FOUNDATIONS OF INTENT- BASED NETWORKING Loris DAntoni Aditya Akella - - PowerPoint PPT Presentation

foundations of intent based networking
SMART_READER_LITE
LIVE PREVIEW

FOUNDATIONS OF INTENT- BASED NETWORKING Loris DAntoni Aditya Akella - - PowerPoint PPT Presentation

FOUNDATIONS OF INTENT- BASED NETWORKING Loris DAntoni Aditya Akella Aaron Gember Jacobson Cloud Network Enterprise Network Network Policies Enterprise Network 2 3 Tenant Network Policies Enterprise Network B A Reachability : A


slide-1
SLIDE 1

FOUNDATIONS OF INTENT- BASED NETWORKING

Loris D’Antoni Aaron Gember‐Jacobson Aditya Akella

slide-2
SLIDE 2

Enterprise Network Enterprise Network Network Policies Cloud Network

2

slide-3
SLIDE 3

Tenant Network Policies

Enterprise Network

A B

Reachability: A can talk to B

C

Waypoints: C to B traffic goes through a Firewall

3

slide-4
SLIDE 4

Cloud Network Policies

S7 S

8

S9 S1 S3 S4 S5 S6 S1 S2

Tenant 1 Network Policies Tenant 2 Network Policies Network isolation: Tenant 1 and 2’s traffic must not affect each other Network resource management Fault tolerance

100Gbps 100Gbps 100Gbps 100 Gbps 100Gbps

4

slide-5
SLIDE 5

High‐level language to specify policies Policy‐compliant network configurations

Synthesize

INPUT OUTPUT

Intent-based networking

5

slide-6
SLIDE 6

GENESIS

SYNTH SYNTHESI SIZI ZING NG FOR FORWARD ARDING NG TA TABLES IN IN MUL MULTI‐TENANT TENANT NETW NETWORKS

6

[Subramanian, D’Antoni, Akella, POPL17] Kausik Subramanian

slide-7
SLIDE 7

Software-defined Networks

S7 S8 S9

S10

S3 S4 S5 S6 S1 S2

SDN Controller

7

SSH

Programmable switch rules: Match: Packet headers Action: Forward to next switch SSH traffic at S3 is forwarded to S7 Centralized controller enforces policies Enforcing policies using conventional distributed networks is difficult

slide-8
SLIDE 8

High‐level language to specify policies Switch forwarding tables

Genesis

Support for complex and diverse policies

Genesis uses Satisfiability Modulo Theories (SMT) solvers to synthesize forwarding tables

Enforcing certain policies is NP‐complete

8

slide-9
SLIDE 9

Outline of the Talk

  • Motivation
  • Synthesis of forwarding tables in Genesis
  • Scaling to large workloads: Tactics
  • Genesis extensions and conclusions

9

slide-10
SLIDE 10

Synthesis Approach

High‐level policies + Topology Forwarding tables

INPUT OUTPUT

(Fwd, Reach)

Constraints

  • n Fwd and

Reach Paths from Fwd and Reach solution

Abstract Representation

10

slide-11
SLIDE 11

Semantics of (Fwd, Reach)

S1 S2 S3

Fwd(S1, ID) = S2: Switch S1 forwards to S2 Fwd(S1, ID) = S2 Fwd(S2, ID) = S3 Reach(S2, ID) = 1: Specifies that S2 is reachable in 1 step from source Reach(S1, ID) = 0 Reach(S2, ID) = 1 Reach(S3, ID) = 2

11

slide-12
SLIDE 12

Reachability Constraints

S1 S4 S5

If a switch is reachable in k steps,

  • ne of its neighbors must be reachable in k ‐ 1 steps

12

S2 S3

SRC DST

Reach(S4, ID) = k Reach(S3, ID) = k ‐ 1 Reach(S2, ID) = k ‐ 1 Fwd(S3, ID) = S4

slide-13
SLIDE 13

Policy Constraints

S1 S2 S3 S5 S4

Waypoint: Blue Tenant specifies path must traverse through S4

Reach(S4, ID) = k

Isolation: Blue Tenant and Red Tenant paths do not share any link

(S3, ID1) (S3, ID2)

Traffic Engineering: Using SMT‐OPT

13

slide-14
SLIDE 14

THE END?

14

slide-15
SLIDE 15

Baseline Synthesis Evaluation Setup

  • Genesis implemented in Python, uses Z3 SMT solver
  • Multi‐tenant isolation: Each tenant has a single reachability policy, and all

tenant paths are mutually isolated

  • Medium‐sized fat‐tree datacenter topologies

15

slide-16
SLIDE 16

Baseline Synthesis Evaluation

Synthesis time for over 60 tenants takes >5000s Exponential Complexity

To scale to large networks and workloads, we need to further algorithmic insights and optimizations

16 16

slide-17
SLIDE 17

SCALING TO LARGE WORKLOADS

TA TACTICS

17

slide-18
SLIDE 18

Tactics: Motivation

Use network structure to specify path properties

Edge Aggregate Core

Edge‐to‐edge paths: 272 Large search space

18 18

slide-19
SLIDE 19

Tactics as regular expressions

No Edge Tactic: Not (Edge .* Edge .* Edge)

Edge Aggregate Core

19 19

slide-20
SLIDE 20

Tactics: Constraint Reduction

20

A1 S E1 C1

Genesis uses tactics as a search strategy to eliminate constraints

Reach(S) = k Reach(C1) = k ‐ 1 Reach(A1) = k ‐ 1 Reach(E1) = k ‐ 1

No Edge Tactic ensures no intermediate edge switch

slide-21
SLIDE 21

Tactics: Algorithmic Properties

  • Specified using a restricted subset of regular expressions
  • Sou

Sound and Com Comple lete algorithm for enforcing them

  • Policy‐agnostic
  • The operator can develop a repository of tactics based on their topology

21

slide-22
SLIDE 22

Tactics: Evaluation

Multi‐tenant isolation workload Valley‐Free Tactic and No Edge Tactic Valley‐Free Tactic speedup: 400x

22 22

slide-23
SLIDE 23

Outline of the Talk

  • Motivation
  • Synthesis of forwarding tables in Genesis
  • Scaling Genesis: Tactics and Divide‐and‐Conquer
  • Genesis extensions and conclusions

23

slide-24
SLIDE 24

Genesis Extensions

24

Genesis Rich Policy Language Synthesis using SMT Resilient Paths Network Repair

slide-25
SLIDE 25

Network Resilience

Cloud network

S1 S2 S3

Single path: Not resilient t‐resilience: For events under t arbitrary link failures, there exists a valid path Link failure

25

slide-26
SLIDE 26

Policy-compliant Resiliency

Cloud network

S1 S2 S3

Backup path 1‐resilient For 1‐resilience, backup path must be edge‐disjoint from original path Isolation policy

26

Sound transformation of input policies to provide t‐resilience

slide-27
SLIDE 27

Minimal Reactive Network Repair

Policies Policies Best repair: Minimize change overhead Genesis uses MaxSMT

Cloud network

27

slide-28
SLIDE 28

Network Repair Evaluation

Multi‐tenant isolation workload One switch‐failure, network repair such that number of switches affected is minimized For larger workloads, repair is faster than re‐synthesis.

28 28

slide-29
SLIDE 29

CONCLUSION

29

slide-30
SLIDE 30

High‐level policies on paths and switches Switch forwarding tables satisfying policies

Genesis

INPUT OUTPUT

30

OSPF and BGP configurations Efficient optimal repair