Lecture 21, Computer Networks (198:552)

Slides:



Advertisements
Similar presentations
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Advertisements

Network Systems Sales LLC
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Ed Duguid with subject: MACE Cloud
Deployment Adavatages Provisioning time reduced to minutes, not days to weeks! Configure hardware Install OS Configure OS & Tools Assign IP Addr Configure.
Toward Practical Integration of SDN and Middleboxes
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Virtualization of Fixed Network Functions on the Oracle Fabric Krishna Srinivasan Director, Product Management Oracle Networking Savi Venkatachalapathy.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Data Center Middleboxes Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 24,
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Data Center Network Redesign using SDN
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
Software-Defined Networks Jennifer Rexford Princeton University.
In the name of God :).
Software-Defined Networking - Attributes, candidate approaches, and use cases - MK. Shin, ETRI M. Hoffmann, NSN.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Slide 1/20 "PerfSight: Performance Diagnosis for Software Dataplanes." Wu, Wenfei, Keqiang He, and Aditya Akella ACM ICM, Presented by: Ayush Patwari.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
A Better Way Huawei Financial Agile Network Solution Success Cases.
Cachebox 200 Series Performance Caching, Outstanding Value CONDUIT TECHNOLOGIES PVT.LTD.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Deep Packet Inspection as a Service Author : Anat Bremler-Barr, Yotam Harchol, David Hay and Yaron Koral Conference: ACM 10th International Conference.
Communication Needs in Agile Computing Environments Michael Ernst, BNL ATLAS Distributed Computing Technical Interchange Meeting University of Tokyo May.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
SDN & NFV Driving Additional Value into Managed Services.
What’s New in Fireware v
Xin Li, Chen Qian University of Kentucky
CompTIA Security+ Study Guide (SY0-401)
Yotam Harchol The Hebrew University of Jerusalem
Business System Development
CIS 700-5: The Design and Implementation of Cloud Networks
A Survey of Network Function Placement
Designing the Physical Architecture
Abstractions for Network Functions
Bentley Systems, Incorporated
15-744: Computer Networking
Leading New ICT, Making eFinance More Effective.
Barracuda Firewall The Next-Generation Firewall for Everyone
Authors: Justine Sherry. , Shaddi Hasan. , Colin Scott
MOBILE NETWORKS DISASTER RECOVERY USING SDN-NFV
VPN: Virtual Private Network
15-744: Computer Networking
Logo here Module 8 Implementing and managing Azure networking 1.
Presenter: Ciaran Roche
How Smart Networks are Changing Corporate Networks
Week 11 Software Defined Networking (SDN): Use-Cases
of Dynamic NFV-Policies
Project 2 Rachel Richman Gatcombe Section /17/2018 3:02 AM.
CompTIA Security+ Study Guide (SY0-401)
Network Function Virtualization: Challenges and
Cloud Computing and Cloud Networking
Software Defined Networking (SDN)
Network Optimizer Optimize Your Business & Cloud Networks
GEN: A GPU-Accelerated Elastic Framework for NFV
IS4680 Security Auditing for Compliance
VPN: Virtual Private Network
09/12/2018 Virtual Networks.
FIREWALL.
Session I Cloud Introduction Session I
NFV and SD-WAN Multi vendor deployment
Improving Performance of Network Function Virtualization System (NFV)
Jason Sones VNO North America – Nuage Networks from Nokia Sherif Awad
Presentation transcript:

Lecture 21, Computer Networks (198:552) Middleboxes Lecture 21, Computer Networks (198:552)

The Internet Textbook view: A “smooth” pipe from source to destination

The Internet Reality: Lots of “glue” Middleboxes! DDoS, mobile packet gateway, VoIP gateway, load balancer, proxy, video transcoder, VPN gateway, WAN optimizer/cache, firewall, intrusion detection system. Reality: Lots of “glue” Middleboxes!

What are middleboxes? Specialized applications Specialized appliances Security, application optimization, network management Specialized appliances Hardware boxes with custom management interfaces Thousands to millions of $$ in equipment ... and more to operate, upgrade, optimize their performance

Significant deployments in enterprises! Source: Aplomb, Justine Sherry et al., SIGCOMM ‘12

Some key concerns for operators Upgradability: hardware vs. software Expertise to operate: configure, optimize, … Monitoring: Need visibility & diagnostics Managing load: what if network traffic suddenly increases? Could really use an elastic cloud + SDN-like approach 

Example: Need for load management Source: Aplomb, Justine Sherry et al., SIGCOMM ‘12

Example: Need for better ways to use Most common causes of middlebox failure

Network Function Virtualization (NFV) Encapsulate specialized app as software network functions Run network functions inside VMs in a cluster

Benefits of NFV Easier to upgrade Easier to manage Easier to develop Regular software maintenance! Easier to manage Use server+VM management tools Easier to develop Write software instead of develop hardware Reduce costs by consolidating VMs And expand elastically as needed

NetBricks: Taking the V out of NFV Aurojit Panda et al., OSDI ’16 (ACK: Material by Aurojit Panda)