Restorable Logical Topology using Cross-Layer Optimization

Similar documents
Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Network performance in virtual infrastructures

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Flow Analysis Versus Packet Analysis. What Should You Choose?

Network Security Demonstration - Snort based IDS Integration -

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Leveraging SDN and NFV in the WAN

Securing Local Area Network with OpenFlow

SDN Architecture and Service Trend

Carrier/WAN SDN. SDN Optimized MPLS Demo

mbits Network Operations Centrec

An Introduction to Software-Defined Networking (SDN) Zhang Fu

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Network Monitoring and Traffic CSTNET, CNIC

TRILL Large Layer 2 Network Solution

Ethernet-based Software Defined Network (SDN)

Internet Infrastructure Measurement: Challenges and Tools

Blue Planet. Introduction. Blue Planet Components. Benefits

Brocade One Data Center Cloud-Optimized Networks

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Frequently Asked Questions

WHITE PAPER September CA Nimsoft For Network Monitoring

Huawei One Net Campus Network Solution

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

A Summary of Network Traffic Monitoring and Analysis Techniques

VXLAN: Scaling Data Center Capacity. White Paper

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

WHITE PAPER. Network Virtualization: A Data Plane Perspective

Definition of a White Box. Benefits of White Boxes

Disaster-Resilient Backbone and Access Networks

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

Software Defined Networking

Software Defined Network (SDN)

SolarWinds Certified Professional. Exam Preparation Guide

Transformation of the enterprise WAN with dynamic-path networking

Using SDN-OpenFlow for High-level Services

SDN and NFV in the WAN

BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Chapter 11 Cloud Application Development

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

Virtual Privacy vs. Real Security

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Open vswitch and the Intelligent Edge

NEN Community REANNZ. Design Statement: NEN Edge Device

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

software networking Jithesh TJ, Santhosh Karipur QuEST Global

1 Data Center Infrastructure Remote Monitoring

Relationship between SMP, ASON, GMPLS and SDN

Optimizing Data Center Networks for Cloud Computing

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

Cisco IOS Flexible NetFlow Technology

NFV Network and Compute Intensive H/W Acceleration (using SDN/PI forwarding)

WHITE PAPER OCTOBER CA Unified Infrastructure Management for Networks

Agenda. NRENs, GARR and GEANT in a nutshell SDN Activities Conclusion. Mauro Campanella Internet Festival, Pisa 9 Oct

The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM CALIENT Technologies

Network Simulation Traffic, Paths and Impairment

Definition. A Historical Example

BlackRidge Technology Transport Access Control: Overview

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

Service Description DDoS Mitigation Service

How To Orchestrate The Clouddusing Network With Andn

John Ragan Director of Product Management. Billy Wise Communications Specialist

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

KT The Value Networking Company

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

DoS: Attack and Defense

The next IP SLA generation Solution. Advisor SLA. Network Performance Monitoring Solution.

Introduction. The Inherent Unpredictability of IP Networks # $# #

Cisco Videoscape Distribution Suite Service Broker

Multi Protocol Label Switching (MPLS) is a core networking technology that

Oracle SDN Performance Acceleration with Software-Defined Networking

Sprint Global MPLS VPN IP Whitepaper

Question: 3 When using Application Intelligence, Server Time may be defined as.

Network Management and Monitoring Software

Qualifying SDN/OpenFlow Enabled Networks

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015

MRV EMPOWERS THE OPTICAL EDGE.

SDN. What's Software Defined Networking? Angelo Capossele

Denial of Service Attacks and Resilient Overlay Networks

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Transcription:

פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical topology overlaid on an optical physical infrastructure. The routers are connected to each other via logical links called LightPaths, where each LightPath is established over one or more optical fibers and optical switches connecting these fibers. The design of LightPaths involves selection of both logical link and logical path, i.e decision which pairs of routers will be connected by the LightPaths and how to route each LightPath across the optical network. Such design requires cross-layer optimization that will maximize the end-to-end traffic throughput in case of a physical failure in order to guarantee the restorability of the logical topology. Router Router Router Router

Goals: For a given network topology of routers and optical switches: a. Build the topology using network simulator (ns-3 or Mininet). b. Determine the LightPaths (Primary & Secondary) using Shortest Path Algorithm (Dijkstra's Algorithm). c. Implement cross layer optimization algorithm that will: 1. Decide which pairs of routers should be connected by a LightPath, while ensuring that the total number of LightPaths does not exceed a given budget of maximum number of LightPaths. 2. Determine the physical path of each LightPath while ensuring that the number of logical links traversing a single physical link is minimum. d. Compare between Dijkstra's Algorithm and the cross layer Algorithm in cases of link failure. Requirements: C++ for ns-3 Python for Mininet Input: Physical switches topology - represented as: o Gp=(Vp,Ep): Gp is Undirected Graph, Vp is set of the optical switches and Ep is set of optical links o Cp: Capacity of each link e Ep. Cp>=2 and is even. Cp is same in all links. o Vl: Number of optical switches that can serve as routers -Subset of Vp Budget of the topology represented as: o B : Maximum LightPaths allowed. Must be >= Vl Input Example: Gp: 1 2 3 4 Vp 16 es Ep 24 Links Vl 4 Routers (1,2,3,4) Cp(e) =2 B=4

Output: a. LightPaths of given the given topology using Dijkstra's Algorithm b. LightPaths of given the given topology using the Cross-Layer Optimization Algorithm For example: 1 2 3 4

Robust Header Compression (ROHC) Abstract: Deploying Intrusion Detection Systems (IDS) requires copying the network traffic from several sensing points in the network using Tap device and sending the traffic to the IDS server. In Supervisory Control And Data Acquisition (SCADA) system, this mission can be challenging, due to the lower bandwidth of the communication channels on the remote site between the Tap device and the IDS Server. A solution for reducing the bandwidth is to compress the sniffed traffic before sending it to IDS server. The traffic will be then decompressed and forwarded to the analyzing application running on the IDS server. The compression is done both on the IP header and on the payload, using standard lossless compression method for the payload and RObust Header Compression (ROHC) for the packet header.. Goals: Implement ROHC on a Client-Server topology or on Network Simulator (ns-3 or Mininet) and test it with both UDP and TCP traffic showing that traffic bandwidth is reduced and not corrupted due to the Compress-Decompress. In addition need to demonstrate correct handling cases of traffic loss. Guided by:

Fault Management (FM) in Open Network Operating System (ONOS) Abstract: Open Network Operating System (ONOS) is an innovative and rapidly growing open source project that already enable service providers to build real Software Defined Networks (SDN). The deployment of SDN will require ONOS to manage legacy Network Element (NE) in an Hybrid environment. One of the required management capabilities from ONOS is to support Fault Management in the NE. When a fault or event occurs, the NE typically sends a notification to the network operator via Simple Network Management Protocol (SNMP). The network operator may also (or alternatively) poll the NE to retrieve this information. An alarm is a persistent indication of a fault that clears only when the triggering condition has been resolved. OpenFlow OpenFlow Legacy Network Element

Goals: ONOS will provide support for such Fault Alarms. It requires implementation in the ONOS project of basic SNMP V2 functionality (both polling and traps handling), as well as Fault Management application that handles the NE s alarm states. Perquisite Requirements: Java

Early DDoS Attack Detection by a Stateless Device Abstract: Detecting Distributed Denial of Service (DDoS) attacks by the router or the switch located in early stage before the attacked server can improve significantly the overall performance since the switch/router itself can trigger packet based filtering rules in order to reduce the load towards the servers. A good sign for DDoS attack is an increasing or high rate of active flows in each time slot compared to normal or pre-defined number of flows threshold. In order to detect such case it is required from a stateless device to be able to estimate on-line the total number of flows while using small memory footprint. The number of flows estimation can be done by working and analyzing the entire stream or only on a sampled stream.

Goals: Implement real-time DDoS attack detection in a stateless device (Router/) in 2 ways: a. Analyzing the entire stream: Estimate the number of flows in each time slot (For example: in 30 seconds) by classifying each packet s 5-Tuple fields -using HyperLogLog algorithm with different number of memory buckets. b. Analyzing sample of the stream: Estimate the number of flows in each time slot (For example: in 30 seconds) by classifying only sample packet s 5-Tuple fields -using HyperLogLog algorithm according to Cardinality Estimation Meets Good-Turing article (Algorithm 1) Use ns-3 or mininet to simulate the topology with many hosts attackers, a stateless switch/router device and a server that will hold the connections. Generate DDoS attack by opening a high rate of flows (TCP, UDP) using DDoS tools or by injecting real captured traffic with DDoS attacks in it. Compare the estimation accuracy resulted in each of the 2 methods. Requirements: Internet Networking Course Guided by:

ISP Mapping using RocketFuel Technique Abstract: Real Internet Service Providers (ISP) topologies today are not publicly available, since ISPs generally regard their router-level topologies as confidential. Some ISPs publish simplified topologies on the Web, but these lack router-level connectivity, Point-Of-Presence (POP) structure and are in most cases out of date. The RocketFuel technique presents a measurement algorithm to infer high quality ISP maps while using as few measurements as possible. The RocketFuel is based on TraceRoute results and uses BGP routing information to choose only those traceroutes that are likely to transit the ISP being mapped. It also suppresses traceroutes that are likely to yield paths through the ISP network that have been already been traversed. These two techniques reduce the number of traces required to map an ISP by three orders of magnitude compared to a brute-force, all-to-all approach, without compromising on the accuracy.

Goals: Implement the RocketFuel technique in Dublin TraceRoute tool (Open Source). Map the top 5 ISPs in Israel (012 Smile, 014 Bezeq International..), 2 ISPs in Europe and 2 in US. Mapping should include for each ISP the following online updated items: a. Backbone Topology on a map. b. Number of routers, links, POPs and average latency. Requirements: Internet Networking Course C++, Python

Distributed Denial of Service (DDoS) attack detection in a virtualized network Abstract: Today s Carrier Ethernet architecture is undergoing the biggest transformation since the beginning of the internet. Video, mobile and cloud usage is driving huge growth in traffic while the constantly changing traffic patterns requires ability to introduce new services quickly. This led the creation of Networking Function Virtualization (NFV), which defines the specifications for Virtualized Network Function (VNF). VNF is a software implementation of a network function such as routing or firewall. Each such VNF runs in a virtual machine (VM). The VMs are created in a compute blade or in a high scale server unusually called the host device. The VMs are located on top of the host s Hypervisor that uses Open Virtual (OVS) to switch the data traffic to/from each VM/NFV and also to chain the traffic between them. Distributed Denial of Service (DDoS) attack embedded in the data traffic can cause performance degradation to the OVS, NFVs as well as to the servers behind. A good sign for DDoS attack is an increasing or high rate of active data flows in each time slot compared to normal or predefined number of flows threshold. In order to detect such case it is required to have ability to estimate on-line the total number of flows per VM/NFV. The number of flows estimation can be done by analyzing sampled stream per VM/NFV.

VM VM VM VM NFV NFV NFV NFV VMs Hypervisor Open v (OVS) Host OS

Goals: Implement real-time DDoS attack detection per VM by analyzing sample of the Ingress and Egress stream on each VM. The implementation requires per VM Ingress/Egress number of flows estimation in each time slot (For example: in 30 seconds) by classifying the sampled packet s 5-Tuple fields -using HyperLogLog algorithm according to Cardinality Estimation Meets Good-Turing article (Algorithm 1). Use a host device to simulate the attackers by opening a high rate of flows (TCP, UDP) using DDoS tools or by injecting real captured traffic with DDoS attacks in it. Example of expected output: Estimated # of Ingress Flows per VM 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 30 60 90 120 150 VM1 VM2 VM3 VM4 Requirements: Internet Networking Course Guided by: