Figure 2 - uploaded by Muhammad Johar Jaafar
Content may be subject to copyright.
Legacy Ethernet Switches Work (Paul, 2013).

Legacy Ethernet Switches Work (Paul, 2013).

Source publication
Full-text available
Nowadays technologies are rapidly growth and it cover many areas. The traditional or legacy network architecture is no longer suited to meet today requirement ever since cloud era appeared. In order to fulfill the gap, the paradigm has shifted to edge computing where the usage of micro-services become mainstream. The needs of using edge computing b...

Contexts in source publication

Context 1
... switch or Ethernet switch, known to link among other network devices such as router or among switches. This hardware component has been use for many type of network both small or larger networks and it use commonly in data center. Most of the time, the learning processes are involving learning process and transfer. In this research, the term usage is really refer to learning switch which mainly use for learning and transfer (however it can evolve into router, routing switch and network slices) due to the mechanism of learning switch that takes effect widely applied. When look back at traditional learning switch (in Figure 2), the learning process works by host send a frame to another devices through the switch. The switch captures the source MAC address of the frame and the interface that received. When it confirms the MAC addresses it will immediately lookup the entries in lookup table. By default, it set an address entry 300 seconds (5 minutes). The timer will get rid unused entries in order to keep lookup process short and fast (Paul, 2013). The switches later learn by flooding the single frame out all in order to learn the MAC address destination switch (by using Address Resolution Protocol (ARP) request). By flooding the frame it can filter and forward at the same time in the switch lookup table. When the switch recognizes the device MAC address it will reply in towards the respective port. For the example in Figure 3, it only occurs that it will filter only target MAC Address for this cases from port 2 to port 7. Other than port 7 will be filtered out and it will drop in the lookup table. By doing this, no one else can look at the contents of the frame. However, it's a little different in OpenFlow, whereby any of switches involving will become learning switch (when apply varies of function inside the module can become router, routing switch and network slice). The learning method is same, which, it includes the packet from host, to learn the position of the host on the network and, transfer by using in positioning information that has been learned via flood and forward packet to the destination host. However, in OpenFlow it involve two different packet to be send and the flood mechanism are bit different which the flow mod or flood manager will be flood simultaneously to all exist port at the first place and waiting for the packet to insert to the Database or Forwarding Database (FDB). Whenever the packet enters to the controller via OpenFlow connection. The OpenFlow packet will declare packet-in because of the flow table still empty, from that moment the packet will join the flood pool in the controller until the controller finish checking the source and destination path. With this, the packet will register in FDB and instruct the switch to spread the PacketOut message by specifying the output port to the flooding. As a result, the packets arrive at the ...
Context 2
... is a set of protocol that use encryption for securely storing data on a distributed network. Each block carries a list of distributed data as well a hash to the previous block. Each of it, has its own references and make an interconnection between blocks. Once it fill, it push to the next chunk to overflow current block to create a new block. Figure 2, is the example of creation of block and how it is interconnected and carry list of data, and hash the previous block. By referring the above photo in Figure 4, the blockchain mechanism work as point-to-point as standard form of framework which it goes through block by block (in general form). In executions, in blockchain bottom line, it work 3 ways. Either as public, private or consortium/federated. In figure 5, the figure shows the flow of two separate type of blockchain (in conditional form). In general, Public provide the decentralized platform that anyone can read and send, but private provide centralized under one control (Shermin Voshmgir, 2017). The consensus define the blockchain shape as permission-less blockchain or permissioned blockchain. This two shapers create the new fabric to meet the network requirement, either it can run publically or privately. In this research, the possible component to implement the block on top on of it is smart contract. The smart contract works by using hashing algorithm functions whereby it only work when both end has the same key or condition are met. The rational reason for using the smart contract because the SDN is known for its vulnerabilities over vector. Whereby, the malicious can creates entries in the network flow and change the ownerships of the network (Guardtime). Once, its infected, the controller, network element or host connected will creates a room for its penetration. However, with smart contract it can keyed policy that only registered can provisioning the entire ...

Similar publications

Full-text available
To provide better services and new future offerings to their customers, an enterprise in the financial services industry in Indonesia has decided to use Kubernetes, an application container technology, to serve their digital services through applications, developed with micro-services architecture concepts. The new services and technology were expe...