On the Performance Impact of Virtual Link Types to 5G Networking
|
|
- Willis Allison
- 6 years ago
- Views:
Transcription
1 On the Performance Impact of Virtual Link Types to 5G Networking Wen-Ping Lai *, Yong-Hsiang Wang Department of Communications Engineering Yuan Ze University Taoyuan, Taiwan, ROC Abstract Virtual links are important building blocks which connect virtual hosts to form virtual networking within a physical host, and thus their link types can potentially impact the performance of virtual networking. This article studies such a performance impact due to the adopted virtual link type, defined by the associated virtual ports at both ends of the link. Two virtual link types have been investigated, including the native virtual ethernet ports (i.e., veth-pair links) for Linux network namespaces and bridging, and Open vswitch-based internal ports (i.e., internal links). Several design principles are proposed based on our performance benchmarking results, which show substantial performance gaps among these two virtual link types, particularly for a large number of traffic connections, where the CPU capability could play an important role to the amplified level of performance gaps. Further outlooks into the convergence of Cloud/SDN/NFV and 5G networking are projected, where virtual networking plays an important role. Keywords-virtual port type; virtual link type; virtual networking; network namespace; container I. INTRODUCTION The global trend of next-generation networking is rapidly moving towards Cloud/SDN/NFV [1] [2], and has been generating many innovations into our current and future daily life, and network virtualization is becoming the common underlying technology. However, the complications of laying virtual networks over physical networks also impose challenging issues in many aspects. In terms of virtualization types, hypervisor virtualization is a mature technology and has been widely deployed for commercial use, such as many Cloud-based services. Famous hypervisor-virtualization platforms include VMware, VirtualBox and Xen etc. In spite of deployment easiness and wide popularity, this type of virtualization inflexibly divides and thus heavily consumes system resources. The main reason comes from the need of installing a guest operation system (Guest-OS) for generating a virtual machine (VM), not only taking a long provision time for one virtual host, but also needing a pre-determined allocation of system resources. As an emerging technology, container virtualization is remarkable for its fast provision of network deployment and light-weight use of system resources. These advantages come from the fact that a container is no longer a box confining a Guest-OS system, but just a box confining the target applications or processes, along with their associated *Corresponding author. wpl@saturn.yzu.edu.tw libraries. Thus, such a concept can also be perceived as processes containment. Linux container (LXC) and Docker container are two well-known container technologies [3], where network namespaces play the common trick behind both. A container does not only offer system resource isolation for contained processes, but also provides control and management. Isolation of system resources is realized through six different types of Linux kernel namespaces, classified as user, mount, process identity (PID), inter process communication (IPC), Unix time-sharing (UTS), and network. Another trick called control groups (cgroups) is in charge of control and management of system resources. In terms of virtual networking, virtual links are important building blocks which connect virtual hosts to form virtual networks within a single physical host. Furthermore, virtual networks on multiple physical hosts can be physically networked together to form a large cloud overlaying virtual networks. Hence, understanding the performance issue of virtual networking is of great importance, and the performances due to the adopted virtual link types provide the major key to resolve the issue. Typically, a virtual link is characteristic of its associated virtual port(s), and thus its link type is fully determined by its associated port types. The article studies how the virtual port type affects the performance of the virtual link type, and thus affects that of virtual networks. The rest of this article is organized as follow. Section II explains the concepts of namespaces, virtual bridges, virtual link/port types, and finally proposes the design principles for establishing three basic virtual linking topologies of virtual networks. These principles are based on the performance measurements presented in Section III, including analyses and discussions on how the performance gaps among different virtual links are shaped by the number of CPU cores. Finally, Section IV draws the concluding remarks and outlooks into their potential impacts to 5G-based virtual networking. II. PROPOSED DESIGN PRINCIPLES FOR ENHANCING VIRTUAL NEWORK PERFORMANCES The goal of this study is to propose useful design principles for enhancing virtual network performances. As aforementioned, the adopted virtual link type is the key factor affecting the performance of a virtual network. Hence, this study proposes the design principles on how to select an appropriate link type for each of the basic linking topologies of virtual networks which dominates the most frequently applied topologies in virtual networking. These principles are reasoned and verified by our measurements presented in the
2 next section. On the other hand, to pave a good foundation, the following concepts should be understood first before justifying the proposed design principles of using an appropriate virtual link type. A. Network namespace-based virtual hosts Network namespace is the common underlying mechanism for the container technology such as LXC and Docker for next-generation network virtualization. A virtual host can easily and rapidly be created/operated/deleted in terms of a network namespace to let each virtual host obtain its own virtual devices such as virtual network interface cards (vnics), and its own network applications binding to the same well-known application port number, such as port 80 for each per-name-space web server running on different virtual hosts networked within the same physical host. Note that five other kernel namespace types are also involved in isolating system resources: (1) user namespaces for isolation among different user/group ID number spaces, (2) mount namespaces for isolation among different filesystem mount points and thus achieving their own filesystem hierarchy, (3) PID namespaces for isolation among different process ID number spaces to let the same PID be allowable for use on different virtual hosts such as the init process with PID=1, (4) IPC namespaces for isolation among different IPC objects and POSIX message queues to let each virtual host have its own IPC identifiers and message queue filesystem, and (5) UTS namespace for isolation among different system identifiers (both hostname and hostdomain). In addition, cgroups is in charge of controlling and managing system resource allocation among different virtual hosts. As for LXC and Docker [4], more userland APIs and other features are added to enhance system resources' control and management. LXC adds secure Linux (SELinux) profiles, secure computing mode (SECOMP) policies, kernel capabilities, and chroot. Stemming from LXC, Docker introduces more advanced designs, including generating multiple containers from a single image template, which is extractable from a public or private repository for a wide variety of downloadable images. In addition, it has rich APIs for operating containers' life cycles (e.g., creation, attachment, detachment and deletion) and their networking interactions (e.g., port-mapping, direct-linking and bridgedlinking). However, the details of these are beyond the scope of this article. In this study, since network namespace plays the common trick behind both LXC and Docker as aforementioned, only the Linux network namespace (netns) manipulation tool, realized by the native command line interface (CLI) such as ip netns... in the iproute2 toolset [5], is adopted for generating virtual hosts. Note that iproute2, intending for replacing the legacy toolset called net-tools (such as the well-known ifconfig and route commands for configuring NICs and routing tables respectively), has become the default toolset to cope with the advanced kernelspace networking core designs such as NETLINK for traffic engineering and NETFILTER for packet filtering and firewalling. As for virtual networking among virtual hosts, two types of virtual links are discussed below for various virtual linking topologies. B. Virtual Link Types for Various Linking Topologies Direct linking and bridged linking are two fundamental virtual linking topologies that can expand to form more complicated ones. As shown in Fig. 1, direct linking is composed of 2 virtual hosts (e.g., h1 and h2), connected by 1 virtual link, each end of which has an associated virtual ethernet NIC, either called h1-veth or h2-veth. Such a link type is called veth-pair. Note that, when the veth-pair link is initially created in the root namespace (Root-NS) of the physical host, neither of h1-veth or h2-veth is visible to the guest namespaces (h1-ns and h2-ns) of the two virtual hosts, and only the physical host sees them. After they are respectively inserted into h1-ns and h2-ns, the visibility reverses. It is then optional to rename h1-veth and h2-veth as h1-eth0 and h2-eth0 respectively, depending on if such an intuition to dummy users is needed. Bridged linking is composed of two virtual hosts (e.g., h1 and h2) connected by a virtual bridge with two virtual links. Depending on the adopted virtual bridge type and virtual link type, Figs. 2~4 demonstrate three designs of bridged linking: (1) Linux-based bridged linking with 2 vethpair links, (2) OVS-based bridged linking with 2 veth-pair links, and (3) OVS-based bridged linking with 2 internal links, natively stemming from the OVS bridge itself and only equipped with 1 vnic per link to be inserted to a network namespace such as h1-ns or h2-ns. Note that OVS stands for Open vswitch [6], and is not only designed for virtual networking among conventional VMs, but also suitable for SDN realization among physical hosts. This study aims at finding the highest-performance design out of these three linking topologies. Thus, it is interesting to study the following two performance issues: (1) whether the virtual bridge type or the virtual link type casts an stronger impact to the performance, and (2) whether the veth-pair link or the internal link can achieve a higher performance. Fig. 1 Direct linking Fig. 2 Linux-based bridged linking with two veth-pair links Fig. 3 OVS-based bridged linking with two veth-pair links Fig. 4 OVS-based bridged linking with two internal links
3 C. Proposed Design Principles of Using Virtual Link Types This study proposes the following design principles which can resolve the performance issues 1 and 2, as mentioned above and verified by performance measurements and analyses in Section III. Principle 1: Use veth-pair links for direct linking between network namespace-based virtual hosts if direct linking is needed or desired. Principle 2: Use veth-pair links for bridged linking among multiple network namespace-based virtual hosts if only the Linux bridge is available. Principle 3: Instead of veth-pair links, select internal links for bridged linking among multiple network namespace-based virtual hosts whenever the OVS bridge is also available. Note that Principle 1 could be useful to use cases of direct linking, such as customized service chaining in NFV provided by a series of virtual hosts with specific services, where each virtual host pair is directly linked. However, be aware of the performance limit issue with veth-pair links. Also note that there is no significant performance difference between the Linux and OVS bridges if they both use vethpair links, and the major performance improvement is from using internal links, only equipped by the OVS bridge. III. PERFORMANCE MEASUREMENTS AND ANALYSES In order to verify the proposed design principles, this section presents the performance measurements and analyses, in particular for the three bridged linking topologies described by Figs. 2~4. As confirmed by our results, direct linking is natively faster than bridged linking in term of the same link type, and thus only the latter becomes the focus of this article since it is more flexible for network topology forming. In addition, these measurements also offer clear answers to the aforementioned performance issues 1 and 2. The experimental setup of performance benchmarking is described, followed by the performance comparisons among these bridged linking topologies and the in-depth messages they deliver in terms of the number of concurrent TCP traffic flows and the number of CPU cores. A. Experimental Setup of Performance Benchmarking An experimental environment was setup to benchmark the average TCP throughputs over the three bridged linking topologies. As shown in Figs. 2~4, each topology consists of two network namespace-based virtual hosts (i.e., h1-ns and h2-ns) bridged by one Linux or OVS bridge, with two virtual links made of veth-pair or internal ports. To be concise in notations, these three topologies are respectively denoted as LBR+veth-pair, OVS+veth-pair, and OVS+internal. To benchmark the average TCP throughputs, the iperf toolset was adopted to generate concurrent TCP traffic flows, each of which was connected and flowcontrolled between h1-ns (iperf client) and h2-ns (iperf server) and implemented by one iperf thread. The number of concurrent TCP connections, realized by the same number of iperf threads, was set to be {1, 2, 4, 8, 16, 32, 64} to observe its impact on the performance. For each data point in Figs. 2~4, the duration of TCP measurements is 20 seconds long, where iperf reports its TCP throughput values every 2 seconds, and the average TCP throughput was carried out over the 10 measurements in the duration. To control and observer the performance effect due to the number of CPU cores, all the measurements were conducted in an Oracle VirtualBox VM-based Ubuntu-Linux LTS environment with Linux kernel version , running on a desktop computer with 8 Intel i7 CPU cores of 2.8 GHz and 8 GB of main memory, where 4 test environments were setup to run the performance measurements under {1, 2, 3, 4} CPU core(s) and 5 GB of main memory. B. Effect of Concurrent TCP Connections Fig. 5 demonstrates the average TCP throughput variations of the three bridged linking topologies, represented by Figs. 2~4, with the number of concurrent TCP connections between the two virtual hosts. Note that the performance results of Fig. 5 were measured with 4 CPU cores within a VM. Three major messages can be extracted as follow. Each topology shows a clear performance variation with the number of concurrent TCP connections. As the number of iperf connection threads increases, the performance of each topology climbs up initially, and then decays later. Thus, there exists a highest performance peak for each topology. Such a common performance variation behavior is contributed by both the characteristics of TCP in flow and congestion controls. The superiority of the OVS+internal topology over the other two is expressed in terms of three aspects: (1) it can accept 8 concurrent TCP connections for the performance peak, i.e., 2 times those for the performance peaks of the other two; (2) it has a much smoother decay rate than the other two; (3) it has around 2~6 times of performance gains than the other two. The superiority of the OVS+internal topology in performance gains over the other two is so obvious, and it recalls our earlier question raised by performance issue 1: whether the virtual bridge type or the virtual link type casts a stronger impact to the performance. The answer is clear now, based on the following two observations: (1) when using veth-pair links with both the two virtual bridge types, namely LBR+veth-pair and OVS+veth-pair, there is no substantial performance difference between the Linux and OVS bridges; (2) it is only when using internal links with the OVS bridge that the topology's performance gets highly boosted. Namely, it is the virtual link type that casts a much stronger performance impact, instead of the virtual bridge type. In addition, these observations can also answer performance issue 2 as follows: the internal link can achieve a substantially a higher performance than the veth-pair link. C. Effect of CPU Cores Figs. 6~8, together with Fig. 5, explore the performance impact of CPU cores to the performance gaps among the three bridged linking topologies, where the results jointly
4 show a strong effect from the number of CPU cores. Three main messages from these figures can be delivered as follow. In spite of a strong effect of CPU cores on the performance gains, the leading place of the OVS+internal topology still stands firmly over the other two. When the number of CPU cores is less than 4, the performance variations of LBR+veth-pair and OVS+veth-pair behave almost the same. This reconfirms that the virtual bridge type basically make no substantial performance difference. Instead, it is again the virtual link type (i.e., the internal link, stemming from the OVS bridge) that actually achieves substantial performance gains. The performance gains of OVS+internal are strongly tuned by the number of CPU cores. Its performance gaps over the other two topologies are dramatically amplified as the number of CPU cores increases from 1 to 4. IV. CONCLUSIONS AND OUTLOOKS This article studied the performance impacts of virtual bridge types and virtual link types to three bridged linking topologies, serving as build blocks for establishing virtual networking, where the virtual bridge type was selected between the Linux native bridge and the OVS bridge, and the virtual link type was chosen between the veth-pair link and the internal link. Our results showed that the selection of virtual link type has been demonstrated to be much more crucial to optimal performance than that of virtual bridge type. Three design principles were thus proposed, which equivalently states that using internal links is more preferred than using veth-pair links. Due to the fact that internal links actually stem from the OVS bridge, the preference on internal links is equivalent to the preference on the OVS bridge. As an outlook into next-generation networking such as the convergence of Cloud/SDN/NFV, the proposed design Fig. 5 Performance Comparison with 4 CPU cores of VM Fig. 7 Performance Comparison with 2 CPU cores of VM Fig. 6 Performance Comparison with 3 CPU cores of VM Fig. 8 Performance Comparison with 1 CPU core of VM
5 for optimal virtual networking performance by selecting an appropriate virtual link type, such as internal links from the OVS bridge, is of great significance and applicable. As aforementioned, the Docker container technology is emerging as a promising design toolset for next-generation virtual networking, despite that it is still based on the Linux native namespaces for system resources isolation and the Linux cgroups for system resources control and management. However, the default virtual bridge for connecting Docker containers, called docker0, is still made of the Linux bridge, and the default virtual links are still based on the veth-pair link type. Hence, it leaves much room for performance enhancement of Docker-based virtual networking by replacing such a docker0+veth-pair bridged linking topology by the proposed OVS+internal topology, whenever possible. Indeed, the OVS bridge also supports another link type called patch-ports, particularly designed for connection between two OVS bridges. This could be useful if a series of OVS bridges are needed to be linked together for a specific virtual networking design, where the performance benchmarking could also be interesting for future work. In addition, in terms of Cloud and SDN, the OVS bridge is also a natural and better choice. For instance, the support for OpenFlow in the OVS bridge makes it unique and suitable for functioning as a SDN switch. In terms of NFV, which also heavily relies on the Docker technology for network virtualization, the OVS+internal topology is also recommended for performance boost. In fact, an open-source LTE framework called OpenAirInterface (OAI), for both 4G and 5G, is emerging as promising candidates for both research and future commercial uses [7]. For instance, we have observed that advanced concepts of creating virtual entities in the evolved packet core (EPC) [8] of OAI such as vhss, vmme and vsgw-vpgw have been implemented based on the Linux kernel namespaces. In fact, a realization of Docker container-based virtualization of the whole EPC is also publicly available from Eurecom, the creator of OAI. We have also observed a similar virtual-networking framework. Indeed, closer investigations into these two cases studies for virtual networking performances, including the adopted virtual link types and integrating physical networking with the OAI-based enodeb or CloudRAN small cells [9] [10], are currently in progress. [2] Y. Li and M. Chen, Software-defined network function virtualization: a survey, IEEE Access, vol. 3, no. 1, pp , [3] D. Bernstein, Containers and cloud: from LXC to Docker to Kubernetes, IEEE Cloud Computing, vol. 1, no. 3, pp , [4] I. Miell and A. H. Sayers, Docker in Practice. New York: Manning, [5] Linux Foundation Wiki. iproute2 [Online]. Available: [6] Linux Foundation Collaboration Projects. Open vswtich [Online]. Available: [7] N. Nikaein, M. K. Marina, S. Manickam et al., "OpenAirInterface: A flexible platform for 5G research, ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp , [8] The journey to packet core virtualization, Alcatel-Lucent White paper, [9] Commscope. What are C-RAN small cells [Online]. Available: [10] Y. Shi, J. Zhang, and K. B. Letaief, "Group sparse beamforming for green Cloud-RAN," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp , May ACKNOWLEDGMENT This work was partly supported by Taiwan's Ministry of Science and Technology under grant E and Ministry of Education for the advanced-technology course promotion project for mobile broadband under grant REFERENCES [1] D. Kreutz, P. E. Verissimo, and S. Azodolmolky, Software-defined networking: a comprehensive survey, Proceedings of the IEEE, vol. 103, no. 1, pp , 2015.
Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center
Container Adoption for NFV Challenges & Opportunities Sriram Natarajan, T-Labs Silicon Valley Innovation Center Virtual Machine vs. Container Stack KVM Container-stack Libraries Guest-OS Hypervisor Libraries
More informationRDMA Container Support. Liran Liss Mellanox Technologies
RDMA Container Support Liran Liss Mellanox Technologies Agenda Containers 101 RDMA isolation Namespace support Controller support Putting it all together Status Conclusions March 15 18, 2015 #OFADevWorkshop
More informationPerformance Considerations of Network Functions Virtualization using Containers
Performance Considerations of Network Functions Virtualization using Containers Jason Anderson, et al. (Clemson University) 2016 International Conference on Computing, Networking and Communications, Internet
More informationIntroduction to Virtualization and Containers Phil Hopkins
Introduction to Virtualization and Containers Phil Hopkins @twitterhandle Virtualization What is it? Introduction to Virtualization and Containers What the heck is a hypervisor? Why are there so many of
More information1 Virtualization Recap
1 Virtualization Recap 2 Recap 1 What is the user part of an ISA? What is the system part of an ISA? What functionality do they provide? 3 Recap 2 Application Programs Libraries Operating System Arrows?
More informationLINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER
Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including
More informationOS Virtualization. Linux Containers (LXC)
OS Virtualization Emulate OS-level interface with native interface Lightweight virtual machines No hypervisor, OS provides necessary support Referred to as containers Solaris containers, BSD jails, Linux
More informationIntroduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016
Introduction to Container Technology Patrick Ladd Technical Account Manager April 13, 2016 Container Technology Containers 3 "Linux Containers" is a Linux kernel feature to contain a group of processes
More informationHP SDN Document Portfolio Introduction
HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,
More informationCloud Networking (VITMMA02) Server Virtualization Data Center Gear
Cloud Networking (VITMMA02) Server Virtualization Data Center Gear Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest
More informationLinux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat
Linux Containers Roadmap Red Hat Enterprise Linux 7 RC Bhavna Sarathy Senior Technology Product Manager, Red Hat Linda Wang Senior Eng. Manager, Red Hat Bob Kozdemba Principal Soln. Architect, Red Hat
More informationNew Approach to OVS Datapath Performance. Founder of CloudNetEngine Jun Xiao
New Approach to OVS Datapath Performance Founder of CloudNetEngine Jun Xiao Agenda VM virtual network datapath evolvement Technical deep dive on a new OVS datapath Performance comparisons Q & A 2 VM virtual
More informationIntroduction to containers
Introduction to containers Nabil Abdennadher nabil.abdennadher@hesge.ch 1 Plan Introduction Details : chroot, control groups, namespaces My first container Deploying a distributed application using containers
More informationNetwork Function Virtualization over Open DC/OS Yung-Han Chen
Network Function Virtualization over Open DC/OS Yung-Han Chen 2016.05.18 1 Outlines Network Function Virtualization (NFV) Framework Container-based Open Source Solutions for NFV Use Cases 2 NFV Architectural
More informationOS Containers. Michal Sekletár November 06, 2016
OS Containers Michal Sekletár msekleta@redhat.com November 06, 2016 whoami Senior Software Engineer @ Red Hat systemd and udev maintainer Free/Open Source Software contributor Michal Sekletár msekleta@redhat.com
More informationTravis Cardwell Technical Meeting
.. Introduction to Docker Travis Cardwell Tokyo Linux Users Group 2014-01-18 Technical Meeting Presentation Motivation OS-level virtualization is becoming accessible Docker makes it very easy to experiment
More informationUnit 5: Distributed, Real-Time, and Multimedia Systems
Unit 5: Distributed, Real-Time, and Multimedia Systems Unit Overview Unit 5 provides an extension to the core topics of operating systems. It introduces distributed systems and special-purpose operating
More informationHow Container Runtimes matter in Kubernetes?
How Container Runtimes matter in Kubernetes? Kunal Kushwaha NTT OSS Center About me Works @ NTT Open Source Software Center Contributes to containerd and other related projects. Docker community leader,
More informationPaperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper
Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor
More informationVNS3 3.5 Container System Add-Ons
VNS3 3.5 Container System Add-Ons Instructions for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Docker Container Network 7 Uploading a Image or Dockerfile 9 Allocating a Container 13 Saving
More informationIntroduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution
Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution Introduction Service providers and IT departments of every type are seeking
More informationImproving CPU Performance of Xen Hypervisor in Virtualized Environment
ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 5 Issue 3; May-June 2018; Page No. 14-19 Improving CPU Performance of
More informationHY436: Network Virtualization
HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationBuilding a Platform Optimized for the Network Edge
Building a Platform Optimized for the Network Edge MPLS + SDN + NFV WORLD 2018 Nicolas Bouthors, Enea Innovation Agenda Software Virtualization - Key Requirements Leveraging DPDK Multi-Function VNFs at
More informationHigh Performance Containers. Convergence of Hyperscale, Big Data and Big Compute
High Performance Containers Convergence of Hyperscale, Big Data and Big Compute Christian Kniep Technical Account Manager, Docker Brief Recap of Container Technology Brief History of Container Technology
More informationNuage Networks Product Architecture. White Paper
Nuage Networks Product Architecture White Paper Table of Contents Abstract... 3 Networking from the Application s Perspective... 4 Design Principles... 4 Architecture... 4 Integrating Bare Metal Resources...
More informationContainer mechanics in Linux and rkt FOSDEM 2016
Container mechanics in Linux and rkt FOSDEM 2016 Alban Crequy github.com/alban Jonathan Boulle github.com/jonboulle @baronboulle a modern, secure, composable container runtime an implementation of appc
More informationONOS-based Data Plane Acceleration Support for 5G. Dec 4, SKTelecom
ONOS-based Data Plane Acceleration Support for 5G Dec 4, 2018 SKTelecom 0 A Brief Introduction to 5G Network 5G Core Service-based Architecture CP UP Key Functions - UE Authentication - UE Mobility Mgmt.
More informationSplunk N Box. Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer. 9/25/2017 Washington, DC
Splunk N Box Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer 9/25/2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking
More informationAn introduction to Docker
An introduction to Docker Ing. Vincenzo Maffione Operating Systems Security Container technologies on Linux Several light virtualization technologies are available for Linux They build on cgroups, namespaces
More informationLINUX Virtualization. Running other code under LINUX
LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows
More informationA Lightweight OS-Level Virtualization Architecture Based on Android Bo-wen LIU, Nai-jie GU and De-he GU
2017 2nd International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017) ISBN: 978-1-60595-439-4 A Lightweight OS-Level Virtualization Architecture Based on Android Bo-wen
More informationOpenStack Networking: Where to Next?
WHITE PAPER OpenStack Networking: Where to Next? WHAT IS STRIKING IS THE PERVASIVE USE OF OPEN VSWITCH (OVS), AND AMONG NEUTRON FEATURES, THE STRONG INTEREST IN SOFTWARE- BASED NETWORKING ON THE SERVER,
More informationOPENSHIFT FOR OPERATIONS. Jamie Cloud Guy - US Public Sector at Red Hat
1 OPENSHIFT FOR OPERATIONS Jamie Duncan @jamieeduncan Cloud Guy - US Public Sector at Red Hat 20170504 ABOUT JDUNCAN I've been at Red Hat just over 5 years 2 This is my daughter Elizabeth. #cutestthingever
More informationUnify Virtual and Physical Networking with Cisco Virtual Interface Card
White Paper Unify Virtual and Physical Networking with Cisco Virtual Interface Card Simplicity of Cisco VM-FEX technology and Power of VMware VMDirectPath What You Will Learn Server virtualization has
More informationDocker A FRAMEWORK FOR DATA INTENSIVE COMPUTING
Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Agenda Intro / Prep Environments Day 1: Docker Deep Dive Day 2: Kubernetes Deep Dive Day 3: Advanced Kubernetes: Concepts, Management, Middleware Day 4:
More informationNIC TEAMING IEEE 802.3ad
WHITE PAPER NIC TEAMING IEEE 802.3ad NIC Teaming IEEE 802.3ad Summary This tech note describes the NIC (Network Interface Card) teaming capabilities of VMware ESX Server 2 including its benefits, performance
More informationNetworking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu
Networking in Virtual Infrastructure and Future Internet NCHC Jen-Wei Hu Overview Virtualization Networking in Virtualization Future Internet 2 Hardware virtualization Hardware virtualization techniques
More informationPower Efficiency of Hypervisor and Container-based Virtualization
Power Efficiency of Hypervisor and Container-based Virtualization University of Amsterdam MSc. System & Network Engineering Research Project II Jeroen van Kessel 02-02-2016 Supervised by: dr. ir. Arie
More informationEE 660: Computer Architecture Cloud Architecture: Virtualization
EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar
More informationIntegrate OAI-as-a-Service into M-CORD. Wilson Wang Chien-Hao Chen Wei-Yu Chen Ching Tang
Integrate OAI-as-a-Service into M-CORD Wilson Wang Chien-Hao Chen Wei-Yu Chen Ching Tang 1 About Us Wilson Wang (ITRI / NCTU) Chien-Hao Chen (ITRI) Jimmy Wen (ITRI) Wei-Yu Chen (NCTU) Ching Tang (NCTU)
More informationAn Analysis and Empirical Study of Container Networks
An Analysis and Empirical Study of Container Networks Kun Suo *, Yong Zhao *, Wei Chen, Jia Rao * University of Texas at Arlington *, University of Colorado, Colorado Springs INFOCOM 2018@Hawaii, USA 1
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationContainer System Overview
Container System Overview 2018 Table of Contents Introduction 3 Container Network 7 Uploading an Image or Dockerfile 9 Allocating a Container 13 Saving a Running Container 15 Access Considerations 18 2
More informationUnderstanding The Performance of DPDK as a Computer Architect
Understanding The Performance of DPDK as a Computer Architect XIAOBAN WU *, PEILONG LI *, YAN LUO *, LIANG- MIN (LARRY) WANG +, MARC PEPIN +, AND JOHN MORGAN + * UNIVERSITY OF MASSACHUSETTS LOWELL + INTEL
More informationContainers and isolation as implemented in the Linux kernel
Containers and isolation as implemented in the Linux kernel Technical Deep Dive Session Hannes Frederic Sowa Senior Software Engineer 13. September 2016 Outline Containers and isolation
More informationCSC 5930/9010 Cloud S & P: Virtualization
CSC 5930/9010 Cloud S & P: Virtualization Professor Henry Carter Fall 2016 Recap Network traffic can be encrypted at different layers depending on application needs TLS: transport layer IPsec: network
More informationData Path acceleration techniques in a NFV world
Data Path acceleration techniques in a NFV world Mohanraj Venkatachalam, Purnendu Ghosh Abstract NFV is a revolutionary approach offering greater flexibility and scalability in the deployment of virtual
More informationAvailable online at ScienceDirect. Procedia Computer Science 98 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 98 (2016 ) 515 521 The 3rd International Symposium on Emerging Information, Communication and Networks (EICN 2016) A Speculative
More informationOPTIMAL METHOD FOR SHARING INTERNET IN WIRELESS MESH NETWORK USING FIXED- BAND NON-SHARING, NON-FIXED-BAND NON-SHARING / SHARING ALGORITHMS
OPTIMAL METHOD FOR SHARING INTERNET IN WIRELESS MESH NETWORK USING FIXED- BAND NON-SHARING, NON-FIXED-BAND NON-SHARING / SHARING ALGORITHMS Palanivel.N Assistant Professor Department of CSE Manakula Vinayagar
More informationImplementation and Analysis of Large Receive Offload in a Virtualized System
Implementation and Analysis of Large Receive Offload in a Virtualized System Takayuki Hatori and Hitoshi Oi The University of Aizu, Aizu Wakamatsu, JAPAN {s1110173,hitoshi}@u-aizu.ac.jp Abstract System
More informatione-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text
e-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text 1. Introduction Virtualization is a necessary mechanism in a data center
More informationLXC(Linux Container) Lightweight virtual system mechanism Gao feng
LXC(Linux Container) Lightweight virtual system mechanism Gao feng gaofeng@cn.fujitsu.com 1 Outline Introduction Namespace System API Libvirt LXC Comparison Problems Future work 2 Introduction Container:
More informationHillstone CloudEdge For Network Function Virtualization (NFV) Solutions
Hillstone CloudEdge For Network Function Virtualization (NFV) Solutions Introduction With the advancing technologies, business applications and operations naturally have become more dynamic in order to
More informationEnd to End SLA for Enterprise Multi-Tenant Applications
End to End SLA for Enterprise Multi-Tenant Applications Girish Moodalbail, Principal Engineer, Oracle Inc. Venugopal Iyer, Principal Engineer, Oracle Inc. The following is intended to outline our general
More informationAbstract. Testing Parameters. Introduction. Hardware Platform. Native System
Abstract In this paper, we address the latency issue in RT- XEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler
More informationOS Security III: Sandbox and SFI
1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS
More informationDesign and Implementation of Log Collection and System Statistics Model for Android Containers in OpenStack
ISBN 978-93-86878-04-5 6th International Conference on Science, Engineering, Technology and Healthcare (SETH-2017) Kuala Lumpur (Malaysia), Nov. 20-21, 2017 Design and Implementation of Log Collection
More informationVIRTUALIZATION IN OPENFLOW NETWORKS
VIRTUALIZATION IN OPENFLOW NETWORKS Miladin Tomić, Milutin Radonjić, Neđeljko Lekić, Igor Radusinović Keywords: FlowVisor, OpenFlow, SDN, virtualization. Abstract: Network virtualization allows network
More informationOpenStack hypervisor, container and Baremetal servers performance comparison
OpenStack hypervisor, container and Baremetal servers performance comparison Yoji Yamato a) Software Innovation Center, NTT Corporation, 3 9 11 Midori-cho, Musashino-shi, Tokyo 180 8585, Japan a) yamato.yoji@lab.ntt.co.jp
More informationSAINT LOUIS JAVA USER GROUP MAY 2014
SAINT LOUIS JAVA USER GROUP MAY 2014 STEVEN BORRELLI steve@borrelli.org @stevendborrelli ABOUT ME FIRST COMPUTER: SYSTEMS ENGINEERING MANAGEMENT FOUNDER, ASTERIS (JAN 2014) @ ORGANIZER OF STL MACHINE LEARNING
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More informationEXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS
EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,
More informationDocker Deep Dive. Daniel Klopp
Docker Deep Dive Daniel Klopp The Talk I m not telling you what fishing rod to use The Talk I m not telling you what fishing rod to use I m helping you understand the fishing rod The Talk I m not telling
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationA Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Software-Defined Networking Security Controller Architecture Fengjun Shang, Qiang Fu College of Computer Science
More informationVirtualization of Customer Premises Equipment (vcpe)
Case Study Virtualization of Customer Premises Equipment (vcpe) Customer Profile Customer: A Cloud Service Provider Reach: Global Industry: Telecommunications The Challenge A Cloud Service Provider serving
More informationFor personnal use only
Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.
More informationOpen Packet Processing Acceleration Nuzzo, Craig,
Open Packet Processing Acceleration Nuzzo, Craig, cnuzz2@uis.edu Summary The amount of data in our world is growing rapidly, this is obvious. However, the behind the scenes impacts of this growth may not
More informationComparing Open vswitch (OpenFlow) and P4 Dataplanes for Agilio SmartNICs
Comparing Open vswitch (OpenFlow) and P4 Dataplanes for Agilio SmartNICs Johann Tönsing May 24, 206 206 NETRONOME Agenda Contributions of OpenFlow, Open vswitch and P4 OpenFlow features missing in P4,
More informationISLET: Jon Schipp, AIDE jonschipp.com. An Attempt to Improve Linux-based Software Training
ISLET: An Attempt to Improve Linux-based Software Training Jon Schipp, AIDE 2015 jonschipp@gmail.com, @Jonschipp, jonschipp.com About me: Security Engineer for the National Center for Supercomputing Applications
More informationHuawei FusionSphere 6.0 Technical White Paper on OpenStack Integrating FusionCompute HUAWEI TECHNOLOGIES CO., LTD. Issue 01.
Technical White Paper on OpenStack Integrating Issue 01 Date 2016-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or
More informationAutomated and Massive-scale CCNx Experiments with Software-Defined SmartX Boxes
Network Research Workshop Proceedings of the Asia-Pacific Advanced Network 2014 v. 38, p. 29-33. http://dx.doi.org/10.7125/apan.38.5 ISSN 2227-3026 Automated and Massive-scale CCNx Experiments with Software-Defined
More informationNEC Virtualized Evolved Packet Core vepc
TE-524262 NEC Virtualized Evolved Packet Core vepc Design Concepts and Benefits INDEX Leading the transformation into Mobile Packet Core Virtualization P.3 vepc System Architecture Overview P.4 Elastic
More informationSoftware Defined Networking: A New Networking Approach
Software Defined Networking: A New Networking Approach Gunjan Katwal #, Ayushi Nainwal * # Computer Science, AP Goyal University Shimla 1 gun363@gmail.com 2 AyushiNainwal@gmail.com ABSTRACT Software defined
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More information[Docker] Containerization
[Docker] Containerization ABCD-LMA Working Group Will Kinard October 12, 2017 WILL Kinard Infrastructure Architect Software Developer Startup Venture IC Husband Father Clemson University That s me. 2 The
More informationFairness Issues in Software Virtual Routers
Fairness Issues in Software Virtual Routers Norbert Egi, Adam Greenhalgh, h Mark Handley, Mickael Hoerdt, Felipe Huici, Laurent Mathy Lancaster University PRESTO 2008 Presenter: Munhwan Choi Virtual Router
More informationVM Migration, Containers (Lecture 12, cs262a)
VM Migration, Containers (Lecture 12, cs262a) Ali Ghodsi and Ion Stoica, UC Berkeley February 28, 2018 (Based in part on http://web.eecs.umich.edu/~mosharaf/slides/eecs582/w16/021516-junchenglivemigration.pptx)
More informationEmulex Universal Multichannel
Emulex Universal Multichannel Reference Manual Versions 11.2 UMC-OCA-RM112 Emulex Universal Multichannel Reference Manual Corporate Headquarters San Jose, CA Website www.broadcom.com Broadcom, the pulse
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationHOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch
HOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch 1 Target audience System Engineers interested to understand the Fabric Attach (FA) technology and/or for demo proposes. Why does it make sense
More informationTEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS
E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand
More informationFast packet processing in the cloud. Dániel Géhberger Ericsson Research
Fast packet processing in the cloud Dániel Géhberger Ericsson Research Outline Motivation Service chains Hardware related topics, acceleration Virtualization basics Software performance and acceleration
More informationAccelStor All-Flash Array VMWare ESXi 6.0 iscsi Multipath Configuration Guide
AccelStor All-Flash Array VMWare ESXi 6.0 iscsi Multipath Configuration Guide 1 Table of Contents Introduction... 3 Prerequisites... 3 Hardware Configurations... 4 Storage... 4 VMWare ESXi Server... 4
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper More Efficient Virtualization Management: Templates www.parallels.com Version 2.0 Table of Contents Table of Contents... 2 OS, Middleware or VM Sprawl... 3 Why
More informationXen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems
Xen and CloudStack Ewan Mellor Director, Engineering, Open-source Cloud Platforms Citrix Systems Agenda What is CloudStack? Move to the Apache Foundation CloudStack architecture on Xen The future for CloudStack
More informationCisco HyperFlex Systems
White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data
More informationTHE VMTURBO CLOUD CONTROL PLANE
THE VMTURBO CLOUD CONTROL PLANE Software-Driven Control for the Software-Defined Data Center EXECUTIVE SUMMARY The Software-Defined Datacenter (SDDC) has the potential to extend the agility, operational
More informationSurvey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016
Survey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016 VNFaaS (Virtual Network Function as a Service) In our present work, we consider the VNFaaS use-case
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationInternational Journal of Advance Engineering and Research Development. DPDK-Based Implementation Of Application : File Downloader
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 3, March -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 DPDK-Based
More informationHuawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers
Huawei CloudFabric and ware Collaboration Innovation Solution in Data Centers ware Data Center and Cloud Computing Solution Components Extend virtual computing to all applications Transform storage networks
More informationVIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD
VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD Truls Myklebust Director, Product Management Brocade Communications 2011 Brocade Communciations - All Rights Reserved 13 October 2011 THE ENTERPRISE IS GOING
More informationITU-T Y Next generation network evolution phase 1 Overview
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project
ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies
More informationDockercon 2017 Networking Workshop
Dockercon 2017 Networking Workshop Mark Church, Technical Account Manager @ Docker Lorenzo Fontana, Docker Captain Nico Kabar, Solutions Architect @ Docker Agenda 1. Container Network Model 2. Docker Networking
More informationKata Containers The way to run virtualized containers. Sebastien Boeuf, Linux Software Engineer Intel Corporation
Kata Containers The way to run virtualized containers Sebastien Boeuf, Linux Software Engineer Intel Corporation https://regmedia.co.uk/2017/09/11/shutterstock_containers_in_port.jpg Containers 101 Process
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights ORACLE PRODUCT LOGO Solaris 11 Networking Overview Sebastien Roy, Senior Principal Engineer Solaris Core OS, Oracle 2 Copyright 2011, Oracle and/or
More information