Transactional Support for SDN Control Planes "
|
|
|
- Theresa Johnson
- 10 years ago
- Views:
Transcription
1 Transactional Support for SDN Control Planes Petr Kuznetsov Telecom ParisTech WTTM, 2015
2 Software Defined Networking An emerging paradigm in computer network management Separate forwarding hardware (data plane) from network managing software (control plane) Simplify network management Facilitate innovation Improve QoS
3 Software-Defined Networking in one slide A small number of «SDN servers»! Forwarding Monitoring Load balancing SDN controller! Security Standard API (OpenFlow)! Rules (match-action): Match mask -> forward to port A, add tag, drop, update counters Sets of rules (flow tables) spacify a policy A lot of! SDN-enabled switches! forward http from x to y! 3
4 SDN challenges [CACM Oct 2014] Network-wide abstractions: consistent snapshot of what is going on: topology, traffic load (e.g., encoded in a NIB) Distributed updates: modifying rules at multiple switches while preserving consistency under transition Modularity: multiple composition levels, programming interface allowing for composition Virtualization: enabling the virtual network abstraction Verification: tools for checking the network program correctness 4
5 Consistent Network Information Base? Forwarding Monitoring Load balancing Control plane! Security Data plane! 5
6 Atomic network snapshot Benefits: calculations based on global view of the network state ü Computing shortest paths ü Load balancing ü Traffic engineering Difficulties: physically impossible to get the state atomically ü The outcome of the calculation may be imprecise ü Double-collect technique? ü Read transactions? Abort if consistency cannot be achieved 6
7 Distributed updates Central controller no need for distributed protocols? ü Atomic update impossible ü But can be emulated ü Sometimes ü Hard to do with coexisting data-plane traffic Сoncurrent updates? ü Necessary for scalability and robustness? Challenges ü Maintain some consistency during the transition period (perpacket/flow consistency, loop-freedom, blackhole-freedom) ü Compose concurrent updates, reject if not composable 7
8 Two-phase update (single controller) [Reitblatt et al., 2012] Choose a unique tag t for the new policy Phase 1: update all internal ports with policy rules for the chosen tag t Phase 2: update all ingress port to tag incoming packets with t Per-packet consistency: every packet is processed by the old policy or by the new one 8
9 Centralized network control? Forwarding Monitoring Load balancing SDN controller! Security Does not scale! Single point of failure 9
10 Distributed Network Control? SDN controller! SDN controller! SDN controller! Forwarding Load balancing Monitoring Security Forwarding Security Faults and Consistency of asynchronous concurrent policy communication? updates? 10
11 Composing (composable) policies SDN controller forward http to y! SDN controller SDN controller count all from x! Composed rule:! forward http not from x to y;! count not http from x;! count http from x and forward to y Centralized setting: Frenetic, Foster et al., ICFP 2011 What to do with an http packet from x?! 11
12 Rejecting conflicting policies SDN controller SDN controller SDN controller forward all from x to z! forward http to y! What to do with a packet from x to y? A policy must be completely installed or completely rejected! Transactional memory? 12
13 Software Transactional Memory in one slide Mark sequences of instructions as an atomic transaction: atomic { } if (tail-head == MAX){ return full; }!items[tail%max]=item;!tail++; A transaction can be either committed or aborted ü Committed transactions are serializable ü Let the transactional memory (STM) care about the conflicts ü Ease of programming and efficient (?) use of concurrency 13!
14 STN: creating the illusion of atomicity Each network operation appears as executed atomically ü Snapshot (read-only)/update (write) ü If not possible: abort (as it never happened) ü Even if traffic overlaps with operation intervals Sequential composability: for each real history (observable trace), there exists a history S: ü Sequential: every control operation or traffic trace/flow sequential in S ü Legal: committed updates compose, snapshots are consistent with the committed past, traffic is processed by the latest committed policy ü Equivalent: no system component sees the difference from S Like serializability for transactions 14
15 STN: Interface 1. A controller executes an operation π by invoking exec(π) that returns ack or nack res π is executed (committed) with result res! nack π is rejected (aborted) 2. The environment injects traffic via ingress ports: inject(pk,j): packet pk enters ingress port j 3. A packet traverses the network according to the current policy: forward(pk,i,pk,j): packet pk arrived at port j and forwarded to port j (possibly modified) SDN controller SDN controller SDN controller 15
16 STN: correctness Every history H of satisfies: Sequential composability: a completion of H (aborted policies ignored) is indistinguishable from a legal sequential history S Progress: only conflicting policies are aborted (exactly one is committed) Liveness: an operation request by a correct control unit eventually returns 16
17 Application: Consistent Policy Composition (CPC) [Infocom 2015] Controllers independently apply policy update requests: Conflict-freedom: no two conflicting policies installed Progress: non-conflicting policy eventually installed; and: at least one policy commits Per-packet consistency: every packet witnesses exactly one policy applied (during its network traversal) (Traffic is not under our control!) 17
18 CPC: Example 3 switches, 3 controllers 18
19 CPC: Example apply(π 1 ) ack apply(π 1 ) ack p 1 p 1 apply(π 2 ) ack apply(π 2 ) ack p 2 apply(π 2 ) nack p 2 p 3 p 3 sw 1 sw 1 sw 2 sw 2 sw 3 sw 3 Original history Sequential equivalent 19
20 CPC: TM analog Two kinds of transactions: Policy updates invoked by the controllers Located paths injected by the environment Semantics: (Committed) transactions appear sequential Policy updates abort when conflict Located paths never abort, witness exactly one policy ü packet arrival and link delays are out of our control MV-permissiveness (read-only txns never abort) ü Paths are not really read-only 20
21 CPC implementation: model v1 Controllers access ports with read and write ops Controllers can communicate via asynchronous messagepassing Controllers may fail by crashing No synchrony assumptions Restrict policies to forwarding ü Compose if domains are disjoint or related by containment ü Reject otherwise 21
22 Asynchronous read-write CPC Theorem: 1-resilient read-write CPC is impossible. Proof sketch:! Two ingress ports 1 and 2 initially forward all to the internal ports (π 0 ) π 1 installed by p 1 and π 2 installed by p 2, π 2 refines π 1 (higher priority, same domain) π 1 and π 2 propose different paths p 1 changes port 1 and is just about to change 2 (with a composition of π 0 and π 1 ), p 2 takes no steps p 1 p 2 π 0 π 1 π 0 π 1 π 2 1! 2!?! p 2 wakes up and installs of π 0 π 1 π 2, p 1 takes no steps p 1 changes port 2 with π 0 π 1 : π 2 is forgotten! 22
23 CPC implementation: model v2 Controllers access ports with atomic read-modify-write ops RMW(f,g,v): ü read the state v! ü write f(v,v ) ü return g(v,v )! Intuition: do not update if conflicts with currently installed policy RMW(f,g,v) g(v,v ) 23
24 RMW in Openflow 1.4 Bundling: multiple control messages organized in mini transactions: ü All messages in a bundle carry the same bundle id! ü If a single message is rejected, the whole bundle is rejected OFPFF_CHECK_OVERLAP flag: detect conflicts on-the-fly ü A conflicting rule is rejected ü A control message is sent if conflict detected Cookies: controller-specific modifications of individual flow entries
25 Upper bound: FixTag algorithm Operation: 1. Unique tag per policy 2. Install at internal ports first (compose if necessary) 3. Once installed at internal ports 4. add the tag to all packets at ingress ports! Upsides: wait-free (tolerates all failure patterns) Downsides: overhead can be huge Super-exponential in the size of the network Internal ports are ready when needed A packet is processed by exactly one (composed) policy internal ports ingress port add Tag 1 Tag 1 Tag 1 Tag 1 Tag 2 Tag 1 Tag 1 Tag 2 25
26 Can we do better? No, if we get no feedback from the network ü Tag t cannot be reused if it is still in flight Suppose, we can correctly evaluate the set of active tags ü Correct (but asynchronous) oracle Single-controller scenario: one bit is enough! ü Upon policy update π i wait until (i mod 2)-traffic is over, and use tag i mod 2! Two or more controllers: inherent price of concurrency? Between constant and super-exponential? Yes, if controllers are synchronized 26
27 CPC protocol: ReuseTag Mark incoming packets with policy tags Proportional to the level of resilience: ü Up to f failures: f+2 tags needed (proved optimal) Controllers use consensus instances (Paxos based on eventual synchrony or «eventual leader») ü Replicated state machine for request-tag ordering Two-phase update per ordered (composable) request ü Atomic read-modify-write (RMW) to avoid overwriting
28 ReuseTag properties All requests are serialized ü Even non-conflicting ones ü Allowing for more concurrency of updates? RMW port operations ü Check a condition on the switch state update the state if satisfied: OpenFlow?
29 Summary: software transactional networking Control middleware: manipulate the network as though there is no concurrency ü Conflicts result in aborts or composition Run sequential code (in the form of txns) Committed transactions and traffic paths appear sequential Aborted transactions do not appear 29
30 STN for SDN Network-wide abstractions and distributed updates: modifying rules at multiple switches while preserving consistency under transition Modularity and virtualization: transactions are compositional Verification: easier to verify (semantically sequential) transactional programs 30
31 New? Interesting? New: distributed network control ü Network races ü Notions of conflict and consistency Interesting: new kinds of concurrency ü Traffic as an independent thread ü Not all is about consensus 31
32 References M. Canini, P. Kuznetsov, D. Levin, and S. Schmid. Software transactional networking: Concurrent and consistent policy composition. ACM HotSDN, August 2013 M. Canini, P. Kuznetsov, D. Levin, and S. Schmid. A Distributed SDN Control Plane for Consistent Policy Updates. INFOCOM 2015 (check arxiv) Liron Schiff, Stefan Schmid, Petr Kuznetsov. In-Band Synchronization for Distributed SDN Control Planes. In submission. 32!
33 Communities? [Kreutzh et al., Software-Defined Networking: A Comprehensive Survey, 2014]: «distributed» appears 73 times in 407 references starting roughly in 2010: ü 61 SIGCOMM ü 34 HotSDN ü 50 HotNets ü 20 CCR ü 25 NSDI/OSDI/ATC ü 1 PODC ü 0 DISC
34 Eskerrik asko! Questions? 34
A Distributed and Robust SDN Control Plane for Transactional Network Updates
A Distributed and Robust SDN Control Plane for Transactional Network Updates Marco Canini 1 Petr Kuznetsov 2 Dan Levin 3 Stefan Schmid 4 1 Université catholique de Louvain, Belgium 2 Télécom ParisTech,
Distributed Software-Defined Networking: The ACM PODC 2014 Workshop DSDN
Distributed Software-Defined Networking: The ACM PODC 2014 Workshop DSDN Petr Kuznetsov 1 Stefan Schmid 2 1 Télécom ParisTech [email protected] 2 TU Berlin & T-Labs [email protected]
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow Networks Jennifer Rexford Princeton University http://www.frenetic-lang.org/ Joint work with Nate Foster, Dave Walker, Rob Harrison, Michael Freedman, Chris
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Formal Specification and Programming for SDN
Formal Specification and Programming for SDN relevant ID: draft-shin-sdn-formal-specification-01 Myung-Ki Shin, Ki-Hyuk Nam ETRI Miyoung Kang, Jin-Young Choi Korea Univ. Proposed SDN RG Meeting@IETF 84
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
Geo-Replication in Large-Scale Cloud Computing Applications
Geo-Replication in Large-Scale Cloud Computing Applications Sérgio Garrau Almeida [email protected] Instituto Superior Técnico (Advisor: Professor Luís Rodrigues) Abstract. Cloud computing applications
Database Replication with Oracle 11g and MS SQL Server 2008
Database Replication with Oracle 11g and MS SQL Server 2008 Flavio Bolfing Software and Systems University of Applied Sciences Chur, Switzerland www.hsr.ch/mse Abstract Database replication is used widely
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? Many slides stolen from Jennifer Rexford, Nick McKeown, Scott Shenker, Teemu Koponen, Yotam Harchol and David Hay Agenda
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Software Defined Networks
Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors
CSCI-1680 So ware-defined Networking
CSCI-1680 So ware-defined Networking Rodrigo Fonseca Most content from lecture notes by Scott Shenker SDN For now: a new paradigm for network management SDN widely accepted as future of networking ~1000
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. Braun University of Basel Cs321 - HS 2012 (Slides material from www.bigswitch.com)
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
Software Defined Networking & Openflow
Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction
B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13
B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13 Google s Software Defined WAN Traditional WAN Routing Treat all bits the same 30% ~ 40% average utilization Cost of
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
Scalable High Resolution Network Monitoring
Scalable High Resolution Network Monitoring Open Cloud Day Wintherthur, 16 th of June, 2016 Georgios Kathareios, Ákos Máté, Mitch Gusat IBM Research GmbH Zürich Laboratory {ios, kos, mig}@zurich.ibm.com
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers?
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers? Gianfranco Nencioni Dipartimento di Ingegneria dell Informazione Università di Pisa Mini-seminar
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
SDN Programming Languages. Programming SDNs!
SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that
Verifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Presented by Alaa Shublaq SDN Overview Software-Defined Networking
Data Management in the Cloud
Data Management in the Cloud Ryan Stern [email protected] : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server
IxNetwork OpenFlow Solution
IxNetwork OpenFlow Solution Solution Highlights OpenFlow Controller Emulation OpenFlow Switch Emulation OpenFlow Benchmarking Test OpenFlow Switch Conformance Test Key Features Software Defined Networking
Conditions for Strong Synchronization In Concurrent Data Types
Conditions for Strong Synchronization In Concurrent Data Types Maged Michael IBM TJ Watson Research Center Joint work with Martin Vechev and Vijay Sarsawat Joint work with Hagit Attiya, Rachid Guerraoui,
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps
(Pessimistic) stamp Ordering Another approach to concurrency control: Assign a timestamp ts(t) to transaction T at the moment it starts Using Lamport's timestamps: total order is given. In distributed
Network Virtualization: Delivering on the Promises of SDN. Bruce Davie, Principal Engineer
Network Virtualization: Delivering on the Promises of SDN Bruce Davie, Principal Engineer What does SDN promise? The original* SDN promise was: Enable rapid innovation in networking Enable new forms of
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time
Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time Achour Mostéfaoui Hamouma Moumen Michel Raynal, LINA, Université de Nantes, 44322 Nantes Cedex,
Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE PANG-WEI TSAI, CHUN-YU HSU, MON-YEN LUO AND CHU-SING YANG NATIONAL CHENG KUNG UNIVERSITY, INSTITUTE OF COMPUTER
Distributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
Failover Mechanisms for Distributed SDN Controllers
Failover Mechanisms for Distributed SDN Controllers Mathis Obadia, Mathieu Bouet, Jérémie Leguay, Kévin Phemius, Luigi Iannone Thales Communications & Security {firstname.name}@thalesgroup.com Telecom
Panopticon: Incremental SDN Deployment in Enterprise Networks
Panopticon: Incremental SDN Deployment in Enterprise Networks Stefan Schmid with Dan Levin, Marco Canini, Fabian Schaffert, Anja Feldmann https://venture.badpacket.in I SDN! How can I deploy it? SDN: Where
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES
DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES Tran Song Dat Phuc - Uyanga Department of Computer Science and Engineering SeoulTech 2014 Table of
FlowGuard: Building Robust Firewalls for Software-Defined Networks. Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao
FlowGuard: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao HotSDN 2014 Outline Introduction Challenges for Building FW in SDN FlowGuard framework
ViSION Status Update. Dan Savu Stefan Stancu. D. Savu - CERN openlab
ViSION Status Update Dan Savu Stefan Stancu D. Savu - CERN openlab 1 Overview Introduction Update on Software Defined Networking ViSION Software Stack HP SDN Controller ViSION Core Framework Load Balancer
Principles and characteristics of distributed systems and environments
Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single
Modular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
OpenFlow 1.4. (Changes compared to 1.3 OpenDaylight Perspec>ve) - Abhijit Kumbhare
OpenFlow 1.4 (Changes compared to 1.3 OpenDaylight Perspec>ve) - Abhijit Kumbhare More extensible wire protocol OpenFlow Protocol ini>ally designed w/ many sta>c fixed structures OXM (TLV format) added
Distributed Databases
C H A P T E R19 Distributed Databases Practice Exercises 19.1 How might a distributed database designed for a local-area network differ from one designed for a wide-area network? Data transfer on a local-area
SEER PROBABILISTIC SCHEDULING FOR COMMODITY HARDWARE TRANSACTIONAL MEMORY. 27 th Symposium on Parallel Architectures and Algorithms
27 th Symposium on Parallel Architectures and Algorithms SEER PROBABILISTIC SCHEDULING FOR COMMODITY HARDWARE TRANSACTIONAL MEMORY Nuno Diegues, Paolo Romano and Stoyan Garbatov Seer: Scheduling for Commodity
find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1
Monitors Monitor: A tool used to observe the activities on a system. Usage: A system programmer may use a monitor to improve software performance. Find frequently used segments of the software. A systems
Scaling Networking Applications to Multiple Cores
Scaling Networking Applications to Multiple Cores Greg Seibert Sr. Technical Marketing Engineer Cavium Networks Challenges with multi-core application performance Amdahl s Law Evaluates application performance
An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture
435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Project 3 and Software-Defined Networking (SDN)
Project 3 and Software-Defined Networking (SDN) EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Lecture 7: Concurrency control. Rasmus Pagh
Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction
ONOS [Open Source SDN Network Operating System for Service Provider networks]
ONOS [Open Source SDN Network Operating System for Service Provider networks] http://onosproject.org/ Released on December 5 th, 2014 Guru Parulkar [email protected] ONOS Partnership A partnership
Name: 1. CS372H: Spring 2009 Final Exam
Name: 1 Instructions CS372H: Spring 2009 Final Exam This exam is closed book and notes with one exception: you may bring and refer to a 1-sided 8.5x11- inch piece of paper printed with a 10-point or larger
A Framework for Highly Available Services Based on Group Communication
A Framework for Highly Available Services Based on Group Communication Alan Fekete [email protected] http://www.cs.usyd.edu.au/ fekete Department of Computer Science F09 University of Sydney 2006,
Empowering Software Defined Network Controller with Packet-Level Information
Empowering Software Defined Network Controller with Packet-Level Information Sajad Shirali-Shahreza, Yashar Ganjali Department of Computer Science, University of Toronto, Toronto, Canada Abstract Packet
Performance Evaluation of OpenFlow Devices
Performance Evaluation of OpenFlow Devices Mariusz Żal, Janusz Kleban Poznan University of Technology Faculty of Electronic and Telecommunications Chair of Communication and Computer Networks Email: [email protected],
Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Middleware for Heterogeneous and Distributed Information Systems
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 [email protected] Chapter 2 Architecture Chapter Outline Distributed transactions (quick
Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee
International Journal of Science and Engineering Vol.4 No.2(2014):251-256 251 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of
The libfluid OpenFlow Driver Implementation
The libfluid OpenFlow Driver Implementation Allan Vidal 1, Christian Esteve Rothenberg 2, Fábio Luciano Verdi 1 1 Programa de Pós-graduação em Ciência da Computação, UFSCar, Sorocaba 2 Faculdade de Engenharia
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
On Scalability of Software-Defined Networking
SOFTWARE DEFINED NETWORKS On Scalability of Software-Defined Networking Soheil Hassas Yeganeh, Amin Tootoonchian, and Yashar Ganjali, University of Toronto ABSTRACT In this article, we deconstruct scalability
Time-based Updates in OpenFlow: A Proposed Extension to the OpenFlow Protocol
CCIT Report #835, July 2013, EE Pub No. 1792, Technion, Israel 1 Time-based Updates in : A Proposed Extension to the Protocol Tal Mizrahi, Yoram Moses Department of Electrical Engineering Technion Israel
Chapter 10: Distributed DBMS Reliability
Chapter 10: Distributed DBMS Reliability Definitions and Basic Concepts Local Recovery Management In-place update, out-of-place update Distributed Reliability Protocols Two phase commit protocol Three
Software Defined Active Queue Management
Software Defined Active Queue Management Future Networks 2014 Sebastian Meier [email protected] 2014-09-26 Universität Stuttgart Institute of Communication Networks and Computer Engineering
MIDDLEWARE 1. Figure 1: Middleware Layer in Context
MIDDLEWARE 1 David E. Bakken 2 Washington State University Middleware is a class of software technologies designed to help manage the complexity and heterogeneity inherent in distributed systems. It is
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
