Design and Implementation of a Consolidated Middlebox Architecture 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.

Slides:



Advertisements
Similar presentations
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
Advertisements

©2010 This information is highly confidential and subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Introducing Campus Networks
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Toward Practical Integration of SDN and Middleboxes
SIMPLE-fying Middlebox Policy Enforcement Using SDN
Toward Practical Convergence of Middleboxes and Software-Defined Networking Vyas Sekar Joint work with: Seyed Kaveh Fayazbakhsh, Zafar Qazi, Luis Chiang,
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Virtualization of Fixed Network Functions on the Oracle Fabric Krishna Srinivasan Director, Product Management Oracle Networking Savi Venkatachalapathy.
Making Cellular Networks Scalable and Flexible Li Erran Li Bell Labs, Alcatel-Lucent Joint work with collaborators at university of Michigan, Princeton,
Performance Evaluation of Open Virtual Routers M.Siraj Rathore
Software Defined Networking COMS , Fall 2013 Guest Speaker: Seyed Kaveh Fayazbakhsh Stony Brook University 11/12/2013: SDN and Middleboxes.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
15-744: Computer Networking
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
The Multikernel: A new OS architecture for scalable multicore systems Andrew Baumann et al CS530 Graduate Operating System Presented by.
Towards Virtual Routers as a Service 6th GI/ITG KuVS Workshop on “Future Internet” November 22, 2010 Hannover Zdravko Bozakov.
Chapter 8 Hardware Conventional Computer Hardware Architecture.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Figure 1.1 Interaction between applications and the operating system.
1 A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley.
ECE 526 – Network Processing Systems Design
15-744: Computer Networking L-7 Software Forwarding.
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
1 Restricted to Nortel Networks Internal Review Ebusiness Infrastructure Platform.
Virtualization for Cloud Computing
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Reducing Risk with Cloud Storage. Dell Storage Forum 2011 Storage 2 Dells’ Definition of Cloud Demand driven scalability: up or down, just happens Metered:
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
DRFQ: Multi-Resource Fair Queueing for Packet Processing Ali Ghodsi 1,3, Vyas Sekar 2, Matei Zaharia 1, Ion Stoica 1 1 UC Berkeley, 2 Intel ISTC/Stony.
VoIP - Abridged - Stephen R. Nelson November 11,
SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Cellular Core Network Architecture
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
Software Routers: NetSlice Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking October 15,
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
Software-Defined Networks Jennifer Rexford Princeton University.
N E T G R O U P P O L I T E C N I C O D I T O R I N O Towards Effective Portability of Packet Handling Applications Across Heterogeneous Hardware Platforms.
1 Liquid Software Larry Peterson Princeton University John Hartman University of Arizona
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
A survey of SDN: Past, Present and Future of Programmable Networks Speaker :Yu-Fu Huang Advisor :Dr. Kai-Wei Ke Date:2014/Sep./30 1.
2015 Security Conference Dave Gill Intel Security.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
SIMPLE-fying Middlebox Policy Enforcement Using SDN
The role of networking in the Dynamic Data Center Niels Friis-Hansen Senior IT Specialist, CCIE IBM Communication & Collaboration.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar, Rui Miao, Minlan Yu Presenter : ChoongHee.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Design and Implementation of a Consolidated Middlebox Architecture (CoMb) Vyas Sekar, Norbert Egi, Sylvia Ratnasamy Michael K. Reiter, Guangyu Shi Intel.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Craig Farrell CTO Telecom IBM. Why to operators want SDN and NFV? Definitions SDN: Separate control/management & data plane of switches Centralization.
Xin Li, Chen Qian University of Kentucky
A Survey of Network Function Placement
Reducing Risk with Cloud Storage
15-744: Computer Networking
15-744: Computer Networking
of Dynamic NFV-Policies
Software Defined Networking (SDN)
Software Defined Networking (SDN)
Ebusiness Infrastructure Platform
NFV and SD-WAN Multi vendor deployment
Presentation transcript:

Design and Implementation of a Consolidated Middlebox Architecture 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi

Need for Network Evolution 2 New devices New applications Evolving threats Policy constraints Performance, Security, Compliance

3 Type of applianceNumber Firewalls166 NIDS127 Media gateways110 Load balancers67 Proxies66 VPN gateways45 WAN Optimizers44 Voice gateways11 Total Middleboxes636 Total routers~900 Network Evolution today: Middleboxes! Data from a large enterprise: >80K users across tens of sites Just network security $10 billion

4 Specialized boxes Narrow interfaces “Point” solutions! Increases capital expenses & sprawl Increases operating expenses Limits extensibility and flexibility Management Key “pain points” 

Motivation High-level idea: Consolidation System design Implementation and Evaluation 5 Outline

Network-wide Controller Key idea: Consolidation 2. Consolidate Management 1. Consolidate Platform Two levels corresponding to two sources of inefficiency 6

Consolidation at Platform-Level 7 ProxyFirewallIDS/IPS AppFilter Today: Independent, specialized boxes Decouple Hardware and Software Commodity hardware: e.g., PacketShader, RouteBricks, ServerSwitch, SwitchBlade Consolidation reduces capital expenses and sprawl

Consolidation reduces CapEx 8 Multiplexing benefit = Max_of_TotalUtilization / Sum_of_MaxUtilizations

Consolidation Enables Extensibility 9 Session Management Protocol Parsers VPN Web Mail IDS Proxy Firewall Contribution of reusable modules: 30 – 80 %

Management consolidation enables flexible resource allocation 10 N1 N3 N2 P: N1  N3 Process (0.4 P) Today: All processing at logical “ingress” Overload! Network-wide distribution reduces load imbalance Process (0.3 P) Process (P)

Motivation High-level idea: Consolidation CoMb: System design Implementation and Evaluation 11 Outline

Network-wide Controller CoMb System Overview 12 General-purpose hardware: e.g., PacketShader, RouteBricks, ServerSwitch, Logically centralized e.g., NOX, 4D Existing work: simple, homogeneous routing-like workload Middleboxes: complex, heterogeneous, new opportunities

Network-wide Controller Processing responsibilities CoMb Management Layer Policy Constraints Resource Requirements Routing, Traffic Goal: Balance load across network. Leverage multiplexing, reuse, distribution 13

Capturing Reuse with HyperApps 14 IDSProxy common Footprint on resource HTTP UDP HTTP NFS Memory CPU HTTP = IDS & Proxy 43 Memory UDP = IDS NFS = Proxy CPU Memory CPU HyperApp: find the union of apps to run Policy, dependency are implicit Need per-packet policy, reuse dependencies! HTTP: 1+2 unit of CPU 1+3 units of mem

Modeling Processing Coverage 15 HTTP N1  N3 N1N2 N3 What fraction of traffic of class HTTP from N1  N3 should each node process? IDS < Proxy 0.4 HTTP: Run IDS < Proxy IDS < Proxy 0.3 IDS < Proxy 0.3

Network-wide Optimization 16 Minimize Maximum Load, Subject to Processing coverage for each class of traffic  Fraction of processed traffic adds up to 1 Load on each node  sum over HyperApp responsibilities per-path A simple, tractable linear program Very close (< 0.1%) to theoretical optimal No explicit Dependency Policy

Network-wide Controller CoMb System Overview 17 General-purpose hardware: e.g., PacketShader, RouteBricks, ServerSwitch, Logically centralized e.g., NOX, 4D Existing work: simple, homogeneous routing-like workload Middleboxes: complex, heterogeneous, new opportunities

CoMb Platform 18 NIC Policy Shim (Pshim) Core1 Core4 IDS … … Proxy Traffic Applications Policy Enforcer Classification: HTTP IDS < Proxy Challenges: Performance Parallelize Isolation Challenges: Lightweight Parallelize Challenges: No contention Fast classification

Parallelizing Application Instances 19 M1 M2 PShim App-per-core Core3 M3 PShim Core1 Core2 HyperApp-per-core M2M3 PShim M1M2 PShim Core1 Core2 - Inter-core communication - More work for PShim + No in-core context switch + Keeps structures core-local + Better for reuse - But incurs context-switch - Need replicas ✔ HyperApp-per-core is better or comparable Contention does not seem to matter!

CoMb Platform Design 20 Hyper App1 Hyper App2 Hyper App4 Hyper App3 Hyper App3 PShim M1M4M1M4M2M3 Q1 Q3 Q2Q4Q5 M1M5 Core 1Core 3Core 2 NIC hardware Contention-free network I/O Core-local processing Parallel, core-local Workload balancing

Motivation High-level idea: Consolidation System design: Making Consolidation Practical Implementation and Evaluation 21 Outline

Implementation 22 Network-wide Management Session Protocol Extensible apps Standalone apps Policy Shim using CPLEX Kernel mode Click Ported logic From Bro  Click Memory mapped Or Virtual interfaces 8-core Intel Xeon with Intel NIC

Consolidation is Practical Low overhead for existing applications Controller takes < 1.6s for 52-node topology 5x better than VM-based consolidation 23

Benefits: Reduction in Maximum Load 24 Consolidation reduces maximum load by X MaxLoad Today /MaxLoad Consolidated

Benefits: Reduction in Provisioning Cost 25 Consolidation reduces provisioning cost X Provisioning Today /Provisioning Consolidated

Discussion Changes traditional vendor business – Already happening (e.g., “virtual appliances”) – Benefits imply someone will do it! – May already have extensible stacks internally! Isolation – Current: rely on process-level isolation – Get reuse-despite-isolation? 26

Network evolution occurs via middleboxes Today: Narrow “point” solutions – High CapEx, OpEx, and device sprawl – Inflexible, difficult to extend Our proposal: Consolidated architecture – Reduces CapEx, OpEx, and device sprawl – Extensible, general-purpose More opportunities – Isolation – APIs (H/W—Apps, Management—Apps, App Stack) 27 Conclusions