116
INTELLIGENT CITIES
maneuvering activities are being activated through software librar-
ies that are modular, service-oriented, and centralized in a controller
module and hence the new terminology “software-defined network-
ing” (SDN) has become hugely popular. at is, instead of managing
network assets separately using separate interfaces, they are controlled
collectively through a comprehensive, easy-to-use, and fine-grained
interface. e API approach has the intrinsic capability of putting a
stimulating and sustainable foundation for all kinds of IT resources
and assets to be easily discoverable, accessible, usable, and compos-
able. Hardware infrastructure programming and thereby their remote
manipulations and machinations are gaining momentum.
erefore standards-compliant SDN controllers provide a widely
adopted API ecosystem that can be used to centrally control multiple
devices in different layers. Such an abstracted and centralized approach
offers many strategically significant improvements over traditional net-
working approaches. For instance, it becomes possible to completely
decouple the network’s control plane and its data plane. e control plane
runs in a cluster setup and can configure all kinds of data plane switches
and routers to support business goals as demanded. at means data flow
is regulated at the network level in an efficient manner. Data can be sent
where it is needed or blocked if it is deemed a security threat.
A detached and deft software implementation of the configuration
and controlling aspects of network elements also means that existing
policies can be refurbished whereas newer policies can be created and
inserted on demand to enable all the associated network devices to
behave in a situation-aware manner. As we all know, policy estab-
lishment and enforcement are the proven mechanism to bring in the
required versatility in network operations. If a particular applica-
tion’s flow unexpectedly needs more bandwidth, the SDN control-
ler proactively recognizes the brewing requirement in real time and
accordingly reroutes the data flow. Precisely speaking, the physical
constraints are being eliminated through software-defined network-
ing. If a security appliance needs to be inserted between two tiers,
it is easily accomplished without altering anything at the infrastruc-
ture level. Another interesting factor is the most recent phenomenon
of “bring your own device” (BYOD). All kinds of employees’ own
devices can be automatically configured, accordingly authorized, and
made ready to access the enterprise’s network anywhere, anytime.