An Improved Mechanism for SDN Flow Space to Control Oriented Authentication NAA Network
Taskeen Fathima1, S. Mary Vennila2
1Taskeen Fathima, Research Scholar, Assistant Professor, Department of Computer Science, JBAS College for Women, Chennai, TamilNadu, India.
2Dr. S. Mary Vennila, Associate Professor and Head, PG & Research Department of Computer Science, Presidency College, Chennai, TamilNadu, India.
Manuscript received on November 25, 2019. | Revised Manuscript received on December 08, 2019. | Manuscript published on December 30, 2019. | PP: 350-353 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B3014129219/2019©BEIESP | DOI: 10.35940/ijeat.B3014.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Open Daylight platform with its power by working with IEEE 802.1X port level authentication for wired and wireless networks has been very supportive because of the massive deployments at mean charge for main design considerations. Within the current marketplace, 802.1X has flourished the ground works for wireless, wire stability, LAN stability and authentication methods. EAP (Extensible Authentication Protocol) supports long time protection of the supplicant and the authentication software till the end condition of the RADIUS (Remote Authentication Dial-In User Service) server is met. This paper is focused on the RAR (RADIUS Access Request) unique identification about the users on the network with SAA (Supplicant, Authenticator and Authentication server) system which records on the attribute cost of RFC 2865 according to the forwarding server. NAA (Non-Adaptive Algorithm) using FlowVisor based virtualization packages drive inward the network timescales or statistics, dynamically controlling the flow space of switches to control the speed and results in scaling of networks. NAA is an application level protocol that contains authentication and configuration information between a Network Access Server and a shared authentication server. It avoids the attacker from listening for requests and responses from the server and calculates the improved MD5 client secret key of the response.
Keywords: Software Defined Networking, Non Adaptive Algorithm, 802.1X, FlowVisor, Flow space, Radius Access Request.