Position Paper: Software-Defined Network Service Chaining

Size: px
Start display at page:

Download "Position Paper: Software-Defined Network Service Chaining"

Transcription

1 Position Paper: Software-Defined Network Service Chaining Jeremias Blendin, Julius Rückert, Nicolai Leymann, Georg Schyguda, and David Hausheer Peer-to-Peer Systems Engineering Lab, Technische Universität Darmstadt, Germany {jblendin rueckert Deutsche Telekom Technik GmbH, Fixed Mobile Engineering Deutschland, Darmstadt, Germany {n.leymann Abstract Network service chaining allows composing services out of multiple service functions. Traditional network service functions include, e.g., firewalls, TCP optimizers, web proxies, or higher layer applications. Network service chaining requires flexible service function deployment models. Related work facilitating service chaining include, e.g., the network service header proposal discussed at the IETF or the complementary work on network function virtualization (NFV) at ETSI. This position paper presents a high-level concept and architecture to enable service chaining using Software Defined Networking (SDN), specifically OpenFlow in a telecommunication environment. The paper discusses required functionalities, challenges, and testbed aspects to implement and test such an approach. Finally, the set of implemented service functions and management interfaces are highlighted to demonstrate the approach as a proof of concept for a selection of relevant use cases. I. INTRODUCTION Network services such as traffic optimizers or firewalls play an important role in achieving the performance and security challenges present in fixed and mobile carrier networks. Today, network services are usually deployed as hardware appliances that are physically integrated in the network by attaching cabling. Network Function Virtualization (NFV) [2] enables network services to run in software on low cost off-theshelf server hardware. Thereby, the NFV approach promises high flexibility and lower costs for network operators at the same time. Yet, the composition of network services, termed network service chaining [5], remains a challenging task as user and operator requirements are changing frequently and new service functions need to be deployed and resources scaled up quickly. Today, pre-configured service chains are typically deployed, purely consisting of statically configured and wired service functions. Static service chains are useful; however, they rely on fixed hardware and software configurations. Moreover, changing existing chains requires time-intensive manual reconfigurations, making the approach often inflexible and hard to adapt to changing requirements. Furthermore, deployments of new network services are slowed down as existing functions inside a chain often cannot be easily reordered to implement different services [3]. Dynamic service chaining aims to improve this situation in two aspects: first, service chains can easily be created from existing service functions. Second, the network resources used to deliver a service function can be allocated dynamically during runtime. The former enables rapid deployments of new service models, therefore, increasing the ability to adapt to the customers needs. The latter enables load balancing and allows using resources more efficiently. Resources for each service function can be dynamically allocated during runtime depending on the actual load. Network Service Headers (NSH) [10] is one approach to implement dynamic service chains. NSH relies on an additional network header which requires special interfaces to handle those headers and to implement the service chaining functionality. StEERING [14] is an alternative which relies on SDN/OpenFlow instead, but the approach doesn t address the identification and handling of packets from service instances where packet header information are modified. Thus, the mapping of packets to service chains and users remains an open issue. Specifically, key challenges are the separation of flows related to different service chain instances within a service instance as well as the mapping of packets to service chain instances at the handover between the network and a service node. This is especially so in case of services which modify the header information (e.g. HTTP proxies). SIMPLE [9] is an approach that aims to address this problem by correlating packet headers before and after they are modified as they traverse a service function. This approach is rather complex as it requires a packet matching with a high accuracy. In contrast, the SDN-based service chaining approach proposed in this paper avoids packet-based matching. At the same time, it allows to integrate unchanged network service software that is unaware of its operating environment. It does so by creating one dedicated service instance per service chain instance which is operated in an isolated network environment. The mapping of multiple users to a single service instance can be supported additionally, provided that the information required for user identification is preserved by the service function. The proposed approach simplifies the deployment process as it minimizes network configuration changes required during deployment. Moreover, it enables deploying large numbers of service function instances with low overhead. The feasibility of the approach is shown by a proof-of-concept implementation using OpenFlow. The remainder of this paper is organized as follows: Section II discusses the background of network service chaining. Moreover, Section III outlines the fundamental concepts proposed here, while Section IV presents the proposed architecture. In addition, Section V outlines first results from a proof-of-concept implementation. Finally, Section VI provides an overview on related works, while Section VII draws preliminary conclusions and outlines future work.

2 II. BACKGROUND III. SERVICE CHAINING CONCEPT NFV and dynamic network service chaining are still new and evolving topics. The terminology is not yet standardized completely, even more so for their implementations. An overview on the terminology used in this work is depicted in Figure 1. It is partially based on [11] and has been extended where necessary. The interconnection of service instances, termed service chaining, works by mapping packets to service chains at the edges and forwarding them between service instances. The service chaining concept proposed here is based on OpenFlow and uses layer 2 addresses to identify service instances as discussed later. The basic approach for integration of per-user service instances in a service chain is depicted in Figure 2. The arrow Service Instance packet flow ingress link egress link OpenFlow switch Client / mobile device other parts of the network are not shown Fig. 2: Service integration into a service chain. Fig. 1: High-Level Entity Relationship Model for Service Chaining The basic concept is a service function, which defines in an abstract manner the treatment of packets related to network flows. Examples include firewalls, HTTP proxies or bandwidth limiters. A service instance is an operational soft- or hardware instance that is deployed in the network, delivering the treatment specified by the associated service function. Software service instances are deployed in services nodes. Besides providing a runtime environment, service nodes comprise facilities for attaching service instances to the network. A service chain specifies a network service that is implemented through the applications of a series of service functions. Like a service function, it is an abstract specification that is implemented by service chain instances. Furthermore, service chain instances rely on service function instances and their interconnection for delivering a network service to a given user. A service chain instance embodies an instantiated service chain capable of delivering a concrete network service to a concrete user. While a service chain defines an order of abstract service functions, an active service chain instance requires the setup, parameterization, and availability of service instances needed to realize the service chain s expected behavior to the user. Moreover, it declares the need of establishing the necessary traffic routes (flows) between the user, service instances, and the appropriate provider edge router. The traffic treatment a user s traffic experiences is called network service. Its functionality can be either visible to or controllable by the customer, or enforced and assigned to particular users or user groups by the network operator. The network operator provides and administers a networking infrastructure and specifies the available network services to deliver to its customers. Finally, a user is a unique networked end-user device requesting access to different types of network services. heads depict the direction of the packet flow, whereas sessions are initiated by the user s device. Each service instance is connected to the network by two links and forwards traffic between these. This requirement can be fulfilled by virtually every network service. For example, an HTTP proxy requires only one interface, but works on systems with two interfaces as well. The ingress link faces in the direction of the user, while the egress link faces away from the user. These links are fundamental reference points for the chaining approach. By identifying the associated link and direction of traffic entering or leaving the OpenFlow network, it is mapped to a user, its service chain instance, and the direction of forwarding. Packets entering the OpenFlow network are modified to meet the forwarding requirements, i.e. packet headers must contain the required information for forwarding the packet to the next service function. Packets leaving the OpenFlow network are modified to meet the requirements of the service instance, i.e. they must contain appropriate layer 2 addresses. Moreover, the isolation of service instances is achieved by filtering network control protocol traffic such as ARP packets. Linux namespaces 1 have been applied here to make the use of one service instance per user feasible for ISP-scale applications under Linux. Linux namespaces introduce a flexible and efficient virtualization approach. Instead of implementing a full-fledged virtualization environment or a completely virtualized operating system, several aspects of the operating system can be virtualized separately with Linux namespaces. This allows to mix-and-match the required virtualization features for each use case. Linux namespaces enable, e.g., user, process, and network namespaces. The latter is the fundamental feature that also Mininet [4] relies on. The ability to virtualize only required features ensures a high performance at a low overhead (see, e.g., [12]). 1

3 A. Forwarding and Flow Identification The forwarding concept is inspired by the service chaining approach introduced in [14]. As depicted in Figure 3, layer 3 addressing is used for identification of users and classification of packets at the edges. The router connecting the mobile network to the Gi-LAN 2 OpenFlow network is called ingress edge router or ingress router. The router that connects the Gi- LAN to the is called egress edge router or egress router. Mobile devices Ingress edge router Packet classification (by user IP address) OpenFlow network / Gi LAN Service node Service node MAC address-based forwarding Egress edge router Fig. 3: Overview on the forwarding concept. Forwarding inside the OpenFlow network is strictly based on layer 2 addresses. While other fields of the packet header could be used for encoding the forwarding information, many existing OpenFlow switches support layer 2 header field rewriting efficiently in hardware, which is often not the case for layer 3 fields. Reference points for the forwarding are the MAC address and port of both the ingress and the egress router. For each registered user, an OpenFlow rule matches the IP source address of incoming packets from the ingress router. The MAC address of the next service instance that the matching packets should pass is written to the MAC destination address field. Forwarding through the OpenFlow network is based on the destination MAC address. When a packet arrives at the last OpenFlow switch before the service instance, the destination MAC address is rewritten to the one required by the service instances and forwarded through the associated port. After the packet is processed by the service instance, it leaves the egress port of the service instance and enters the OpenFlow network again. The incoming port of the OpenFlow switch identifies the associated service chain instance of the packet. Again, the MAC address of the next service instance is written to the destination MAC address field and the packet is forwarded. After the last service instance processed the packet, the MAC address of the egress router is written to the destination MAC address field and the packet is forwarded. Processing packets of flows in the opposite direction is done accordingly. Packets incoming from the egress router are associated with a service chain instance by matching the destination IP address of the user. While MAC addresses are used for identifying interfaces of service instances, the addresses are generally not learned by employing the well-known approach of a learning switch. Instead, the MAC address of each interface of each service 2 Gi-LAN is the interconnection reference point between a mobile network and the. instance are learned and disseminated by the chaining control system. B. Service Instance Interface Handling packets to and from service instances is done differently than in [14]. Forgoing the use of MAC address learning in the forwarding approach allows filtering of control traffic to and from service instances and thereby enables their isolation: they operate in a completely isolated network environment. Service instances are not able to communicate with other service instances or nodes in the network, the Address Resolution Protocol (ARP) and similar control protocols are filtered. The isolation of the service instances is useful, as a coherent network addressing scheme that spans the whole service chaining system is not required. All service instances use identical IP addresses, which simplifies the deployment process. For example, every service instance can use /30 and next hop for its ingress, as well as /30 and next hop for its egress interface. MAC addresses are discovered and disseminated in the system as required by the control plane. Appropriate service instance network behavior is either implemented by statically configuring the routes and MAC addresses for the egress and ingress interfaces or by implementing a dynamic routing mechanism and ARP handling module in the adaption layer using OpenFlow. Depending on the service function, the characteristics and requirements of service instances can vary. Five types of service instances are identified as outlined in Table I. The network behavior and information loss for each packet during the processing is different for each type and listed in the column User : modified fields in Table I. The requirements for incoming traffic are listed in column In: requirements. For illustration, the packet modifications that are applied on packets received by the OpenFlow switch from the instances egress interface are listed in column Egress out: applied modifications. Corresponding modifications are applied to packets forwarded to and from the ingress interface. The service chaining system needs to know the service function type of each service instance. The column Sharing possible indicates, whether a service instance of the corresponding service type could be shared by multiple users when using the flow identification scheme of the described system. Additional service function types could be added, the list is not exclusive. A traffic shaping service can be implemented based on layer 2 bridging. This forwarding mode ensures that passing packets are not altered in the service instance; this type is called L2. However, if an incoming packet is addressed at the MAC address of the switch, it is not forwarded but processed locally and subsequently dropped. Therefore, the type requires incoming traffic to not be addressed at the MAC address of one of the interfaces of the service instance; they are rewritten to the one of the edge router that should be passed next on the way to the destination. A firewall service can be implemented based on routing. Incoming packets are addressed at the layer 2 address of the incoming interface, filtered, and forwarded to the next hop as configured in the routing table. The layer 3 information remains unchanged, but both the source and destination MAC address are rewritten during the forwarding process; this type is called L3. For this service type, as

4 TABLE I: Overview on the types of service instances and their characteristics. Type Forwarding In: requirements User : modified fields Egress out: applied modifications Sharing possible Example L2 briding MAC dst MAC if none none yes Traffic shaper L3 routing MAC dst = MAC if L2 src,dst L2 src = MAC ingress edge, L2 dst = MAC next instance yes Firewall L4 dst routing MAC dst = MAC if L2 src,dst; L3,L4 dst type L3 modifications yes Redirect L4 src routing MAC dst = MAC if L2 src,dst; L3,L4 src L3 src = IP user + type L3 modifications no NAT L7 proxying MAC dst = MAC if L2,L3,L4 src,dst type L4 src modifications no HTTP proxy well as for types L4 src,dst and L7 the requirement is that the MAC address of the incoming packet matches the one of the incoming interface. However, when a packet leaves the service instance, it contains the wrong source and destination MAC address. The destination MAC address is rewritten after every service instance as required by the forwarding system; the source MAC address is rewritten to the one of the opposite edge router. Redirection changes the destination IP address and layer 4 destination port, the corresponding type is called L4 dst. No information that is relevant for the forwarding system is changed; hence no processing in addition to the one of type L3 is required. When using Network Address Translation (NAT), the layer 3 source address and layer 4 source port in the packet header are modified. This service instance type is called type L4 src, while the service instance has to be treated like one of type L7. Service instances implementing an application layer function such as a web proxy are based on routing, too. In addition to that, the transport layer connection coming from the user s device is terminated by the proxy and a new connection to the requested web server is created. Therefore, after being processed by the web proxy, the packets layer 2, 3, and 4 headers are changed; this service instance type is called L7. Packets leaving the egress port contain the correct destination IP address, but not the source IP address required by the forwarding system. Hence, the IP address of the user is written to the source address field. IV. ARCHITECTURE The system architecture is based on the OpenFlow reference architecture [8] introduced by the Open Networking Foundation. As depicted in Fig. 4, the three major layers are the infrastructure layer, the control layer, and the application layer. While the infrastructure layer consists of the actual OpenFlow devices, the control layer contains the controlplane logic. However, the layer should not process application logic data but strictly network-related information. The Service Function Chaining Router (SFCR) module is located in this layer, while the business logic is located in the application layer, where the Service Function Chaining Controller (SFCC) module is located. The high-level, modular architecture for the proposed SDN-based approach is depicted in Figure 5. The data flow is depicted as a double line, where connections originate at the mobile user, cross the wireless network as well as the Gi-LAN and are forwarded to the. Service nodes are traversed if the selected network service requires the forwarding through the service instances that are hosted on them. Packets arriving from the traverse the path in the reverse direction. The Service Function Chaining Controller (SFCC) is the central controlling unit responsible for controlling all sys- Application Layer Control Layer Infrastructure Layer Business Application OpenFlow Application... API Access... OpenFlow Interface OpenFlow Protocol SFCC SFCR OpenFlow switches Fig. 4: Mapping of SFCR and SFCC to OpenFlow Reference Architecture tem components, maintaining the system state, handling user (de-)registration, service instance allocation, and offering a high-level API as single interface to the service chaining system. The SFCC maintains a permanent connection to the SFCR and all available Service Node Controllers (SNC). The SNCs are responsible for managing one service node and the service instances which are operated there. When a user connects to the wireless network, it is detected and registered with the SFCC. A default service chain instance is then being created for the new user, thus allocating the needed service instances and requesting the SFCR to install the appropriate network flow rules. After a disconnect event, the previously established service chain instance is destroyed by releasing all service instances and requesting the SFCR to remove the created flow rules. The SFCC offers a high Mobile User Wireless Network / ingress router SFCR control Network data SFCC control SNC User registration Gi interface High-level API Service Function Chaining Controller (SFCC) Service Function Chain Router (SFCR) OpenFlow Network Service Node Controller (SNC) Service Nodes gateway / egress router Fig. 5: High-level architecture of components and their interactions. level API that allows the network operator to define, modify,

5 and remove service chains during runtime. If a service chain is modified, e.g., by adding a service function, for each corresponding service chain instance an appropriate service instance is allocated and inserted. The SFCC orders the SFCR to update the service chain routing by sending information on the ingress and egress port of the service instance, the OpenFlow switch where it is connected, and the type of the service instance. The SFCR then looks up the packet processing that is required for this service instance type and installs the corresponding OpenFlow rules. The SFCR deals with network related abstractions, such as ports, layer 2, and layer 3 addresses only. Furthermore, as it is a passive, stateless component, it operates on commands by the SFCC only. For the OpenFlow devices it acts as a controller and implements chaining of service instances. Each SNC runs on the service node it manages. It relies on an OpenFlow enabled software switch and multiple service instances. The SNC is responsible for the creation, usage, configuration, and destruction of service instances. Their implementation is based on standard Linux features such as traffic shaping and firewalling or other suitable software. Linux network namespaces are used to separate the network traffic of different instances. For each service instance the software switch provides two network ports, establishing a connection between both entities. For each service function that should be available on a given service node, multiple instances are started in advance. The strategy used for pre starting instances can be adapted to the operating environment. The infrastructure layer consists of OpenFlow switches, both dedicated hardware devices and software switches running on the service nodes. Ingress and egress routers are not required to be OpenFlow enabled. However, their MAC addresses and network ports through which they are connected need to be known to the SFCC, either through configuration or ARP snooping. The service chaining network is transparent to the edge routers. For these, the system is indistinguishable from a direct network link. The mobile network registers and de-registers its users and their IP address to the SFCC through its API. V. FIRST RESULTS The service chaining system has been implemented as a proof of concept and deployed in an OpenFlow-based testbed. The SFCR is implemented as a component for the Floodlight OpenFlow controller 3. The other components are designed as standalone programs, relying either on Java or Python for their implementation. Mininet [4] and custom scripts are used for creating service instances. The infrastructure layer consists of NEC PF5240 OpenFlow switches [7], the ingress router is an Access Point (AP) running OpenWRT, the egress router is a server running Linux, which in addition to routing hosts some of the required websites. The service nodes utilize Mininet [4] and extensions for creating service instances running in Linux network spaces; switching is provided by Open vswitch 4 v The latter supports OpenFlow v1.0 only, therefore this OpenFlow version is used by the service chaining system The SFCC provides a high-level API for the service chaining approach. As a proof of concept, both an operator interface and a end-user interface have been implemented based on the SFCC API. They illustrate how the solution may be integrated in an operator s environment and is further described in [13]. The service instance isolation proves to be advantageous for deployment of service instances of type L3, L4 and L7. Contrary to traditional deployments, neither an IP addressing scheme nor the assignment of unique IP addresses to each service instance is required. Each service instance of type L3 and higher is used with identical network configurations. The deployed service instances are based on unmodified open source software, which is not aware of the characteristics of its operating environment. The deployment in combination with the service instance type adaptation and the service instance isolation proves to be trouble free. Besides Linux kernel features such as iptables for firewalling as well as redirection, and queueing features for traffic shaping, the usage of third party HTTP proxy software works without problems. Traffic, even when processed by an HTTP proxy is identified and mapped to the associated service in every case. Due to the start of service instances in advance, changing service chains only requires the modification of OpenFlow rules. Therefore, the system s response time to such modifications is small. An additional advantage of the service instance isolation is its resilience against network misconfigurations. Only the service instances that are directly affected by the misconfiguration do fail. Due to the isolation, no other service instances are influenced. Evaluated cases are redirection, traffic shaping, and enforcing a video quality for HTTP Live Streams (HLS). Redirection is used for implementing a landing page that enables user self-service. Traffic shaping limits the available bandwidth of each user and supports per uses settings. An open source HTTP proxy software 5 is customized to modify HLS request headers to enforce the specified video quality. The system reacts to creating and modifying service chains as well as reordering the service functions with low latency. Changing the service quality for HLS video works reliably even for existing streaming sessions. Based on the assumption of a one-to-one mapping of users to chain instances and therefore service instances, the number of OpenFlow rules increases with the number of users, service instances, and OpenFlow switches in the system. An upper bound for the number of OpenFlow rules in such a service chaining system can be derived as follows. For each user, two rules are required at both edge routers. For each service instance, two rules are required on its attached OpenFlow switch for each of its two interfaces, ingress and egress. Assuming that a user uses each available service function once, the upper bound for the required OpenFlow rules can be derived as follows: #rules = 2 #users (2 + #service functions #switches) Based on which the maximum number of rules per switch can be easily determined: #rules = 2 #users (2 + #service instances) 5

6 Improvement in the rule efficiency is not the goal of this approach and is partly a result of the OpenFlow 1.0 based implementation. Therefore the reduction of the number of required rules is planned in future work. The implementation of the service instance isolation adapter with OpenFlow 1.3 should reduce the number of required rules significantly. Furthermore, some of the optimizations introduced by StEERING could be integrated in the approach. Finally, by employing a hierarchical L2 addressing scheme the number of rules can be reduced further on intermediate OpenFlow switches. With this scheme, each service node is assigned a range of virtual MAC addresses. Each service instance is identified in the system by one address from this range, reducing the number of OpenFlow rules for forwarding to the number of service nodes instead of the number of service instances. VI. RELATED WORK Network Service Headers (NSH) [10] are a related approach, which, amongst features for routing include an approach for interfacing with service instances. Each packet is added an additional header, which could be used by service instances for traffic separation. However, this approach requires the network instances software to be aware of its runtime environment. By adding an additional network header to each packet passing through a service chain, an overlay network is created that implements the specified services chains. The approach relies on the proven overlay network concept; however, its main drawbacks are an increased overhead due to the additional header that is added to each packet. Furthermore, the approach relies on special nodes to handle the NSH headers and implement the service chaining functionality. Another approach is to implement a similar concept by reinterpreting existing header fields using flow based forwarding and SDN instead of introducing a new packet header. StEERING [14] introduces, amongst other features, an approach to optimize the OpenFlow rule usage by exploiting the OpenFlow pipeline feature. StEERING is geared towards a Gi-LAN scenario and focusses on resource efficiency and scalability. The OpenFlow pipeline feature is introduced in OpenFlow version 1.1, hence, is not available in the scenario this work is based on. However, the optimization feature could be integrated with the approach described in this paper. However, the handling and identification of packets received from and forwarded to service instances is not specified in detail. SIMPLE [9] describes an efficient routing mechanism for connecting service instances and an approach to load balancing service instances. SIMPLE explicitly considers the inclusion of legacy service instances. Therefore, one major contribution of the paper is an approach to tracking packets when processed by service functions that modify the header information. The approach relies on correlating packets before the processing by a service instance and afterwards which does not require modifications or even detailed knowledge of the service instance. However, the approach requires the system to collect packets for the correlation analysis. Furthermore, the approach is rather complex as it requires a packet matching with a high accuracy. A number of approaches to highly efficient virtualized runtime environments other than using Linux virtualization exist. One example is Mirage OS [6] that is based on the XEN hypervisor. The feasibility for ISP scale applications of one service instance per used has been demonstrated in [1]. However, these approaches introduce new APIs and cannot leverage today s abundance of network software available for, e.g., the Linux operating system. VII. PRELIMINARY CONCLUSION AND FUTURE WORK A novel approach to integrate network services into a service chaining system has been presented in this paper. The network isolation of service instances allows a simplified deployment process that requires minimal per-instance configuration. The simplified deployment supports the oneto-one mapping of users to service instances, by which the issue of modified packet headers in service instances can be solved reliably. Furthermore, the isolation approach is able to prepare the packet flows for each service instance as required. By relying on an efficient virtualization approach based on standard Linux features the abundance of available Linux software can be leveraged by the proposed approach. A proofof-concept implementation demonstrates the feasibility of the approach and the usefulness of its high level API. ACKNOWLEDGMENT This work has been supported in parts by Deutsche Telekom (D-Nets project) and the German DFG (CRC 1053, MAKI). The authors would like to thank all their colleagues and project partners and especially Victor-Philipp Negoescu and Sergej Melnikowitsch for their contributions. REFERENCES [1] R. Bifulco, T. Dietz, F. Huici, M. Ahmed, J. Martins, S. Niccolini, and H.-J. Kolbe, Rethinking Access Networks with High Performance Virtual Software BRASes, in EWSDN Workshop, [2] M. Chiosi et al., Network Functions Virtualisation (NFV), European Telecommunications Standards Institute (ETSI), Oct [3] W. John, K. Pentikousis, G. Agapiou et al., Research Directions in Network Service Chaining, in IEEE SDN4FNS, [4] B. Lantz, B. Heller, and N. McKeown, A Network in a Laptop, in ACM HotNets, [5] N. Leymann, Flexible Service Chaining. Requirements and Architectures. in EWSDN. Presentation, [6] A. Madhavapeddy and D. J. Scott, Unikernels: Rise of the Virtual Library Operating System, ACM Queue, vol. 11, no. 11, pp. 1 15, [7] NEC, ProgrammableFlow PF5240 Switch, docs/?id=5ce9b8d9-e3f3-41de-a5c2-6bd7c9b [8] Open Networking Foundation, Software-Defined Networking: The New Norm for Networks, Apr [9] Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, SIMPLE-fying Middlebox Policy Enforcement using SDN, in ACM SIGCOMM, [10] P. Quinn, J. Guichard, R. Fernando et al., Network Service Header, -Draft, draft-quinn-nsh-02.txt, IETF, Feb [11] P. Quinn and T. Nadeao, Service Function Chaining Problem Statement, -Draft, draft-quinn-sfc-problem-statement-03.txt, IETF, Dec [12] M. S. Rathore, M. Hidell, and P. Sjödin, KVM vs LXC: Comparing Performance and Isolation of Hardware-assisted Virtual Routers, American Journal of Networks and Communications, vol. 2, no. 4, pp , [13] J. Rückert, J. Blendin, N. Leymann, G. Schyguda, and D. Hausheer, Demo: Software-Defined Network Service Chaining, in EWSDN, [14] Y. Zhang, N. Beheshti, L. Beliveau et al., StEERING: A Softwaredefined Networking for Inline Service Chaining, in IEEE ICNP, 2013.

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical

More information

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,

More information

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash srinivas.govindraj@colorado.edu, arunkumar.jayaraman@colorado.edu,

More information

OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization.

OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization. Deploying a virtual network function over a software defined network infrastructure: experiences deploying an access control VNF in the University of Basque Country s OpenFlow enabled facility Eduardo

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Software Defined Networking Seminar

Software Defined Networking Seminar Software Defined ing Seminar Introduction - Summer Term 2014 Net Jeremias Blendin jblendin@ps.tu-darmstadt.de Prof. Dr. David Hausheer hausheer@ps.tu-darmstadt.de PS Peer-to-Peer Systems Engineering Prof

More information

Improving Network Management with Software Defined Networking

Improving Network Management with Software Defined Networking Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction

More information

Multiple Service Load-Balancing with OpenFlow

Multiple Service Load-Balancing with OpenFlow 2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication

More information

Software Defined Networking What is it, how does it work, and what is it good for?

Software Defined Networking What is it, how does it work, and what is it good for? Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David

More information

Business Cases for Brocade Software-Defined Networking Use Cases

Business Cases for Brocade Software-Defined Networking Use Cases Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,

More information

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks? OpenFlow and Onix Bowei Xu boweixu@umich.edu [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control

More information

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane

More information

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

Challenges and Opportunities:

Challenges and Opportunities: Challenges and Opportunities: The Rise of Software Centric Networking Nicolai Leymann Deutsche Telekom Technik 12.03.2015 Table of Contents 1. Todays networks and challenges 2. The New World: Software

More information

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

Open Source Network: Software-Defined Networking (SDN) and OpenFlow Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking

More information

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SOFTWARE-DEFINED NETWORKING AND OPENFLOW SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

Using SDN-OpenFlow for High-level Services

Using SDN-OpenFlow for High-level Services Using SDN-OpenFlow for High-level Services Nabil Damouny Sr. Director, Strategic Marketing Netronome Vice Chair, Marketing Education, ONF ndamouny@netronome.com Open Server Summit, Networking Applications

More information

How To Understand The Power Of The Internet

How To Understand The Power Of The Internet DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461

More information

The following normative disclaimer shall be included on the front page of a PoC report:

The following normative disclaimer shall be included on the front page of a PoC report: Annex B (normative): NFV ISG PoC #28 Report The following normative disclaimer shall be included on the front page of a PoC report: Submission of this NFV ISG PoC Report as a contribution to the NFV ISG

More information

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way

More information

Tail-f NCS Dynamic Service Chaining The purpose of this paper is to explain how Tail-f s NCS product supports dynamic service chaining.

Tail-f NCS Dynamic Service Chaining The purpose of this paper is to explain how Tail-f s NCS product supports dynamic service chaining. Tail-f NCS Dynamic Service Chaining The purpose of this paper is to explain how Tail-f s NCS product supports dynamic service chaining. Service Chaining: What and why? Service chaining refers to the sequencing

More information

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Open vswitch and the Intelligent Edge

Open vswitch and the Intelligent Edge Open vswitch and the Intelligent Edge Justin Pettit OpenStack 2014 Atlanta 2014 VMware Inc. All rights reserved. Hypervisor as Edge VM1 VM2 VM3 Open vswitch Hypervisor 2 An Intelligent Edge We view the

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

48 0890-8044/15/$25.00 2015 IEEE

48 0890-8044/15/$25.00 2015 IEEE An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional

More information

SSL Inspection Step-by-Step Guide. June 6, 2016

SSL Inspection Step-by-Step Guide. June 6, 2016 SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Application Delivery Networking

Application Delivery Networking Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: 8-1 Overview

More information

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability

More information

WHITE PAPER. Network Virtualization: A Data Plane Perspective

WHITE PAPER. Network Virtualization: A Data Plane Perspective WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable

More information

Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management

Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London

More information

LPM: Layered Policy Management for Software-Defined Networks

LPM: Layered Policy Management for Software-Defined Networks LPM: Layered Policy Management for Software-Defined Networks Wonkyu Han 1, Hongxin Hu 2 and Gail-Joon Ahn 1 1 Arizona State University, Tempe, AZ 85287, USA {whan7,gahn}@asu.edu 2 Clemson University, Clemson,

More information

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SOFTWARE-DEFINED NETWORKING AND OPENFLOW SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < echoi@brocade.com> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Software Defined Networks

Software Defined Networks Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors

More information

Service Chaining in Carrier Networks

Service Chaining in Carrier Networks White Paper Service Chaining in Carrier Networks Prepared by Gabriel Brown Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.qosmos.com February 2015 Dynamic Services, Dynamic Networks

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,

More information

Effective disaster recovery using Software defined networking

Effective disaster recovery using Software defined networking Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this

More information

Software Defined Networks

Software Defined Networks Software Defined Networks Inspired from the article Software-defined Networking: A Comprehensive Survey by Diego Kreutz, Fernando M. V. Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky

More information

Tutorial: OpenFlow in GENI

Tutorial: OpenFlow in GENI Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse

More information

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014

OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014 OpenFlow-enabled SDN and Functions Virtualization ONF Solution Brief February 17, 2014 Table of Contents 2 Executive Summary 3 SDN Overview 4 Introduction to NFV 5 NFV Challenges 6 NFV/SDN Example Use

More information

Applying SDN to Network Management Problems. Nick Feamster University of Maryland

Applying SDN to Network Management Problems. Nick Feamster University of Maryland Applying SDN to Network Management Problems Nick Feamster University of Maryland 1 Addressing the Challenges of Network Management Challenge Approach System Frequent Changes Event-Based Network Control

More information

Ten Things to Look for in an SDN Controller

Ten Things to Look for in an SDN Controller Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

The Road to SDN: Software-Based Networking and Security from Brocade

The Road to SDN: Software-Based Networking and Security from Brocade WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network

More information

2015 Spring Technical Forum Proceedings

2015 Spring Technical Forum Proceedings Virtualizing the Home Network Michael Kloberdans CableLabs Abstract One of the areas of focus in the Cable industry has been a virtualized home network. This paper proposes a road map with an analysis

More information

Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework)

Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework) Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework) John Sonchack, Adam J. Aviv, Eric Keller, and Jonathan M. Smith Outline Introduction Overview of OFX Using OFX Benchmarks

More information

Network Virtualization and Application Delivery Using Software Defined Networking

Network Virtualization and Application Delivery Using Software Defined Networking Network Virtualization and Application Delivery Using Software Defined Networking Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Keynote at

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

DREAMER and GN4-JRA2 on GTS

DREAMER and GN4-JRA2 on GTS GTS Tech+Futures Workshop (Copenhagen) GTS Tech+Futures Workshop (Copenhagen) DREAMER and GN4-JRA2 on GTS CNIT Research Unit of Rome University of Rome Tor Vergata Outline DREAMER (Distributed REsilient

More information

Disaster-Resilient Backbone and Access Networks

Disaster-Resilient Backbone and Access Networks The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)

More information

SDN Architecture and Service Trend

SDN Architecture and Service Trend 2013 SDN 高 峰 論 壇 SDN Architecture and Service Trend Dr. Yu-Huang Chu Broadband Network Lab Chunghwa Telecom Co., Ltd., Taiwan 10/09/13 1 Outlines SDN & NFV introduction Network Architecture Trend SDN Services

More information

Network Security through Software Defined Networking: a Survey

Network Security through Software Defined Networking: a Survey jerome.francois@inria.fr 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

RSVP as Firewall Signalling Protocol

RSVP as Firewall Signalling Protocol RSVP as Firewall Signalling Protocol Utz Roedig 1, Manuel Görtz 1, Martin Karsten 1, Ralf Steinmetz 1,2 1 Industrial Process and System Communications, Darmstadt University of Technology, Germany 1 German

More information

Network Functions Virtualization in Home Networks

Network Functions Virtualization in Home Networks Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.

More information

Invariant Preserving Middlebox Traversal

Invariant Preserving Middlebox Traversal Invariant Preserving Middlebox Traversal Ahmed Abujoda and Panagiotis Papadimitriou Institute of Communications Technology, Leibniz Universität Hannover, Germany {first.last}@ikt.uni-hannover.de Abstract.

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

SDN, OpenFlow and the ONF

SDN, OpenFlow and the ONF SDN, OpenFlow and the ONF OpenFlow/Software-Defined Networking (SDN) OpenFlow/SDN is emerging as one of the most promising and disruptive networking technologies of recent years. It has the potential to

More information

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS VIEWABILL Cloud Security and Operational Architecture featuring RUBY ON RAILS VAB_CloudSecurity V1 : May 2014 Overview The Viewabill.com cloud is a highly-secure, scalable and redundant solution that enables

More information

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P 19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

Simplifying Data Data Center Center Network Management Leveraging SDN SDN

Simplifying Data Data Center Center Network Management Leveraging SDN SDN Feb 2014, HAPPIEST MINDS TECHNOLOGIES March 2014, HAPPIEST MINDS TECHNOLOGIES Simplifying Data Data Center Center Network Management Leveraging SDN SDN Author Author Srinivas Srinivas Jakkam Jakkam Shivaji

More information

Software Defined Networking and OpenFlow: a Concise Review

Software Defined Networking and OpenFlow: a Concise Review Software Defined Networking and OpenFlow: a Concise Review Stefano Forti stefano.forti92@gmail.com MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction

More information

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments Aryan TaheriMonfared Department of Electrical Engineering and Computer Science University of Stavanger

More information

OpenFlow: Enabling Innovation in Campus Networks

OpenFlow: Enabling Innovation in Campus Networks OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification

More information

SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1

SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei

More information

Networking and High Availability

Networking and High Availability yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Xperience of Programmable Network with OpenFlow

Xperience of Programmable Network with OpenFlow International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is

More information

Network Virtualization Solutions

Network Virtualization Solutions Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction

More information

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

Network Functions Virtualization (NFV) for Next Generation Networks (NGN) P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks SDN and OpenFlow Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks Open 2014 Open SDN Networking India Foundation Technology Symposium, January 18-19, 2015, Bangalore Agenda SDN

More information

Evaluation guide. Vyatta Quick Evaluation Guide

Evaluation guide. Vyatta Quick Evaluation Guide VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up

More information

Wireless & Mobile. Working Group

Wireless & Mobile. Working Group Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...

More information

The Role of Virtual Routers In Carrier Networks

The Role of Virtual Routers In Carrier Networks The Role of Virtual Routers In Carrier Networks Sterling d Perrin Senior Analyst, Heavy Reading Agenda Definitions of SDN and NFV Benefits of SDN and NFV Challenges and Inhibitors Some Use Cases Some Industry

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

SDN Interfaces and Performance Analysis of SDN components

SDN Interfaces and Performance Analysis of SDN components Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia SDN Interfaces and Performance Analysis of SDN components, David Hock, Michael Jarschel, Thomas Zinner, Phuoc

More information

A Network Control Plane for Massive Video Delivery

A Network Control Plane for Massive Video Delivery A Network Control Plane for Massive Video Delivery Giuseppe Cofano Politecnico di Bari, Dipartimento di Ingegneria Elettrica e dell Informazione, Via E. Orabona 4 70125 Bari, Italy - giuseppe.cofano@poliba.it

More information

Open, Elastic Provisioning of Hardware Acceleration in NFV Environments

Open, Elastic Provisioning of Hardware Acceleration in NFV Environments Open, Elastic Provisioning of Hardware Acceleration in NFV Environments Leonhard Nobach, M. Sc. lnobach@ps.tu-darmstadt.de Prof. Dr. David Hausheer hausheer@ps.tu-darmstadt.de Netsys 2015 SDNFlex Workshop

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts

The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to

More information

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables OpenFlow and Software Defined Networking presented by Greg Ferro OpenFlow Functions and Flow Tables would like to thank Greg Ferro and Ivan Pepelnjak for giving us the opportunity to sponsor to this educational

More information