Towards Correct Network Virtualization. Soudeh Ghorbani Brighten Godfrey UIUC
|
|
|
- Kristian Nicholson
- 10 years ago
- Views:
Transcription
1 Towards Correct Network Virtualization Soudeh Ghorbani Brighten Godfrey UIUC HotSDN 2014
2 Virtualization VM VM VM Hypervisor x86
3 Virtualization Firewall Loadbalancer Router VM VM VM L2 bridge Hypervisor Network Virtualization x86 Physical Network
4 Virtualization Firewall Loadbalancer Router VM VM VM L2 bridge Hypervisor Network Virtualization x86 Diagram inspired by Teemu Koponen s NSDI 2014 talk on Network Virtualization in Multi-tenant Datacenters. Physical Network
5 Is the physical implementation a faithful reproduction of the virtual network?
6 Virtual firewall Policy: permit an external server to talk to an internal client if and only if the client has sent a request to the server.
7 Virtual firewall Policy: permit an external server to talk to an internal client if and only if the client has sent a request to the server.
8 Virtual firewall X Policy: permit an external server to talk to an internal client if and only if the client has sent a request to the server.
9 Virtual firewall Policy: permit an external server to talk to an internal client if and only if the client has sent a request to the server.
10 Virtual firewall Policy: permit an external server to talk to an internal client if and only if the client has sent a request to the server.
11 Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller
12 Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller
13 Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller
14 (Part of the) Firewall Controller Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller switch(msg.gettype()) { case PACKET_IN: if ( internal.contains(msg.srcmac()) ) { whitelisted[msg.dstmac()][msg.srcmaca()] = true; }else { if (whitelisted[msg.srcmac()][msg.dstmac()] ){ whitelist(sw, msg); }else{ blacklist(sw, msg); } }
15 (Part of the) Firewall Controller Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller Packet-in from an internal client? Save state: dst server is allowed to send back. switch(msg.gettype()) { case PACKET_IN: if ( internal.contains(msg.srcmac()) ) { whitelisted[msg.dstmac()][msg.srcmaca()] = true; }else { if (whitelisted[msg.srcmac()][msg.dstmac()] ){ whitelist(sw, msg); }else{ blacklist(sw, msg); } }
16 (Part of the) Firewall Controller Firewall Switch Virtual firewall app Prio rity Flow Action 10 srcip= *.* Send to controller, fwd(1) 0 * Send to controller switch(msg.gettype()) { case PACKET_IN: if ( internal.contains(msg.srcmac()) ) { whitelisted[msg.dstmac()][msg.srcmaca()] = true; }else { if (whitelisted[msg.srcmac()][msg.dstmac()] ){ whitelist(sw, msg); }else{ blacklist(sw, msg); } } Packet-in from an external server? If the server is allowed to send, install rules to allow bidirectional traffic. Else, blacklist the external server.
17 Virtual firewall Firewall 1
18 Virtual firewall Firewall 2 1
19 Virtual firewall Firewall 2 1 3
20 Virtual firewall Firewall
21 Virtual firewall Firewall
22 Firewall + virtualization = bug Firewall
23 Firewall + virtualization = bug Flow src= *.* Action Firewall Send to controller, fwd(1) * Send to controller
24 Firewall + virtualization = bug Flow src= *.* Action Firewall Send to controller, fwd(1) * Send to controller Flow Action * Send to controller Flow src= *.* Action Send to controller, fwd(1)
25 Firewall + virtualization = bug Firewall
26 Firewall + virtualization = bug Firewall
27 Firewall + virtualization = bug Firewall X
28 Network virtualization: What could go wrong? Stateful firewall NAT Load-balancer Virtualization technique One-to-many mapping One-to-many mapping One-to-many mapping Incorrect-behavior Blacklisting the legitimate hosts Dropping requested packets Overloading some servers and leaving some underutilized Firewall & router Many-to-one mapping Blacklisting the legitimate hosts
29 Related work Incorrect behavior caused by moving, observed in: 1. LIME: Transparent, Live Migration of a Software-Defined Network, Soudeh Ghorbani, Cole Schlesinger, Matthew Monaco, Eric Keller, Matthew Caesar, Jennifer Rexford, David Walker, under submission. 2. OpenNF: Enabling Innovation in Network Function Control, Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella, SIGCOMM These existing solutions are: Only a short-term fix while virtual network is being moved. Infeasible when incorrect behavior is permanent rather than transient.
30 Root-cause of the incorrect behavior
31 Firewall + virtualization = bug Firewall X
32 Firewall + virtualization = bug Firewall X
33 Firewall + virtualization = bug Firewall Root-cause: forwarding decision has some dependency on the history, the sequence of previous send and receive events. X
34 Who programs the network? The entities that can make or influence the forwarding decisions: Controller Switch: random forwarding like ECMP Data packet: indirectly through local state, e.g., idle-timers
35 Who programs the network? The entities that can make or influence the forwarding decisions: Controller Switch: random forwarding like ECMP Data packet: indirectly through local state, e.g., idle-timers
36 Can existing correctness definitions detect the incorrect behavior? Correctness conditions: 1. Per-packet/flow consistency: prevents loops, black-holes, Consensus Routing [NSDI 08], Consistent Updates [SIGCOMM 12] 2. Congestion freedom zupdates [SIGCOMM 13], SWAN [SIGCOMM 13], On Consistent Updates in Software-Defined Networks [HotNets 13]
37 Can existing correctness definitions detect the incorrect behavior? Correctness conditions: 1 None of these conditions were violated in our examples! 1. Per-packet/flow consistency: prevents loops, black-holes, Consensus Routing [NSDI 08], Consistent Updates [SIGCOMM 12] 2. Congestion freedom zupdates [SIGCOMM 13], SWAN [SIGCOMM 13], On Consistent Updates in Software-Defined Networks [HotNets 13]
38 Can existing correctness definitions detect the incorrect behavior? Correctness conditions: 1 None of these conditions were violated in our examples! 1. Per-packet/flow consistency: prevents loops, black-holes, 2 Correctness is what users want. Consensus Routing [NSDI 08], Consistent Leslie Lamport Updates [SIGCOMM 12] 2. Congestion freedom zupdates [SIGCOMM 13], SWAN [SIGCOMM 13], On Consistent Updates in Software-Defined Networks [HotNets 13]
39 Can existing correctness definitions detect the incorrect behavior? Correctness conditions: 1 None of these conditions were violated in our examples! 1. Per-packet/flow consistency: prevents loops, black-holes, Correctness is what users want. Consensus Routing [NSDI 08], Consistent Leslie Lamport Updates [SIGCOMM 12] Techniques designed to preserve those correctness conditions could break the otherwise correct behavior. zupdates [SIGCOMM 13], SWAN [SIGCOMM 13], On Consistent Updates in Software-Defined Networks [HotNets 13] Congestion freedom
40 Can existing correctness definitions detect the incorrect behavior? Correctness conditions: 1 1. Per-packet/flow consistency: prevents loops, black-holes, 2 3 Correctness is what users want. Consensus Routing [NSDI 08], Consistent Leslie Lamport Updates [SIGCOMM 12] Techniques designed to preserve those correctness conditions could break the otherwise correct behavior. zupdates [SIGCOMM 13], SWAN [SIGCOMM 13], On Consistent Updates in Software-Defined Networks We need [HotNets 13] new definitions of correctness and new techniques to achieve those. 2. Congestion freedom 4 None of these conditions were violated in our examples!
41 A new correctness condition: End-to-end correctness
42 A new correctness condition: End-to-end correctness?
43 A new correctness condition: End-to-end correctness?
44 A new correctness condition: End-to-end correctness A mapping of a logical network L to a physical network P is said to be end-to-end correct iff Pr L [E] Pr P [E] where E is the partially ordered set of send and receive events.
45 A new correctness condition: End-to-end correctness A mapping of a logical network L to a physical network P is said to be end-to-end correct iff Pr L [E] Pr P [E] where E is the partially ordered set of send and receive events. Key features: distinguishes between events that happen always, sometimes, and never.
46 A new correctness condition: End-to-end correctness A mapping of a logical network L to a physical network P is said to be end-to-end correct iff Pr L [E] Pr P [E] where E is the partially ordered set of send and receive events. Key features: distinguishes between events that happen always, sometimes, and never. permissive of the differences in packet loss or timing that do not affect correctness.
47 A new correctness condition: End-to-end correctness A mapping of a logical network L to a physical network P is said to be end-to-end correct iff Pr L [E] Pr P [E] where E is the partially ordered set of send and receive events. Key features: distinguishes between events that happen always, sometimes, and never. permissive of the differences in packet loss or timing that do not affect correctness. permissive of the legitimate differences in orderings of events.
48 So far: 1 We identified the problem: incorrect application-level behavior under the existing virtualization techniques. We identified its rootcause: dependence on 2 the history. 3 We developed an analytical framework to reason about the problem. Research Vision: Developing a general algorithm. 4 Proving its correctness. 5 Developing a correct virtualization System. 6
49 Thanks! Questions?
Hypothesis Testing for Network Security
Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science
A Migration of Virtual Machine to Remote System
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? Many slides stolen from Jennifer Rexford, Nick McKeown, Scott Shenker, Teemu Koponen, Yotam Harchol and David Hay Agenda
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Formal Specification and Programming for SDN
Formal Specification and Programming for SDN relevant ID: draft-shin-sdn-formal-specification-01 Myung-Ki Shin, Ki-Hyuk Nam ETRI Miyoung Kang, Jin-Young Choi Korea Univ. Proposed SDN RG Meeting@IETF 84
Software Defined Networking Architecture
Software Defined Networking Architecture Brighten Godfrey CS 538 October 8 2013 slides 2010-2013 by Brighten Godfrey The Problem Networks are complicated Just like any computer system Worse: it s distributed
Understanding Latency in Software Defined Networks
Understanding Latency in Software Defined Networks Junaid Khalid Keqiang He, Sourav Das, Aditya Akella Li Erran Li, Marina Thottan 1 Latency in SDN Mobility Centralized Controller Openflow msgs 1 flows
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
Live Migration of an Entire Network (and its Hosts)
Live Migration of an Entire Network (and its Hosts) Eric Keller, Soudeh Ghorbani, Matt Caesar, Jennifer Rexford University of Colorado UIUC Princeton University ABSTRACT Live virtual machine (VM) migration
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Automated Formal Analysis of Internet Routing Systems
Automated Formal Analysis of Internet Routing Systems Boon Thau Loo University of Pennsylvania [Joint work with Anduo Wang (Penn -> UIUC), Wenchao Zhou (Georgetown), Andre Scedrov (Penn), Limin Jia (CMU),
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
OpenBox: Enabling Innovation in Middlebox Applications
OpenBox: Enabling Innovation in Middlebox Applications Anat Bremler-Barr School of Computer Science The Interdisciplinary Center Herzliya, Israel [email protected] Yotam Harchol School of Computer Science
How To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Datacenter Network Large Flow Detection and Scheduling from the Edge
Datacenter Network Large Flow Detection and Scheduling from the Edge Rui (Ray) Zhou [email protected] Supervisor : Prof. Rodrigo Fonseca Reading & Research Project - Spring 2014 Abstract Today, datacenter
Software Defined Networking Basics
Software Defined Networking Basics Anupama Potluri School of Computer and Information Sciences University of Hyderabad Software Defined Networking (SDN) is considered as a paradigm shift in how networking
PLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
SDN Programming Languages. Programming SDNs!
SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Flow Monitoring With Cisco Routers
CSAMP: A System for Network- Wide Flow Monitoring Vyas Sekar,Michael K. Reiter, Walter Willinger, Hui Zhang,Ramana Rao Kompella, David G. Andersen Presentation by Beletsioti Georgia Flow measurements today
Data Center Load Balancing. 11.11.2015 Kristian Hartikainen
Data Center Load Balancing 11.11.2015 Kristian Hartikainen Load Balancing in Computing Efficient distribution of the workload across the available computing resources Distributing computation over multiple
Elasticity in virtual middleboxes using NFV/SDN
Seminar Report Elasticity in virtual middleboxes using NFV/SDN Author: Mihir Vegad J. Guide: Prof. Purushottam Kulkarni A report submitted in partial fulfilment of the requirements for the degree of Master
SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres. Tore Anderson Redpill Linpro AS RIPE69, London, November 2014
SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres Tore Anderson Redpill Linpro AS RIPE69, London, November 2014 Stop Thinking IPv4; IPv6 is Here IPv4 is a dying and cramped protocol IPv6 is the exact
High Availability HTTP/S. R.P. (Adi) Aditya [email protected] Senior Network Architect
High Availability HTTP/S R.P. (Adi) Aditya [email protected] Senior Network Architect HTTP/S is not the Internet HTTP/S Internet so why care about High Availability HTTP/S? because HTTP/S is such a large
Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe
Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable
Application Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
STRUCTURE AND DESIGN OF SOFTWARE-DEFINED NETWORKS TEEMU KOPONEN NICIRA, VMWARE
STRUCTURE AND DESIGN OF SOFTWARE-DEFINED NETWORKS TEEMU KOPONEN NICIRA, VMWARE WARNING: I DON T DESIGN PROTOCOLS. I WRITE C++. TRANSLATION: THIS IS NOT YOUR TYPICAL NETWORK TALK. AGENDA: 5 YEARS OF SDN
FRESCO: Modular Composable Security Services for So;ware- Defined Networks
FRESCO: Modular Composable Security Services for So;ware- Defined Networks Seungwon Shin, Phil Porras, Vinod Yegneswaran, MarIn Fong, Guofei Gu, and Mabry Tyson SUCCESS LAB, Texas A&M and SRI Interna7onal
Data Analysis Load Balancer
Data Analysis Load Balancer Design Document: Version: 1.0 Last saved by Chris Small April 12, 2010 Abstract: The project is to design a mechanism to load balance network traffic over multiple different
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
LPM: Layered Policy Management for Software-Defined Networks
LPM: Layered Policy Management for Software-Defined Networks Wonkyu Han 1, Hongxin Hu 2 and Gail-Joon Ahn 1 1 Arizona State University, Tempe, AZ 85287, USA {whan7,gahn}@asu.edu 2 Clemson University, Clemson,
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
Measuring Control Plane Latency in SDN-enabled Switches
Measuring Control Plane Latency in SDN-enabled Switches Keqiang He, Junaid Khalid, Aaron Gember-Jacobson, Sourav Das, Chaithan Prakash, Aditya Akella, Li Erran Li*, Marina Thottan* University of Wisconsin-Madison,
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Data Center Use Cases and Trends
Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,
Network Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
Enabling Service Function Chaining through Routing Optimization in Software Defined Networks
Enabling Service Function Chaining through Routing Optimization in Software Defined Networks Andrey Gushchin Cornell University Ithaca, New York 14850 [email protected] Anwar Walid Bell Labs, Alcatel-Lucent
TRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM) Todd Bundy Director Business Development, ADVA Optical Networking [email protected] Our Students, Our Future Benjamin Carle
SDN Tutorial. Dean Pemberton NSRC
SDN Tutorial Dean Pemberton NSRC Dean Pemberton NSRC Who am I Trainer/Network Engineer Victoria University of Wellington SDN Research Associate InternetNZ Technical Policy Advisor You probably have questions
Cisco Intercloud Fabric for Business
Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control (Load-Balance across multiple servers) Event: Partner Exchange Conference Date: October 10, 1999 Revision 1.0 Author:
GregSowell.com. Mikrotik Security
Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks (or: How to Provide Security Monitoring as a Service in Clouds?) Seungwon Shin SUCCESS Lab Texas A&M University Email:
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM) Our speakers today Todd Bundy Director Global Alliances, ADVA Optical Networking [email protected] Joe Weinman SVP, Cloud
On real-time delay monitoring in software-defined networks
On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia [email protected] Eugene V. Chemeritskiy Applied Research Center for
OpenFlow: Enabling Innovation in Campus Networks
OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification
Project 3 and Software-Defined Networking (SDN)
Project 3 and Software-Defined Networking (SDN) EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues
Tutorial: OpenFlow in GENI
Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse
A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM
Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
Project 4: SDNs Due: 11:59 PM, Dec 11, 2014
CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 Contents 1 Introduction 1 2 Overview 2 2.1 Components......................................... 2 3 Setup 3 4 Shortest-path Switching
Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
Extensible and Scalable Network Monitoring Using OpenSAFE
Extensible and Scalable Network Monitoring Using OpenSAFE Jeffrey R. Ballard [email protected] Ian Rae [email protected] Aditya Akella [email protected] Abstract Administrators of today s networks are
Building a small Data Centre
Building a small Data Centre Cause we re not all Facebook, Google, Amazon, Microsoft Karl Brumund, Dyn RIPE71 1 Dyn what we do DNS, email, Internet Intelligence from where 28 sites, 100s of probes, clouds
How To Build A Policy Aware Switching Layer For Data Center Data Center Servers
A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley 1 Problem: Middleboxes are hard to deploy Place on network path Overload path
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management
Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
Multicasting on SDN. Prof. Sunyoung Han Konkuk University [email protected] 23 July 2015
Multicasting on SDN Prof. Sunyoung Han Konkuk University [email protected] 23 July 2015 1 Contents 1. Software Defined Networking (SDN) 2. OpenFlow 3. Multicasting 4. Open vswitch 5. OpenFlow Protocol
Software-Defined Networks: on the road to the softwarization of networking
Software-Defined Networks: on the road to the softwarization of networking Fernando M. V. Ramos LaSIGE/FCUL, University of Lisboa, Portugal [email protected] Diego Kreutz, Paulo Verissimo SnT/University
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, and Ziming Zhao Clemson University Arizona State University [email protected], {whan7,gahn,zzhao3}@asu.edu
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014.
IMPROVING LINK UTILIZATION IN DATA CENTER NETWORK USING NEAR OPTIMAL TRAFFIC ENGINEERING TECHNIQUES L. Priyadharshini 1, S. Rajanarayanan, M.E (Ph.D) 2 1 Final Year M.E-CSE, 2 Assistant Professor 1&2 Selvam
Towards an Elastic Distributed SDN Controller
Towards an Elastic Distributed SDN Controller Advait Dixit, Fang Hao, Sarit Mukherjee, T.V. Lakshman, Ramana Kompella Purdue University, Bell Labs Alcatel-Lucent ABSTRACT Distributed controllers have been
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, and Ziming Zhao Clemson University Arizona State University [email protected], {whan7,gahn,zzhao3}@asu.edu
How To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
Stanford SDN-Based Private Cloud. Johan van Reijendam ([email protected]) Stanford University
Stanford SDN-Based Private Cloud ([email protected]) Stanford University Executive Summary The Web and its infrastructure continue to make phenomenal progress, allowing the creation and scaling of
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
SDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
