Challenges for enabling Cloud



Similar documents
IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Introducing Basic MPLS Concepts

Virtual Private Networks. Juha Heinänen Song Networks

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS multi-domain services MD-VPN service

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Quidway MPLS VPN Solution for Financial Networks

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

SBSCET, Firozpur (Punjab), India

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

How To Provide Qos Based Routing In The Internet

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

SIP-based service virtualization for future IT services and applications over high speed optical networks

End-to-End Quality-of-Service Support in Next Generation Networks with NSIS

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Session Border Controllers in Enterprise

Service-Oriented Architectures

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Network Virtualization Network Admission Control Deployment Guide

OpenNaaS based Management Solution for inter-data Centers Connectivity

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Project Report on Traffic Engineering and QoS with MPLS and its applications

Cisco IP Solution Center MPLS VPN Management 5.0

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Table of Contents. Cisco Configuring a Basic MPLS VPN

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Juniper Networks NorthStar Controller

IP/MPLS Network Planning, Design, Simulation, Audit and Management. Dave Wang, WANDL

Cisco Active Network Abstraction 4.0

MPLS is the enabling technology for the New Broadband (IP) Public Network

4 Internet QoS Management

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Interconnecting Data Centers Using VPLS

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Junos MPLS and VPNs (JMV)

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

November Defining the Value of MPLS VPNs

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Relationship between SMP, ASON, GMPLS and SDN

SSVVP SIP School VVoIP Professional Certification

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania

Corporate Network Services of Tomorrow Business-Aware VPNs

a new sdn-based control plane architecture for 5G

Service-Oriented Architecture and Software Engineering

Definition. A Historical Example

A Proposed Model For QoS guarantee In IMSbased Video Conference services

Private IP Overview. Feature Description Benefit to the Customer

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

MPLS over Various IP Tunnels. W. Mark Townsley

A Network Management Framework for Emerging Telecommunications Network.

Internet Protocol: IP packet headers. vendredi 18 octobre 13

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

Multi-protocol Label Switching

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Ethernet over MPLS tests

SSVP SIP School VoIP Professional Certification

MPLS L2VPN (VLL) Technology White Paper

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Analysis of IP Network for different Quality of Service

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Introduction to MPLS-based VPNs

Addressing Inter Provider Connections With MPLS-ICI

Virtual Private LAN Service

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Grid Computing Vs. Cloud Computing

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Review: Lecture 1 - Internet History

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

An Architecture for Application-Based Network Operations

Trust areas: a security paradigm for the Future Internet

Telecom. White Paper. Inter-SDN Controller Communication: Using Border Gateway Protocol

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

NGN Network Architecture

Transcription:

Scuola Superiore Sant Anna Challenges for enabling Cloud Computing over optical networks Piero Castoldi, Barbara Martini, Fabio Baroncelli Workshop Grid vs Cloud Computing and Why This Should Concern the Optical Networking Community OFC/NFOEC 2009 March 22-26, 2009 - San Diego, USA

Outline Introduction and concepts Challenges Resource virtualization Service Abstraction ti User-driven service delivery Security Conclusion 2/20

The network as a service paradigm Cloud Computing is a general paradigm of operation where the capabilities of an ICT infrastructure (e.g., computation, storage, servers, connectivity) are consumed as a service. Users are able to access ICT capabilities from the Internet (i.e., "the cloud") without t knowledge of and control over the technology infrastructure that supports them. According to the network-as-a-service (NaaS) paradigm, the network should support useroriented capabilities 3/20

User-oriented network capabilities Cloud computing will require dynamic complex service set-up and tear down with strict requirements (e.g. content streaming are with adequate bandwidth, delay and jitter and performance of streaming server) User???? Edge Nod e Client Request Format: Disney, Wall E (Session, Server Location) HD Movie (Bandwidth) Good Quality (QoS) Network Directives Format: mpls { traffic engineering bgp igp both ribs; no cspf; label switched path to R2{ to 10.20.0.1; install 10.20.12.0/24 active; bandwidth 10m; } Triggering g of network services in transport network is available via network technology-dependent interfaces (e.g. the User to Network Interface), but network has a different grain in service description with respect to an application intimate knowledge of the network technology is required no mechanism is available for coordinating set-up of complex private networks What is needed: a provisioning framework operating at a level 4/204 of abstraction suitable for being invoked directly by an application

Concepts (1) Network resource a network capability of supporting (set-up, configure, monitor, tear- down) the forwarding of data, possibly across multiple nodes, according to a certain encapsulation (e.g. a MPLS L2 LSP) Non-network network (or IT) resource a data processing capability over the payload of a data flow, realized in software or in hardware in a network node (e.g. a random access memory) Network service a service, described in a technology-independent way that, leveraging on network resources, offers connectivity capabilities, directly or indirectly, to the customers applications (e.g. a L2 VPN) Non-network service a service, described in a technology-independent way, that leveraging on an IT resources offers a data manipulation capability (e.g. a storage service). 5/20

Concepts (2) Virtualization of resources capability to hide the network resource technology details to an application Service abstraction capability to map the set of high-level parameters specified by an application, into a set of specific parameters used by the network for the provisioning of that service. The process of service abstraction requires virtualization of resources: Resources on a network are made available as independent services that can be accessed without knowledge of their underlying technical implementation. Services are defined through an ontology language to facilitate their composition. Semantic rules can be defined to compose or orchestrate services 6/20

Cloud computing and optical networks Cloud Computing can benefit from ultra high-capacity optical network connectivity, if optical networks are adapted to support user-oriented capabilities: Service control signaling, i.e., signaling for session control among end-user applications including message exchange for session state monitoring, resource negotiation and media transfer control. Resource control signaling, i.e., signaling for resource control for the purpose of a consistent end-to-end resource reservation leveraging on the Control Plane, serving for: resource and admission control network attachment functions (e.g., auto-discovery of border network topology) 7/20

Challenges Resource virtualization Joint virtualization of IT and network resources Network resource discovery and virtualization at the network boundary Service abstraction: Service exposition for bridging i applications and CP-enabled Optical Network User-driven service delivery On-demand service triggering Security AAA in multi-operator scenario and distributed environment Advanced mechanisms for user access control 8/20

Network resources Service concept Requesting application Grid computing Capability to transfer a specific type of data traffic generated by a customer network: Traffic transparency QoS support Advanced mesh connectivity (e.g. L1/L2/L3 VPN, VPLS) E-science applications TE/Management application (OSS) Cloud computing Capacity to match application request to network resource availability and accordingly affect network resource status: Traffic enforcement on per-flow basis QoS guarantees End-to-end resource control Multimedia applications Virtual terminal applications Service request QoS-enabled connectivity set-up in Assured data transfer among endhosts WAN context Service Coarse grain (GB up to TB) Fine grain (100 s MB) granularity 9/20

Non-network (IT) resources IT Resources are more difficult to be described than network resources IT resources are more heterogeneous and may lack of a relation of hierarchy Some virtualization efforts exist but solutions are heterogeneous (e.g. naming for addressing: Universal Unique Identifier, Universal Resource Identifier, etc) An adequate, typically complex, information i model is needed to handle IT resource (discover, publish, etc) Some applications, e.g. grid, already have a well established IT resources virtualization mechanism that do not involve provider networks at all. 10/20

Virtualization of resources and service abstraction (1) Control Plane-enabled optical transport networks Approach based on the introduction of a Service Plane: Fill the informational-gap i between the Application-Layer i (Service Control Function) and the Network-Layer Decouples network technologies from future evolution of the network services Composes and orchestrates the connectivity service provided by the CP at the boundary of the Transport Network via CMI (Control-Plane Management Interface) Defines a technology-independent network service definition at a level of abstraction suitable for being invoked by an application via USI (User-to- Service Interface). F. Baroncelli, B. Martini, V. Martini, P. Castoldi, "A distributed signaling gfor the provisioning of on-demand VPN services in transport networks" Proc. of IM 2007, May 2007, Munich, Germany. B. Martini, V. Martini, F. Baroncelli, K. Torkman, P. Castoldi, Application-driven Resource Management in Multi-Service Optical Networks, Journal of Optical Communications and Networking, June 2009, to appear 11/20

Virtualization of resources and service abstraction (2) Fully distributed and technology-independent approach based on a Service Plane that supports on-the-fly invocation of services Populated by asetof distributed entities that inter-communicate via dedicate signalling g using XML messages Two main procedures are envisioned: The Background Signalling The Service Provisioning Signalling The Service Control Function (SCF) Actsasagateway Request Network services The Centralized Service Element (CSE) Verifies the SCF identity (Client Authentication) Controls the access (Service Authorization); The Distributed Service Element (DSE) Handles multiple service requests Composes the Network-Services Performs technology-specific configurations on controlled PEs using the BNS module The Broker Network Server (BNS) Performs configuration of devices via Control Plane Management Interface (CMI) 12/20

Network topology virtualization Background Signalling: Collects and abstracts Network status Update the NR-DB within the DSEs Is Continuously repeated in background at regular intervals 1 - Network Resource Discovery phase (arrow 1, 2): DSEsgathers at regular intervals the information 2 - Service Abstraction phase: DSEs map technology-dependent into technologyindependentinformationandstoresitinthe NR-DB 3 - Information Distribution phase (arrow 3, 4): DSEs distribute information to CSE module (CSE acts as a Database Reflector of the overall knowledge of Network) 13/20

On-demand service triggering The Service Provisioning Signalling is responsible of the actual service provisioning is triggered by a service request issued by a SCF to a DSE 1 - The DSE-master receives a Network- Service request from an SCF [Authorization] A messages exchange occurs between DSE and CSE 2 - The DSE elaborates and distributes directives to the relevant DSEs [*] DSEs-slave execute service commands coming from a DSE-master. 3-EachDSEmapdirectiveinasetof CMI Network primitives to its controlled PEs (3). [Ack] Collects and elaborates the response from the PE [Ack] DSEs-slave send a reply-message to report the established service [Ack] to SCF 14/20

Security security at application layer protection ti against unauthorized access to application platforms (e.g., server, data base or web portal) for corruption of information, interruption of service security at service (control) layer protection against unauthorized access to service control element (e.g., SIP proxy, HSS), to subscriber be information o (e.g., user and service profiles for identity theft), network provider information (e.g., repository with routing, numbering and addressing information) security at (transport) network layer protection against unauthorized access to network elements (e.g., IP routers, MPLS nodes), to transport control information (e.g., OSPF, ebgp), to transport t user profile information (e.g., DSL subscription data repository, user location information) 15/20

Authorization Authorization mechanisms are categorized as: Authentication-based mechanisms which assign asetof rights based on the (authenticated) user identity Credentials-based (a.k.a. role-based) mechanisms, which assign a set of rights based on trustworthy information (i.e., credentials) being held by the user Role-based Authorization process is composed of two phases: Based on user credentials, the resource provider deduce the level of trust it can place in him and consequently assign a (set of) role(s) Based on the role, the authorization engine identifies and enforces a policy determine the set of actions the user is allowed to perform verify if the user is allowed to perform the required action on the resource 16/20

Traditional vs. advanced access control In traditional access control The decision process is based on the identity or the role of users that t are registered with the Administrative i ti Domain The policy rules are static, i.e., changed only through administrative actions, typically performed by human operator In a multi-domain scenario the user may be unknown in the Administrative Domain of the resource provider resource access rights may be revoked or may expire Role-based Access Control Traditional techniques Role-based Advanced Trust Management Usage CONtrol techniques 17/20

Trust management Trust definition: Trust of a party A in a party B for a service X is the measurable belief of A in B behaving dependably for a specified period within a specified context in relation to X... [Dimitrakos, 2001] Trust Management definition: iti Technique to make decisions about the dependability of transactions involving risk in a situation of uncertainty Role-Based Trust Management: A subject has (a set of) roles in each Administrative Domain to which he belongs A set of access rules define the relations among Administrative Domains and are used to combine credentials and obtain new roles for the same subject in Administrative Domain to which he does not belong. 18/20 [Blaze96] M. Blaze, J. Feigenbaum, J. Lacy. Decentralized Trust Management. In 17th Symposium on Security and Privacy (pp. 164-173). IEEE Computer Society. 2006

Usage Control Model Subjects: entities that perform actions on Objects Characterized by attributes: Identity; Role; Reputation; Credits; Objects: entities that are used by Subjects. Characterized by attributes: Value; Role permission; The decision process is based on: Authorizations Obligations Conditions after checking subject/object attributes Continuity of decisions pre-decision ongoing-decisions before usage ongoing usage after usage pre-updates ongoing updates post-updates Mutability of attributes time J. Park, R. Sandhu. The h UCON Usage Control Model, ACM Trans. On Information and System Security, 7(1), 2004. 19/20

Conclusion Re-use of many concepts coming from grid for enabling cloud computing Production networks not designed to support cloud computing Optical networks can be good candidate because they are CP-enabled abed From security to trustworthiness 20/20

Thank you E-mail: castoldi@sssup.it it ola Superiore Sant Anna, CNR research area, Via Moruzzi 1, 56124 Pisa, Italy 21/20