Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim and Jennifer Rexford Princeton University.

Slides:



Advertisements
Similar presentations
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Advertisements

PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
IP Mobility Support Basic idea of IP mobility management
Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
ARP: Address Resolution Protocol
Data Center Fabrics. Forwarding Today Layer 3 approach: – Assign IP addresses to hosts hierarchically based on their directly connected switch. – Use.
CSE 534 Fundamentals of Computer Networks Lecture 4: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim, and Jennifer Rexford Princeton University.
Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Chang Kim, and Jennifer Rexford Princeton.
Projects Related to Coronet Jennifer Rexford Princeton University
Tesseract A 4D Network Control Plane
ProActive Routing In Scalable Data Centers with PARIS Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Theophilus.
COS 461: Computer Networks
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
A Scalable, Commodity Data Center Network Architecture.
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
SEATTLE - SEATTLE - A Scalable Ethernet Architecture for Large Enterprises T – Special Course in Future Internet Technologies M.Sc.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
1 Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about dynamic assignment of IP addresses with DHCP.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Homework Assignment #1 1. Homework Assignment Part 1: LAN setup –All nodes are hosts (including middle nodes) –Each link is its own LAN, with its own.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Submission doc.: IEEE /1015r1 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Proxy ARP in ax Date: Authors:
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Broadcast and Multicast. Overview Last time: routing protocols for the Internet  Hierarchical routing  RIP, OSPF, BGP This time: broadcast and multicast.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
SEATTLE and Recent Work Jennifer Rexford Princeton University Joint with Changhoon Kim, Minlan Yu, and Matthew Caesar.
“Hashing Out” the Future of Enterprise and Data-Center Networks Jennifer Rexford Princeton University Joint with Changhoon.
Cisco Systems Networking Academy S2 C 11 Routing Basics.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Objectives After completing this chapter you will be able to: Describe the different types of bridging: Transparent, Source Route and Translate Describe.
CS470 Computer Networking Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 4. Internetworking.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
1 Chapter 4: Internetworking (Introduction) Dr. Rocky K. C. Chang 16 March 2004.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Routing Jennifer Rexford.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
CS4470 Computer Networking Protocols
Revisiting Ethernet: Plug-and-play made scalable and efficient
3. Internetworking (part 2: switched LANs)
ICMP ICMP – Internet Control Message Protocol
Intra-Domain Routing Jacob Strauss September 14, 2006.
Dr. Rocky K. C. Chang 23 February 2004
Revisiting Ethernet: Plug-and-play made scalable and efficient
Implementing Multicast
Reconciling Zero-conf with Efficiency in Enterprises
Presentation transcript:

Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim and Jennifer Rexford Princeton University

2 An “All Ethernet” Enterprise Network?  “All Ethernet” makes network management easier Zero-configuration of end-hosts and network due to  Flat addressing  Self-learning Location independent and permanent addresses also simplify  Host mobility  Troubleshooting  Access control  But, Ethernet has problems Poor scalability Poor efficiency

3 Today: Hybrid Architecture For Scalability Enterprise networks comprised of Ethernet-based IP subnets interconnected by routers R R R R Ethernet Bridging - Flat addressing - Self-learning - Flooding - Forwarding along a tree IP Routing - Hierarchical addressing - Subnet configuration - Host configuration - Forwarding along shortest paths R

4 Motivation Neither bridging nor routing is satisfactory. Can’t we take only the best of each? Architectures Features Ethernet Bridging IP Routing Ease of configuration  Optimality in addressing  Mobility support  Path efficiency  Load distribution  Convergence speed  Tolerance to loop  SEIZE (Scalable and Efficient Zero-config Enterprise) SEIZE       

5 Avoiding Flooding  Bridging uses flooding as a routing scheme Unicast frames to unknown destinations are flooded Does not scale to a large network  Objective #1: Unicast unicast traffic Need a control-plane mechanism to discover and disseminate hosts’ location information “Send it everywhere! At least, they’ll learn where the source is.” “Don’t know where destination is.”

6 Restraining Broadcasting  Liberal use of broadcasting for bootstrapping (DHCP and ARP) Broadcasting is a vestige of shared-medium Ethernet Very serious overhead in switched networks  Objective #2: Support unicast-based bootstrapping Need a directory service  Sub-objective #2.1: Support general broadcast However, handling broadcast should be more scalable

7 Keeping Forwarding Tables Small  Flooding and self-learning lead to unnecessarily large forwarding tables Large tables are not only inefficient, but also dangerous  Objective #3: Install hosts’ location information only when and where it is needed Need a reactive resolution scheme Enterprise traffic patterns are better-suited to reactive resolution

8 Ensuring Optimal Forwarding Paths  Spanning tree avoids broadcast storms. But, forwarding along a single tree is inefficient. Poor load balancing and longer paths Multiple spanning trees are insufficient and expensive  Objective #4: Utilize shortest paths Need a routing protocol  Sub-objective #4.1: Prevent broadcast storms Need an alternative measure to prevent broadcast storms

9 Backwards Compatibility  Objective #5: Do not modify end-hosts From end-hosts’ view, network must work the same way End hosts should  Use the same protocol stacks and applications  Not be forced to run an additional protocol

10 SEIZE in a Slide  Flat addressing of end-hosts Switches use hosts ’ MAC addresses for routing Ensures zero-configuration and backwards-compatibility (Obj # 5)  Automated host discovery at the edge Switches detect the arrival/departure of hosts Obviates flooding and ensures scalability (Obj #1, 5)  Hash-based on-demand resolution Hash deterministically maps a host to a switch Switches resolve end-hosts ’ location and address via hashing Ensures scalability (Obj #1, 2, 3)  Shortest-path forwarding between switches Switches run link-state routing with only their own connectivity info Ensures data-plane efficiency (Obj #4)

11 How does it work? Host discovery or registration B D x y Hash ( F ( x ) = B ) Store at B Traffic to x Hash ( F ( x ) = B ) Tunnel to egress node, A Deliver to x Switches End-hosts Control flow Data flow Notifying to D Entire enterprise (A large single IP subnet) LS core E Optimized forwarding directly from D to A C A Tunnel to relay switch, B

12 Terminology Ingress Relay (for x ) Egress x y B A Dst Src D Ingress applies a cache eviction policy to this entry cut-through forwarding

13 Responding to Topology Changes  Consistent Hash [Karger et al.,STOC’97] minimizes re-registration A B C D E F h h h h h h h h h h

14 Single Hop Look-up A B C D F(x) x y y sends traffic to x E Every switch on a ring is logically one hop away

15 Responding to Host Mobility Relay (for x ) x y B A Src D when cut-through forwarding is used G Old Dst New Dst

16 Unicast-based Bootstrapping  ARP Ethernet: Broadcast requests SEIZE: Hash-based on-demand address resolution  Exactly the same mechanism as location resolution  Proxy resolution by ingress switches via unicasting  DHCP Ethernet: Broadcast requests and replies SEIZE: Utilize DHCP relay agent (RFC 2131)  Proxy resolution by ingress switches via unicasting

17 Control-Plane Scalability When Using Relays  Minimal overhead for disseminating host-location information Each host’s location is advertised to only two switches  Small forwarding tables The number of host information entries over all switches leads to O(H), not O(SH)  Simple and robust mobility support When a host moves, updating only its relay suffices No forwarding loop created since update is atomic

18 Data-Plane Efficiency w/o Compromise  Price for path optimization Additional control messages for on-demand resolution Larger forwarding tables Control overhead for updating stale info of mobile hosts  The gain is much bigger than the cost Because most hosts maintain a small, static communities of interest (COIs) [Aiello et al., PAM’05] Classical analogy: COI ↔ Working Set (WS); Caching is effective when a WS is small and static

19 Conclusions  SEIZE is a plug-and-playable enterprise architecture ensuring both scalability and efficiency  Enabling design choices Hash-based location management Reactive location resolution and caching Shortest-path forwarding  Ongoing work Analysis of enterprise traffic measurements Evaluation of a SEIZE prototype in Emulab Exploring ways to incrementally deploy SEIZE