Authors: Justine Sherry. , Shaddi Hasan. , Colin Scott

Slides:



Advertisements
Similar presentations
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Advertisements

Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Data Center Middleboxes Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 24,
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
CH2 System models.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
Slide 1/20 "PerfSight: Performance Diagnosis for Software Dataplanes." Wu, Wenfei, Keqiang He, and Aditya Akella ACM ICM, Presented by: Ayush Patwari.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
DISA Cyclops Program.
Xin Li, Chen Qian University of Kentucky
Chapter 6: Securing the Cloud
Lab A: Planning an Installation
Optimize your network for the cloud
Barracuda Firewall The Next-Generation Firewall for Everyone
Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes
Content Distribution Networks
Martin Casado, Nate Foster, and Arjun Guha CACM, October 2014
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Internet and Intranet.
Network Address Translation
Planning and Troubleshooting Routing and Switching
Principles of Network Applications
15-744: Computer Networking
2TCloud - Veeam Cloud Connect
How Smart Networks are Changing Corporate Networks
Introducing To Networking
The NPD Group - Enterprise DC Agenda
Firewalls.
Chapter 21: Cloud Computing and Related Security Issues
Hiding Network Computers Gateways
Chapter 22: Cloud Computing Technology and Security
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
Internet and Intranet.
6.6 Firewalls Packet Filter (=filtering router)
ECE 671 – Lecture 16 Content Distribution Networks
Module 5 - Switches CCNA 3 version 3.0.
Distributed Content in the Network: A Backbone View
Network Function Virtualization: Challenges and
Design Unit 26 Design a small or home office network
Network Optimizer Optimize Your Business & Cloud Networks
Design Unit 26 Design a small or home office network
Content Distribution Networks
Cloud computing mechanisms
AWS Cloud Computing Masaki.
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Internet and Intranet.
Cloud Computing Architecture
Specialized Cloud Architectures
Lecture 21, Computer Networks (198:552)
Amazon AWS Certified Solutions Architect Professional solutions-architect-professional-practice-test.html.
Dynamic WAN Selection Optimize Your Business & Cloud Networks
EE 122: Lecture 22 (Overlay Networks)
OpenSec:Policy-Based Security Using Software-Defined Networking
Internet and Intranet.
NFV and SD-WAN Multi vendor deployment
Presentation transcript:

Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service Authors: Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†, Sylvia Ratnasamy*, and Vyas Sekar‡ Reviewer: Tiancheng Huang

What is middlebox? A middlebox or network appliance is a computer networking device that transforms, inspects, filters, or otherwise manipulates traffic for purposes other than packet forwarding Middleboxes offer valuable benefits, such as improved security (e.g., firewalls and intrusion detection systems), improved performance (e.g., proxies) and reduced bandwidth costs (e.g., WAN optimizers)

Middleboxes Today A survey of 57 enterprise network administrators about middlebox deployments The deployments are very large The average very large network 1946 total middleboxes; the average small network 10.2 total middleboxes. The deployments are costly, requiring high up-front investment in hardware The deployments are diverse: causing complexity in management & incuring substantial operational expenses Even small networks with only tens of middleboxes typically required a management team of 6-25 personnel Administrators have to deal with Overload and Failures

Recap How can we improve this? High Capital and Operating Expenses Time Consuming and Error-Prone Physical and Overload Failures How can we improve this?

APLOMB: Appliance for Outsourcing Middleboxes Outsourcing the processing of enterprises‘ traffic to third-party middlebox service providers running in the cloud.

A move to the cloud Cloud outsourcing can cut costs by leveraging economies of scale, simplify management for enterprise administrators, and can provide elastic scaling to limit failures. High Capital and Operating Expenses Provides Economies of scale and pay-per use Time Consuming and Error-Prone Simplifies configuration and deployment Physical and Overload Failures Redundant resources for failover (fault tolerance) & Autoscaling

Key challenges for outsourcing Middleboxes with APLOMB Redirection of traffic What redirection architecture is required to retain the functional equivalence and low latency operation; e.g., ensuring that both directions of traffic between a and b via the cloud consistently traverse the same cloud point-of- presence (POP) Minimizing Latency Location Dependent Services

Redirection We consider three natural approaches for redirecting the traffic to the cloud for middlebox processing Bounce Redirection IP Redirection DNS Redirection

Bounce Redirection Incoming traffic is bounced to the cloud PoP (1), processed by middleboxes, and then sent back to the enterprise (2,3). Outgoing traffic is similarly redirected (4-6). Immediate drawback : increase in end-to-end latency But very simple! Only the APLOMB gateway needs to be cloud-aware and no modification is required to existing enterprise applications

IP Redirection To avoid the extra round-trips latency, we can route traffic directly to/from the cloud Enterprises may want to redirect through several of the cloud provider’s datacenters for improved latency, load distribution, and fault tolerance The cloud provider might advertise P from multiple PoPs so that client traffic is effectively anycasted to the closest PoP. IP-based redirection in a multi-PoP scenario cannot ensure that traffic from a client a to enterprise b will be routed to the same cloud PoP as that from b to a

DNS redirection To allow redirection using multiple cloud PoPs, we can rely on DNS- based redirection similar to its use in CDNs The cloud provider runs DNS resolution on the enterprise’s behalf and registers DNS names for the client’s external services Ensures that traffic between the enterprise and an external host will always traverse the same cloud PoPs

Minimizing Latency Smart Redirection Provider Footprint analyze how the middlebox provider’s choice of geo-graphic footprint impacts latency

Smart Redirection Idea: redirect traffic not through the cloud PoP with the minimum RTT to and from the enterprise, but redirect traffic on a per-destination basis through the PoP that minmizes end-to-end latency

Provider Footprint Analyze how the middlebox provider’s choice of geo- graphic footprint impacts latency Amazon-like clouds: tens of global PoPs Akamai-like middleboxes provider: thousands of vantage points Conclusion: an Amazon-like footprint of a few tens of PoPs can service most customers with most types of middleboxes.

APLOMB architecture Three key components (1) A APLOMB gateway to redirect enterprise traffic (2) Cloud provider (3) A control plane which is responsible for managing and configuring these components

APLOMB gateway logically co-located with the enterprise’s gateway router Two key functions (1) maintaining persistent tunnels to multiple cloud PoPs (2) steering the outgoing traffic to the appropriate cloud PoP. The gateway registers itself with the cloud controller which supplies it with a list of cloud tunnel endpoints in each PoP and forwarding rules for redirection.

Cloud Functionality Core components: Tunnel Endpoints to encapsulate/decapsulate traffic from the enterprise Middlebox Instances to process the customers’ traffic NAT Devices to translate between publicly visible IP addresses and the clients’ internal addresses. Policy switching logic to steer packets between the above components.

Control Plane Design principle: to keep the new components introduced by the architecture as stateless as possible APLOMB Control Plane manages the relevant network state Determining optimal redirection strategies between communicating parties, Managing and pushing middlebox policy configurations, and Dynamically scaling cloud middlebox capacity to meet demands.

Control Plane(cont) What control plane do? sends periodic ‘heartbeat’ health checks to each device gathers RTTs from each PoP to every prefix on the Internet (for PoP selection) and utilization statistics from each middlebox (for adaptive scaling). Redirection Optimization pushes the current best tunnel selection strategies to the APLOMB gate by Using measurement data from the cloud PoPs Middlebox Scaling detects changes in utilization using data from heartbeat health checks to automatically scale out or scale in

EVALUATION APLOMB is practical ! Application Performance Measures three kinds of app: HTTP Page Loads, BitTorrent, Voice over IP Conclusion: suffer little or no penalty when their traffic is redirected through APLOMB Scaling and Failover Once a new middle- box instance has been allocated and initialized, actual switchover time to begin routing traffic through it is less than 100ms APLOMB is practical !

Conclusion Outsourcing middlebox processing to the cloud relieves enterprises of major problems caused by today’s enterprise middlebox infrastructure: cost, management complexity, capacity rigidity, and failures APLOMB succeeds in outsourcing the vast majority of middleboxes from a typical enterprise network without impacting performance, making scalable, affordable middlebox processing accessible to enterprise networks of every size

Thank you