Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Advertisements

PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
DOT – Distributed OpenFlow Testbed
Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat Department.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
Scalable Network Virtualization in Software-Defined Networks
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Data Center Network Redesign using SDN
Chapter 4: Managing LAN Traffic
Chapter 6: Packet Filtering
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Windows Server 2012 Hyper-V Networking
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
Switching Topic 2 VLANs.
The Goals Proposal Realizing broadcast/multicast in virtual networks
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
VL2: A Scalable and Flexible Data Center Network
Security fundamentals
CCNA Practice Exam Questions
Scaling the Network Chapters 3-4 Part 2
CIS 700-5: The Design and Implementation of Cloud Networks
Exploiting Layer 2 By Balwant Rathore.
Software defined networking: Experimental research on QoS
Virtual Local Area Networks or VLANs
Instructor Materials Chapter 6: VLANs
Instructor Materials Chapter 5: Ethernet
Selecting Unicast or Multicast Mode
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Objective: ARP.
ISO/OSI Model and Collision Domain
Chapter 4 Data Link Layer Switching
Chapter 5: Inter-VLAN Routing
Virtual LANs.
Net 323: NETWORK Protocols
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
Direct Attached Storage and Introduction to SCSI
Ethernet Network Systems Security
Indigo Doyoung Lee Dept. of CSE, POSTECH
Routing and Switching Essentials v6.0
CCNA Routing and Switching Routing and Switching Essentials v6.0
Access Control Lists CCNA 2 v3 – Module 11
Network Virtualization
NTHU CS5421 Cloud Computing
2018/12/10 Energy Efficient SDN Commodity Switch based Practical Flow Forwarding Method Author: Amer AlGhadhban and Basem Shihada Publisher: 2016 IEEE/IFIP.
Implementing an OpenFlow Switch on the NetFPGA platform
Chapter 3 VLANs Chaffee County Academy
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Scaling the Network: The Internet Protocol
Ch 17 - Binding Protocol Addresses
MICROSOFT NETWORK VIRTUALIZATION
Elmo Muhammad Shahbaz Lalith Suresh, Jennifer Rexford, Nick Feamster,
Presentation transcript:

Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes Efficient Virtual Network Isolation in Multi-Tenant Data Centers on Commodity Ethernet Switches Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes

Problem I want IP 192.168.0.1 I want IP 192.168.0.1 commodity switch

Introduction Ideally, except for specific interconnection agreements, traffic from one tenant‘s VMs should never be visible to other tenants‘ VMs Only that tenant‘s traffic should be able to reach his VMs IaaS providers must provision network resources to garantee isolation between customer networks

Virtualization Server Virtualization Server Data center set up VM 1A VM 2A VM 3A Open vSwitch VM 1B VM 2B VM3B Tenant 1 Tenant 2 Logical plane Tenant 3 Users Physical plane commodity switch Virtualization Server Host B Virtualization Server Host A

Network isolation approaches Extra header Packet tagging with additional packet headers VLANs, QinQ Tunneling Packets transported inside other packets Total control over transport’s packet header Fragmentation Packet rewriting

LANES We propose LANES, a system that: Provides arbitrary virtual network topologies Ensures isolation between tenants Uses commodity switches Is free of encapsulation overheads

LANES set up Follows SDN paradigm Requires no physical changes VM 1A Open vSwitch VM 1B VM 2B VM3B Open vSwitch ETHERNET NETWORK Follows SDN paradigm Requires no physical changes

How LANES works LANES associates a flow identifier to the traffic between each pair of communicating VMs Flow IDs are generated on demand when VMs start communicating and need to be unique only between pairs of servers As Ethernet switches forward packets based on MAC addresses alone, LANES uses the source and destination IP addresses to store flow identifiers.

Packet rewriting Traffic of VMs go through the physical network are rewritten to hide source and destination MAC and IP addresses Each VM interface has a unique IP assigned to it that is associated with its virtual switch It is used in the rewriting SDN rules Openstack and its tenants are unaware of this IP because packets are modified when they leave a host and when they arrive at another

How LANES works Source MAC: Ms Dest MAC: Mr Source IP: 10.0.0.1 Dest IP: 10.0.0.1 MAC Addresses of the OvS Switches LANES Flow ID Rewriting flow rules applied by OvS switch on source virtualization host Source MAC: Mu Dest MAC: Mw Source IP: 192.168.0.1 Dest IP: 192.168.0.2 Packet sent through physical network Source MAC: Mu Dest MAC: Mw Source IP: 192.168.0.1 Dest IP: 192.168.0.2 Rewriting flow rules applied by OvS switch on destination virtualization host Source MAC: Ms Dest MAC: Mr Source IP: 10.0.0.1 Dest IP: 10.0.0.1

How LANES works

Types of traffic Traffic within a host Authorized traffic between VMs located on the same host is forwarded without modification and no packet rewriting is performed

Types of traffic Between hosts When LANES identifies that a packet‘s destination VM runs on a different host, LANES allocates any unused Flow ID to the pair of communicating VMs Flow rules rewrite packet headers before they are transmited through the physical network Flow rules in the destination server recover packet‘s original headers

Types of traffic ARP Queries LANES has all information about the interfaces used by Openstack VMs, including IP, MAC and Network of each one ARP Requests are intercepted by LANES, MAC addresses requested are looked up by the controller in its database and the response is returned only to the requester

Types of traffic IP broadcast Broadcasts packets need to be delivered to all ports allocated on the network of a tenant These networks may span across multiple hosts LANES delivers broadcasts messages to all ports of the network inside the host and rewrites them as unicast packets to be sent to other hosts which also have VMs on the same network Other hosts rewrite back the received packets into broadcast and deliver them to the local ports

Types of traffic External networks LANES generates external flow identifiers for packets between VMs and external IP addresses To avoid generating one flow identifier whenever a VM connects to a different external IP address, external flow identifiers overwrite the source IP address of outbound packets and the destination IP address of inbound packets LANES keeps the external IP address untouched when rewriting inbound and outbound packets

Implementation LANES prototype works on top of OpenStack using the POX SDN controller The virtual network topologies are created using OpenStack‘s Neutron module

Implementation Changes in the virtual networks topology are propagated by Neutron to LANES which can reconfigure Open vSwitches as necessary When a virtualization host boots, its Open vSwitch instance contacts the LANES controller, which configures that instance and adds it to its database

And does it work? What was tested? Network isolation Latency Physical address resolution (ARP) Configuration latency Communication latency after configuration Bandwidth Broadcast latency Controller load under heavy load of new flows

System Evaluation We considered three different software stacks for the evaluation: LANES with POX module L2 switch from POX, which is offered as a reference, indicated as POX+L2 OvS switch as a simple L2 switch, without isolation or an OpenFlow controller

System Evaluation Testing environment A physical infrastructure corresponding to part of the infrastructure of an IaaS provider was build to validate LANE‘s operation One switch for OpenStack control communications, to access the datacenter network, to communicate with the POX controller, and to exchange traffic with the Internet One switch for traffic between virtual machines

Testing network isolation Are the networks protected? ICMP packets were sent to all IPs of the local area network Bandwidth tests were executed while the network was under attack

Testing network isolation LANES OvS and POX+L2

Testing network isolation

Testing MAC address resolution latency How much time does it take to resolve the MAC address of a VM? And during an attack?

Testing MAC address resolution latency LANES OvS POX+L2

Testing flow configuration latency How long does it take for the first packet to leave a VM, be received by the destination and the response return?

Testing flow configuration latency Same server Between servers

Testing estabilished flows latency What is the delay after the forwarding rules are installed into the switches? This is the state where the communication will effectively occur

Packet latency in milliseconds Testing estabilished flows latency Packet latency in milliseconds

Testing bandwidth What is the maximum bandwidth available between VMs? Inside the same virtualization server When the traffic flows through the physical network

Available bandwidth in Gbps Testing bandwidth Available bandwidth in Gbps

Testing scalability Evaluate the controller capacity in dealing with heavy bursts of new flows Measurement of multiple parameters CPU, latency, bandwidth and number of new flows

Testing scalability Bandwidth capacity between VM1 and VM3 Latency between VM1 and VM2 New flows bursts originated on VM4

Testing scalability

Conclusions LANES ensures isolation between virtual networks Packet rewrite hides tenants’ traffic from the physical network LANES can be effective in protecting the network from DoS attacks within the datacenter network

Conclusions LANES does not require advanced features and works on top of commodity Ethernet switches LANES requires no modification to hosted VMs Puts no restrictions on VM IP addresses Does not incur encapsulation overhead

Thank you.

OpenStack Architecture http://docs.openstack.org/security-guide/content/ch031_neutron-architecture.html

OpenFlow versions Ren, Tiantian, and Yanwei Xu. "Analysis of the New Features of OpenFlow 1.4." 2nd International Conference on Information, Electronics and Computer. Atlantis Press, 2014.

Packet rewriting example

Packet rewriting example

Related Work

Tenant’s demands Efficiency Flexibility Freedom Isolation of other tenants It is easy to isolate CPU, memory and storage Network is not