policy preserving middlebox placement in sdn enabled data
play

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers - PowerPoint PPT Presentation

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/Courses/CS268.F08/lectures/22-


  1. Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/Courses/CS268.F08/lectures/22- policy_switching.ppt, and www.cs.yale.edu/homes/yu-minlan/talk/sigcomm13. ppt x

  2. Overview • What is middlebox? • What is SDN (Software Defined Network) and NFV (Network Function Virtulization)? • Policy-preserving middlebox placement problem in data centers – Problems and preliminary solutions • Conclusions 2

  3. Middleboxes • A middlebox, or network appliance, is a computer networking device that transforms, inspects, filters, or otherwise manipulates traffic for purposes other than packet forwarding. – Intermediaries in-between the communica9ng hosts – O;en without knowledge of one or both par9es • Examples – Network address translators – Firewalls – Load balancers – Intrusion detec9on systems – Transparent Web proxy caches 3

  4. Problem: Middleboxes are hard to deploy • Place on network path pkt network path Firewall Load Balancer • On path placement fails to achieve Flexibility (Re)configurable network topology Efficiency No middlebox resource wastage Correctness Guaranteed middlebox traversal

  5. Common data center topology Internet Data Center Layer-3 router Core Firewall Aggregation Layer-2/3 switch Load Balancer Access Layer-2 switch Servers

  6. Inflexible topology Internet Intrusion Prevention Box Firewall Load Balancer

  7. Inefficient - middlebox resource wastage Internet Backup path Process unnecessary Unutilized traffic

  8. Policy-Preserving of MBs Firewall IDS Proxy * Policy Chain: IDS Firewall Proxy S1 S2 Dst 8

  9. The Internet: A Remarkable Story • Tremendous success – From research experiment to global infrastructure • Brilliance of under-specifying – Network: best-effort packet delivery – Hosts: arbitrary applica9ons • Enables innova9on in applica9ons – Web, P2P, VoIP, social networks, virtual worlds • But, change is easy only at the edge… L

  10. Inside the ‘ Net: A Different Story… • Closed equipment – So;ware bundled with hardware – Vendor-specific interfaces • Over specified – Slow protocol standardiza9on • Few people can innovate – Equipment vendors write the code – Long delays to introduce new features Impacts performance, security, reliability, cost…

  11. Networks are Hard to Manage • Opera9ng a network is expensive – More than half the cost of a network – Yet, operator error causes most outages • Buggy so;ware in the equipment – Routers with 20+ million lines of code – Cascading failures, vulnerabili9es, etc. • The network is “ in the way ” – Especially a problem in data centers – … and home networks

  12. Tradi9onal Computer Networks Data plane: Packet streaming Forward, filter, buffer, mark, rate-limit, and measure packets

  13. Tradi9onal Computer Networks Control plane: Distributed algorithms Track topology changes, compute routes, install forwarding rules

  14. So;ware Defined Networking (SDN) Logically-centralized control Smart API to the data plane (e.g., OpenFlow) Dumb, fast Switches

  15. 3 Complementary but Independent Networking Developments Creates operational flexibility Reduces Reduces CapEx, OpEx, space & power Network delivery time consumption Functions Virtualisation Software Open Defined Innovation Networks Creates Creates competitive control supply of innovative abstractions applications by third parties to foster innovation.

  16. Network Functions Virtualisation: Vision Network Func9ons Virtualisa9on Classical Network Appliance Approach Approach Open Ecosystem Independent Competitive & Innovative Software Vendors WAN CDN Session Border Message Accelera9on Controller Router Orchestrated, DPI automatic & remote install. Carrier Firewall Tester/QoE Grade NAT monitor High volume standard servers SGSN/GGSN BRAS PE Router Radio/Fixed Access High volume standard storage Network Nodes • Fragmented, purpose-built hardware. • Physical install per appliance per site. • Hardware development large barrier to entry for new vendors, constraining innovation & competition. High volume Ethernet switches Geneva, Switzerland, 4 16 June 2013

  17. Policy-Preserving MB Placement Problem in Data Centers

  18. Core Switches Aggrega9on Switches Edge Switches : VM v 1 v 2 v 1 v 2 ’ ’ : PM 9 5 6 8 13 14 15 16 1 3 7 10 11 12 2 4

  19. MB Placement Problems § Many communica9on pairs in the network § Single MB Type § One MB type, say firewall, but mul9ple instances § Mul9ple MBs Type § each has one instance § Ordered Service Chaining § Unordered Server Chaining § Goal: Minimize total communica9on cost § Constraint: Capacity of MB (each can only process limited number of pairs) 19

  20. Single MB Case § Given a data center graph G(V,E) § There are m instances of a MB, placed at different node in V § A set of p communica9ng node pairs P, each pair (s,t) in P needs to traverse to an instance of a MB § Each middlebox can only be traversed by at most k pairs § When p = (s,t) traverses an MB instance m, its cost c(p,m) = d(s,sw(m) ) + d(sw(m),t) § Goal: assign all the pairs in P, each traverses one MB instance, s.t. the total cost is minimized, subject to that each MB instance takes at most k pairs. 20

  21. Solu9on – minimum cost flow 21

  22. m MB instances p Communication Pairs (1, c(1,sw(1))) 1 (s 1, t 1 ) (k, 0) (1, c(1,sw(2))) 2 (1, 0) (k, 0) (s 2, t 2 ) 3 (1, 0) s' t' (k, 0) Source Sink (1, c(p, 1)) (1, 0) (k, 0) (s p, t p ) (1, c(p, m)) m

  23. Ordered Mul9ple MBs Case § Given a data center graph G(V,E) § There are m MBs M={mb 1 , mb 2 , …, mb m } to be placed inside the data center § A set of p communica9ng node pairs P, each pair (s,t) in P needs to traverse mb 1 , mb 2 , …, mb m in that order § The cost for p = (s,t) is c(p) = d(s, mb 1 ) + d( mb 1 , mb 2 ) + … + d( mb m-1 , mb m ) + d( mb m , t ) § Goal: where to place the m MBs, s.t. the total cost of all p pairs is minimized 23

  24. Ordered Mul9ple MBs Case: Solu9on § NP-hard § Random: randomly place the m MBs inside the data center § Greedy: takes place in m rounds § In round i, it places mb i at a node that minimizes the total communica9on cost so far § Load Balancing: each switch can only accommodate limited number of communica9on pairs 24

  25. Un-Ordered Mul9ple MBs Case § Given a data center graph G(V,E) § There are m MBs M={mb 1 , mb 2 , …, mb m } to to be placed inside the data center § A set of p communica9ng node pairs P, each pair (s,t) in P needs to traverse mb 1 , mb 2 , …, mb m , but not necessarily in that order § The cost for p = (s,t) is c(p) = d(s, mb i,1 ) + d( mb i,1 , mb i, 2 ) + … + d( mb i,m-1 , mb i, m ) + d( mb i, m , t ) § Goal: where to place the m MBs, s.t. the total cost of all p pairs is minimized 25

  26. Un-Ordered Mul9ple MBs Case: Solu9on § Even more complicated that Ordered Mul9ple MB case 26

  27. MB Migra9on Problems § Many communica9on pairs in the network § Move MBs from their ini9al loca9on to other loca9ons § Goal: Minimize total communica9on cost § Constraint: Capacity of MB (each can only process limited number of pairs) 27

  28. MB Replica9on Problems § Many communica9on pairs in the network § Mul9ple MB types, each has one instance § Goal: How to replicate the MBs, in order to minimize total communica9on cost § Constraint: Capacity of switch (each can only store limited number of MB instances) 28

  29. Conclusions • Deploying middleboxes is hard, but SDN and NFV makes it easier • Middleboxes management in SDN-enabled data center is a new and exciting research fields • Many new algorithmic problems that have not been solved • Need your participation!

  30. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend