What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface?


Answer 1

The types of messages which flow across an SDN controller northbound and southbound APIs are:

  • Messages that helps to develop flow tables
  • Messages that helps to interact between the controller and network control applications
  • Messages which help for the up-to-date view of the network's state, etc.

The recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface are:

  • Controlled devices are the recipient
  • Network control applications send the messages

What is Communication?

This refers to the exchange of information between different people or computers using a medium which also gives feedback.

Read more about communication here:

Answer 2

Answer and Explanation:

Messages flow across an SDN controller's:  

Northbound APIs:  

• Messages which help in read/write state of the network and developing flow tables within the  

state management layer.  

• Notifications for the state-change events.  

• The interaction between the controller and network control applications is done through the  

northbound interface.  

• Network control applications send messages to the controller.  

Southbound APIs:  

• Messages which help for the up-to-date view of the network's state like message for the  

attached link has gone up or down, new devices are joined the network, or indications of the  

device is up or down.  

• Controller's southbound interface is the communication among the controller and the controlled  

devices. Controlled devices are the recipients of the messages sent form the controller.  

Related Questions

The ticketing system at the airport is broken, and passengers have lined up to board the plane in the incorrect order. This line is represented in an ArrayList tickets in the AirLineTester class. Devise a way to separate passengers into the correct boarding groups. Currently, there is an AirlineTicket class that holds the information for each passengers ticket. They have a name, seat, row, and boarding group. Use the TicketOrganizer class to help fix the order of passengers boarding. First, create a constructor that takes an ArrayList of AirLineTickets and copies it to a class variable ArrayList. Then, create a getTickets method to get the ArrayList of AirLineTickets. In the TicketOrganizer class, create a method called printPassengersByBoardingGroup that prints out the name of the passengers organized by boarding group. The boarding groups go from 1-5, and have been predetermined for you. This should print the boarding group followed by all passengers in the group:
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security
Describe how the presence or absence of balance can affect a visitor’s perceptions of a Web page.
Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers​
Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox. Shana is developing software for the minimum viable product stage in order to provide the development team with feedback on how to improve the application. Gus is employing the software methodology known as __________, while Shana is employing the software methodology known as __________.

Write a C++ program to find the number of pairs of integers in a given array of integers whose sum is equal to a specified number.



int main()


   int A1= {5,3,4,8,9,0,7};

   int SArri1 = sizeof(A1);

  printf("Original array: ");


   for (int i=0; i < SArri1;i++)  

   printf("", A1[i] );


   int i, sum = 20, n= 0;

   printf("\nArray pairs whose sum equal to 20: ");


   for (int i=0; i<SArri1; i++)

       for (int j=i+1; j<SArri1; j++)

           if (A1[i]+A1[j] == sum)


              Printf(“\n”, array1[i])





  printf("\nNumber of pairs whose sum equal to 20: ",n)

   return 0;



First of all, you should create the array of integers, and put random numbers. Then you have to save in a constant the size of the array (in this  code is called SArr1) With a for you can print all the numbers that are on the array because then you will print all array pairs whose sum is equal to  a specified numer. in this code we are going to use 20.

then with a condition (if) you are going to compare one of number of the array with all the others and check if its equal to 20. If yes, it going to print the numbers that answer to that condition and it's going to add +1 to the variable n (for this you will need to use two bucles for)

Then you can print the number of pairs whose sum is equal to 20 by printing n

Write a program that prints the following 45 pairs of numbers:11
Note that the first numbers go from 1 to 9, and the second numbers start at 1 and go up to the
value of the first number (9 times). You must use loops to do this not 45 print statements.



  • Code is in JAVA language. As there is no user input the logic is straightforward.
  • Below is the code along with a detailed explanation of the logic.
  • The class name is Print main save as file as the main class.



public class Main{

public static void main(String args[]){

/* There are two for loops...

* First for loop runs from i=1 to i=9

* Second for loop runs from j=1 to j=i.



for(int i=1;i<=9;i++){

for(int j=1;j<=i;j++){ // j loop runs from j=1 to j=i

/*Prints I and j next to each other*/


}//for loop of j ends here

}// for loop of I ends here



Write a program that declares variables named init1, init2, and init3, to hold your three initials. Display the three initials with a period following each one, as in J.M.F.



Written in Python

init1 = input("initials 1: ")

init2 = input("initials 2: ")

init3 = input("initials 3 ")



This line prompts user for init1 and gets the input

init1 = input("initials 1: ")

This line prompts user for init2 and gets the input

init2 = input("initials 2: ")

This line prompts user for init3 and gets the input

init3 = input("initials 3 ")

This line prints out the required output


___ defines a series of standards for encoding audio and video in digital form for storage or transmission. Most of these standards include compression, often lossy compression.a) JPEG b) ANSI c) ISO d) MPEG





MPEG stands for Moving Picture Experts Group.

It defines standards for audio and video compression on digital form for storage and transmission.

  • JPEG (Joint Photographic Experts Group)
  • ANSI (American National Standards Institute)
  • ISO ( International Organization for Standardization)

are also international standards but they are not related to dogotal video compression.

1. The system admin staff would like you to create a cron job that runs only on weekdays (Monday - Friday) at 1am, continuously throughout the year. The job should write a list of all processes that are currently running on the host to a file called processes.txt 2. The Helpdesk would like to keep metrics on disk usage for a short period of time. Write a cron job that writes the output of the 'df -h' command to a local file titled metric.txt. The job should run on Wednesday from 10am till 2pm and update every 2 minutes. Make sure that you don't OVERWRITE the data that's already in the file. You'll need to structure your command so that it APPENDS to the file, saving the data that's already been written.


Answer: idk


When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate



Verifying digital signature


In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.