1 A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley.

Slides:



Advertisements
Similar presentations
EdgeNet2006 Summit1 Virtual LAN as A Network Control Mechanism Tzi-cker Chiueh Computer Science Department Stony Brook University.
Advertisements

New Directions in Enterprise Network Management Aditya Akella University of Wisconsin, Madison MSR Networking Summit June 2006.
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Chapter 1: Introduction to Scaling Networks
Introducing Campus Networks
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Slick: A control plane for middleboxes Bilal Anwer, Theophilus Benson, Dave Levin, Nick Feamster, Jennifer Rexford Supported by DARPA through the U.S.
Applying NOX to the Datacenter Arsalan Tavakoli, Martin Casado, Teemu Koponen, and Scott Shenker 10/22/2009Hot Topics in Networks Workshop 2009.
Can the Production Network Be the Testbed? Rob Sherwood Deutsche Telekom Inc. R&D Lab Glen Gibb, KK Yap, Guido Appenzeller, Martin Cassado, Nick McKeown,
OpenFlow : Enabling Innovation in Campus Networks SIGCOMM 2008 Nick McKeown, Tom Anderson, et el. Stanford University California, USA Presented.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
OpenFlow-Based Server Load Balancing GoneWild
SDN and Openflow.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat Presented by Gregory Peaker and Tyler Maclean.
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
A Scalable, Commodity Data Center Network Architecture.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Cellular Core Network Architecture
A policy-aware switching layer for data centers ACM Special Interest Group on Data Communication (SIGCOMM’08) Authors: Dilip A. Joseph, Arsalan Tavakoli,
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Barracuda Load Balancer Server Availability and Scalability.
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Aug 20 th, 2002 Sigcomm Education Workshop 1 Teaching tools for a network infrastructure teaching lab The Virtual Router and NetFPGA Sigcomm Education.
OpenFlow: Enabling Technology Transfer to Networking Industry Nikhil Handigol Nikhil Handigol Cisco Nerd.
Software-Defined Networks Jennifer Rexford Princeton University.
Software Defined Networks and OpenFlow SDN CIO Summit 2010 Nick McKeown & Guru Parulkar Stanford University In collaboration with Martin Casado and Scott.
OpenFlow: Enabling Innovation in Campus Networks
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
June, 2006 Stanford 2006 Ethane. June, 2006 Stanford 2006 Security and You  What does security mean to you?  Data on personal PC?  Data on family PC?
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Security fundamentals Topic 10 Securing the network perimeter.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
VLAN Trunking Protocol
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Xin Li, Chen Qian University of Kentucky
CCNA Practice Exam Questions
CIS 700-5: The Design and Implementation of Cloud Networks
A Survey of Network Function Placement
Architecture and Algorithms for an IEEE 802
Network Anti-Spoofing with SDN Data plane Authors:Yehuda Afek et al.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Chapter 4: Routing Concepts
of Dynamic NFV-Policies
Stanford University Software Defined Networks and OpenFlow SDN CIO Summit 2010 Nick McKeown & Guru Parulkar In collaboration with Martin Casado and Scott.
인터넷 구조 2002년 2학기 장주욱.
Software Defined Networking (SDN)
Presentation transcript:

1 A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley

Problem: Middleboxes are hard to deploy Place on network path Overload path selection mechanisms pkt network path On path placement fails to achieve CorrectnessGuaranteed middlebox traversal Flexibility(Re)configurable network topology EfficiencyNo middlebox resource wastage Load Balancer Firewall

Preview Problem –Middleboxes are hard to deploy Solution –Overview –Challenges –Limitations Implementation & evaluation Related work

Common data center topology Internet Servers Layer-2 switch Access Data Center Layer-2/3 switch Aggregation Layer-3 router Core Firewall Load Balancer

Inflexible topology Internet Intrusion Prevention Box Firewall Load Balancer

Inefficient - middlebox resource wastage Internet Process unnecessary traffic Unutilized Backup path

S1S2 Protect S1 ↔ S2 traffic Correctness is hard Internet Option 1 –Existing firewalls Newly blocked link

Correctness is hard Internet Option 1 –Existing firewalls Option 2 –New firewall S1S2 Protect S1 ↔ S2 traffic

Correctness is hard Internet Option 1 –Existing firewalls Option 2 –New firewall Option 3 –Separate VLANs S1S2 Protect S1 ↔ S2 traffic

Outline Problem Middleboxes are hard to deploy Solution –Overview –Challenges –Limitations Implementation & evaluation Related work

Policy-aware Switching Layer Policy-aware switching layer load balancer Existing mechanisms firewall 1Take middleboxes off-path Separate policy from reachability2 HTTP Firewall  Load balancer TCP port = 80 PSwitch load balancer firewall PPPPPPPPPPPPPPP

PSwitch explicitly forwards packets to middleboxes Firewall (F)Load Balancer (L) Core Router R PSwitch Web Server Data center Src:RSrc:L HeaderBody Rule table MatchNext Hop MAC R,port 80F Interface 1, port 80L MAC L,port 80FinalDest PPPPP HTTPFirewall  Load balancer Centralized Policy Controller

Firewall Load Balancer PSwitch A Web Server Data center Custom Firewall Intrusion Prevention Box ERP Server Firewall PSwitch B HTTPFirewall  Load balancer ERPCustom Firewall  IPS Distributed forwarding Loadbalancing middleboxes Different policies for different traffic

Challenges 1.Minimizing infrastructure changes 2.Non-transparent middleboxes 3.Guaranteeing correctness under churn

Guarantees under Churn Network Middlebox Policy Packets never bypass middleboxes Some packets may be dropped

Limitations Indirect paths Policy specification complexity

Outline Problem Middleboxes are hard to deploy Solution Overview Challenges Limitations Implementation & evaluation Related work

Implementation PSwitches prototyped in PPPPP 750 Mbps 0.3 milliseconds 25 policies Compared to software Ethernet switch –82% TCP throughput –16% latency increase Exploring hardware options PSwitch

Validation of functionality 10 PCs with 4 network interfaces each PPPPPPPPPPPPPPPPPPPP iptables firewallswebservers BalanceNG Load balancer client Physical topology

Logical topologies on same physical topology X

Related Work 4D Routing Control Platform Ethane Indirection Internet Indirection Infrastructure Delegation Oriented Architecture Separation of policy and reachability High-end switches Cisco Catalyst 6500 SIGCOMM 2008 SEATTLE DCell Commodity DC Network Architecture

Conclusion Deploying middleboxes is hard A new layer-2 with explicit middlebox support –Middleboxes taken off network path –Policy separated from reachability

Questions?

Backup Slides

Policy churn Conflicting policy updates HTTPLoad balancer  Firewall Version 1 Firewall  Load balancerHTTP Version 2 FirewallLoad Balancer PPPPP Version 1Version 2 MatchNext Hop Interface 0, port 80L Interface 2, port 80F Interface 1, port 80FinalDest MatchNext Hop Interface 0, port 80F Interface 2, port 80FinalDest Interface 1, port 80L

Intermediate middlebox types Guarantees traversal HTTPLoad balancer  Firewall Version 1 Firewall ’  Load balancer ’ HTTP Version 2 Firewall Load Balancer PPPPP Firewall ’ Load Balancer ’