Telekinesis: Controlling Legacy Switch Routing with OpenFlow in Hybrid Networks

Size: px
Start display at page:

Download "Telekinesis: Controlling Legacy Switch Routing with OpenFlow in Hybrid Networks"

Transcription

1 : Controlling witch Routing with OpenFlow in Hybrid Networks Cheng Jin, Cristian Lumezanu, Qiang Xu, Zhi-Li Zhang, Guofei Jiang University of Minnesota, NEC Laboratories America, ABTRACT Hybrid networks contain both legacy and programmable network switches and allow operators to reap the benefits of oftware-defined networking (N) without upgrading the entire network. Previous research shows that adding N capabilities to switches at strategic places in a network and ensuring that each flow traverses at least one such switch is sufficient to achieve many N control paradigms, such as routing or access control. However, the control points are still limited to the N-enabled devices and operators cannot enforce fine-grained policies on the legacy paths between N switches. We present, a network controller that enables finergrained routing control over legacy paths in hybrid networks using OpenFlow. To update routing entries in legacy switches, we introduce a new flow control primitive,. Flow- Mod uses OpenFlow s PacketOut function to send a special packet on a specific interface of a legacy switch and remotely manipulate the forwarding entry associated with the source of the packet. Using simulations on random network topologies with varying degrees of OpenFlow deployment, we show that can provide more diverse path control than an OpenFlow-only controller: even when only 20% of switches are OpenFlow-enabled, we can update 70% of the paths. Categories and ubject escriptors C.2.1 [Computer-Communication Networks]: Network Architecture and esign; C.2.3 [Computer-Communication Networks]: Network Operations General Terms esign, Management Keywords ; Hybrid N Most of this work was conducted while the first author was an intern at NEC Laboratories America. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. OR2015, June 17-18, 2015, anta Clara, CA, UA. Copyright 2015 ACM. IBN /15/06$ OI: 1. INTROUCTION N provides a logically-centralized interface to control and interact with network devices. Operators perform network management tasks such as traffic engineering or access control through software programs executed from a centralized controller. The flexible control and expanded visibility offered by N [7] can reduce the cost of operating a network by half [2]. However, fully benefiting from N requires a considerable initial investment: network providers must upgrade or replace all legacy devices with programmable ones (e.g., whose forwarding tables are programmable remotely from a logically-centralized controller using a specialized protocol such as OpenFlow) 1. Recent work, both in academia and industry, attempts to reduce the capital expenditure of N while maintaining most of its benefits, by upgrading only a few, strategically chosen devices in a network. We refer to such networks as hybrid networks. Panopticon develops an optimization framework to determine the location of partial N deployment and enforces that every network flow traverse at least one N-enabled switch [5]. HybNET provides a common configuration mechanism for an existing hybrid network and automatically translates legacy to N configurations and vice versa [6]. VMWare s NX forgoes physical programmable switches altogether and implements N in hypervisors at the edge of the legacy network [4]. Although effective at controlling paths through N-enabled devices, neither Panopticon nor NX can dynamically affect the configuration of legacy switches and, consequently, the paths through the legacy nework. network paths between two N switches are coarsely controlled using VLANs or tunnels [5, 4] or simply left to the latitude of Layer 2 routing protocols such as TP or ECMP. HybNET proposes a netconf-based mechanism to change legacy switch routing but its speed (more than 10s to configure a switch) makes it incompatible with real world networks. In this paper, we explore the following question: can we extend the main capability of an N switch (that of allowing remote programming of its forwarding tables) to legacy devices in the same hybrid network? In other words, can we control paths through legacy switches with the same network controller used to manage the N devices? Towards answering this question, we introduce, a network management framework that enables fine-grained routing control over legacy paths in hybrid N using OpenFlow. To update routing entries in legacy switches, we propose a simple primitive,. When calling with respect 1 Throughout the paper, we interchangeably use the terms programmable, N(-enabled), or OpenFlow(-enabled) to refer to switches whose forwarding entries can be updated from a remote controller using OpenFlow.

2 to an OpenFlow switch A, a legacy switch B, a port on the legacy switch p, and a address m, instructs the Open- Flow switch to send a special packet (with m as the source ) to port p on the legacy switch. Assuming that B runs learning, it will update its forwarding entry for m. This mechanism allows us to remotely manipulate a forwarding entry on a legacy switch using OpenFlow and learning. is similar conceptually to Fibbing, a mechanism proposed by Vissicchio et al.to improve the flexibility and diversity of Layer 3 routing [9]. Indeed, and Fibbing share the same philosophy: that we can indirectly affect network routing by injecting fake and harmless information into the network. However, their scope and goals are different. works at layer 2 in hybrid N networks consisting of legacy and OpenFlow switches, with the goal of improving path diversity by providing more fine-grained legacy path control. Fibbing works in layer 3 legacy networks consisting of only legacy routers. It injects fake network topologies into link-state routing to improve routing flexibility, while ensuring loop-free paths. Not all network paths can be enforced by. Updating a forwarding entry for m to port p requires that the switch be accessible on port p. For this, p must be directly connected to an OpenFlow switch or be part of the layer 2 underlay that controls -level routing (e.g., spanning tree). Given a path to update, first checks whether the update is possible for every switch on the path and then attempts to enact it. Using experiments on random network topologies with varying degrees of OpenFlow deployment, we are able to update 70% of the paths, when only 20% switches in the network are OpenFlow-enabled. When there is no data traffic traversing the original path, can update the configuration to a new path using a constant overhead, proportional to the number of legacy switches on the new path but not on the old one. ata traffic on the original path may override the path updates if not all switches on the new path are updated quickly enough. To ensure that an update is eventually applied, adapts to the rate of underlying data traffic and adjusts the rate of special packets accordingly. We make the following contributions. First, we present an Open- Flow based primitive,, to remotely configure forwarding entries for legacy switch interfaces reachable from an N switch in the same hybrid network. econd, based on Flow- Mod, we design, a hybrid network controller that achieves better path diversity and more fine-grained path control than regular OpenFlow controllers deployed in a hybrid network. The rest of the paper is structured as follows. In ection 2, we discuss the motivation for deploying hybrid networks and present a short overview of path enforcement in layer 2 legacy and Open- Flow networks. ection 3 describes how to remotely manipulate legacy switch forwarding tables using OpenFlow and sketches the design for, our hybrid network controller. We present a preliminary evaluation in ection 4, followed by conclusions and an introspection into planned future work in ection BACKGROUN AN MOTIVATION In this section, we introduce hybrid layer 2 networks and discuss mechanisms to enforce a given path in either legacy networks or software-defined networks. 2.1 Hybrid Networks Hybrid networks (also called transitional networks by Levin et al.[5]) contain both OpenFlow and legacy switches. They provide a tradeoff to network providers between the cost to deploy and the benefit derived from having a software-defined network. Because providers do not need to upgrade the entire network, they can take advantage of the increased control and visibility provided by N at a fraction of the cost [5, 4, 6]. However, the increased control is still limited to the N-enabled devices. Neither of the existing hybrid networks provide a way to dynamically manage the configuration of legacy devices. Thus, legacy paths between N switches must be manually set up (e.g., with VLANs) or left in the care of layer 2 protocols such as TP. Next we present a short overview of path enforcement in both legacy networks and software-defined networks. 2.2 Path Enforcement networks. tandard layer 2 Ethernet switches perform two main functions: learning (the next-hop switch towards a destination address) and forwarding (a packet according to learned information). To learn the next-hop switch for a packet, layer 2 switches broadcast the packet on all ports except the one on which the packet arrived. To prevent loops they restrict the underlying topology to a spanning tree by turning off (e.g., using TP) or aggregating (e.g., using link aggregation) multiple links. To learn the port on which to forward a packet with a specific address, switches use learning: if a packet with source address m arrives on port p they assume that any future packet with destination addressmcan be delivered throughp. The path of a packet is static and changes only if there are topology or configuration changes in the network. To increase path diversity, operators can slice the network into multiple VLANs, each with its own spanning tree and set of forwarding entries. Figure 1a shows how to set up a path in a legacy network. The network builds a spanning tree to prevent broadcast loops. As a result, the traffic between and will be re-routed on the spanning tree. This limits path selection flexibility, as feasible paths must contain spanning tree links, and network performance, as paths may be much longer than necessary. oftware-defined networks. oftware-defined networking allows operators or software programs to remotely modify their forwarding entries from a logically-centralized controller using a specialized protocol such as OpenFlow [7]. Thus, switches learn about unknown destinations and routing policies without requiring expensive broadcast or complex configurations. Unlike legacy networks, N provides explicit and fast path control across the whole topology. If all switches in Figure 1a are OpenFlow switches, explicit rules can be added in the switches to easily set up any path between and, thereby improving both path selection flexibility and network performance. Hybrid networks. Hybrid networks retain some of the advantages of N with respect to path selection and network performance. When replacing a legacy switch with an OpenFlow switch, we add yet another point of control into the network, which may enable setting up new and better paths (see Figures 1a and 1b). Fully controlling paths in hybrid networks requires control of both the OpenFlow switches and the legacy switches on the paths. Although some switch vendors enable remote configuration (e.g., using netconf), this is usually slow and not amenable to the speed of real world networks. In the next section, we present a simple mechanism that allows us to use OpenFlow and the learning function in legacy switches to remotely configure forwarding entries on legacy switches. 3. EIGN At the heart of this paper lies a simple question: can we use OpenFlow to control and update forwarding entries on legacy network switches? In this section, we describe a simple mechanism that realizes such control on specific switches. We then introduce

3 LE6 OpenFlow (a) A legacy network with six switches. The spanning tree created by PT (depicted by the blue links) dictates network paths. Figure 1: Path setup in legacy and hybrid networks. (b) A hybrid N network. All the links in the spanning tree and adjacent to the OpenFlow switch can be used. the preliminary design of, a controller for hybrid N networks that provides fine-grained control over both N and legacy paths. 3.1 Goal and Assumptions Assumptions: We consider a layer 2 hybrid network with both programmable and legacy switches. We control the programmable switches with OpenFlow, but we cannot directly update the legacy switch forwarding entries. While technically feasible, remote configuration for legacy switches (e.g., using netconf) is slow and unreliable [6]. A forwarding entry consists of a destination address m and an action (e.g., send to port, drop ) to be applied to packets whose destination ism. We also assume that each legacy switch runs learning and that the legacy network is configured, either manually or automatically, to avoid routing loops (e.g., with TP). We call the collection of legacy links that results after this configuration the network underlay. The underlay is a always a tree or a collection of trees. Goal: Given a configured path (i.e., a sequence of switches) P between two hostsaandb attached to a hybrid network and a new pathp, we want to enforcep in the network, i.e., change the path between A and B from P top. P P Figure 2: An example of P and P. (1,6,2) and (4,7,5) are the subpaths needed to be updated. 3.2 Idea Our insight is to use OpenFlow switches to send special packets to the legacy switches on the new path. These packets take advantage of learning to manipulate legacy switches into updating a single forwarding entry in their routing tables. For example, if we want to modify the action of a routing entry for m from send to port p1 to send to port p2, we create a packet whose source address is m and make sure it arrives at the switch on port p2. The learning algorithm sees the packet arriving onp2 and assumes its source address m is reachable on p2, therefore updating the corresponding forwarding entry. UpdatingP top requires updating all switches onp but not on P and all switches where the two paths diverge and converge 2. For example, in Figure 2, we must update all switches except switch 3. We refer to an update subpath as a sequence of adjacent switches that must be updated during a path change. In Figure 2, (1,6,2) and (4,7,5) form subpaths. All special packets that we use to remotely manipulate a legacy switch s forwarding table must arrive at the switch on a link that is part of the path we want to install. This leads to the two conditions that a path P needs to satisfy before it can be enforced: Condition 1: All legacy links on path P (i.e., links that have at least one legacy switch as endpoint) must be either part of the legacy layer 2 network underlay (e.g., the spanning tree) or adjacent to an OpenFlow switch. This guarantees that each legacy link on P is reachable from an OpenFlow switch. Condition 2: Every update subpath of P must contain at least one OpenFlow switch. Otherwise, no OpenFlow switch in the network can send a special packet that reaches a switch on the update subpath through a link part ofp, even if the update subpath is part of the layer 2 underlay. 3.3 We now present the preliminary design of, a hybrid network controller that can modify forwarding tables on both OpenFlow and legacy switches. mirrors the design of a general OpenFlow network controller and adds two components: path verification and path update. Given a network configuration (i.e., forwarding tables on all switches and the network underlay) and a new path P to enforce between two endpoints attached to the network, first checks whether the path P is feasible and then proceeds to update each switch on the subpaths. We present the two components in detail below Path Verification Given a pathp and the current network configuration, path verification determines whether P is feasible in the network. First, it 2 We assume the reverse paths are updated as well.

4 s Flow Table: Match Action src=, dst= Output: src=, dst= Output: s Flow Table: Match Action src=, dst= Output: src=, dst= Output: src=, dst= src=, dst= OpenFlow OpenFlow (a) Enforce the path between 1 and 1 in the initial stage where no traffic between end-hosts. Figure 3: An example of path update in a hybrid network. (b) Change the path between 1 and 1 to a new one: (,,,), while the connection is still alive. verifies if all legacy links on path P are part of the legacy layer 2 network underlay or adjacent to an OpenFlow switch, following Condition 1. econd, for every update subpath of P, verifies whether at least one switch is OpenFlow enabled, following Condition 2. If both conditions hold, updates the forwarding entries in one or more OpenFlow switches (for subpaths starting or ending with at least one OpenFlow switch) or uses one OpenFlow switch to send a message (for legacy links part of the underlay). Algorithm 1 presents the steps taken when verifying the feasibility of a path. Algorithm 1 : Path Verification Algorithm P 1: for x P k y k do 2: for each legacy link e LE i do 3: if e LE i not in the underlay and e LE i switches then 4: returnp is infeasible 5: end if 6: end for 7: tag 0 8: for each switch n i do 9: ifn i is OpenFlow enabled then 10: tag 1 11: break 12: end if 13: end for 14: iftag = 0 then 15: returnp is infeasible 16: end if 17: end for 18: return P is feasible contains only legacy Path Update To support forwarding entry updates on legacy switches, we introduce a new primitive, called. We use to generate and send special packets to the switch we want to control. The only requirement we enforce on the header of these packets is that their source address should be the same as the associated with the forwarding entry we want to change. pecial packets may have any time. However, to limit the side-effects to the network, we send ARP packets, as they update only ARP caches in hosts and switches. To send a special packet, we use OpenFlow s PacketOut functionality, which allows us to use any OpenFlow switch we control to put a packet on the data plane. We must be careful to call PacketOut with respect to an OpenFlow switch that can reach the intended legacy switch using a link that is on the new path we want to enforce. Algorithm 2 presents the path update process. Figure 3 shows an example of path update. Initially, the path between and is (,,) and we want to update it to (,, OF 6, ). This requires changing the forwarding entries on (to forward packets for to rather than ) and on (to forward packets for to rather than ). calls to send special packets from to. The packets contain the address of as their source address and trigger the learning algorithms on switches and to update their forwarding tables according to the incoming interfaces. When updating a path, automatically updates the reverse path as well. For brevity, we omit the description of reverse path change but reflect it in Figure 3. In this example, as the subpath(,,) starts or ends with one OpenFlow switch, i.e., we can also simply update the forwarding entry in to redirect traffic from to on the link (,). In this way, will change the forwarding entry to forward future packets for to after it receives one data packet from. Algorithm 2 : Path Update Algorithm P 1: for x P k y k do 2: tag 0 3: for each switch n i do 4: if n i is OpenFlow enabled then 5: add forwarding rules in n i forp 6: iftag = 0 then 7: call to send special packets 8: tag 1 9: end if 10: end if 11: end for 12: end for 3.4 iscussion The key to our path enforcement is to make legacy switches react to fake packets sent along the path we want to set up. When setting up a new path, we change the state of the legacy switches at

5 2. Unicast Gratuitous ARP src_=, dst_= 1.Request 3. Reply 4. Unicast Gratuitous ARP src_=, dst_= (a) (b) (c) 5.Request 6. Reply (d) (e) (f) Figure 4: An example of path flapping. and are legacy switches, and is an OpenFlow switch. Assume the connection between and has been set up, and traffic is going on the path (,). We want to change the path to (,,). only injects special packets towards. the intersection between the old (existing) path and the new path. However, the state may revert if data packets on the reverse original path arrive at a switch after our special packets. The late packet, which has the same source as our special packet but arrives on a different port, modifies the forwarding table on the switch to the original entry. We call this phenomenon path flapping. Next we present an example of path flapping and discuss a solution. In Figure 4, the original path between and is (,) and the new path to be setup is (,,). Changing the path requires updates to both legacy switches. uring the path change process, and communicate to each other (Figure 4a). However, after updates switch to forward traffic for to instead of (Figure 4b), a late reply from arrives at on the original path. This changes the forwarding entry associated with back to send to and nullifies the outcome of (Figure 4c). To guarantee the path change, must send another special packet. Note that the problem would persist even if we sent special packets to both legacy switches which updated their configuration at the same time: there is a small probability that a packet between and is on the wire between and when the updates are applied. To overcome path flapping, we propose that continually injects special packets until legacy switches reach a stable state. This happens when data packets start traversing the new path in both directions. The controller can detect such events by deploying a matching rule on an OpenFlow switch that lies on the new path but not on the old one. How often injects special packets depends on the rate of data packets traversing the old path. Ideally, we would inject special packets to at least match the rate of the data packets. However, we also must be careful to limit the network overhead, as a high rate of special packets can limit the OpenFlow switch functionality and in extreme cases introduce congestion in the network. In this paper, we assume that path updates in are not atomic and that a path can flap back and forth before stabilizing. Recent work in software-defined networking studied how to perform consistent network updates, such that all packets follow either the old or the new path [8, 3]. uch work is orthogonal to the goals of this paper but is part of one of the directions we consider for future work. 4. PRELIMINARY EVALUATION We built a proof-of-concept prototype for based on the Pox OpenFlow controller to which we add the path verification and path update components. Our preliminary evaluation focuses on two key questions: 1) can significantly increase the degree of control that we have over the network?, and 2) what is the cost of such increased control in terms of network overhead? We use Mininet [1] to simulate a hybrid network. To mimic legacy switches, we set OV into standalone mode and disconnect them from the controller. All other switches in the network run as normal OpenFlow switches. We configure VLANs on switches to construct the static network underlay. We also add a default rule with low priority in all OpenFlow switches to drop all packets, in order to avoid forwarding any packets received from legacy switches which are used to conduct learning. When we want to enable a path going through an OpenFlow switch, we add explicit forwarding rules with higher priority. We use Tcpdump to capture all packets in the network in order to measure the overhead of path update. 4.1 Feasibility We show that provides more diverse path control

6 Fraction of uccessful Path Update witches 500 witches 1000 witches Fraction of OpenFlow witches Fraction of uccessful Path Update x (Faster) ata Interval-ingle 1.4x (Fast) ata Interval-ingle 1.8x (low) ata Interval-ingle 2x (lower) ata Interval-Both n pecial Packets Figure 5: ucceed ratio of path updates with as a function of the fraction of OF switches. Figure 6: Cost to enforce a path update with as a function of the number of special packets. compared to a controller that manages only the OpenFlow devices. Using randomly generated network topologies with hundreds to thousands of switches and at various degrees of OpenFlow deployment, we compute the fraction of successful path updates. For each fraction of OpenFlow switch deployment, we run a hundred experiments on random topologies with 100, 500, 1000 switches respectively. We randomly generate a pair of old and new paths between two hosts, and verify whether the new path can be updated by. Our results present average across all runs. Figure 5 presents the success ratio of path updates with, while varying the OpenFlow switch coverage and the network size. Even when only 20% of the switches are OpenFlow-enabled, can update 70% of the paths. Increasing the OpenFlow coverage increases the percentage of successful path updates. The figure also shows that the size of the network has little effect on the additional diversity unraveled by : when the total number of switches increases from 100 to 1000, the fraction of successful path updates does not change much. This indicates that can serve large-scale networks. 4.2 Overhead Enforcing a new path introduces network overhead due to the special packets we send from OpenFlow switches. If there is no path flapping, it suffices to send a single packet for every switch whose configuration we want to update. With path flapping, the number of packets we send depends on the rate of the data traffic in the network. Using the same setup as above, we randomly generate a pair of old and new paths between two hosts, such that updating to the new path essentially requires updating at least the two switches at the intersection between the old path and the new path 3. As mentioned earlier in ection 3.3.1, if one of the intersection switch is OpenFlow enabled, we can simply update a forwarding entry in the OpenFlow switch to redirect traffic on the link in the new path. Using to send special packets accelerates the path update but it is not mandatory. Otherwise, must call to send special packets towards the intersection switches. We experiment in the more general case where both intersection switches are legacy to measure the network overhead of path update. We continually send ICMP traffic between the hosts. 3 The fewest number of switches needed to be updated is two, and it is more likely that these two intersection switches are not OpenFlow-enabled. We define the interval between data packets as the data interval. We also inject special packets from an OpenFlow switch on the new path. The time between consecutive special packets is the control interval. We vary the size of the control interval among 1, 1.4, 1.8, and 2 times that of the data interval. Figure 6 shows the cumulative distribution of the number of special packets needed to apply an update on a switch according to the ratio between the data and control intervals. As expected, the number of special packets needed to apply an update increases with the interval between special packets. Injecting special packets with the source of both hosts, rather than a single one, can change the path faster (green line on Figure 6), albeit at twice as much network overhead. This is because switches do not need to wait until the direct path is changed to update their forwarding entries for the reverse path. 5. ICUION AN CONCLUION We presented a preliminary design for, a hybrid network controller that manages forwarding entries on both legacy and OpenFlow-enabled switches. The main idea behind is that we can use OpenFlow to send special packets on selective interfaces of legacy switches to influence the internal learning of these switches. This allows us to remotely manipulate the forwarding entries on these switches. This paper is only a first step towards enabling routing control over legacy paths in hybrid networks using OpenFlow. There are still many interesting issues to be addressed. First, we want to improve the path enforcement mechanism adjusting to the dynamic network factors, such as data interval and latency. econd, we will explore the benefits of the strategic OpenFlow switch placement. Although can improve path control with random Open- Flow switch locations, we believe a more careful deployment can increase the path diversity significantly. 6. ACKNOWLEGMENT We thank the anonymous reviews for their valuable feedback. The bulk of this work was conducted while the first author was an intern at NEC Laboratories America. This research was supported in part by NF grants CN , CN and CRI , a Raytheon/NF subcontract /CN , TRA grant HTRA and o ARO MURI Award W911NF

7 7. REFERENCE [1] Mininet. [2] oftware efined Networks tudy. pr-n-nfv-eployment.asp. [3] KATTA, N. P., REXFOR, J., AN WALKER,. Incremental consistent updates. In HotN (2013). [4] KOPONEN, T., AN ET AL. Network virtualization in multi-tenant datacenters. In UENIX NI (2014). [5] LEVIN,., CANINI, M., CHMI,., CHAFFERT, F., AN FELMANN, A. Panopticon: Reaping the Benefits of Incremental N eployment in Enterprise Networks. In UENIX Annual Technical Conference (2014). [6] LU, H., ARORA, N., ZHANG, H., LUMEZANU, C., RHEE, J., AN JIANG, G. HybNET: Network Manager for a Hybrid Network Infrastructure. In Middleware (2013). [7] MCKEOWN, N., ANERON, T., BALAKRIHNAN, H., PARULKAR, G., PETERON, L., REXFOR, J., HENKER,., AN TURNER, J. OpenFlow: enabling innovation in campus networks. ACM igcomm CCR 38 (2008), [8] REITBLATT, M., FOTER, N., REXFOR, J., CHELINGER, C., AN WALKER,. Abstractions for network update. In ACM igcomm (2012). [9] VIICCHIO,., VANBEVER, L., AN REXFOR, J. weet little lies: Fake topologies for flexible routing. In ACM HotNets (2014).

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Panopticon: Incremental SDN Deployment in Enterprise Networks

Panopticon: Incremental SDN Deployment in Enterprise Networks Panopticon: Incremental SDN Deployment in Enterprise Networks Stefan Schmid with Dan Levin, Marco Canini, Fabian Schaffert, Anja Feldmann https://venture.badpacket.in I SDN! How can I deploy it? SDN: Where

More information

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks? OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control

More information

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane

More information

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 Revision C 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Passive Link State Auto Configuration (A/P)...

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Software Defined Networking What is it, how does it work, and what is it good for?

Software Defined Networking What is it, how does it work, and what is it good for? Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David

More information

Auto-Configuration of SDN Switches in SDN/Non-SDN Hybrid Network

Auto-Configuration of SDN Switches in SDN/Non-SDN Hybrid Network Auto-Configuration of SDN Switches in SDN/Non-SDN Hybrid Network Rohit Katiyar [email protected] Prakash Pawar [email protected] Kotaro Kataoka [email protected] Abhay Gupta [email protected]

More information

Software Defined Networking and OpenFlow: a Concise Review

Software Defined Networking and OpenFlow: a Concise Review Software Defined Networking and OpenFlow: a Concise Review Stefano Forti [email protected] MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction

More information

Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks

Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks Dan Levin withmarco Canini, Stefan Schmid, Fabian Schaffert, Anja Feldmann Enterprise Network Management Policy changes

More information

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight

More information

TRILL Large Layer 2 Network Solution

TRILL Large Layer 2 Network Solution TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network

More information

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SOFTWARE-DEFINED NETWORKING AND OPENFLOW SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control

More information

Central Control over Distributed Routing fibbing.net

Central Control over Distributed Routing fibbing.net Central Control over Distributed Routing fibbing.net Stefano Vissicchio UCLouvain SIGCOMM 8th August 205 Joint work with O. Tilmans (UCLouvain), L. Vanbever (ETH Zurich) and J. Rexford (Princeton) SDN

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

Multiple Service Load-Balancing with OpenFlow

Multiple Service Load-Balancing with OpenFlow 2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication

More information

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,

More information

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal

More information

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable

More information

OpenFlow: Enabling Innovation in Campus Networks

OpenFlow: Enabling Innovation in Campus Networks OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification

More information

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

Open Source Network: Software-Defined Networking (SDN) and OpenFlow Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking

More information

High Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

High Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks High Availability Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Software Defined Networks

Software Defined Networks Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports

More information

Software Defined Networking & Openflow

Software Defined Networking & Openflow Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction

More information

Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks

Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent

More information

HybNET: Network Manager for a Hybrid Network Infrastructure

HybNET: Network Manager for a Hybrid Network Infrastructure HybNET: Network Manager for a Hybrid Network Infrastructure Hui Lu, Nipun Arora, Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Guofei Jiang Purdue University NEC Laboratories America [email protected] {nipun,huizhang,lume,rhee,gfj}@nec-labs.com

More information

Why Software Defined Networking (SDN)? Boyan Sotirov

Why Software Defined Networking (SDN)? Boyan Sotirov Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,

More information

COMPSCI 314: SDN: Software Defined Networking

COMPSCI 314: SDN: Software Defined Networking COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling

More information

Extensible and Scalable Network Monitoring Using OpenSAFE

Extensible and Scalable Network Monitoring Using OpenSAFE Extensible and Scalable Network Monitoring Using OpenSAFE Jeffrey R. Ballard [email protected] Ian Rae [email protected] Aditya Akella [email protected] Abstract Administrators of today s networks are

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

How Network Transparency Affects Application Acceleration Deployment

How Network Transparency Affects Application Acceleration Deployment How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration

More information

OpenDaylight Project Proposal Dynamic Flow Management

OpenDaylight Project Proposal Dynamic Flow Management OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Business Cases for Brocade Software-Defined Networking Use Cases

Business Cases for Brocade Software-Defined Networking Use Cases Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

SDN. What's Software Defined Networking? Angelo Capossele

SDN. What's Software Defined Networking? Angelo Capossele SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial

More information

Mobility Management Framework in Software Defined Networks

Mobility Management Framework in Software Defined Networks , pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Presented by Alaa Shublaq SDN Overview Software-Defined Networking

More information

SDN and FTTH Software defined networking for fiber networks

SDN and FTTH Software defined networking for fiber networks SDN and FTTH Software defined networking for fiber networks A new method to simplify management of FTTH networks What is SDN Software Defined Networking (SDN) revolutionizes service deployment and service

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.

From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. From Active & Programmable Networks to.. OpenFlow & Software Defined Networks Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. Braun University of Basel Cs321 - HS 2012 (Slides material from www.bigswitch.com)

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

OpenFlow - the key standard of Software-Defined Networks. Dmitry Orekhov, Epam Systems

OpenFlow - the key standard of Software-Defined Networks. Dmitry Orekhov, Epam Systems OpenFlow - the key standard of Software-Defined Networks Dmitry Orekhov, Epam Systems Software-defined network The Need for a New Network Architecture Limitations of Current Networking Technologies Changing

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Tutorial: OpenFlow in GENI

Tutorial: OpenFlow in GENI Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

NEC s Juniper Technology Brief Issue 2

NEC s Juniper Technology Brief Issue 2 NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email [email protected] or visit www.nec.co.nz

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Policy Based Forwarding

Policy Based Forwarding Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus

More information

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability

More information

An Introduction to Software-Defined Networking (SDN) Zhang Fu

An Introduction to Software-Defined Networking (SDN) Zhang Fu An Introduction to Software-Defined Networking (SDN) Zhang Fu Roadmap Reviewing traditional networking Examples for motivating SDN Enabling networking as developing softwares SDN architecture SDN components

More information

Static IP Routing and Aggregation Exercises

Static IP Routing and Aggregation Exercises Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

Software Defined Networking What is it, how does it work, and what is it good for?

Software Defined Networking What is it, how does it work, and what is it good for? Software Defined Networking What is it, how does it work, and what is it good for? Many slides stolen from Jennifer Rexford, Nick McKeown, Scott Shenker, Teemu Koponen, Yotam Harchol and David Hay Agenda

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

IxNetwork OpenFlow Solution

IxNetwork OpenFlow Solution IxNetwork OpenFlow Solution Solution Highlights OpenFlow Controller Emulation OpenFlow Switch Emulation OpenFlow Benchmarking Test OpenFlow Switch Conformance Test Key Features Software Defined Networking

More information

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SOFTWARE-DEFINED NETWORKING AND OPENFLOW SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking

More information

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Limitations of Current Networking Architecture OpenFlow Architecture

Limitations of Current Networking Architecture OpenFlow Architecture CECS 572 Student Name Monday/Wednesday 5:00 PM Dr. Tracy Bradley Maples OpenFlow OpenFlow is the first open standard communications interface that enables Software Defined Networking (SDN) [6]. It was

More information

ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE

ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE PANG-WEI TSAI, CHUN-YU HSU, MON-YEN LUO AND CHU-SING YANG NATIONAL CHENG KUNG UNIVERSITY, INSTITUTE OF COMPUTER

More information

How To Understand The Power Of The Internet

How To Understand The Power Of The Internet DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Chapter 2 Lab 2-2, EIGRP Load Balancing

Chapter 2 Lab 2-2, EIGRP Load Balancing Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.

More information

Network Security through Software Defined Networking: a Survey

Network Security through Software Defined Networking: a Survey [email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring

More information

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],

More information

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments Aryan TaheriMonfared Department of Electrical Engineering and Computer Science University of Stavanger

More information

Software Defined Networking Basics

Software Defined Networking Basics Software Defined Networking Basics Anupama Potluri School of Computer and Information Sciences University of Hyderabad Software Defined Networking (SDN) is considered as a paradigm shift in how networking

More information

Programmable Networking with Open vswitch

Programmable Networking with Open vswitch Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads

More information

SDN. WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking. Recep Ozdag Intel Corporation

SDN. WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking. Recep Ozdag Intel Corporation WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking Intel Ethernet Switch FM6000 Series - Software Defined Networking Recep Ozdag Intel Corporation Software Defined Networking

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Introduction to OpenFlow:

Introduction to OpenFlow: Introduction to OpenFlow: Bringing Experimental Protocols to a Network Near You! Chris Tracy, Network Engineer ESnet Engineering Group Overview Fundamentals and Terminology Hardware Options for Deploying

More information

Configuring the Transparent or Routed Firewall

Configuring the Transparent or Routed Firewall 5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing

More information

Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics

Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational

More information

Data Analysis Load Balancer

Data Analysis Load Balancer Data Analysis Load Balancer Design Document: Version: 1.0 Last saved by Chris Small April 12, 2010 Abstract: The project is to design a mechanism to load balance network traffic over multiple different

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR

More information