vnf chain allocation and management at data center scale
play

VNF Chain Allocation and Management at Data Center Scale Internet - PowerPoint PPT Presentation

VNF Chain Allocation and Management at Data Center Scale Internet Cloud Provider Tenants Nodir Kodirov , Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger Hoos, Alan Hu Network Functions (NF) are useful and widespread Security


  1. VNF Chain Allocation and Management at Data Center Scale … Internet Cloud Provider Tenants Nodir Kodirov , Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger Hoos, Alan Hu

  2. Network Functions (NF) are useful and widespread • Security DDoS protection • Firewall, DDoS protection, DPI • Monitoring session border controller load balancer ad insertion • QoE monitor, Network Stats • Services IDS WAN accelerator BRAS carrier-grade • Ad insertion, Transcoder NAT • Network optimization QoE monitor transcoder • NAT, Load-balancer, WAN accelerator firewall DPI Sherry et al. find # of middleboxes are ≈ to # of L2/L3 devices in enterprise Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, SIGCOMM'12 2

  3. Network Functions (NF) are useful and widespread • Security • Firewall, DDoS protection, DPI DDoS protection • Monitoring session border controller load balancer ad insertion • QoE monitor, Network Stats • Services IDS WAN accelerator BRAS carrier-grade • Ad insertion, Transcoder NAT • Network optimization QoE monitor transcoder • NAT, Load-balancer, WAN accelerator firewall DPI Sherry et al. find # of middleboxes are ≈ to # of L2/L3 devices in enterprise Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, SIGCOMM'12 3

  4. Benefits of Virtualized Network Functions (VNF) • Elasticity DDoS protection • Quick scale up and down NFs • Fast upgrades session border controller load balancer ad insertion • No need to wait for new hardware • Quick configuration, recovery IDS WAN accelerator BRAS carrier-grade NAT • Failover to the backup NF instance QoE monitor transcoder • Outsourcing firewall DPI Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, SIGCOMM’12 Rajagopalan et al., Split/Merge: System Support for Elastic Execution in Virtual Middleboxes, NSDI’13 4 Martins et al., ClickOS and the Art of Network Function Virtualization, NSDI'14

  5. Outsourcing VNFs to the Cloud Cloud Provider 5

  6. Outsourcing VNFs to the Cloud … Internet Tenants Cloud Provider 6

  7. Outsourcing VNFs to the Cloud … Internet Tenants Cloud Provider 7

  8. Outsourcing VNF Chains to the Cloud … Internet chain Tenants Cloud Provider 8

  9. Outsourcing VNF Chains to the Cloud … Internet chain Tenants Cloud Provider 9

  10. Challenges of outsourcing VNF Chains How can cloud providers achieve How can tenants allocate and high data center utilization? manage their VNF chains? … … Internet chain Tenants Cloud Provider 10

  11. Our contributions: API and algorithm How can cloud providers achieve How can tenants allocate and high data center utilization? manage their VNF chains? • API to allocate and manage VNF chains • Three algorithms … • implement the API, and Internet • achieve high data center utilization Tenants Cloud Provider • Evaluation • simulate: in data center scale with 1000+ servers • Daisy: emulate chain management at rack-scale 11

  12. VNF Chain: six API with use-cases 1 2 1 1 2 NAT 2 FW IDS VPN Initial chain cid ⟵ allocate-chain(C, bw) remove-link-bandwidth(a, b, bw, cid) remove-node(f, cid) add-link-bandwidth(a, b, bw, cid) remove-e2e-bandwidth(cid, bw) add-node(f, cid) 1 1 2 2 1 1 2 NAT FW IDS VPN 3 2 2 3 NAT 3 FW IDS VPN 1 1 IDS’ Chain scale-out Element upgrade 12

  13. VNF Chain: API is expressive 1 2 1 1 2 NAT 2 FW IDS VPN Initial chain cid ⟵ allocate-chain(C, bw) remove-link-bandwidth(a, b, bw, cid) remove-node(f, cid) add-link-bandwidth(a, b, bw, cid) remove-e2e-bandwidth(cid, bw) add-node(f, cid) A graph can be transformed arbitrarily by manipulating individual nodes and edges. Chain scale-out Element upgrade Chain expand … 13

  14. Scale-out beyond single physical resource capacity 1 2 1 1 2 NAT 2 FW IDS VPN Initial chain cid ⟵ allocate-chain(C, bw) (a, b, bw, cid) (f, cid) add-link-bandwidth(a, b, bw, cid) (cid, bw) (f, cid) 100 Gateway 10 40 40 50 40 50 50 NAT FW IDS 40 VPN ToR1 ToR2 40 40 Chain scale-out 14

  15. Chain Abstraction: Abstract-Concrete VNF Chains 10 • Abstract VNF chain 50 40 50 40 50 NAT FW IDS VPN • what tenant requires to allocate Abstract chain (for Tenants) and operates on • Concrete VNF chain • cloud provider’s implementation of the abstract chain 1 • Chains abstraction advantages 5 5 4 4 5 NAT FW IDS VPN • facilitates high DC utilization 10× … 1 • Challenges 5 5 4 4 5 • low-latency, packet loss, NAT FW IDS VPN state synchronization, efficiency loss Concrete chains (see the paper and ANCS’18 poster) (for Cloud provider) 15

  16. Our contributions: API and algorithm How can cloud providers achieve How can tenants allocate and high data center utilization? manage their VNF chains? • API to allocate and manage VNF chains • Three algorithms … • implement the API, and Internet • achieve high data center utilization Tenants Cloud Provider • Evaluation • simulate: in data center scale with 1000+ servers • Daisy: emulate chain management at rack-scale 16

  17. Algorithm inputs: DC topology and chain 1 Gateway 100 100 2 1 2 2 1 NAT FW IDS VPN 40 AggSw1 AggSw2 40 40 40 40 1/8 core 3/8 core 1/2 core 1/4 core 1/2 GB 1/2 GB 2 GB 1/2 GB ToR1 ToR2 [ 2048 TCAM ] [ 2048 TCAM ] 10 10 Expected resource consumption per Gbps of traffic ] ] [ [ 32 core 32 core (see the paper for VNF profile generation) 128 GB 128 GB Palkar et al., E2: A Framework for NFV Applications, SOSP’15 Naik et al., NFVPerf: Online performance monitoring and bottleneck detection for NFV, IEEE NFV-SDN 2016. 17 Nam et al., Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV, SOSR'18

  18. Algorithms for Chain Allocation and Management 1 2 2 1 1 2 NAT FW IDS VPN Gateway 100 100 40 AggSw1 AggSw2 40 40 40 40 ToR1 ToR2 [ 2048 TCAM ] [ 2048 TCAM ] 10 10 ] ] [ [ 32 core 32 core 128 GB 128 GB 18

  19. Algorithms for Chain Allocation and Management • Random (baseline) 2 2 1 1 2 NAT IDS • Consider NFs and servers/switches in random order • Attempt the above step n times (e.g., n=100) Gateway • Choose the shortest path between chain NFs 100 100 40 AggSw1 AggSw2 40 40 40 40 FW ToR1 ToR2 [ 2048 TCAM ] [ 2048 TCAM ] 10 10 ] ] [ [ 32 core 32 core VPN 128 GB 128 GB 19

  20. Algorithms for Chain Allocation and Management • Random (baseline) • Consider NFs and servers/switches in random order Commercial Facebook E2 • Attempt the above step n times (e.g., n=100) # of allocated chains • Choose the shortest path between chain NFs N NetPack NetPack • NetPack: Random + 3 simple heuristics NetPack NetPack NetPack Random • Consider the chain NFs in a topological order • Re-use the same server when allocating consecutive NFs Random • Gradually increase the network scope: rack, cluster, etc. R R R R 10-node Palkar et al., E2: A Framework for NFV Applications, SOSP’15 20 Bayless et al., SAT Modulo Monotonic Theories, AAAI'15

  21. Algorithms for Chain Allocation and Management • Random (baseline) Commercial Facebook E2 • Consider NFs and servers/switches in random order # of allocated chains ? ? • Attempt the above step n times (e.g., n=100) ? ? ? ? N • Choose the shortest path between chain NFs NetPack NetPack NetPack NetPack NetPack • NetPack: Random + 3 simple heuristics Random • Consider the chain NFs in a topological order Random • Re-use the same server when allocating consecutive NFs R R R • Gradually increase the network scope: rack, cluster, etc. R 10-node • VNFSolver: how optimal is NetPack? • Constraint-solver based chain allocation algorithm • Slow, but complete: finds a solution when one exists Palkar et al., E2: A Framework for NFV Applications, SOSP’15 21 Bayless et al., SAT Modulo Monotonic Theories, AAAI'15

  22. Our contributions: API and algorithm How can cloud providers achieve How can tenants allocate and high data center utilization? manage their VNF chains? • API to allocate and manage VNF chains • Three algorithms … • implement the API, and Internet • achieve high data center utilization Tenants Cloud Provider • Evaluation • simulate: in data center scale with 1000+ servers • Daisy: emulate chain management at rack-scale 22

  23. Evaluation: Objectives • How good is the data center utilization? • Evaluate Random, NetPack, and VNFSolver • Consider three different data center topologies • Use five different VNF chains with varying length (2-10) • How fast is chain allocation? • Measure time it takes to saturate the data center • Does API reliably implement the use-cases? • Prototype scale-out and chain upgrade in Daisy • Use two different racks, two sources of packet traces 23

  24. Data center utilization evaluation 1 2 2 1 1 2 NAT FW IDS VPN Palkar et al., E2: A Framework for NFV Applications, SOSP'15 24

  25. Data center utilization evaluation NetPack achieves at least 96% of VNFSolver allocations. Chain allocation time: Random ≲ NetPack ≪ VNFSolver. Palkar et al., E2: A Framework for NFV Applications, SOSP'15 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend