errors. For an error the controller may receive the ICMP packets such as host unreachable error, write a routine to entertain such messages.

In the created scenario one should be able to:

• Ping the routers
• Ping all the other hosts.
• Tracing a host
• ICMP message if a host does not exist

Finally explain at least two attacks and their impact on Software defined network.

Assignment 2 report should contain following sections:

• Containing (Draw) a network topology along with sub-nets and IP addresses assigned to networking devices and hosts.
• Write all of the activities to achieve ARP requests and ICMP error message implementations.
• Demonstration to show connectivity between all the hosts by ping command (Screen shots or video)
• Demonstration to show an error message when a host is not reachable or the destination IP address is in a sub-net that is not connected to the network (Screen shots or Video)
• Explanation of at least two attacks and their impact on SDN.

Reference no: EM132373357

Questions Cloud

How much will the new certificate be worth 2 years from now : How much will the new certificate be worth 2 years from now?
Reviewed medical informatics with historical examples : Reviewed medical informatics with historical examples of medical AI and CDSS domain and system resources in general and focus on a real-world project
Developed to measure risk mitigation effectiveness : The metrics you have developed to measure risk mitigation effectiveness must also be used for audit purposes.
Discuss shared technology vulnerabilities in the cloud : Discuss Shared technology vulnerabilities in the cloud, Which is better for security server virtualization or application isolation? Why?
Create a network topology using mininet : MN622 - Software Defined Networking - Melbourne Institute of Technology - Software Defined Controllers - Write all of the activities to achieve ARP requests
What is the relationship between a bank capital ratio : What is the relationship between a bank's capital ratio and the risks and returns faced by (i) its shareholders and (ii) its creditors? Explain your answers.
Flow of money within the circular flow model : Describe how microeconomics and macroeconomics affect the flow of money within the Circular Flow Model?
Variance and standard deviation for project alfa and beta : Calculate the expectation, variance and standard deviation for project Alfa and Beta.
Describe the issues raised over audit quality : For Former Australian Securities and Investments Commission (ASIC) chairman Greg Medcraft, "audit quality has been a concern for a number of years now"

Reviews

len2373357

9/20/2019 2:21:34 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD > 80% DI 70-79% Excellent Very Good Topology /5 An appropriate topology is clearly and precisely drawn in the report and created in the VM An appropriate topology is clearly drawn in the report and created in the VM ARP requests implementatio n /10 How ARP is implemented in the POX or some other controller is explained exceptionally well How ARP is implemented in the POX or some other controller is explained well ICMP error message implementatio n /10 How ICMP is implemented in the POX or some other controller is explained exceptionally well How ICMP is implemented in the POX or some other controller is explained well Router connectivity and demonstration /15 Demonstrates of the connectivity and error messages clearly and precisely Demonstrates of the connectivity and error messages clearly

len2373357

9/20/2019 2:21:17 AM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Topology is drawn and created An appropriate topology is drawn in the report and created in the VM. 5 ARP requests implementation in the controller Explaining how ARP is implemented in the POX or some other controller of your choice. 10 ICMP error message implementation in the controller Explaining how ICMP is implemented in the POX or some other controller of your choice. 10 Router connectivity verification Demonstration of the connectivity of the network by ping command 5 Demonstration Demonstration of error messages by tracing route to hosts 10 Attacks on SDN Two attacks explanation 5 Attacks impacts on SDN Analysis of the two attacks 5 Total 50

len2373357

9/20/2019 2:20:48 AM

• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available

len2373357

9/20/2019 2:20:41 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Questions that should be included in request for information

Write 10 security related questions that should be included in a Request For Information (RFI) that a large bank or financial institution would want answers to.

  Briefly describe the address resolution protocol

Briefly describe the Address Resolution Protocol. What is the purpose of ARP Cache? Compare and contrast the OSI reference model with TCP/IP networking model.

  Explain use of virtual private network-tunneling protocol

Can they use virtual private network and tunneling protocol, or is a better technique available? Justify your answer.

  Describe the tool you selected and why you selected tool

Describe the tool you selected and why you selected this tool. Describe the data you collected and how it can be used to identify threats to your network.

  Plan technical solution for priority advertising networking

plan a technical solution for Priority Advertising's networking and communications requirements - contract position at a medium-sized marketing and advertising

  Represents an effective troubleshooting routine for switches

Provide a discussion of 3-5 paragraphs in your own words of what techniques you find as being most useful for troubleshooting virtual local area networks.

  Discuss the difference between multicast and unicast routing

Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life

  The network security systems in corporations

The network security systems in corporations and universities and how it can be developed - Majority of references should be peer reviewed

  Would you say given was a well designed network

It is said that packet-switched services and dedicated-circuit services are somewhat similar from the perspective of the network designer. Why?

  Compare and contrast operating system forensics

Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you conside..

  What are the advantages of having an interface

Consider an alternative interface design that provides an interface for every layer of protocol software.

  What distinguishes a virus from other types of malware

What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd