Applying SDN to Network Management Problems. Nick Feamster University of Maryland



Similar documents
Lithium: Event-Driven Network Control

Facilitating Network Management with Software Defined Networking

Software-Defined Network Management

The Past, Present, and Future of Software Defined Networking

Managing the Home Network

Improving Network Management with Software Defined Networking

Improving Network Management with Software Defined Networking

Pushing Enterprise Security Down the Network Stack

A Method for Load Balancing based on Software- Defined Network

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

SDN and NFV in the WAN

Securing Local Area Network with OpenFlow

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

A Study on Software Defined Networking

SDN/Virtualization and Cloud Computing

Best Practices for Outdoor Wireless Security

Network Functions Virtualization in Home Networks

Procera: A Language for High-Level Reactive Network Control

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

White Paper. Requirements of Network Virtualization

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

Testing Challenges for Modern Networks Built Using SDN and OpenFlow

Using SDN-OpenFlow for High-level Services

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

Leveraging SDN and NFV in the WAN

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

Software Defined Network (SDN)

Network Virtualization Network Admission Control Deployment Guide

Transforming Service Life Cycle Through Automation with SDN and NFV

VIA COLLAGE Deployment Guide

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

Oracle SDN Performance Acceleration with Software-Defined Networking

VMware vcloud Networking and Security Overview

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

SDN PARTNER INTEGRATION: SANDVINE

1 Network Service Development Trends and Challenges

Musings on OpenFlow and SDN. David Meyer Cisco Systems OpenFlow Symposium

CiscoWorks Internetwork Performance Monitor 4.0

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Business Cases for Brocade Software-Defined Networking Use Cases

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Ten Things to Look for in an SDN Controller

Ethernet-based Software Defined Network (SDN)

The Business Case for Software-Defined Networking

SDN and FTTH Software defined networking for fiber networks

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Customer Benefits Through Automation with SDN and NFV

How To Build A Policy Aware Switching Layer For Data Center Data Center Servers

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

How the emergence of OpenFlow and SDN will change the networking landscape

SDN, a New Definition of Next-Generation Campus Network

How the Emergence of OpenFlow and SDN will Change the Networking Landscape

Limitations of Current Networking Architecture OpenFlow Architecture

Simplifying Data Data Center Center Network Management Leveraging SDN SDN

Security improvement in IoT based on Software Defined Networking (SDN)

Ten top problems network techs encounter

Virtualization, SDN and NFV

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Benchmarking Broadband Internet Performance. Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Antonio Pescape

VIDEO STREAMING OVER SOFTWARE DEFINED NETWORKS WITH SERVER LOAD BALANCING. Selin Yilmaz, A. Murat Tekalp, Bige D. Unluturk

Software Defined Networking and Network Virtualization

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

Intelligent Routing Platform White Paper

Technical Note. ForeScout CounterACT: Virtual Firewall

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

A Link Load Balancing Solution for Multi-Homed Networks

Enterprise Broadband Customer Service Description

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu

Network Virtualization Solutions - A Practical Solution

OpenFlow Overview. Daniel Turull

Testing & Assuring Mobile End User Experience Before Production. Neotys

IP Telephony Management

OpenFlow: Enabling Innovation in Campus Networks

A Look at the New Converged Data Center

a new sdn-based control plane architecture for 5G

Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923)

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Virtualized Network Services SDN solution for enterprises

Secure Networks for Process Control

Application Note Secure Enterprise Guest Access August 2004

Software Defined Networking What is it, how does it work, and what is it good for?

Extreme Networks Security Analytics G2 Risk Manager

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Installation of the On Site Server (OSS)

Transcription:

Applying SDN to Network Management Problems Nick Feamster University of Maryland 1

Addressing the Challenges of Network Management Challenge Approach System Frequent Changes Event-Based Network Control Minimal Visibility and Control Low-Level Configuration Programmable Measurement Platform High-Level Policy Language Lithium BISmark Procera 2

Insight: Network Configuration is Really Just Event Processing! Rate limit all Bittorrent traffic between the hours of 9 a.m. and 5 p.m. Do not use more than 100 GB of my monthly allocation for Netflix traffic If a host becomes infected, re-direct it to a captive portal with software patches 3

Lithium: Event-Based Network Control Main Idea: Express network policies as event-based programs. Resonance: Inference-Based Access Control for Enterprise Networks. Nayak, Reimers, Feamster, Clark. ACM SIGCOMM Workshop on Enterprise Networks. August 2009. 4

Event-Driven Control Domains 5

Extending the Control Model Currently, OpenFlow only operates on flow properties Lithium extends the control model so that actions can be taken on time, history, and user 6

Lithium: Finite State Machine State: A set of domain values represents a state. Representation of network state. Events: Event-driven control domains invoke events, which trigger state transitions in the controller s finite state machine. Intrusions Traffic fluctuations Arrival/departure of hosts 7

Lithium: Dynamic Event Handler Reacts to domain events Determines event source Updates state based on event type Can process both internal and external events 8

Two Real-World Deployments Access control in enterprise networks Re-implementation of access control on the Georgia Tech campus network Today: Complicated, low-level With SDN: Simpler, more flexible Usage control in home networks Implementation of user controls (e.g., usage cap management, parental controls) in home networks Today: Not possible With SDN: Intuitive, simple 9

Example from Campus Network: Enterprise Access Control 7. REBOOT Switch 3. VLAN with Private IP 1. New MAC Addr 2. VQP New Host 6. VLAN with Public IP VMPS 4. Web Authentication 5. Authentication Result Web Portal 10

Problems with Current Approach Access control is too coarse-grained Static, inflexible and prone to misconfigurations Need to rely on VLANs to isolate infected machines Cannot dynamically remap hosts to different portions of the network Needs a DHCP request which for a windows user would mean a reboot Monitoring is not continuous Express policies that incorporate network dynamics. 11

Lithium State Machine for Campus Network Registration Infection removed or manually fixed Failed Authentication Quarantined Successful Authentication Authenticated Clean after update Vulnerability detected Operation 12

Deployment: Campus Network Software-defined network in use across three buildings across the university Redesign of network access control Also deployed at other universities 13

Example From Home Networks: Usage Control Network management in homes is challenging One aspect of management: usage control Usage cap management Parental control Bandwidth management Idea: Outsource network management/control Home router runs OpenFlow switch Usage reported to off-site controller Controller adjusts behavior of traffic flows 14

Deployment: Home Networks User monitors behavior and sets policies with UI Lithium controller manages policies and router behavior 15

Network Management Challenges Challenge Approach System Frequent Changes Event-Based Network Control Minimal Visibility and Control Low-Level Configuration Programmable Measurement Platform High-Level Policy Language Lithium BISmark Procera 16

Little Visibility Into Performance Access ISPs What performance are customers seeing? Can they gain better visibility into downtimes? Can visibility into problems help reduce service calls? Content Providers How do content routing or traffic engineering decisions affect end user performance Also, consumers and regulators 17

Making the Web Faster (Why Latency Matters) Latency can dominate page load times, especially for service plans with higher throughput. 18

Where Programmability in the Home can Help Reconfiguration of the home network in response to different conditions (e.g., traffic shaping) Proactively (and programmatically?) prefetching and caching content, before the last mile. Triggered on-demand measurements (e.g., from content providers, ISPs, etc.) 19

Programmable Traffic Shaping Intermittent or shaped traffic can achieve same levels of throughput, without incurring high latency 20

Programmable Caching Proactively caching content, connections, and DNS lookups can reduce page load times by 80%. Even caching connections alone can reduce page load times by 40%. 21

Network Management Challenges Challenge Approach System Frequent Changes Event-Based Network Control Minimal Visibility and Control Low-Level Configuration Programmable Measurement Platform High-Level Policy Language Lithium BISmark Procera 22

Language Design Requirements Declarative Reactivity: Describing when events happen, what changes they trigger, and how permissions change over time. Expressive and Compositional Operators: Building reactive permissions out of smaller reactive components. Well-defined Semantics: Simple semantics, simplifying policy specification. Error Checking & Conflict Resolution: Leveraging well-defined, mathematical semantics. 23

Procera Highlights Flow constraint functions that the network controller uses to constrain its own behavior Functional reactive programming: Declarative, expressive, compositional framework to describe reactive and temporal behaviors Customizable with a collection of primitive event streams 24

Procera System Architecture Lowest layer: Programmable Switches Control layer: Control and data Policy layer: Supervisor role Process input signals Events to network controllers 25

Why Procera? Example: Ban a device if its usage over the last five days exceeds 10 GB. Can t express this in existing languages, since FML doesn t incorporate usage data, provide arithmetic operations. So, extend FML with inequalities and a usage predicate? But, what about permanent bans? Requires another predicate! 26

Procera: Functional Reactive Programming Users describe time-varying values by describing how their current value depends on event histories and other values Three components Signals, functions, and events Windowing and aggregation Input signals and flow constraints 27

Constructs: Windowing & Aggregation 28

Procera Constraints Allow: Forward the packet Deny: Do not allow the packet Rate limit: Rate limit to a given rate Redirect: Send to a specified host Compose: Constrain the flow according to multiple constraints 29

Procera Examples Static Policy Device Registration 30

Summary Network management is difficult, and only becoming more difficult (and more important) Software-defined networking has made it possible to refactor network control We are exploring how to use SDN to simplify network management tasks Lithium: Event-based network control BISmark: Improved visibility and performance Next steps: Languages 31