OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization.
|
|
|
- August Preston Sharp
- 10 years ago
- Views:
Transcription
1 Deploying a virtual network function over a software defined network infrastructure: experiences deploying an access control VNF in the University of Basque Country s OpenFlow enabled facility Eduardo Jacob, Jon Matias, Alaitz Mendiola, Victor Fuentes, Jokin Garay, Christian Pinedo University of the Basque Country (UPV/EHU) s: {eduardo.jacob, jon.matias, alaitz.mendiola, victor.fuentes, jokin.garay, christian.pinedo}@ehu.es Paper type Technical paper. Abstract Network Function Virtualisation is one of the last buzzwords in the networking scenario. Although this functionality is many times related with Software Defined Networks this is not compulsory. For some, NFV can be seen as a new name for an assembly of known technologies, but substituting hardware boxes by Virtual Machines in the dynamic scenario of the slice creation in SDN based infrastructure is quite novel. In this article we will present our experience deploying a Virtualised Network Function to offer access control services (as an output of an AuthN/AuthZ process) on our OpenFlow Enabled Facility (EHU-OEF). Keywords OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization. 1. Introduction We have deployed our own experimental facility at the University of the Basque Country (UPV/EHU), the EHU OpenFlow Enabled Facility (EHU-OEF) (I2T Research Group, 2014). This facility is based on Software Defined Networking (SDN) technology (Kreutz, et al., 2014), OpenFlow in particular (McKeown, et al., 2008), and delegates the control plane of the slice to the controller defined and administered by the owner of the slice. EHU- OEF provides a virtualised infrastructure based on Layer 2 prefixes, i.e. MAC address prefixes. It is a novel approach to network virtualisation, which allows us to provide full VLAN capacity to the experiments running on top of our infrastructure. The only requirement is the need to configure the MAC addresses of end host accessing the infrastructure (as simple as configuring the IP address and even more simple when using virtual machines). A very detailed explanation of this infrastructure can be found at (Matias, et al., 2013). The shared infrastructure imposes some challenges when trying to assure the isolation between slices and controlling who has access to each slice. In this context, we have designed a mechanism to authenticate and authorize each user before accessing the resources available at each slice. This procedure must be enforced by each slice owner. Moreover, the resources and services provided (i.e. multiple services, not just access to the slice) by each slice can be defined by the owner of the slice and be controlled independently by a different security procedure. In a nutshell, the EHU-OEF provides a virtualised infrastructure which exposes the OpenFlow control plane to the experimenters. A mechanism to control the access to each slice is provided, but it is delegated to the experimenters and must be managed by them. This network functionality, i.e. the access control to the slice, is provided as a virtual machine that could be instantiated at slice creation process and implements FlowNAC, (Matias, et al., 2014) a modified version of IEEE 802.1X with a novel EAPoL-in-EAPoL (Extensible Authentication Protocol over LAN) encapsulation to authenticate the users without the need of a captive portal and provide service level access control. However, some interaction is needed between the SDN (i.e. OpenFlow controller) and the Network Functions Virtualisation (NFV) resources (i.e. Access Control Virtual Network
2 Function, AC-VNF) in order to implement such access control to the slice. The rest of the paper is structured as follows; in section 2 we will present the problem statement, in section 3 the EHU-OEF platform and its second release that allows conducting experiments in NFV, in section 4 the interaction between SDN and NFV and implementation details of the Access Control Virtual Network Function, in section 5 the operative of the EHU-OEF management framework and finally, in section 6 the conclusions will be drawn. 2. Problem statement One of the limitations of SDN while trying to implement a network functionality is the lack of state supported at the networking elements. SDN architecture components (switches) are essentially stateless. The state is maintained at the controller by means of SDN applications. But, it s important to highlight that implementing a stateful application implies redirecting all the traffic to the OpenFlow controller by encapsulating it in the OpenFlow protocol. Network Function Virtualisation (Chiosi, et al., 2013) is the ideal complement for SDN in order to implement stateful solutions, since the SDN interfaces can be used to redirect the specific traffic (i.e. identified by flow entries at data plane) to the Virtual Network Function (VNF) box, where the state is maintained. No encapsulation is needed and it can be located at any place in the infrastructure by using the IT virtual resources (i.e. computation and storage). The traffic can be processed by distributed VNF boxes (at data plane) without needing to redirect all the traffic to the (logically) centralized OpenFlow Controller (although it can be physically distributed). As previously mentioned, some kind of interaction is needed between NFV and SDN in order to assign each traffic to the corresponding VNF box. 3. EHU-OEF platform Back in 2010, the I2T Research Group started the deployment of an OpenFlow testbed to conduct networking related research, the EHU-OEF, in the first campus-wide experience with OpenFlow at the University of the Basque Country. The first release of the platform consisted solely of networking resources as the platform was oriented to SDN research. Afterwards, the offerings of the infrastructure were augmented to include virtualised computational resources, allowing the experimenters to deploy a complete testbed attaching virtual machines (VMs) associated to their network slices and thus enabling research and experimentation in NFV following the ideas behind the ETSI NFV Proof of Concepts (ETSI Industry Specification Group for NFV, 2013). The complete infrastructure of the EHU-OEF is shown in Figure 1. Figure 1: EHU-OEF experimental facility
3 Building upon this, recently a second release of EHU-OEF has been deployed with a management framework to ease the use by the experimenters automatizing the provisioning and deployment of the slices and the associated resources and also allowing the enrichment of the slices with NFV based services. The management framework is displayed in Figure 2 and is composed of the following elements: - Management: built with Tomcat and MySQL, hosts the management website described in section 5 and interacts with the rest of the elements of the framework. - Monitoring: gathers the monitoring information from the infrastructure using SNMP and MRTG and provides the information to the management server. - Slicing: built with a modified version of FlowVisor that implements L2PNV and manages the slicing. - Xen hosts: built with Xen and libvirt, they host the computing resources and are deployed at different points in the network. Communication with the management server is done using TLS and certificates issued by a locally managed certification authority. - Gateway: provides DHCP, DNS and internet access (NAT/FW) to the VMs and VNFs deployed in EHU- OEF through the management network. Figure 2: EHU-OEF Management framework As this release is currently stable and used in the experiments of the research group, currently a new release is being planned that includes extending the available VNFs to offer basic services in the experimenter slices (such as DHCP, DNS, firewall, etc.) and implementing software switches in the Xen servers to extend the scope and variety of the networking resources available in the EHU-OEF platform. 4. Approach for implementing a Virtualised Network Function over a SDN infrastructure. 4.1 SDN and NFV interactions According to the ETSI NFV architecture (ETSI NFV ISG, 2013) there are some assumptions that must be considered regarding the implementation of a VNF: - The VNF is built on top of a NFV Infrastructure (NFVI), which provides a set of virtual resources (i.e. Virtual Computing, Virtual Storage and Virtual Network) over a virtualised layer. - The VNF implements all the logic in a single box and has two reference points (northbound and southbound). - The actual management of the VNF is out of the scope of this NFV architecture. - There is no explicit relation with SDN and how both technologies could be related in a real deployment. What we have tried to solve with this experience in deploying a VNF over EHU-OEF infrastructure (based on SDN) is how the SDN and NFV can fit together and to identify how each technology could be beneficial for each other. Moreover, when actually deploying the VNF to become operational, the management of the VNF needs to be covered by the implementation.
4 Regarding the SDN and NFV interaction, first of all some basic concepts need to be clarified. At this point, the the state (stateless vs stateful) must be analyzed. In SDN the data plane and control plane are separated and implemented on different (at least logical) entities: the Data Path and Controller, respectively. On the one hand, the Data Path is stateless by definition, since the flow entries that can be matched do not maintain any state from previous packets. On the other hand, the Controller is a software application which can easily maintain the state of previous interactions. In a nutshell, to implement a stateful solution in SDN all the packets (involved in the stateful support) must be redirected to the Controller. From the NFV perspective, there is no restriction to implement both a stateless and stateful VNF and it is up to the logic of the VNF to support one or another. One interesting aspect is how this state-related issue can be addressed when combining the SDN and NFV technologies. Following the same split between stateless (data) and stateful (control), the VNF could also have some benefits from as similar approach (depending of the actual network function). In this approach the stateless part of the VNF could even rely on SDN to implement this functionality, whereas the stateful part could remain in a VM somewhere in the network. If any interaction is needed between both stateless and stateful parts of the VNF, the SDN could eventually be used to steer the packets from the stateless data path to the VM in order to be processed. The main difference between SDN and NFV split (data vs. control or stateless vs. stateful) is the following: On the SDN approach the packets from the Data Path to the Controller are encapsulated in OpenFlow protocol and the logic to process this packets must be adapted to run as an OpenFlow application on top of the Controller. A specific implementation is needed for each Controller to be used. As opposite, on the NFV approach the packets can be redirected to the VM without any encapsulation (less overhead and processing time) and even more, the packets can be processed by legacy deployments (e.g. Linux x86 applications). In a mixed SDN and NFV scenario, we foresee two main beneficial interactions between both technologies. On the one hand, the SDN can be a tool for steering the traffic to the adequate VNF VM by just setting the proper flow entries matching the packets (e.g. specific protocol) to be redirected to this VM. Moreover, the redirected packets are not encapsulated in OpenFlow messages and can be processed by legacy applications deployed on top of any OS. Typically, these packets will be related to a specific legacy protocol that allows interaction between end hosts (e.g. a client and a server). On the other hand, the VNF can rely on SDN to implement some (stateless) flow level process (i.e. basically match and action) as an output from the process (stateful or stateless) previously described, i.e. the exchange between end hosts by means of a specific protocol. To achieve this interaction the VNF must be connected to the SDN controller by any northbound interface exposed upwards. This interface allows the VNF to apply and enforce some actions on the Data Path, which could improve the overall performance of packet processing. Finally, there is an important interface, which is out of the scope of the NFV standard, which is the VNF management interface. The main challenge of this interface is its dependence with the application logic implemented on the VM. This means that it is really challenging to define a common interface for any type of application that could be implemented by the VNF. However, this management interface is key for a real deployment and must be defined when implementing the VNF. This interface should be also made available, through some kind of connectivity, to the actual user who requests the VNF. The SDN could be also the tool for providing such connectivity. To conclude the security is a topic to be further study for all the interfaces described above, both for the SDN- NFV and VNF management interface. 4.2 The Access Control Virtualised Network Function (AC-VNF) The objective of the Access Control Virtualised Network Function is the provisioning of security services, more concretely, access control to the slice (or services behind the slice resources) and policy enforcement. The solution is based on IEEE 802.1X standard (and a modified version of the standard to implement the access control per service (Jacob & Matias, 2012), instead of per port). Basically, the VNF is built on a VM with a Linux distribution and HostAP ( software (authenticator) running on it. To implement the service based access control, both modified versions of HostAP and wpa_supplicant ( are used (already developed). In addition to this, a RADIUS server (authentication server, infrastructure must be also provided in conjunction with the HostAP VM (this can be provided as a joint VNF box or with a standard interface to legacy resources). The user identifiers and credentials must be also managed by the slice s owner (in our case a LDAP infrastructure). An interface between the RADIUS server and the SDN controller (OpenFlow
5 controller) has been also implemented by means of REST-JSON in order to properly enforce the policy (access to a service). This interface defines the flow entries and the specific DPID (Data Path Identifier, which identifies the switch), which must be activated/released on successful/failed ending of authentication and authorization (AA) procedure. This approach effectively implements the separation of the state associated to the AA procedure, which is maintained in the VNF box, from the actual enforcement of the policy, which is assured by the SDN flow entries. Thus, the functions associated to the whole AA procedure are distributed between SDN and NFV. The cooperation between SDN and NFV is fundamental. Our implementation in fact, provides an example on how this could be implemented: the definition of this type of interfaces (probably per VNF) is basic. Regarding our implementation, we mentioned that the associated traffic to the VNF, must be redirected to the VNF box. In our case, the VNF traffic (IEEE 802.1x) can be easily distinguished by it s EtherType (0x888E) or it s MAC destination address (a reserved multicast address: 01:80:C2:00:00:03). In our platform, we have also implemented a module for the slice controller (currently, we have a module for NOX and FloodLight controllers) in order to redirect all the IEEE 802.1X traffic (i.e. EAPoL frames) to the appropriate VM, the VNF box, where the HostAP is located. To obtain a more general solution and the possibility to deploy multiple HostAP VMs in the same slice (e.g. for load balancing between several VNF boxes), we have designed a procedure to redirect the EAPoL frames by rewriting the multicast MAC destination address with the unicast MAC address of the HostAP VM. The rewriting is enforced at the edge switch directly connected to the end user and reverted before accessing the HostAP VM (i.e. rewrite the unicast by multicast address). The end user can be both a VM from another virtual server or a physical PC directly connected to one of the physical ports of any of the OpenFlow switches. One important issue related to NFV is the need of some virtual machine provisioning mechanism and management, including some automated configuration mechanism to adapt the dummy configuration of the VM on the repository to the specific values needed in each slice. For instance, the HostAP VM (i.e. authenticator) needs some information about the RADIUS server (e.g. the pre-shared key, the IP address, port...). This VM provisioning mechanism and its automated configuration functionality represents an additional set of features for our infrastructure and is also available to users for generic purposes, as previously explained in section 3. Figure 3: AC-VNF process Once the slice is deployed and properly configured, no traffic is allowed at the slice except the EAPoL frames, which are redirected properly (by unicast rewriting) to the VNF box. An IEEE 802.1X authentication and authorization procedure must be successfully completed before accessing any resource/service available at the slice. This AA procedure can be associated to specific services (instead of full access to the network as defined at the IEEE 802.1X standard) defined at SDN by a set of flow entries. Once the AA procedure succeeds, flow entries are deployed by the SDN controller enabling the access to the service, thus, enforcing the policy. The
6 same end user can also request additional services by using the modified HostAP wpa_supplicant software. This is shown in Figure Operations overview An experimenter who wants to use EHU-OEF facility must contact the administrator of the platform and request access. Once request is approved by the administrator, access credentials -username and password- are given to the experimenter. In order to use of the facility, experimenters must also provide the public key which will be used to grant access to the resources instantiated by the experimenter. Management of the platform is entirely performed from the web portal shown in Figure 4, where the experimenter, after the authentication procedure, can manage the slices, including operations such as creation of new resources over the slice, deploying, enabling or disabling Virtual Network Functions, etc. Figure 4: EHU-OEF Management server, home The rest of the section describes the available operations related to slices in section 4.1, resources in section 4.2 and monitoring in section Slices Under the Slices Tab shown in Figure 5, the experimenter can get a list of running slices assigned, and access the detailed configuration for each one. The website also allows creating new slices and to do so the experimenter must set a name for the slice and configure the controller.
7 Figure 5: EHU-OEF Management server, slices view The platform provides the option to automatically add a controller from a set of templates POX, RYU... which are dynamically configured for the slice and ready-to-work. Also, the experimenter can use his own controller setting up the corresponding URL and OpenFlow Port. Once the creation of the slice is started some process are activated internally. First of all, it is required to create a slice into Flowvisor and corresponding rules to enforce flowspace policy to guarantee isolation between slices. EHU-OEFs runs a modified version of Flowvisor-1.4 which is able to support MAC prefixes for flow characterizations using OpenFlow 1.0. After this process, if the automatic controller option is selected, a virtual resource running the selected controller type is provided and attached to the slice, including the public key of the experimenter to grant access to the resource. After the creation of the slice, the experimenter can continue managing the slice selecting View Resources for a certain slice Resources As previously stated, the EHU-OEF offers both network and computational resources to experimenters. In the first release of the platform, slices were considered as a subset of the network resources, composed of hardware and software switches, that experimenters were able to control through OpenFlow. Since the appearance of NFV, with the VMs assuming some networking functionalities, the slice definition has become richer. As a consequence, in order to provide the best possible service to the experimenters of the facility, the EHU-OEF platform provides the means to provision and deploy generic purpose VMs and also more specific purpose resources for NFV related research and experiments as shown in Figure 6.
8 Figure 6: EHU-OEF Management server, resources view First of all, at the resources section, experimenters can visualize the resources associated with their slice. They can see information about the resource types, their location inside the facility or the VM template that has been used for their creation. Second, experimenters are able to add new resources to their slice anytime. Besides the template that they want to use for the creation of the VM, researchers are also able to select the location where that VM will be deployed. Thus, they will know exactly the composition of their slice, making possible for them to control the network in a proactive way. All VMs run on Xen Server. For that matter, when a new resource is added from the EHU-OEF management server, the corresponding Xen Server is instructed to create a new VM using the specified template. Besides, in order to keep a record of everything that has been provisioned for users, all the relevant information such as the VM type, etc. is stored in a MySQL database. Starting from a basic set, the available VM templates is continuously expanded as experiments are conducted in the platform and those specific VMs used that are considered to be useful for further experiments are modified and include in the list. At the time of writing this document, several different VM templates are available for users: - OF Controllers POX and Ryu: Linux VM templates with the POX or Ryu OpenFlow controller already installed (each template has one of them) - Standard Lightweight Linux VM: A Linux lightweight VM template of generic purpose. The template contains a pre-installed set of common tools very useful for networking research, e.g., tcpdump, vim, compilers, etc. - Demo Client and Demo Server: Linux VM templates prepared to run iperf as client and server respectively. - HostAP (Access VNF): A Linux VM template that contains everything necessary to implement the Access Control Virtual Network Function as explained in section VNF Configuration The EHU-OEF management framework can also be used to manage the VNFs of the slices. For instance, in the the Access Control VNF, it is possible to activate or deactivate the Access Control VNF without disrupting the service. Furthermore, it provides the necessary tools to configure the allowed services inside the slice and the users with permission to access it as shown in Figure 7 and Figure 8.
9 Figure 7: EHU-OEF Management server, VNF configuration of services Figure 8: EHU-OEF Management server, VNF configuration of users 5.3. Monitoring Aware of the importance of monitoring in networking experiments, the EHU-OEF management framework includes a monitoring tool available for experimenters. The framework monitors the bandwidth of a set of ports within the EHU-OEF OpenFlow switches. In order to obtain the bandwidth, SNMP and MRTG are used as can be seen in Figure 9. As a consequence, the information obtained is port-based and not flow-based. In order to improve the monitoring system, the I2T Research group is currently working on alternative ways to monitor an OpenFlow network.
10 Figure 9: EHU-OEF Management server, monitoring 6. Conclusions and future work The paper has presented the automated deployment of a Virtualised Network Function over the slices created in our SDN based infrastructure. This approach is particularly well suited to a stateless SDN based infrastructure as the VNF is able to store the data needed to main the AA state. As additional conclusions, we have found that our MAC prefix based virtualisation has proved to be very effective to deal with layer 2 traffic involved in the 802.1x procedure. Finally, it s worth to mention that the design needs to carefully address the configuration not only of the VM employed in the VNF but also of the underlying communication substrate to maintain the proper isolation and these involves the creation of some specific pieces of software. Starting with this first implementation our goal is to continue developing more VNFs. Acknowledgments This work has been partially funded by the Spanish MICINN project A3RAM-NG (TIN C02-01) and the Basque Government Strategic Research Project Future Internet II (IE11-316). It is also supported by the University of the Basque Country s Training and Research Unit for Telecommunications and Electronics (UFI11/16). References Chiosi, M., Wright, S. & et al., Network Functions Virtualisation (NFV). [Online] Available at: [Accessed 14 April 2014]. ETSI Industry Specification Group for NFV, ETSI GS NFV 002: "Network Functions Virtualisation (NFV); Architectural Framework". [Online] Available at: [Accessed 14 April 2014]. ETSI Industry Specification Group for NFV, ETSI GS NFV-PER 002: "Network Functions Virtualisation (NFV); Proof of Concepts; Framework". [Online] Available at: PER/001_099/002/ _60/gs_NFV-PER002v010101p.pdf [Accessed 12 June 2014]. I2T Research Group, The University of the Basque Country s OpenFlow Enabled Facility (EHU-OEF).
11 [Online] Available at: [Accessed 14 April 2014]. Jacob, E. & Matias, J., Deploying OpenFlow in production at the University of the Basque Country: Identity based network infrastructure configuration. s.l., s.n. Kreutz, D. et al., Software-Defined Networking: A Comprehensive Survey. arxiv: Matias, J. et al., FlowNAC: Flow-based Network Access Control. Budapest, EWSDN14 (accepted paper). Matias, J. et al., The EHU-OEF: An OpenFlow-based Layer-2 experimental facility. Computer Networks, Special Issue: Future Internet Testbeds. McKeown, N. et al., OpenFlow: Enabling Innovation in Campus Networks. ACM SIGCOMM Computer Communication Review, II(38), pp Vitae Eduardo Jacob got in 1991 a BSc in Industrial Engineering and a MSc. in Industrial Communications and Electronics from the University of the Basque Country (UPV/EHU). He spent 5 years in a public R&D institution and as IT director in the private. He got his PhD in ICT in He is assistant professor and actually acting as Head of the Communications Engineering Department. He is the promoter of the EHU OpenFlow Enabled Facility. His interests are related to application of the Software Defined Networks to support advanced applications, ITS and privacy by design sensors. Jon Matias received his BS and MS degree in Electrical Engineering from the University of the Basque Country (UPV/EHU, Spain) in He currently works as a lecturer and researcher in the Electronics and Telecommunications Department at the Faculty of Engineering of Bilbao (UPV/EHU). He is also pursuing the PhD degree in electrical engineering at the same University focused on access networks and security. His research interests include Computer Networks, Broadband Access Networks, OpenFlow, Services Provisioning and Security. Alaitz Mendiola received her BSc and MSc degrees in telecommunication engineering in 2012 from the University of the Basque Country (UPV/EHU). Her research interests include Software Defined Networking, Network Virtualisation and DOCSIS Access networks. Victor Fuentes received his BSc and MSc degrees in Telecommunication engineering in 2013 at the University of the Basque Country (UPV/EHU). He has experience with integration of GPON access networks into Openflow sceneries and Openflow proxy-based platforms. He has been actively involved in the deployment of EHU-OEF. Jokin Garay received his BSc and MSc degrees in telecommunication engineering in 2003 from the University of the Basque Country (UPV/EHU). After a period in the private sector he came back to the University. His research interests include Software Defined Networking, Network Functions Virtualisation and Cloud Computing. Christian Pinedo received his BSc and MSc degrees in Telecommunication Engineering in 2004 from the University of the Basque Country (UPV/EHU). He was researcher at the I2T research lab until he got in 2007 another MSc in Information and Communication Systems in Wireless Networks from the UPV/EHU. In September 2007 he left the university and was employed in the private sector. Since August 2012 he returned to I2T research lab focusing his research on network virtualisation technologies and railway communications.
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
Network Functions Virtualization (NFV) for Next Generation Networks (NGN)
P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
Unifying the Programmability of Cloud and Carrier Infrastructure
Unifying the Programmability of Cloud and Carrier Infrastructure Mario Kind EWSDN 2014, Budapest UNIFY is co-funded by the European Commission DG CONNECT in FP7 We might only have to knit the future. Operator
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King [email protected] Matthew Broadbent [email protected] David Hutchison [email protected]
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Network Virtualization and Application Delivery Using Software Defined Networking
Network Virtualization and Application Delivery Using Software Defined Networking Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Keynote at
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
An Introduction to Software-Defined Networking (SDN) Zhang Fu
An Introduction to Software-Defined Networking (SDN) Zhang Fu Roadmap Reviewing traditional networking Examples for motivating SDN Enabling networking as developing softwares SDN architecture SDN components
Software Defined Networking
Software Defined Networking Stefano Giordano Dipartimento di Ingegneria dell Informazione Università di Pisa 3D Reference model of ISDN Hourglass reference model of a TCP/IP network Network Ossification
Software Defined Networking Seminar
Software Defined ing Seminar Introduction - Summer Term 2014 Net Jeremias Blendin [email protected] Prof. Dr. David Hausheer [email protected] PS Peer-to-Peer Systems Engineering Prof
Defining SDN. Overview of SDN Terminology & Concepts. Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014
Defining SDN Overview of SDN Terminology & Concepts Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014 2013 Cisco and/or its affiliates. All rights reserved. 2 2013 Cisco and/or its affiliates.
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe
Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Tutorial: OpenFlow in GENI
Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
Network Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
Using SDN-OpenFlow for High-level Services
Using SDN-OpenFlow for High-level Services Nabil Damouny Sr. Director, Strategic Marketing Netronome Vice Chair, Marketing Education, ONF [email protected] Open Server Summit, Networking Applications
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
SDN Interfaces and Performance Analysis of SDN components
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia SDN Interfaces and Performance Analysis of SDN components, David Hock, Michael Jarschel, Thomas Zinner, Phuoc
T-NOVA: Network Functions As-a-Service Over Virtualized Infrastructures. George Xilouris T-NOVA Technical Coordinator
T-NOVA: Network Functions As-a-Service Over Virtualized Infrastructures George Xilouris T-NOVA Technical Coordinator T-NOVA Facts ICT Call 11 (FP7-ICT-2013-11) Objective ICT-2013.1.1.: Future Networks
SDN Architecture and Service Trend
2013 SDN 高 峰 論 壇 SDN Architecture and Service Trend Dr. Yu-Huang Chu Broadband Network Lab Chunghwa Telecom Co., Ltd., Taiwan 10/09/13 1 Outlines SDN & NFV introduction Network Architecture Trend SDN Services
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
SDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics
Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational
Position Paper: Software-Defined Network Service Chaining
Position Paper: Software-Defined Network Service Chaining Jeremias Blendin, Julius Rückert, Nicolai Leymann, Georg Schyguda, and David Hausheer Peer-to-Peer Systems Engineering Lab, Technische Universität
OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014
OpenFlow-enabled SDN and Functions Virtualization ONF Solution Brief February 17, 2014 Table of Contents 2 Executive Summary 3 SDN Overview 4 Introduction to NFV 5 NFV Challenges 6 NFV/SDN Example Use
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
1 Data Center Infrastructure Remote Monitoring
Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR
Software Defined Networking and the design of OpenFlow switches
Software Defined Networking and the design of OpenFlow switches Paolo Giaccone Notes for the class on Packet Switch Architectures Politecnico di Torino December 2015 Outline 1 Introduction to SDN 2 OpenFlow
The following normative disclaimer shall be included on the front page of a PoC report:
Annex B (normative): NFV ISG PoC #28 Report The following normative disclaimer shall be included on the front page of a PoC report: Submission of this NFV ISG PoC Report as a contribution to the NFV ISG
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
Network Virtualization Solutions
Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
48 0890-8044/15/$25.00 2015 IEEE
An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
SDN Testbeds and Experimentation
SDN Testbeds and Experimentation Vasileios Kotronis ([email protected]) 1 What you have seen till now What SDN is about (and how it came to be) Basic concepts, abstractions Architectural components
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Understanding OpenFlow
Understanding OpenFlow Technical Whitepaper June, 2014 Saurabh Kumar Agarwal Email: [email protected] Abstract Technical overview of OpenFlow Switch Specification, Version 1.0.0, published on December
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Ten Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
The Promise and the Reality of a Software Defined Data Center
The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure
Cisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
A Study on Software Defined Networking
A Study on Software Defined Networking Yogita Shivaji Hande, M. Akkalakshmi Research Scholar, Dept. of Information Technology, Gitam University, Hyderabad, India Professor, Dept. of Information Technology,
PLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
Software Defined Networks
Software Defined Networks Inspired from the article Software-defined Networking: A Comprehensive Survey by Diego Kreutz, Fernando M. V. Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
Utility Computing and Cloud Networking. Delivering Networking as a Service
Utility Computing and Cloud Networking Delivering Networking as a Service Overview Utility Computing OpenStack Virtual Networking Network Functions Virtualization Utility Computing Utility Computing: Everything
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking
AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking Diogo Menezes Ferrazani Mattos, Lyno Henrique Gonçalves Ferraz, Otto Carlos Muniz Bandeira Duarte Grupo de Teleinformática
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
Network Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
How To Write A Network Plan In Openflow V1.3.3 (For A Test)
OpenFlowand IPv6 Two great tastes that taste great together! Scott Hogg, CTO GTRI Chair Emeritus RMv6TF Infoblox IPv6 COE Today s Outline Software-Defined Networking Background Introduction to OpenFlow
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Bandwidth Management and Optimization System Design (draft)
Royal Institute of Technology Cost Effective Bandwidth Management and Optimization System: A Case of Hawassa University Bandwidth Management and Optimization System Design (draft) Date: 20 March 2009.
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
OpenFlow Overview. Daniel Turull [email protected]
OpenFlow Overview Daniel Turull [email protected] Overview OpenFlow Software Defined Networks (SDN) Network Systems Lab activities Daniel Turull - Netnod spring meeting 2012 2 OpenFlow Why and where was
Ethernet-based Software Defined Network (SDN)
Ethernet-based Software Defined Network (SDN) Tzi-cker Chiueh Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 Cloud Data Center Architecture Physical Server
Software Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
OpenFlow network virtualization with FlowVisor
Research Project 2 OpenFlow network virtualization with FlowVisor Author: Sebastian Dabkiewicz [email protected] Supervisors: Ronald van der Pol [email protected] Gerben van Malenstein [email protected]
INTRODUCTION TO CLOUD MANAGEMENT
CONFIGURING AND MANAGING A PRIVATE CLOUD WITH ORACLE ENTERPRISE MANAGER 12C Kai Yu, Dell Inc. INTRODUCTION TO CLOUD MANAGEMENT Oracle cloud supports several types of resource service models: Infrastructure
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Spotlight On Backbone Technologies
Spotlight On Backbone Technologies Shawn Stevens Technical Lead, Data Center Technologies CCIE #4618 [email protected] CDW.com/network 800.800.4239 Agenda Overview of Software-Defined Networking (SDN)
COMPSCI 314: SDN: Software Defined Networking
COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling
SDN Software Defined Networks
There is nothing more important than our customers SDN Software Defined Networks A deployable approach for the Enterprise 2012 Enterasys Networks, Inc. All rights reserved SDN Overview What is SDN? Loosely
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
Real-World Insights from an SDN Lab. Ron Milford Manager, InCNTRE SDN Lab Indiana University
Real-World Insights from an SDN Lab Ron Milford Manager, InCNTRE SDN Lab Indiana University 1 A bit about IU, the GlobalNOC, and InCNTRE... Indiana University s Network History 1998 University Corporation
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
Application-Centric WLAN. Rob Mellencamp
Application-Centric WLAN Rob Mellencamp Agenda NX Integrated Services Platform Integrated Services Architecture Application Installation Example Application Monitoring Enterprise Mobility Architecture
Network functions virtualization and software management
ericsson White paper Uen 284 23-3248 December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
Data Analysis Load Balancer
Data Analysis Load Balancer Design Document: Version: 1.0 Last saved by Chris Small April 12, 2010 Abstract: The project is to design a mechanism to load balance network traffic over multiple different
