PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018) Date: 25 Aug 2018 (Sat)Time: 14:00 -...

Information Security Summit 2018 (4-5 Sep 2018)

Information Security Summit 2018 (4-5 Sep 2018)

Information Security Summit 2018 Date: 4-5 Sep, 2018Time: 8:30am - 6:00pmVenue: Hong Kong...

Supporting Event: IoT Security Forum (29 Aug 2018)

IoT Security Forum Date :  29 August 2018, WednesdayTime : 2:00 pm - 5:00 pm (Registration start...

  • PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

    PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

  • Information Security Summit 2018 (4-5 Sep 2018)

    Information Security Summit 2018 (4-5 Sep 2018)

  • Supporting Event: IoT Security Forum (29 Aug 2018)

Software Defined Network and how can it help enhancing Cloud Security

Date: Apr 7, 2016 (Thur)

Time: 7:00 pm

Venue: Room Z414, Zone Z, The Hong Kong Polytechnic University, Hung Hom, Hong Kong

Fee: Free of charge

Registrationhttp://www.eventnook.com/event/csakse1604

 

Highlights:

SDN as defined by the Open Networking Foundation (ONF), is the physical separation of the network control plane from the forwarding plane and where the control plane controls several devices. In traditional, a SDN architecture departs from legacy solutions by building networks from three abstractions or layers. First, the infrastructure layer acts as the foundation for a SDN architecture. The infrastructure consists of both physical and virtual network devices such as switches and routers. These devices implement the OpenFlow protocol as a standards-based method of implementing traffic forwarding rules.

Second, the control layer consists of a centralized control plane for the entire network. The control plane is decoupled from the underlying infrastructure to provide a single centralized view of the entire network. The SDN controller provides this control layer and utilizes OpenFlow southbound to communicate with the infrastructure layer.

Third, the application layer consists of network services, orchestration tools, and business applications that interact with the control layer. These applications leverage open interfaces to communicate with the control layer and the network state. In particular, security vendors can put their effort on this layer to protect and defend the attacks from inside or outside of the network.

For more detail: http://www.eventnook.com/event/csakse1604

Contact: This email address is being protected from spambots. You need JavaScript enabled to view it.