Virtualization of networks

Similar documents
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Master Course Computer Networks IN2097

VXLAN: Scaling Data Center Capacity. White Paper

Definition. A Historical Example

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Overlay Networks and Tunneling Reading: 4.5, 9.4

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Computer Networking Networks

Lecture 02b Cloud Computing II

Extending Networking to Fit the Cloud

Cloud Infrastructure Planning. Chapter Six

IP Switching: Issues and Alternatives

Transport and Network Layer

SBSCET, Firozpur (Punjab), India

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Network performance in virtual infrastructures

EVALUATING NETWORKING TECHNOLOGIES

Network Virtualization and its Application to M2M Business

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Multi Protocol Label Switching (MPLS) is a core networking technology that

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Address Resolution Protocol (ARP)

Top-Down Network Design

Ethernet. Ethernet. Network Devices

Addressing Inter Provider Connections With MPLS-ICI

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

1.1. Abstract VPN Overview

Internetworking. Problem: There is more than one network (heterogeneity & scale)

ENTERPRISE CONNECTIVITY

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Networking Topology For Your System

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Communication Networks. MAP-TELE 2011/12 José Ruela

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN

Communication Systems Internetworking (Bridges & Co)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks CS321

White paper. Reliable and Scalable TETRA networks

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

High Performance VPN Solutions Over Satellite Networks

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Network Simulation Traffic, Paths and Impairment

Network Security TCP/IP Refresher

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Network Virtualization for Large-Scale Data Centers

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

November Defining the Value of MPLS VPNs

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Virtual Privacy vs. Real Security

Lecture 8. IP Fundamentals

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Virtual Private Networks. Juha Heinänen Song Networks

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

Internet Protocol: IP packet headers. vendredi 18 octobre 13

BT Internet Connect Global - Annex to the General Service Schedule

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN

Introduction to MPLS-based VPNs

Network Technologies for Next-generation Data Centers

Cisco Dynamic Workload Scaling Solution

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Global Headquarters: 5 Speen Street Framingham, MA USA P F

SSVVP SIP School VVoIP Professional Certification

TCP/IP Protocol Suite. Marshal Miller Chris Chase

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Network Virtualization Network Admission Control Deployment Guide

Overview of Computer Networks

ADVANCED NETWORK CONFIGURATION GUIDE

Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG

1.264 Lecture 37. Telecom: Enterprise networks, VPN

The BANDIT Device in the Network

Introduction to LAN/WAN. Network Layer (part II)

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Chapter 2 - The TCP/IP and OSI Networking Models

WAN Failover Scenarios Using Digi Wireless WAN Routers

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

Guideline for setting up a functional VPN

MPLS Concepts. Overview. Objectives

How To Design A Layered Network In A Computer Network

Contents. Foreword. Acknowledgments

Fibre Channel over Ethernet in the Data Center: An Introduction

VMware vcloud Networking and Security Overview

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Transcription:

Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960 s/70 s Layering of abstractions: Don t sweat the details of the lower layer, only deal with lower layers abstractly 1

The Internet: Virtualizing local networks 1974: Multiple unconnected networks ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network... differing in: addressing conventions packet formats error recovery routing 2

Cerf & Kahn: Interconnecting two networks ARPAnet satellite net interconnection must preserve intact the internal operation of each network.... the interface between networks must play a central role in the development of any network interconnection strategy. We give a special name to this interface that performs these functions and call it a GATEWAY.... prefer that the interface be as simple and reliable as possible, and deal primarily with passing data between networks that use different packet-switching strategies address formats is a problem between networks because the local network addresses of TCP's may vary substantially in format and size. A uniform internetwork TCP address space, understood by each GATEWAY and TCP, is essential to routing and delivery of internetwork packets. 3

Cerf & Kahn: Interconnecting two networks Internetwork layer: Addressing: Internetwork appears as a single, uniform entity, despite underlying local network heterogeneity Network of networks Gateway: Embed internetwork packets in local packet format or extract them Route (at internetwork level) to next gateway gateway ARPAnet satellite net 4

Historical Aside: Proposed Internetwork packet in 1974: local header source address dest. address seq. # byte count flag field text checksum network TCP identifier 8 16 5

Cerf & Kahn s Internetwork Architecture What is virtualized? Two layers of addressing: Internetwork and local network New layer makes everything homogeneous Underlying local network technology (cable, satellite, 56K modem) is invisible at internetwork layer 6

Resilient Overlay Networks Overlay network: Applications, running at various sites as nodes on an application-level network Create logical links (e.g., TCP or UDP connections) pairwise between each other Each logical link: multiple physical links, routing defined by native Internet routing 7

Overlay network 8

Overlay network Focus at the application level 9

What s new/what s old here? Old: We re doing routing, but at application layer (e.g., can be content-specific) New names/addresses: Internet uses IP addresses (reflecting only network physical structure), overlay can use content-specific or application-specific names/addresses Virtualizing the Internet: another layer of abstraction Tradeoffs possible: can improve routing performance not just delay/throughput but application-specific measures (e.g., content that I *want* - publish/subscribe) content matters too 10

What s new/what s old here? (cont.) Security and anonymity: easier to add at application layer? Can be used to get around congestion/bad routing in the underlay (can route differently from underlay). Can do more complex routing but lose access to underlying measures like topology, delay, QoS: lose performance (???) but gain flexibility/functionality Overlay is a single entity that combines heterogeneous underlays to provide the homogeneous overlay New data transmission functions: broadcast and multicast can be done in overlay 11

Internet Routing BGP defines routes between stub networks Berkeley.net Internet 2 UMass.net C&W Mediaone UCLA Noho.net 12

Internet Routing BGP defines routes between stub networks Berkeley.net Internet 2 UMass.net C&W UCLA Noho-to-UMass Mediaone Noho.net 13

Internet Routing BGP defines routes between stub networks Berkeley.net Internet 2 UMass.net C&W UCLA Noho-to-Berkeley Mediaone Noho.net 14

Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) UCLA Internet 2 Noho-to-Berkeley UMass.net C&W Mediaone Noho.net 15

Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) Internet 2 Noho to UMass to Berkeley Route not visible or available via BGP! MediaOne can t route to Berkeley via Internet2 C&W Mediaone UMass.net UCLA Noho-to-Berkeley Noho.net 16

RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance, reliability of routing application-layer router Two-hop (application-level) noho-to-berkeley route 17

RON Experiments Measure loss, latency, and throughput with and without RON 13 hosts in the US and Europe 3 days of measurements from data collected in March 2001 30-minute average loss rates A 30 minute outage is very serious! Note: Experiments done with No-Internet2- for-commercial-use policy -18

An order-of-magnitude fewer failures Loss Rate 10% 20% 30% 50% 80% 100% 30-minute average loss rates RON No Better Change 479 127 32 20 14 10 57 4 0 0 0 0 RON Worse 47 15 6,825 path hours represented here" 5 path hours of essentially complete outage" 16 path hours of TCP-perceived (>=30%) outage"!ron routed around all of these!! One indirection hop provides almost all the benefit!" 0 0 0 0 19

RON Research Issues How to design overlay networks? Measurement and self-configuration Understanding performance of underlying network (when to use RON) Fast fail-over (fast switching to new RON paths) Application-sensitive (e.g., delay versus throughput) path selection Effect of RON on underlying network If everyone does RON, are we better off? 20

IP-Over-ATM Classic IP only 3 networks (e.g., LAN segments) MAC (802.3) and IP addresses IP over ATM Replace network (e.g., LAN segment) with ATM network ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs 21

IP-Over-ATM app transport IP Eth phy Eth phy IP AAL ATM phy ATM phy ATM phy app transport IP AAL ATM phy 22

IP View of the world IP network ATM network 23

Classical IP-over ATM [RFC 1577] A B C D LIS 1 LIS 2 LIS 3 R1 R2 E LIS: logical IP subnet End systems in same LIS have same IP network addr LIS looks like a LAN ATM net divided into multiple LIS Intra-LIS communication via direct ATM connections How to go from IP addr to ATM addr: ATMARP resolves IP addr to ATM addr (similar to ARP) 24

Classical IP-over ATM [RFC 1577] Inter-LIS communication: A B C D E source, dest. in different LIS each LIS looks like a LAN hop-by hop forwarding: LIS 1 LIS 2 LIS 3 A-R1-R2-E R1 R2 25

NHRP (next hop resolution protocol) [RFC 2332] A NHRP server, S 1 B C D LIS 1 LIS 2 LIS 3 NHRP server, S 2 E NHRP server, S 3 Source/dest. not in same LIS: ATMARP can not provide ATM dest. address NHRP: Resolve IP-to-ATM address of remote dest. Client queries local NHRP server NHRP server routes NHRP request to next NHRP server Destination NHRP returns dest ATM address back through NHRP server chain (like routed DNS) Source can send directly to dest. using provided ATM address 26

Virtual Private Networks (VPN) VPNs Networks perceived as being private networks by customers using them, but built over shared infrastructure owned by service provider (SP) SP infrastructure: backbone provider edge devices Customer: customer edge devices (communicating over shared backbone) 27

VPN reference architecture customer edge device provider edge device 28

VPN: logical view virtual private network customer edge device provider edge device Part 1 2-29

Leased-line VPN PEs interconnected via static virtual channels (e.g., ATM VCs), leased lines customer site connects to provider edge 30

Customer premise VPN q All VPN functions implemented by customer Customer sites interconnected via tunnels q Tunnels encrypted typically q SP treats VPN packets like all other packets 31

Drawbacks Leased-line VPN: configuration costs, maintenance by SP: long time, much manpower CE-based VPN: expertise by customer to acquire, configure, manage VPN Network-based VPN Customer s routers connect to SP routers SP routers maintain separate (independent) IP contexts for each VPN Sites can use private addressing Traffic from one VPN can not be injected into another 32

Network-based Layer 3 VPNs multiple virtual routers in single provider edge device 33

Tunneling 34

VPNs: why? Security/privacy Works well with mobility: Looks like you are always at home Cost: Many forms of newer VPNs are cheaper than leased line VPN s Ability to share at lower layers Exploit multiple paths, redundancy, fault-recovery (lower layers) Need isolation mechanisms to ensure appropriate resources sharing Abstraction and manageability: All machines with addresses that are in are trusted no matter where they are 35

Network Virtualization: Vision Success of Node Virtualization a.k.a. end-host virtualization VMWare revamped server business VM = basic unit in datacenters hardly any physical resources! VM = flexible allocation, migration... Trend of Link Virtualization VLANs, VPNs, MPLS, OpenFlow,... Unified, fully virtualized networks (a.k.a. CloudNets) Combine networking with heterougeneous cloud resources (e.g., storage, CPU,...)! 36

Objectives (1) Based on layer 2: virtual network as a LAN (can experiment with new network protocols!) Today s Internet protocol stack: One size fits it all! (Narrow waist...) Not always optimal: service-tailored networks, e.g., for social networking, bulk data transfers,...? Ossification: I cannot innovate the network core! (example: introduction of IPv6, or add functionality in routers for intrusion detection systems...) Virtualization: Can migrate seamlessly (IP addresses stay!), can allocate physical resources where needed or cheap, automatic recovery and robustness,... 37

Objectives (2) Flexible spec, Goal focused migration Result Multi-provider driven Solution Resource oriented sharing QoS Precise guarantees On-demand, Blunt short duration Heterogeneous Challenging resources Assertive Service-tailored Innovation in Confident network core 38

Virtualization = Flexible Embedding CloudNet CPU, location, OS,... benefit, duration, compatibility,... Some specifications may be missing and can be optimized! bw, latency, duplex,... CPU, location, OS,... Physical Infrastructure bw, latency, duplex,... 39

Embedding: Example CloudNet 1: Computation Specification: 1. > 1 GFLOPS per node 2. Monday 3pm-5pm 3. multi provider ok CloudNet 2: Mobile service w/ QoS Specification: 1. close to mobile clients 2. >100 kbit/s bandwidth for synchronization CloudNet requests Provider 1 Provider 2 Physical infrastructure (e.g., accessed by mobile clients) 40

Use Cases VPN++ Datacenters Goal: Fully specified CloudNet mapping constraints (e.g., end-points for a telco), but with QoS guarantees (e.g., bandwidth) along links Palo Alto 1Mbit/s 1Mbit/s Berlin 1Mbit/s Tel Aviv November 22, 1pm-2pm! < 10ms > 100 MB/ s any any < 10ms > 100 MB/s < 10ms > 100 MB/s any Guaranteed resources, job deadlines met, no overhead! Cloud Bursting / Cloud Spillover/ Out-Sourcing Migration Berlin < 50ms 50 TB storage, 10 TFlops computation! Goal: Move with the sun, with the commuters, (QoS) allow for maintenance, avoiding roaming cost : e.g., SAP server, game server, small CDN server Berlin < 50ms (corporate access network) any European cloud provideer (e.g., due to legal issues?) 41

Prototype at TU Berlin! Contact us for more details! Joint project with Deutsche Telekom and NTT DoCoMo Project website: http://www.net.t-labs.tu-berlin.de/~stefan/virtu.shtml Based on VLAN technology (alternative would be OpenFlow) Embedding using linear programming (using CPLEX solvers) YouTube: http://www.youtube.com/watch?v=lljce0f1zhq&noredirect=1 42