Report of Interconnectivity Testing of Service Function Chaining by Six Companies NTT Alaxala Networks Cisco Systems Hitachi Alcatel-Lucent Japan et al.

Slides:



Advertisements
Similar presentations
Computer Network Topologies
Advertisements

Chapter 7: Intranet LAN Design
Network Service Header (NSH) draft-quinn-sfc-nsh IETF 90
Network Based Services in Mobile Networks Context, Typical Use Cases, Problem Area, Requirements IETF 87 Berlin, 29 July 2013 BoF Meeting on Network Service.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
Security Awareness: Applying Practical Security in Your World
Ch.6 - Switches CCNA 3 version 3.0.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
A Survey on Interfaces to Network Security
Semester 3, v Chapter 3: Virtual LANs
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Layered Protocol. 2 Types of Networks by Logical Connectivity Peer to Peer and Client-Server Peer-to-peer Networks  Every computer can communicate directly.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Chapter 8: Virtual LAN (VLAN)
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
Router Basics MM Clements.
Network Service Header (NSH) draft-quinn-sfc-nsh IETF 89 A. Chauhan Citrix U. Elzur Intel B. McConnell Rackspace C. Wright Red Hat Inc. P. Quinn J. Guichard.
Network Service Header (NSH) draft-ietf-sfc-nsh-04 IETF95, Buenos Aires, March 2016 Paul Quinn, Editor Uri Elzur, Editor.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
1 Layer 3: Routing & Addressing Honolulu Community College Cisco Academy Training Center Semester 1 Version
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
J. Halpern (Ericsson), C. Pignataro (Cisco)
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
IETF SFC active drafts PRESENTER: VU ANH VU
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Only Use FD.io VPP to Achieve high performance service function chaining Yi Intel.
Service Function Chaining
A Survey of Network Function Placement
ODL SFC and VPP Integration
University of Maryland College Park
ODL SFC, Implementing IETF SFC November 14, 2016
Securing the Network Perimeter with ISA 2004
of Dynamic NFV-Policies
100% Exam Passing Guarantee & Money Back Assurance
CCNA R&S Overview  The CCNA Routing and Switching Boot Camp is a composite course derived from ICND1 and ICND2 content merged into a single accelerated.
Module 5 - Switches CCNA 3 version 3.0.
Data and Computer Communications by William Stallings Eighth Edition
IS4680 Security Auditing for Compliance
Service Function Chaining-Enabled
Sangfor Cloud Security Pool, The First-ever NSH Use Case
IETF-100, MPTCP WG, November 2017
Introduction to Network Security
draft-guichard-sfc-nsh-sr-02
Geneve applicability for service function chaining draft-boutros-nvo3-geneve-applicability-for-sfc-02 Sami Boutros Dharma Rajan Philip Kippen Pierluigi.
Tokyo OpenStack® Summit
Presentation transcript:

Report of Interconnectivity Testing of Service Function Chaining by Six Companies NTT Alaxala Networks Cisco Systems Hitachi Alcatel-Lucent Japan et al. Shunsuke Homma, NTT March 26 th, 2015

Agenda 1.Purpose of this Testing 2.Overview of the Demo 3.Issues in Implementation 4.Future Work

1.Purpose of this Testing Confirm feasibility of SFC which is a new framework – Connectivity in forwarding plane (control plane was out of scope in this testing) – Feasibility of SFC using multi-vendor devices Ref)

2.Overview of the Demo Showed advantages of SFC – Easiness of switching service – Optimizing Service Chain (Path Branching) Provided 3 scenarios as follows: Scenario 1 : Security Service Used Traffic Monitor, Traffic Analyzer and Firewall Scenario 2 : Optimal Communication Service Used DPI, Video Optimizer and WAN Accelerator Scenario 3 : Redundant chains Used Traffic Monitor and Firewall

Demo Structure Assumed large network including multiple data centers (Ref. draft-ietf-sfc-dc-use-cases-02)draft-ietf-sfc-dc-use-cases-02

Demo Structure NSH and VXLAN-GPE are used as SFC and transport headers (Ref. draft-quinn-sfc-network-service-header-03)draft-quinn-sfc-network-service-header |R|R|R|R|I|P|R|R| Reserved | Next Protocol | | VXLAN Network Identifier (VNI) | Reserved | |Ver|O|C|R|R|R|R|R|R| Length | MD Type | Next Protocol | | Service Path ID | Service Index | | Network Platform Context | | Network Shared Context | | Service Platform Context | | Service Shared Context |

Scenario 1 : Security Service Operator defends user from attackers by using appropriate combination of SFs (Traffic Monitor, Traffic Analyzer and Firewall)

Scenario 2 : Optimal Communication Service Classifier at edge node classifies packet based on IP and DPI changes the following path based on the application VO : Video Optimizer WAC : WAN Accelerator Classifier#2 WAC DPI (Classifier) VO Classifier#3 Service Paths in Downstream DPI inspects packets and replaces the NSH based on the result of the inspection. Classifier attaches applicable NSH on the packet based on user’s service plan. Contents Server User#3 (User with Optimized Service) User#4 (User with non-optimized service) Data center#3 Data center#2 Optimized Paths Video Optimized Paths File-optimized Paths Non-optimized Paths : Packets flow of optimized user (Video) : Packets flow of optimized user (File) : Packets flow of non-optimized user

Scenario 3 : Redundant Chain Switching to a redundant path by only changing NSH

3.Issues in Implementation Report the knowledge gained from this testing – SFC Aspect – SF Aspect – Management Aspect

SFC Aspect There were no serious issues in the forwarding-plane with SFC header SPI needs to be uniquely assigned in the entire network, and so centralized control may be feasible. -> Hierarchical approach will be required for using SFC in large networks. (Ref. draft-homma-sfc-forwarding-methods-analysis-01)draft-homma-sfc-forwarding-methods-analysis-01

SF Aspect There are various types of SFs and their connection methods are different, and SFC proxy will be required to be flexible -> A document describing guidelines for SFC proxy may be required. (Ref. draft-song-sfc-legacy-sf-mapping-04)draft-song-sfc-legacy-sf-mapping-04 SFF/SFC Proxy WAN Accelerator Network To WAN To LAN PDU VLAN Ether PDU VLAN Ether Same VLAN must be attached in bidirection From LAN From WAN WAN Accelerator detect session by using VLAN

Management Aspect It was hard to detect failure points because packets traverse various places. -> Some OAM functions for confirming connection will be required. (Ref. draft-aldrin-sfc-oam-framework)draft-aldrin-sfc-oam-framework

4.Future Work This testing is specific to the demo, and so flexibility factor or mechanisms for edge cases were not considered – Co-operation with control functions (e.g. ODL, Openflow, PCRF) – Redundancy mechanism Some SFC components were implemented as software, and so throughput can be examined Generalizing SFC -> Accelerate SFs to adopt the new SFC header We had submitted this demo as a PoC to ETSI NFV Ref)

Thank you for your attention! Contact (NTT)