Virtual Networks: Host Perspective IETF-77 Anaheim, CA Virtual - - PowerPoint PPT Presentation

virtual networks host perspective
SMART_READER_LITE
LIVE PREVIEW

Virtual Networks: Host Perspective IETF-77 Anaheim, CA Virtual - - PowerPoint PPT Presentation

Virtual Networks: Host Perspective IETF-77 Anaheim, CA Virtual Network Research Group March 23rd, 2010 Sunay Tripathi Sunay.Tripathi@Oracle.Com 1 Evolving Virtualization Landscape Physical OS Hypervisor Server Server Server Virtual


slide-1
SLIDE 1

1

Virtual Networks: Host Perspective

IETF-77 Anaheim, CA Virtual Network Research Group March 23rd, 2010 Sunay Tripathi Sunay.Tripathi@Oracle.Com

slide-2
SLIDE 2

2

Network Physical OS

Evolving Virtualization Landscape

  • New Challenges

– Defining the Virtual Network and its scope – Identifying the Virtual Machines on the network and policy enforcement – Added complexity with new layers

Server Server Server

NIC NIC NIC

Physical Switch Router

Network Hypervisor

Virtual Server Virtual Server Virtual Server

VNIC VNIC VNIC

Virtual Switch Router Physical Switch

Evolving Domain

slide-3
SLIDE 3

3

  • Assigning MAC address to virtual NICs (VNIC) and VSwitches

> A randomly created MAC address is preferred to aid virtual machine

migration

> L2 networks are becoming bigger in data centers (1000s of hosts) and

the hosts and becoming more powerful capable of hosting 100s of VM so MAC addresses can collide fairly often

> For a Vswitch to be managed and be a identifyiable entity, it needs to

have a MAC address too

  • Identifying Virtual Machine on the network

> Need mechanisms to find current physical location

  • Policies associated with VNICs and VM migration

> MAC address, B/W limits, ACLs, host resources (CPUs, MIBs, stats, etc)

need to be transferred to destination hypervisor during Virtual Machine migration

> A centralized Port Profile Manager is not preferable since it creates

another point of failure

Components of a Virtual Network

slide-4
SLIDE 4

4

  • Naming and Identifying a Virtual Network
  • Do they span just a layer 2 network or they span multiple IP

networks that can be geographically separated

> Perhaps we can classify them into two three types including a simple

network that just spans a L2

  • Migrating, snapshotting a Virtual Network

Scope of a Virtual Network

slide-5
SLIDE 5

5

  • L2 network open to new attacks

> With SR-IOV virtualized NICs, a VM has ability to send bridge PDU,

OSPF packets, etc and attack the L2 networks in new ways > Some OSes along with NICs can protect themselves but others can't > Some switch can deal with per VM security while others can't > Who does the protection can be a business decision so both modes need to be supported

  • Performance and Security

> Doing security checks twice doesn't improve performance > Clear protocols needed to negotiate who is doing the enforcement so we

don't end up doing it twice (EVB group has some drafts)

> At the same time, need to guarantee that it has been done atleast once

  • Challenges

> The environment gets very dynamic in terms of Number of Virtual

Machines and migration

> The policy enforcement, negotiation needs to scale in this environment

Security in a Virtualized Network

slide-6
SLIDE 6

6

  • For some people, Virtual Network means VLANs

> VLANs do provide functional separation of the broadcast domains but

have no resources attached to them

> The hypervisors have QoS mechanisms that can be set on per VNIC

basis

> Some switches can do QoS per VM basis

  • Challenges

> Too many VMs and VNICs make up a Virtual Network > Configuring them individually is too challenging and error prone > Need a way to tie a group of VMs to a VLAN or extended VLAN and a

mechanism for hypervisor and switch to negotiate B/W sharing mode

Isolation and B/W sharing

slide-7
SLIDE 7

7

  • Statistics in a Virtualized Network

> Need per VNIC statistics – some OSes (like OpenSolaris) do it while

  • thers don't

> Need per Virtual Network aggregated statistics

Diagnostics and Observability

slide-8
SLIDE 8

8

  • Implemented via project Crossbow

> Supports VNICs and Vswitches with NIC H/W assist > Per VNIC MIBs > Supports configurable link speeds (QoS) between VMs > Works with link aggregation and IPMP > VNICs can have VLAN tags assigned to them > VNICs have dedicated NIC, CPU, kernel threads and queues

and are fully isolated from each other within the system

OpenSolaris Network Virtualization

slide-9
SLIDE 9

9

Physical Wire w/Physical Machines

Client Router

Virtual Wire w/Virtual Machines

Host 1 Host 2

Port 6 20.0.03 1 Gbps 1 Gbps 100 Mbps 1 Gbps Port 9 20.0.01 Port 3 10.0.03 Port 1 10.0.01 Port 2 10.0.02

Switch 3 Switch 1 Client Router

(Virtual Router) VNIC6 20.0.03 1 Gbps 1 Gbps 1 Gbps 100 Mbps 1 Gbps VNIC9 20.0.01 VNIC3 10.0.03 VNIC1 10.0.01 VNIC2 10.0.02 1 Gbps

Vswitch 3 Vswitch 1 Host 1 Host 2

Crossbow: Virtual Network in a Box

slide-10
SLIDE 10

10

More details

  • Related Links

> CrossBow: http://opensolaris.org/os/project/crossbow > VNM: http://opensolaris.org/os/project/vnm > Networking: http://opensolaris.org/os/community/networking

  • Research Papers

> Sigcomm VISA 2009 - “Crossbow: From H/W Virtualized NICs to Virtualized

Networks”

> Sigcomm WREN 2009 - “Crossbow: A vertically integrated QoS stack” > Usenix LISA 2009 - “Crossbow Virtual Wire: Network in a Box”

  • All the papers can be accessed via http://blogs.sun.com/sunay
slide-11
SLIDE 11

11

BACKUP

slide-12
SLIDE 12

12 Physical Machine Physical NIC Hardware Lane

C L A S S I F I E R

Virtual NIC

Crossbow 'Hardware Lanes'

Ground Up Design for multi-core and multi-10GigE > Linear Scalability by using 'Hardware Lanes' with dedicated resources > Network Virtualization and QoS designed in the stack > More Efficiency due to 'Dynamic Polling and Packet Chaining'

Hardware Rings/DMA Kernel Threads and Queues Virtual NIC Kernel Threads and Queues Squeue Hardware Rings/DMA Kernel Threads and Queues Virtual Machine/Zone Virtual Machine/Zone Application Switch

VLAN Separated

Hardware Rings/DMA

slide-13
SLIDE 13

13

Virtual Network Containers

Flow Classifier

Exclusive IP Instance

Rx/Tx

DMA

Rx/Tx

DMA

Rx/Tx

DMA

NIC bge0

VNIC1 (100Mbps) VNIC2 (200Mbps) Exclusive IP Instance

Virtual

SQUEUE

Virtual

SQUEUE

Zone

xb1-z1

Zone

xb1-z2

Client

xb2

Client

xb3

Solaris Global Zone Virtualization

  • Flows
  • Virtual NICs & Virtual Switches
  • Virtual Wire

Resource Control

  • Bandwidth Partitioning
  • NIC H/W Partitioning
  • CPUs/pri assignment

Observability

  • Real time usage for each Link/flow
  • Finer grained stats per Link/flow
  • History at no cost
slide-14
SLIDE 14

14

Virtual NIC (VNIC) & Virtual Switches

Virtual NICs

> Functionally physical NICs:

> IP address assigned statically or via DHCP and snooped individually > Appear in MIB as separate 'if' with configured link speed shown as 'ifspeed' > VNICs can be created over Link Aggregation on can be assigned to IPMP groups for load balancing and failover support

> VNICs Can have multiple hardware lanes assigned to them > Can be created over physical NIC (without needing a Vswitch) to

provide external connectivity with switching done in NIC H/W

> VNICs have configurable link speed, CPU and priority assignment > Standards based End to End Network Virtualization

> VLAN tags and Priority Flow Control (PFC) assigned to VNIC extend Hardware Lanes to Switch

> No configuration changes needed on switch to support virtualization

Virtual Switches

> Can be created to provide private connectivity between Virtual

Machines

slide-15
SLIDE 15

15

Virtual Machines

Solaris Guest OS 1 Solaris Guest OS 2 Solaris Host OS Host OS

VIRTUAL SQUEUE All Traffic NIC Virtualization Engine NIC Virtualization Engine NIC Virtualization Engine

Guest OS 1

VIRTUAL SQUEUE

Guest OS 2

VIRTUAL SQUEUE All Traffic Host OS VNIC Guest OS 2 VNIC

NIC

H/W Flow Classifier HTTP

SQUEUE

HTTPS

SQUEUE

DEFAULT

SQUEUE

Virtual NIC Virtual NIC Virtual NIC

Host OS All traffic Guest OS 1 HTTP Guest OS 1 HTTPS Guest OS 1 DEFAULT Guest OS 2 All Traffic