FNAL Site Perspective on LHCOPN & LHCONE Future Directions Phil DeMar (FNAL) February 10, 2014.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
T1-NREN Luca dell’Agnello CCR, 21-Ottobre The problem Computing for LHC experiments –Multi tier model (MONARC) –LHC computing based on grid –Experiment.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Trial of the Infinera PXM Guy Roberts, Mian Usman.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Transport SDN: Key Drivers & Elements
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Questionaire answers D. Petravick P. Demar FNAL. 7/14/05 DLP -- GDB2 FNAL/T1 issues In interpreting the T0/T1 document how do the T1s foresee to connect.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CD FY09 Tactical Plan Review FY09 Tactical Plan for Wide-Area Networking Phil DeMar 9/25/2008.
TCOM 515 Lecture 6.
Chapter 6: Packet Filtering
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
TeraPaths TeraPaths: establishing end-to-end QoS paths - the user perspective Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
100G R&D at Fermilab Gabriele Garzoglio (for the High Throughput Data Program team) Grid and Cloud Computing Department Computing Sector, Fermilab Overview.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Securing IPv6 Ken Renard WareOnEarth Communications, Inc.
US LHC Tier-1 WAN Data Movement Security Architectures Phil DeMar (FNAL); Scott Bradley (BNL)
LHC Open Network Environment LHCONE Artur Barczyk California Institute of Technology LISHEP Workshop on the LHC Rio de Janeiro, July 9 th,
Thoughts on Future LHCOPN Some ideas Artur Barczyk, Vancouver, 31/08/09.
Bas Kreukniet, Sr Network Specialist at SURF SARA NL-T1 Expectations, findings, and innovation Geneva Workshop 10 Februari 2014.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
Brookhaven Science Associates U.S. Department of Energy 1 Network Services BNL USATLAS Tier 1 / Tier 2 Meeting John Bigrow December 14, 2005.
INFN TIER1 (IT-INFN-CNAF) “Concerns from sites” Session LHC OPN/ONE “Networking for WLCG” Workshop CERN, Stefano Zani
Network to and at CERN Getting ready for LHC networking Jean-Michel Jouanigot and Paolo Moroni CERN/IT/CS.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
5/18/2006 Department of Technology Services Security Architecture.
Security fundamentals Topic 10 Securing the network perimeter.
Network infrastructure at FR-CCIN2P3 Guillaume Cessieux – CCIN2P3 network team Guillaume. cc.in2p3.fr On behalf of CCIN2P3 network team LHCOPN.
Point-to-point Architecture topics for discussion Remote I/O as a data access scenario Remote I/O is a scenario that, for the first time, puts the WAN.
TeraPaths: A QoS Enabled Collaborative Data Sharing Infrastructure for Petascale Computing Research The TeraPaths Project Team Usatlas Tier 2 workshop.
Brookhaven Science Associates U.S. Department of Energy 1 Network Services LHC OPN Networking at BNL Summer 2006 Internet 2 Joint Techs John Bigrow July.
Michael Ernst U.S. ATLAS Tier-1 Network Status Evolution of LHC Networking – February 10,
Ian Bird WLCG Networking workshop CERN, 10 th February February 2014
Connect communicate collaborate LHCONE European design & implementation Roberto Sabatino, DANTE LHCONE Meeting, Washington, June
Strawman LHCONE Point to Point Experiment Plan LHCONE meeting Paris, June 17-18, 2013.
David Foster, CERN GDB Meeting April 2008 GDB Meeting April 2008 LHCOPN Status and Plans A lot more detail at:
Use of Alternate Path Circuits at Fermilab {A Site Perspective of E2E Circuits} Phil DeMar I2/JointTechs Meeting Monday, Feb. 12, 2007.
A Strawman for Merging LHCOPN and LHCONE infrastructure LHCOPN + LHCONE Meeting Washington, DC, Jan. 31, 2013 W. E. Johnston and Chin Guok.
Networks ∙ Services ∙ People Mian Usman TNC15, Porto GÉANT IP Layer 17 th June 2015 IP Network Architect, GÉANT.
Run - II Networks Run-II Computing Review 9/13/04 Phil DeMar Networks Section Head.
100GE Upgrades at FNAL Phil DeMar; Andrey Bobyshev CHEP 2015 April 14, 2015.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Brookhaven Science Associates U.S. Department of Energy 1 n BNL –8 OSCARS provisioned circuits for ATLAS. Includes CERN primary and secondary to LHCNET,
LHC high-level network architecture Erik-Jan Bos Director of Network Services SURFnet, The Netherlands T0/T1 network meeting CERN, Geneva, Switzerland;
Fermilab Cal Tech Lambda Station High-Performance Network Research PI Meeting BNL Phil DeMar September 29, 2005.
Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii.
Security fundamentals
T0-T1 Networking Meeting 16th June Meeting
Troubleshooting Networked Video
Optimize your network for the cloud
CONNECTING TO THE INTERNET
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
Click to edit Master subtitle style
Introduction to Networking
Brookhaven National Laboratory Storage service Group Hironori Ito
Internet2 Tech Exchange
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
* Essential Network Security Book Slides.
IS4680 Security Auditing for Compliance
Data collection methodology and NM paradigms
an overlay network with added resources
Office 365 – How NOT to do it UKNOF43.
Presentation transcript:

FNAL Site Perspective on LHCOPN & LHCONE Future Directions Phil DeMar (FNAL) February 10, 2014

FNAL WAN Basics Aggregate WAN b/w: –8x10GE migrating to 100GE + 3x10GE –All but 2x10GE allocated for “science data” movement LHCOPN = ~17Gb/s –2x8.6Gb/s with addtl 3Gb/s for backup –Subjective evaluation: current b/w is adequate LHCONE = 10Gb/s –Subjective evaluation: current b/w is adequate E2E data circuits: –With 6 of 7 US T2s –Guaranteed 1Gb/s w/ scavenge to 10Gb/s Routinely peak at 8-9Gb/s

FNAL WAN Security Model FNAL does not have a site firewall Site security based on wide spectrum of controls –Strong auth., vulnerability scanning, ACLs, IPS, web proxy, etc By default, science data must pass thru perimeter controls Bypass exception: “Known traffic from well-managed systems at trusted sites” –Exception based on risk analysis and acceptable residual risk –Bypass implementation = policy routing ACLs on the border LHCOPN & LHCONE traffic generally via policy route ACLs No reliance on security controls of external networks –Added layer protection is nice, but not essential

FNAL Tier-1 WAN Data Path(s) Today CMS Tier-1 integrated into campus network Routed IP traffic to T1 goes thru border routers –Bypass available for identified traffic –Security controls on the rest Separate border router for science data paths: –LHCOPN & LHCONE –E2E circuits

Bypass for Science Data Networks Internal policy-based routing (PBR) creates bypass path Incoming traffic not in PBR tables forwarded to border router: –Still gets into the Tier1 –But passes through security controls 5 –Also creates WAN path asymmetry May cause firewall problem on remote end Haven’t run into actual cases of this yet Flow data monitored for non-bypass traffic from science data paths

Coming Soon: New Perimeter Architecture 100GE costs necessitate consolidating bypass router functions into border & backup border routers –Actively working on 2x100GE configuration Expect to continue efforts to separate out science data: –But using virtual separation technologies, not separate physical infrastructure 6

Tier-1 Perspective(s) - I T0  T1 data movement (LHCOPN): –Raw data movement should continue to have “preferred handling” –But doesn’t need dedicated b/w (LHCOPN isn’t a distributed DAQ) –Goal is 48hrs to tape –Even for upcoming run, 10Gb/s would be more than sufficient… T1  T1 data movement (LHCOPN): –No “preferred handling” needs, just “adequate” b/w –Currently works well soaking up available LHCOPN b/w –Large flows very intermittent & not latency sensitive T1  T2 data movement (circuits, LHCONE, other) –No “preferred handling” needs, just “adequate” b/w –Circuits (static) to US T2s work very well –LHCONE & general R&E network paths to T2s vary considerably

Tier-1 Perspective(s) - II Potential changes to LHCOPN: –Keep “preferred handling”; don’t care about implementation –Would like to have any changes implemented by 1/1/15 Building network-awareness into applications: –Willing to consider, if necessary… –But concerns about: Troubleshooting would become extremely difficult Ongoing maintenance another concern –For now, having capacious b/w available is working fine On/over the horizon WAN concerns –Impact of potential consolidation of tape archiving –How commercial cloud services would be supported –Firewall performance (100GE) issues at other sites

Summary Plan to keep current model of separating science data movement from general network traffic –Virtualized separation will be necessary (at least internally…) Would prefer to see LHC data carried on “LHC” networks –But not essential; LHC traffic on R&E routed paths will also be supported (ie., get bypass handling service) LHCOPN function should be preserved: –Implementation should evolve with technology –T2s on the LHCOPN? This is not what LHCOPN was intended for This is what LHCONE & general R&E networks are for Don’t want to act as an ISP for T2s using LHCOPN –T1 traffic on LHCOPN has worked fine, but could be moved

10 Questions ?