OpenFlow Switching: Data Plane Performance
|
|
|
- Edmund Sutton
- 10 years ago
- Views:
Transcription
1 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings OpenFlow : Data Plane Performance Andrea Bianco, Robert Birke, Luca Giraudo, Manuel Palacin Dipartimento di Elettronica, Politecnico di Torino, Italy {andrea.bianco, robert.birke, luca.giraudo}@polito.it, [email protected] Abstract OpenFlow is an open standard that can be implemented in Ethernet switches, routers and wireless access points (AP). In the OpenFlow framework, packet forwarding (data plane) and routing decisions (control plane) run on different devices. OpenFlow switches are in charge of packet forwarding, whereas a controller sets up switch forwarding tables on a perflow basis, to enable flow isolation and resource slicing. We focus on the data path and analyze the OpenFlow implementation in Linux based PCs. We compare OpenFlow switching, layer-2 Ethernet switching and layer-3 IP routing performance. Forwarding throughput and packet latency in underloaded and overloaded conditions are analyzed, with different traffic patterns. System scalability is analyzed using different forwarding table size, and fairness in resource distribution is measured. I. INTRODUCTION Networks are a critical element for companies and institutions, because a network failure may dramatically influence business activities. Therefore, network administrators are struggling to ensure high network availability. On the other hand, there is an increasing need for researchers to experiment on real networks new protocols and technologies. However, running experiments on the production network may be risky, and deploying a separate research network is often too costly and does not allow researchers to scale the network to large size. Programmable networks and network virtualization are just two among the technologies that may help in solving this dilemma, allowing researchers to operate on real networks without challenging production traffic or network availability. The OpenFlow technology allows network administrators to segment telecommunication networks by properly programming network devices. OpenFlow devices identify traffic flows following forwarding rules established by network managers. OpenFlow provides a flow-based network virtualization framework to avoid interferences among different flows. Furthermore, the network administrator can delegate the management of network segment/s to the researchers, as if it was a completely independent network. Finally, OpenFlow switches are deployed into UNIX/Linux platforms and available in Ethernet switches/routers from different vendors. Virtualization is a key element to provide flow isolation. Other technologies, like VPN (Virtual Private Network). Ethernet VLANs (IEEE 82.1Q), MPLS tunneling, or even Frame Relay and ATM, provide flow isolation. However, they often lack easy management or flexibility, being tailored to a specific set of protocols. Some research projects, e.g. GENI [1], FEDERICA [2], try to develop a programmable network in which a researcher can obtain a slice of resources (network, CPU, RAM, disk...) to run its experiments. This approach is very ambitious, but it may require several years to be deployed, and it may turn out to be rater costly. OpenFlow is largely protocol independent and readily available on currently running networks. This justifies the interest of the research community for this approach. Since OpenFlow is a relatively new technology currently under deployment, several research issues should be solved: among others, robustness, ease of management, performance and scalability. In this paper we focus on the OpenFlow data plane performance. We compare OpenFlow with Ethernet switching and IP routing functionalities in a Linux environment. Experiments were run in our Lab on a Linux PC exploiting an HW traffic generator to stress packet forwarding capabilities of the PC under test. Besides absolute performance values, which clearly depend on the specific hardware and software architecture, OpenFlow showed good forwarding performance and fairness properties. II. BRIEF INTRODUCTION TO OPENFLOW We briefly outline the main characteristics of OpenFlow. A more detailed and exhaustive documentation is available in the OpenFlow white paper [3] and in the OpenFlow specification [4]. The OpenFlow network architecture comprises several OpenFlow switches, one (or more) controller, a secure channel that interconnects the switch with the controller, and the OpenFlow protocol for signaling between the switches and the controller. A classical IP router or Ethernet switch runs both the data and the control plane. The data plane is in charge of packet forwarding, whereas routing decisions are taken in the control plane. OpenFlow separates data and control plane functions: packet forwarding is executed in the OpenFlow switch on the basis of a flow table, whereas high-level routing decisions are moved to a separate OpenFlow controller. A proprietary protocol defines the messages exchanged between an Open- Flow switch and an OpenFlow controller: messages include information on received packets, sent packets, forwarding table modifications, statistics collection, etc. When the switch receives a packet that does not match any entry in the flow table, it sends the packet to the controller. The controller may drop the packet or may add a flow entry in the switch flow table, to force the switch to forward packets belonging to the same flow on a given path. Each entry in the flow table of an OpenFlow switch contains a set of packet header fields, an action to be performed on packets matching the header field, and flow statistics. The /1/$ IEEE Authorized licensed use limited to: Politecnico di Torino. Downloaded on July 7,21 at 7:42:38 UTC from IEEE Xplore. Restrictions apply.
2 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings 1 8 Fig. 1. Test Setup packet header field includes: port id; VLAN tag; Ethernet type, source and destination address; IP protocol type, source and destination address; UDP/TCP source and destination port. Examples of possible actions are: send the packet to output port i, modify packet header field f or drop the packet. Flow statistics include number of packets and bytes for each flow, and the time since the last packet matched the flow (to ease the task of inactive flow removal). Two types of OpenFlow switch can be identified. The first one is the hardware-based commercial switch, which typically uses TCAMs and a proprietary operating system to implement the flow table and the OpenFlow protocol. The second one is the software-based switch that use UNIX/Linux systems to implement the OpenFlow switch functions. Two flow tables are managed in the software based OpenFlow switch. The first one is named linear table and exploits wildcards in the packet header fields to match packets to flows. This table is of small size: it contains only 1 entries. The second table is an exact match table, exploiting a hashing function, and contains up to entries. III. EXPERIMENTAL SETUP The experimental setup is shown in Fig. 1. The test machine (TM) is a standard PC mounting a C2SBX mainboard from Supermicro, an Intel Core2 Duo processor and 8 Gbyte of DDR3 166 MHz RAM. Network connectivity is provided by two Intel PRO/1 PT dual port 1 Gbit/s NICs plugged into PCI-Express bus. The operating system is Linux Ubuntu 8.1, kernel version , with bridging and NAPI enabled. Each test is based on synthetic traffic generated using an Agilent N2X router tester [5] equipped with Gigabit Ethernet modules. The use of the router tester ensures both bottleneckfree traffic generation and high measurement precision not achievable with standard PCs and software traffic generators. Results are averaged over three runs lasting 6 seconds each. Two port pairs are used (except for the fairness tests) to interconnect directly the TM and the router tester. Traffic is sent to the TM over the first link and collected over the second one. In the case of the fairness tests, the two links are both used to send traffic to the TM, and a third link (the dashed one in Fig. 1) is used to sink the traffic. All links use UTP cat 5e cabling. tests use directly the Linux kernel implementation of a 82.1d bridge. The bridge-utils software suite is used to create a virtual switch and to connect the test interfaces to it. is performed using the IP forwarding engine available in the Linux kernel. OpenFlow tests use version.8.9r2. Fig Maximum single flow throughput versus packet size. IV. RESULTS We present the main results of the experiments run in our lab to compare the performance of OpenFlow to the ones achievable by standard L-2 and L-3 forwarding. We mainly focus on achieved throughput as the main comparison metric, although we discuss packet latency in some scenarios. A. Single-flow Performance We start comparing the three technologies assessing the maximum throughput as a function of the packet size in Fig. 2, with single-entry forwarding tables. Using a single flow permits to assess the maximum throughput, because it minimizes the table lookup cost and it benefits from caching techniques. The offered input load is also plotted as a reference. As expected, in all three cases, performance increases with packet size. This is due to the well-known fact that the operations performed to forward packets scale with the number of packets. Thus, the smaller the packet size, the higher the load on the CPU, which becomes the bottleneck. Both routing and OpenFlow perform well, being able to almost match the offered load, if not for small packet size. Having a single flow means that IP routing exploits the internal (hashbased) cache, which simply tests the IP header without the need to perform a demanding longest-prefix look-up operation. Thus, the small difference between OpenFlow and routing performance can be credited to the fact that the OpenFlow switch has to consider additional header fields with respect to the L-3 forwarder. Strangely enough, switching performs quite worse than the other two forwarding techniques. We could not find any explanation for this, apart from the suspicion that the bridging code is not optimized. However, starting from 256-byte packets, all three forwarding techniques are able to achieve the full wire speed. Since small packets are the worst case, we take a slightly deeper look at this scenario. Fig. 3 and Fig. 4 report throughput and latency for 64-byte packets for different input loads. As expected, thanks to NAPI, the throughput reaches a saturation level and does not suffer from performance drops after the peak has been reached. From the latency plot, it is easy Authorized licensed use limited to: Politecnico di Torino. Downloaded on July 7,21 at 7:42:38 UTC from IEEE Xplore. Restrictions apply.
3 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings [%] Latency [us] 12 1 Fig Single 64-byte packet flow throughput Fig. 4. [%] Single 64-byte packet flow latency. to discern the underloaded from the overloaded region. The results are very similar for all three technologies. In the underloaded region, the average latencies are quite small (slightly less then 3 µs). B. Multi-flow Performance We consider now the effects of the forwarding table size. We perform tests with three different table size: 8K, 64K and 128K, labelled in Fig. 5 as (s)mall, (m)edium and (l)arge. The large table is set to 128K entries because this is the maximum table size supported by the OpenFlow software. To fill up the forwarding tables, we use bash scripts. The routing table is filled with C-class networks, while the OpenFlow rules are created using both different UDP source and destination port numbers. An extra note is needed for the switching table. This table is usually created automatically adding entries through the backward learning algorithm: entries are removed after a timeout expiration. Hence, no explicit commands to manipulate the table content are provided. To fill up the table, we set the timeout value to one hour, and, before starting any test, we send through the switch a proper number of packets with different source addresses. Fig. 5. Maximum throughput for different packet and forwarding table size. Each bar within the groups of three refers to different table size: (s)mall 8K, (m)edium 64K and (l)arge 128K entries. To minimize the beneficial effects of caching techniques, which would make the comparison more difficult, we generate packets with random header fields (uniform distribution within the admissible range). More precisely, we use packets with randomly generated destination IP addresses for the routing tests, UDP port numbers for OpenFlow tests and destination MAC addresses for switching. Fig. 5 presents the results. For each packet size, three columns are plotted: one for each table size. Furthermore, in each column the offered load and throughput achieved by the three forwarding engines are superimposed: offered load is plotted first, in the background, then, moving to the foreground, routing, OpenFlow and switching. As expected, the larger the size of the forwarding table, the worse the achieved performance. However, while for both routing and OpenFlow the performance degradation is quite limited, the effect on switching is disastrous. For 96-byte packets, routing and OpenFlow present a relative performance drop of.1%, 5.4%, 8.9% and.6%, 5.%, 11.3% respectively, for the three table size. instead looses an astonishing 13.6%, 7.4%, 89.5%, with a throughput smaller than 1% of the link capacity in the worst case. Of course, increasing the packet size helps. and OpenFlow need at least 256 byte packets to achieve wire-speed, for small table size. In the case of switching, the minimum packet size to obtain wire speed becomes 124 bytes. C. OpenFlow Table Types: Hash vs Linear Up to now, we considered only exact matches for the OpenFlow forwarding rules. However, OpenFlow permits to set up rules with wildcards. The rules for exact matching are stored in a hash table, while the wild-card table is implemented using a linear search table allowing for up to 1 entries. The two tables are organized in a chain, and priority is given to the hash table matching. Fig. 6 reports throughput performance when using the two tables for different packet size. Despite the small table size, Authorized licensed use limited to: Politecnico di Torino. Downloaded on July 7,21 at 7:42:38 UTC from IEEE Xplore. Restrictions apply.
4 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings Hash: 128K entries Linear: 1 entries Fig. 8. Timing model to estimate the processing time from latency measurements. Fig. 6. Throughput [Mbit-s] OpenFlow throughput versus packet size with different table types Entries: Hash 96K / Linear 1 Entries: Hash 128K / Linear 1 1%/% 9%/1% 7%/3% 5%/5% 3%/7% Traffic Mix Hash/Linear [%] 1%/9% %/1% Fig. 7. OpenFlow throughput when varying the traffic mix for hash and linear tables. the throughput achieved, when using the linear table only, is lower than the throughput of the hash table. The performance drop for 96-byte packets is about 33%. Fig. 7 shows that mixing up traffic of flows that are forwarded using both tables does not modify forwarding performance too much. As expected, performance is always bounded by those obtained when using, respectively, the hash table only and the linear table only. The performance drop is proportional to the amount of traffic matching the linear table. This is due to the fact that the table chain smartly puts the hash table before the linear table. The hash table should find the match in constant time, independently of the table size, while the lookup operation within the linear table should be directly proportional to its size. To verify this, we tried to estimate the average per packet processing time T p. To estimate T p, we use the model shown in Fig. 8: the packet latency L is the sum of the transmission time T t, the propagation delay D for both the forward and reverse direction plus T p. Therefore: T p = L 2(T t + D) (1) L is measured by the router tester, T t depends on the packet size S and the link capacity C (T t = S C ) which are known. Since the UTP cables are short (3 meters), D is negligible. Table I shows the computed processing times for different table size, table types and packet size. If we read the table by rows, the hash processing time is constant and independent of the table size. More surprisingly, also the linear table processing time seems to be constant and independent of the table size. This is in contrast with our expectations. Since the maximum table size is rather small, we believe that the effect of the table size is too small to be measurable if compared to other delay variations induced for example by CPU scheduling. Reading the table by columns, we observe that the processing time is constant with respect to the packet size. This confirms two well-known facts: i) forwarding delay is a per packet operation, and ii) with small packets, performance is limited by the CPU. D. Fairness The fairness test uses two different flows. The first flow F 1 has a fixed rate equal to 1% of the link capacity. The second flow F 2 has a variable input load (4%, 5%, 6% and 9% of link capacity), and is used to overload the system. Both flows use 96-byte packets, and the forwarding table has 64K entries. We measured fairness looking at the loss probability P L for the two flows. In particular, we consider as a fairness parameter the difference between the two loss probabilities (P LF 1 P LF 2 ). If the difference is zero, the same relative amount of packets is lost by both flows, and the system is fairly managing the flows. If the difference is positive/negative, F1/F2 is obtaining more than its fair share. Furthermore, we considered two different scenarios. In the first one, one input port is used for both flows, the same setup used for all other tests. In the second one, the two flows arrive at different input ports. In both cases, a free output port is connected to the traffic generator to collect statistics. Results for the first scenario are reported in Fig. 9. We observe that all three forwarding technologies are quite fair: the packet loss difference is always smaller than 1.5%. Within Authorized licensed use limited to: Politecnico di Torino. Downloaded on July 7,21 at 7:42:38 UTC from IEEE Xplore. Restrictions apply.
5 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings Linear Table Size Hash Table Size Packet Size [byte] K 64K 96K 128K 96 28,18 28,18 28,18 28,18 28,18 28,18 28,18 28,18 28,18 28, ,66 28,66 28,66 28,66 27,66 28,66 28,66 28,66 28,66 28, ,62 29,62 28,62 28,62 28,62 29,62 29,62 29,62 29,62 29, ,52 28,52 28,52 28,52 28,52 28,52 28,52 28,52 28,52 28, ,33 29,33 29,33 29,33 29,33 28,33 28,33 28,33 29,33 29, ,71 25,71 25,71 26,71 26,71 25,71 26,71 26,71 26,71 26,71 TABLE I ESTIMATED OPENFLOW PACKET PROCESSING TIMES [µs] FOR DIFFERENT TABLE TYPES AND SIZE. Difference in P L [%] Difference in P L [%] /4 1/5 1/6 1/9 Input load F1/F2 [%] 1/4 1/5 1/6 1/9 Input load F1/F2 [%] Fig. 9. Fairness test when flows are generated on a single link, for a packet size of 96 byte. Fig. 1. Fairness test when flows are generated on two different links, for a packet size of 96 byte. this small range, OpenFlow seems to do slightly better and switching slightly worse. For the second scenario, the results are quite different (Fig. 1): flow F1 is given higher priority. The reason is the NAPI deficit round robin scheduler used within the Linux kernel, that gives service to the different network interfaces. The deficit round robin scheduler ensures a max-min fairness mechanism, which privileges the smaller flow (F1 in our case). The more the system is overloaded, the more this effect is evident. Both routing and OpenFlow clearly show this behaviour, and OpenFlow is slightly fairer. Instead, switching is already overloaded even at the lowest load. Having reached a saturation point, no difference can be observed by further increasing the load of the second flow. V. CONCLUSIONS The OpenFlow implementation in Linux systems is able to offer very good performance. The hash table performance matches almost always the ones obtained by the layer-3 routing. Only when the system is overloaded, e.g., small packets load the switch, throughput performance becomes slightly worse. Roughly a performance drop of 11% is measured for 64-byte packets only, which reduces to 3.5% for 96-byte packets and 128K forwarding table entries (hash table). When using the linear table (wildcards), performance becomes worse than those of the hash-based case, but wire speed is reached with packets larger or equal to 256-byte. Finally, OpenFlow shows good fairness capability in dealing with multiple flows. In summary, the ability to handle up to 128K exact matches and up to 1 wild-card matches, combined with good throughput, latency and fairness performance, seems an encouraging result toward the use of OpenFlow in production networks. Surprisingly, the Layer-2 switching Linux implementation shows a performance drop of about 4% and 3% respectively with respect to layer-3 routing and OpenFlow for single 64- byte packet flows. Furthermore, layer-2 switching suffers large forwarding tables: in the worst case of 96-byte packets and 128K table entries, layer-2 switching is unable to sustain an input load of 1%. ACKNOWLEDGMENTS These activities were developed in the framework of the FEDERICA project, funded by the European Commission. REFERENCES [1] GENI: Global Environment for Network Innovations. Web site: geni.net. [2] FEDERICA: Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures fp7-federica.eu/. [3] OpenFlow: Enabling Innovation in Campus Networks. Web site: http: // [4] OpenFlow Switch Specification v.8.9. Brandon Heller ([email protected]). Web site: org/documents/openflow-spec-v.8.9.pdf [5] Agilent N2X router tester. Web site: n2x/ Authorized licensed use limited to: Politecnico di Torino. Downloaded on July 7,21 at 7:42:38 UTC from IEEE Xplore. Restrictions apply.
POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар
УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V4 PP 32-41 Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs Ragalatha
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
SDN. WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking. Recep Ozdag Intel Corporation
WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking Intel Ethernet Switch FM6000 Series - Software Defined Networking Recep Ozdag Intel Corporation Software Defined Networking
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
The Elements of GigE Vision
What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Removing Cell Demultiplexing Performance Bottleneck in ATM Pseudo Wire Emulation over MPLS Networks 1 Introduction
1 Removing Cell Demultiplexing Performance Bottleneck in ATM Pseudo Wire Emulation over MPLS Networks Puneet Konghot and Hao Che {[email protected], [email protected]} The Department of Computer Science
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Network Virtualization Based on Flows
TERENA NETWORKING CONFERENCE 2009 June 9, 2009 Network Virtualization Based on Flows Peter Sjödin Markus Hidell, Georgia Kontesidou, Kyriakos Zarifis KTH Royal Institute of Technology, Stockholm Outline
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Software Defined Networking and the design of OpenFlow switches
Software Defined Networking and the design of OpenFlow switches Paolo Giaccone Notes for the class on Packet Switch Architectures Politecnico di Torino December 2015 Outline 1 Introduction to SDN 2 OpenFlow
Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics
Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
Quantifying TCP Performance for IPv6 in Linux- Based Server Operating Systems
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), November Edition, 2013 Volume 3, Issue 11 Quantifying TCP Performance for IPv6
Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck
Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Auspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
OpenFlow. Ihsan Ayyub Qazi. Slides use info from Nick Mckeown
OpenFlow Ihsan Ayyub Qazi Slides use info from Nick Mckeown Why Openflow? Deployment of new experimental protocols is challenging Huge installed base of protocols and equipment Reluctance by network operators
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
Redundancy & the Netnod Internet Exchange Points
Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
TamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
Ethernet Fabric Requirements for FCoE in the Data Center
Ethernet Fabric Requirements for FCoE in the Data Center Gary Lee Director of Product Marketing [email protected] February 2010 1 FCoE Market Overview FC networks are relatively high cost solutions
enetworks TM IP Quality of Service B.1 Overview of IP Prioritization
encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority
Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note
Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Internet SCSI (iscsi)
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Whitepaper What s wrong with today s clouds? Compute and storage virtualization has enabled
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding
CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell [email protected] our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM. 2012-13 CALIENT Technologies www.calient.
The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM 2012-13 CALIENT Technologies www.calient.net 1 INTRODUCTION In datacenter networks, video, mobile data, and big data
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
RFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
LAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
Accelerating Development and Troubleshooting of Data Center Bridging (DCB) Protocols Using Xgig
White Paper Accelerating Development and Troubleshooting of The new Data Center Bridging (DCB) protocols provide important mechanisms for enabling priority and managing bandwidth allocations between different
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1
Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Elisabete Reis [email protected] Polytechnic Institute of Coimbra Fernando Melo [email protected]
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
Performance of Software Switching
Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Ten top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
OpenFlow: Enabling Innovation in Campus Networks
OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan [email protected]
Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan [email protected] Outline About Vyatta: Open source project, and software product Areas we re working on or interested in
