Network function virtualization

Size: px
Start display at page:

Download "Network function virtualization"

Transcription

1 Network function virtualization Ankit Singla ETH Zürich Spring 2017

2 News from SIGCOMM papers (out of 250 submissions) On every topic we covered / will cover 2 papers from ETH! 2

3 An update Beyond fat-trees without antennae, mirrors, and disco-balls 92, 12 pages + (1) references ACM SIGCOMM, 2017 Under submission Simon Kassing (MSc,

4 This lecture What are network functions? Why / how might we want to virtualize them? Intro: Generalizing congestion control TCP ex Machina: Computer-Generated Congestion Control 4

5 Our view of networks so far 5

6 Network functions / middleboxes ad insertion WAN accelerator Middleboxes vs. end-to-end principle? BRAS carrier-grade NAT transcoder session border controller IDS Middleboxes vs. fate-sharing principle? load balancer DDoS protection firewall QoE monitor DPI ClickOS and the Art of Network Function Virtualization, Usenix NSDI 14 Joao Martins, Mohamed Ahmed, Costin Raiciu, Roberto Bifulco, Vladimir Olteanu, Michio Honda, Felipe Huici 6

7 Middleboxes are ubiquitous Very Large Large Medium Small L3 Routers All Middleboxes L2 Switches IP Firewalls App. Firewalls Proxies Wan Opt. App. Gateways VPNs Load Balancers IDS/IPS ure 1: Box plot of middlebox deployments for small (fewer than 1k hosts), medium (1k-10k hosts), large (10k-100k hosts As many middleboxes as routers or switches! Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service, ACM SIGCOMM 12 Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, Vyas Sekar 7

8 Middleboxes are complex Misconfig. Overload Physical/Electric Firewalls 67.3% 16.3% 16.3% Proxies 63.2% 15.7% 21.1% IDS 54.5% 11.4% 34% 1-5 hours per week dealing with middlebox failures Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service, ACM SIGCOMM 12 Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, Vyas Sekar 8

9 Middleboxes are expensive 5 Year Expenditure $1M-50M $500K-1M $50K-500K $5K-50K <$5K Number of Middleboxes re 2: Administrator-estimated spending on midd Additional expense on specialist engineers to manage them Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service, ACM SIGCOMM 12 Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, Vyas Sekar 9

10 Wasteful replication of functionality Drop Firewall: Read Packets Header Classifier Output Alert Load balancer: Read Packets Header Classifier Output Rewrite Header Intrusion prevention system: DPI Drop Read Packets Header Classifier DPI Alert Output OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions, ACM SIGCOMM 16 Bremlar-Barr, Harchol, Hay 10

11 Middleboxes are black-boxes Firewall IDS Load balancer Monolithic hard to understand, debug, upgrade, provision Long deployment timelines No standards, vendor lock-in, slow innovation 11

12

13 As always: problems = opportunities! Software defined middleboxes? - Standardized low-level API? - Centralized, consolidated control? Consolidate middleboxes? Virtualized middleboxes? Offload middleboxes to the cloud? - Peak load average load 13

14 14

15 Consolidating middleboxes Normalized utilization WAN optimizer Proxy ,06: ,17:00 Load Balancer Firewall 07-10,04:00 Time (mm-dd,hr) 07-10,15: ,02:00 Peaks aren t aligned multiplexing can yield benefits Design and Implementation of a Consolidated Middlebox Architecture, Usenix NSDI 12 Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi 15

16 Consolidating middleboxes VPN WanOpt IDS Proxy Firewall Protocol'Parsers' Session'Management' Re-use underlying machinery: packet I/O, parsing and processing Design and Implementation of a Consolidated Middlebox Architecture, Usenix NSDI 12 Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi 16

17 Consolidating middleboxes Core 1 Core 2 Core 3 M1 M2 M3 M1 M4 M5 M1 M4 Hyper& Hyper& Hyper& Hyper& Hyper& App1& App2& App3& App4& App3& PShim& PShim& PShim& PShim& PShim& Q1 Q2 Q3 Q4 Q5 NIC hardware Design and Implementation of a Consolidated Middlebox Architecture, Usenix NSDI 12 Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi 17

18 Network-wide coordination P1: N1! N2 T1 15 T2 30 T3 15 N1 N2 P3: N3! N1 T1 15 T2 15 T3 30 P2: N2! N3 T1 15 T2 15 T3 30 N3 N1 s assignment N2 s assignment N3 s assignment P1# P2# P3# T1# 15# 0# 5# 20# T2# 20# 0# 0# 20# T3# 15# 0# 5# 20# P1# P2# P3# T1# 0# 15# 5# 20# T2# 10# 10# 0# 20# T3# 0# 20# 0# 20# P1# P2# P3# T1# 0# 0# 20# 20# T2# 0# 5# 15# 20# T3# 0# 10# 10# 20# 18

19 Benefits of consolidation & spatial distribution 25 MaxLoad Today '/MaxLoad Consolidated '' Relative savings Abilene Geant Enterprise AS1221 AS3257 AS

20 Software-defined middleboxes Network functions: OpenBox apps Logically centralized controller Control plane Data plane Data packets OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions, ACM SIGCOMM 16 Bremlar-Barr, Harchol, Hay 20

21 Have the cloud take care of it? rise under different outsourcing options. APLOMB Control Plane Client Registration DNS IP Middlebox Monitoring & Invocation Redirection Client PoP Cloud Instances APLOMB Enterprise Site Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service, ACM SIGCOMM 12 Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, Vyas Sekar 21

22 Challenge: managing NF state OpenNF: Enabling Innovation in Network Function Control, ACM SIGCOMM 14 Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella 22

23 Looking to the future Wasteful replication of functionality Drop Firewall: Read Packets Header Classifier Alert Output Load balancer: Read Packets Header Classifier Rewrite Header Output Intrusion prevention system: Read Packets Header Classifier DPI DPI Drop Alert Output OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions, ACM SIGCOMM 16 Bremlar-Barr, Harchol, Hay What else shares the common parts of these pipelines? 23

24 Weekly reading guide

25 TCP falls short. Again. TCP ex Machina: Computer-Generated Congestion Control Keith Winstein and Hari Balakrishnan Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology, Cambridge, Mass. hw, ACM SIGCOMM, TCP s brittle rule-action design Can machine-generated congestion control work? Control / learning approaches to CC? 25

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy, Sylvia Ratnasamy*, and Vyas Sekar * Typical Enterprise

More information

Design and Implementa/on of a Consolidated Middlebox Architecture. Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi

Design and Implementa/on of a Consolidated Middlebox Architecture. Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi Design and Implementa/on of a Consolidated Middlebox Architecture Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi 1 Need for Network Evolu/on New applica/ons Evolving threats Performance,

More information

15-744: Computer Networking. Middleboxes and NFV

15-744: Computer Networking. Middleboxes and NFV 15-744: Computer Networking Middleboxes and NFV Middleboxes and NFV Overview of NFV Challenge of middleboxes Middlebox consolidation Outsourcing middlebox functionality Readings: Network Functions Virtualization

More information

Enabling Fast, Dynamic Network Processing with ClickOS

Enabling Fast, Dynamic Network Processing with ClickOS Enabling Fast, Dynamic Network Processing with ClickOS Joao Martins*, Mohamed Ahmed*, Costin Raiciu, Roberto Bifulco*, Vladimir Olteanu, Michio Honda*, Felipe Huici* * NEC Labs Europe, Heidelberg, Germany

More information

Network Function Virtualization. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli

Network Function Virtualization. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli Network Function Virtualization CSU CS557, Spring 2018 Instructor: Lorenzo De Carli Managing middleboxes Middlebox manifesto (ref. previous lecture) pointed out the need for automated middlebox management

More information

Middleboxes. CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli

Middleboxes. CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli Middleboxes CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli What is a middlebox? Middlebox : networking parlance for any network device which performs analysis and/or transformation of application-level

More information

VNF Chain Allocation and Management at Data Center Scale

VNF Chain Allocation and Management at Data Center Scale VNF Chain Allocation and Management at Data Center Scale Internet Cloud Provider Tenants Nodir Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger Hoos, Alan Hu Network Functions (NF) are useful

More information

Abstrac(ons for Middleboxes. à StonyBrook

Abstrac(ons for Middleboxes. à StonyBrook Abstrac(ons for Middleboxes Vyas Sekar Intel Labs à StonyBrook Sylvia Ratnasamy UC Berkeley 1 Need for In- Network Func(ons Changing applica(ons Evolving threats Performance Security Compliance Policy

More information

Making Network Functions Software-Defined

Making Network Functions Software-Defined Making Network Functions Software-Defined Yotam Harchol VMware Research / The Hebrew University of Jerusalem Joint work with Anat Bremler-Barr and David Hay Appeared in ACM SIGCOMM 2016 THE HEBREW UNIVERSITY

More information

COCONUT: Seamless Scale-out of Network Elements

COCONUT: Seamless Scale-out of Network Elements COCONUT: Seamless Scale-out of Network Elements Soudeh Ghorbani P. Brighten Godfrey University of Illinois at Urbana-Champaign Simple abstractions Firewall Loadbalancer Router Network operating system

More information

Placement Strategies for Virtualized Network Functions in a NFaaS Cloud

Placement Strategies for Virtualized Network Functions in a NFaaS Cloud 216 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies Placement Strategies for Virtualized Network Functions in a NFaaS Cloud Xin He Tian Guo Erich Nahum Prashant Shenoy University of

More information

A Ten Minute Introduction to Middleboxes. Justine Sherry, UC Berkeley

A Ten Minute Introduction to Middleboxes. Justine Sherry, UC Berkeley A Ten Minute Introduction to Middleboxes Justine Sherry, UC Berkeley This Talk: Three Questions! What is a middlebox? What are some recent trends in middlebox engineering? What research challenges do middleboxes

More information

Virtual Function Placement and Traffic Steering in Flexible and Dynamic Software Defined Networks

Virtual Function Placement and Traffic Steering in Flexible and Dynamic Software Defined Networks Virtual Function Placement and Traffic Steering in Flexible and Dynamic Software Defined Networks Ali Mohammadkhan, Sheida Ghapani, Guyue Liu, Wei Zhang, K. K. Ramakrishnan, and Timothy Wood University

More information

Enabling innovation in the Internet: Main Achievements of the CHANGE Project. Felipe Huici, NEC Europe

Enabling innovation in the Internet: Main Achievements of the CHANGE Project. Felipe Huici, NEC Europe Enabling innovation in the Internet: Main Achievements of the CHANGE Project Felipe Huici, NEC Europe EU FP7 CHANGE Project Info: Start in Oct. 2010, will end in December 2013 Partner Eurescom (Prime Contractor)

More information

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Justine Sherry UC Berkeley Arvind Krishnamurthy University of Washington Shaddi Hasan UC Berkeley Sylvia Ratnasamy UC Berkeley

More information

Mobile Applications on

Mobile Applications on 7 Mobile Applications on Global Clouds Using OpenFlow and Sof t ware- D efined Ne t workin g SUBHARTHI PAUL, RAJ JAIN, JAY IYER, AND DAVE ORAN Contents Introduction 134 Private Data Center 134 Service

More information

Network in the Cloud: a Map-and-Encap Approach

Network in the Cloud: a Map-and-Encap Approach Network in the Cloud: a Map-and-Encap Approach Damien Saucez Wassim Haddad Inria Ericsson IEEE CloudNet 12 Enterprise network www ISP1 SOHO ISP2 Internet 2 Enterprise network (contd.) Survey on 57 enterprise

More information

Aaron Gember-Jacobson

Aaron Gember-Jacobson Aaron Gember-Jacobson http://aaron.gember-jacobson.com Contact Information Department of Computer Science, Colgate University agemberjacobson@colgate.edu 13 Oak Drive, Hamilton, NY 13346 (315) 228-6298

More information

Data Center Virtualization: VirtualWire

Data Center Virtualization: VirtualWire Data Center Virtualization: VirtualWire Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 21, 2014 Slides from USENIX Workshop on

More information

Embark: Securely Outsourcing Middleboxes to the Cloud

Embark: Securely Outsourcing Middleboxes to the Cloud Embark: Securely Outsourcing Middleboxes to the Cloud Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, Zhi Liu UC Berkeley Tsinghua University 1 Background Middleboxes are prevalent and problematic

More information

Rethinking Access Networks with High Performance

Rethinking Access Networks with High Performance Rethinking Access Networks with High Performance Virtual Software BRASes Roberto Bifulco, Thomas Dietz, Felipe Huici, Mohamed Ahmed, Joao Martins, Saverio Niccolini, Hans-Joerg Kolbe roberto.bifulco@neclab.eu

More information

Enhancing the BRAS through Virtualization

Enhancing the BRAS through Virtualization Enhancing the BRAS through Virtualization Thomas Dietz, Roberto Bifulco, Filipe Manco, Joao Martins, Hans-Joerg Kolbe, Felipe Huici NEC Laboratories Europe, name.surname@neclab.eu Abstract Broadband Remote

More information

PDP : A Flexible and Programmable Data Plane. Massimo Gallo et al.

PDP : A Flexible and Programmable Data Plane. Massimo Gallo et al. PDP : A Flexible and Programmable Data Plane Massimo Gallo et al. Introduction Network Function evolution L7 Load Balancer TLS/SSL Server Proxy Server Firewall Introduction Network Function evolution Can

More information

Elastic Virtual Network Function Placement CloudNet 2015

Elastic Virtual Network Function Placement CloudNet 2015 Elastic Virtual Network Function Placement CloudNet 215 M. GHAZNAVI, A. KHAN, N. SHAHRIAR, KH. ALSUBHI, R. AHMED, R. BOUTABA DAVID R. CHERITON SCHOOL OF COMPUTER SCIENCE UNIVERSITY OF WATERLOO Outline

More information

Deep Packet Inspection of Next Generation Network Devices

Deep Packet Inspection of Next Generation Network Devices Deep Packet Inspection of Next Generation Network Devices Prof. Anat Bremler-Barr IDC Herzliya, Israel www.deepness-lab.org This work was supported by European Research Council (ERC) Starting Grant no.

More information

OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella

OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella With: Aaron Gember, Raajay Vishwanathan, Chaithan Prakash, Sourav Das, Robert Grandl, and Junaid Khalid Network func2ons, or Middleboxes

More information

Is it Still Possible to Extend TCP?

Is it Still Possible to Extend TCP? Is it Still Possible to Extend TCP? Michio Honda, Keio University Yoshifumi Nishida, Keio University Costin Raiciu, Universitatea Politehnica Bucuresti Adam Greenhalgh, University College London Mark Handley,

More information

OpenADN: A Case for Open Application Delivery Networking

OpenADN: A Case for Open Application Delivery Networking OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer

More information

Online VNF Scaling in Datacenters

Online VNF Scaling in Datacenters Online VNF Scaling in Datacenters Xiaoke Wang, Chuan Wu, Franck Le, Alex Liu, Zongpeng Li and Francis Lau The University of Hong Kong, Email: {xkwang, cwu, fcmlau}@cs.hku.hk IBM T. J. Watson, Email: fle@us.ibm.com

More information

Exploiting Cloud Technologies in Networks: NFV and SDN. Andy Reid and Peter Willis BT Research and Innovation

Exploiting Cloud Technologies in Networks: NFV and SDN. Andy Reid and Peter Willis BT Research and Innovation Exploiting Cloud Technologies in Networks: NFV and SDN Andy Reid and Peter Willis BT Research and Innovation Clarifying what we mean by: SDN Separation of control plane logic/processing data plane header

More information

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 Challenges and Opportunities Reduce Capex/Opex Challenges Innovation at devices and OTT side Number of devices explode

More information

Preparing your Business for Virtualization

Preparing your Business for Virtualization Preparing your Business for Virtualization Pierre Lavillat NFV Director Program Manager - HPE 2018 TM Forum 1 Future Network will be virtualized Classic Appliance Approach Virtualization Approach Message

More information

SafeBricks: Shielding Network Functions in the Cloud

SafeBricks: Shielding Network Functions in the Cloud SafeBricks: Shielding Network Functions in the Cloud Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy UC Berkeley Network Functions (NFs) in the cloud Clients 2 Enterprise Destination Network

More information

Forwarding Architecture

Forwarding Architecture Forwarding Architecture Brighten Godfrey CS 538 February 14 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Building a fast router Partridge: 50 Gb/sec router A fast IP router well, fast

More information

Rethinking Access Networks with High Performance Virtual Software BRASes

Rethinking Access Networks with High Performance Virtual Software BRASes 2013 Second European Workshop on Software Defined Networks Rethinking Access Networks with High Performance Virtual Software BRASes Roberto Bifulco, Thomas Dietz, Felipe Huici, Mohamed Ahmed Joao Martins,

More information

Power Management for Networked Systems

Power Management for Networked Systems Power Management for Networked Systems Sylvia Ratnasamy (Intel Research Berkeley) Work in collaboration with UC Berkeley, Univ. of Washington and Lawrence Berkeley National Lab How do networks contribute

More information

Network Wide Policy Enforcement. Michael K. Reiter (joint work with V. Sekar, R. Krishnaswamy, A. Gupta)

Network Wide Policy Enforcement. Michael K. Reiter (joint work with V. Sekar, R. Krishnaswamy, A. Gupta) Network Wide Policy Enforcement Michael K. Reiter (joint work with V. Sekar, R. Krishnaswamy, A. Gupta) 1 Enforcing Policy in Future Networks MF vision includes enforcement of rich policies in the network

More information

GNFC: Towards Network Function Cloudification

GNFC: Towards Network Function Cloudification : Towards Network Function Cloudification Richard Cziva, Simon Jouet and Dimitrios P. Pezaros School of Computing Science, University of Glasgow, Glasgow, G12 8QQ, Scotland {richard.cziva, simon.jouet,

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

NetBricks: Taking the V out of NFV. Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, Scott Shenker UC Berkeley, Google, ICSI

NetBricks: Taking the V out of NFV. Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, Scott Shenker UC Berkeley, Google, ICSI NetBricks: Taking the V out of NFV Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, Scott Shenker UC Berkeley, Google, ICSI What the heck is NFV? A Short Introduction to NFV A Short

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Leverage SDN Principles in LTE to Meet Future Network Demands

Leverage SDN Principles in LTE to Meet Future Network Demands Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network

More information

CS 43: Computer Networks. 20: The Network Layer November 5, 2018

CS 43: Computer Networks. 20: The Network Layer November 5, 2018 CS 43: Computer Networks 20: The Network Layer November 5, 2018 Last Class: TCP Rate and Flow Control TCP has mechanisms to control sending rate: Flow control: don t overload receiver Congestion control:

More information

Application Delivery Using SDN

Application Delivery Using SDN Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound

More information

CNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS

CNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS CNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS The objective of this course is to provide the foundational concepts and teach the skills necessary to deploy, secure and manage a Citrix NetScaler

More information

Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services)

Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services) 1 Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services) Vyas Sekar vnfo joint with Seyed Fayazbakhsh, Mike Reiter VRA joint with Chen Chen, Petros Mania9s,

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/courses/cs268.f08/lectures/22-

More information

RDMA and Hardware Support

RDMA and Hardware Support RDMA and Hardware Support SIGCOMM Topic Preview 2018 Yibo Zhu Microsoft Research 1 The (Traditional) Journey of Data How app developers see the network Under the hood This architecture had been working

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Ingate Firewall & SIParator Product Training. SIP Trunking Focused

Ingate Firewall & SIParator Product Training. SIP Trunking Focused Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

A Survey of Network Function Placement

A Survey of Network Function Placement A Survey of Network Function Placement Xin Li and Chen Qian Department of Computer Science, University of Kentucky Email: xin.li@uky.edu, qian@cs.uky.edu Abstract Ranging from web caches to firewalls,

More information

A Software-Defined Framework for Improved Performance and Security of Network Functions

A Software-Defined Framework for Improved Performance and Security of Network Functions A Software-Defined Framework for Improved Performance and Security of Network Functions Thesis submitted for the degree of Doctor of Philosophy by Yotam Harchol Submitted to the Senate of The Hebrew University

More information

Toward Software-Defined Middlebox Networking

Toward Software-Defined Middlebox Networking Toward Software-Defined Middlebox Networking Aaron Gember, Prathmesh Prabhu, Zainab Ghadiyali, Aditya Akella University of Wisconsin-Madison, Madison, WI, USA {agember,pprabhu,zainab,akella}@cs.wisc.edu

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

Rule-Based Forwarding

Rule-Based Forwarding Building Extensible Networks with Rule-Based Forwarding Lucian Popa Norbert Egi Sylvia Ratnasamy Ion Stoica UC Berkeley/ICSI Lancaster Univ. Intel Labs Berkeley UC Berkeley Making Internet forwarding flexible

More information

SUPC: SDN enabled Universal Policy Checking in Cloud Network

SUPC: SDN enabled Universal Policy Checking in Cloud Network SUPC: SDN enabled Universal Policy Checking in Cloud Network Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang Arizona State University {achaud16, aalsham4, dijiang}@asu.edu arxiv:1811.00657v1 [cs.cr]

More information

2013 ONS Tutorial 2: SDN Market Opportunities. Sizing the SDN Market Opportunities Lee Doyle, Doyle Research

2013 ONS Tutorial 2: SDN Market Opportunities. Sizing the SDN Market Opportunities Lee Doyle, Doyle Research 2013 ONS Tutorial 2: SDN Market Opportunities Sizing the SDN Market Opportunities Lee Doyle, Doyle Research ldoyle@doyle-research.com April 15, 2013 1 1 SDN Market Overview SDN Opportunity is Unlimited

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

SD-WAN orchestrated by Amdocs

SD-WAN orchestrated by Amdocs SD-WAN orchestrated by Amdocs What is software-defined wide area network? SD-WAN determines the most cost-effective and efficient way to route enterprise traffic to remote locations over ubiquitous broadband

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

CellSDN: Software-Defined Cellular Core networks

CellSDN: Software-Defined Cellular Core networks CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford Cellular Core Network Architecture Base Station User Equipment

More information

Powerful application delivery, security, performance and reliability

Powerful application delivery, security, performance and reliability Powerful application delivery, security, performance and reliability Snapt Summary Snapt develops high-end solutions for application delivery. We provide load balancing, web acceleration, caching and security

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

Are TCP Extensions Middlebox-proof?

Are TCP Extensions Middlebox-proof? Are TCP Extensions Middlebox-proof? Benjamin Hesmans, Fabien Duchene, Christoph Paasch, Gregory Detal and Olivier Bonaventure ICTEAM, Université Catholique de Louvain Louvain-La-Neuve Belgium firstname.name@uclouvain.be

More information

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course

More information

Design and implementation of an MPLS based load balancing architecture for Web switching

Design and implementation of an MPLS based load balancing architecture for Web switching School of Electronic Engineering - DCU Switching and Systems Laboratory Design and implementation of an MPLS based load balancing architecture for Web switching Radu Dragos, Sanda Dragos and Martin Collier

More information

New Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles

New Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles Q&A New Cisco 2800 And 3800 Series Integrated Wan Optimization Bundles Q. What are the components of the new Cisco 2800 and 3800 series integrated services router WAN optimization bundles? A. There are

More information

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way

More information

Lecture 2: Layering & End-to-End

Lecture 2: Layering & End-to-End Lecture 2: Layering & End-to-End CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 2 Overview Layering Application interface Transport services Discussion

More information

GEN: A GPU-Accelerated Elastic Framework for NFV

GEN: A GPU-Accelerated Elastic Framework for NFV GEN: A GPU-Accelerated Elastic Framework for NFV Zhilong Zheng, Jun Bi, Chen Sun, Heng Yu, Hongxin Hu, Zili Meng, Shuhe Wang, Kai Gao, Jianping Wu * ABSTRACT Network Function Virtualization (NFV) has the

More information

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks

More information

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software

More information

Scalable Network Function Virtualization for Heterogeneous Middleboxes

Scalable Network Function Virtualization for Heterogeneous Middleboxes Scalable Network Function Virtualization for Heterogeneous Middleboxes Xuzhi Zhang, Xiaozhe Shao, George Provelengios, Naveen Kumar Dumpala, Lixin Gao, and Russell Tessier University of Massachusetts,

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Application Note Asterisk BE with Remote Phones - Configuration Guide

Application Note Asterisk BE with Remote Phones - Configuration Guide Application Note Asterisk BE with Remote Phones - Configuration Guide 15 January 2009 Asterisk BE - Remote SIP Phones Table of Contents 1 ASTERISK BUSINESS EDITION AND INGATE... 1 1.1 REMOTE SIP PHONE

More information

And Then There Were More:

And Then There Were More: David Naylor Carnegie Mellon And Then There Were More: Secure Communication for More Than Two Parties Richard Li University of Utah Christos Gkantsidis Microsoft Research Thomas Karagiannis Microsoft Research

More information

STATEFUL TCP/UDP traffic generation and analysis

STATEFUL TCP/UDP traffic generation and analysis XENATM STATEFUL TCP/UDP traffic generation and analysis Ideal for validating firewalls, switches, routers, NAT routers, proxies, load-balancers, bandwidth shapers and more. VULCAN LAYER 4-7 GIGABIT ETHERNET

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-24 Course Wrap-up Goals and Objectives Understand state-of-the-art in network protocols, architectures, and applications Process of networking research Constraints and thought

More information

Network Functions Virtualisation. Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories

Network Functions Virtualisation. Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories Network Functions Virtualisation Looking to the Future NFV ETSI Industry Specification Group Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories Network Functions Virtualisation:

More information

Network Edge Innovation With Virtual Routing

Network Edge Innovation With Virtual Routing Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading

More information

Don t Call Them Middleboxes, Call Them Middlepipes

Don t Call Them Middleboxes, Call Them Middlepipes Don t Call Them Middleboxes, Call Them Middlepipes Hani Jamjoom Dan Williams IBM T. J. Watson Research Center Yorktown Heights, NY Upendra Sharma Abstract As interest grows in introducing network functions

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

2610:f8:ffff:2010:04:13:0085:1

2610:f8:ffff:2010:04:13:0085:1 2610:f8:ffff:2010:04:13:0085:1 Qwest IPv6 Implementation Experience Shawn Carroll 2610:f8:ffff:2010:04:13:0085:55 Previous Qwest Implementation Work Obtained 6bone Pseudo Next Level Aggregator (pnla) from

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Daniel Zappala CS 460 Computer Networking Brigham Young University Proliferation of Middleboxes 2/16 a router that manipulatees traffic rather than just forwarding it NAT rewrite

More information

Security Overview and Cisco ACE Replacement

Security Overview and Cisco ACE Replacement Security Overview and Cisco ACE Replacement March, 2014 Florian Hartmann, Senior Systems Engineer DACH A10 Corporate Introduction Headquarters in San Jose 800+ Employees Offices in 32 countries Customers

More information

Benefits of SD-WAN to the Distributed Enterprise

Benefits of SD-WAN to the Distributed Enterprise WHITE PAPER Benefits of SD-WAN to the Distributed Enterprise 1 B enefits of SD-WAN to the Distributed Enterprise Branch Networking Today More Bandwidth, More Complexity Branch or remote office network

More information

OpenNF: Enabling Innovation in Network Function Control

OpenNF: Enabling Innovation in Network Function Control OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison

More information

Network Configuration Guide

Network Configuration Guide Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.

More information

Recent Advances in Software Router Technologies

Recent Advances in Software Router Technologies Recent Advances in Software Router Technologies KRNET 2013 2013.6.24-25 COEX Sue Moon In collaboration with: Sangjin Han 1, Seungyeop Han 2, Seonggu Huh 3, Keon Jang 4, Joongi Kim, KyoungSoo Park 5 Advanced

More information

Dynamic Network Segmentation

Dynamic Network Segmentation Dynamic Network Segmentation Innovative network security protection to stop cyber attacks and meet compliance. 1 Isolate and flexibly segment your networks Introduction As organizational structures and

More information

Cloud Computing and Cloud Networking

Cloud Computing and Cloud Networking Cloud Computing and Cloud Networking Dr. Adel Nadjaran Toosi Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems The University of Melbourne, Australia

More information

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE

More information

SDN (Software-Defined Networking) Enabling Network Innovation from Edge

SDN (Software-Defined Networking) Enabling Network Innovation from Edge SDN (Software-Defined Networking) Enabling Network Innovation from Edge Gaogang XIE http://www.fnii.cn http://www.ict.ac.cn Internet 20 Year in China April 20, 1994, NCFC (The National Computing and Networking

More information

OpenFlow: What s it Good for?

OpenFlow: What s it Good for? OpenFlow: What s it Good for? Apricot 2016 Pete Moyer pmoyer@brocade.com Principal Solutions Architect Agenda SDN & OpenFlow Refresher How we got here SDN/OF Deployment Examples Other practical use cases

More information

NFV and SDN what does it mean to enterprises?

NFV and SDN what does it mean to enterprises? OPINION NFV and SDN what does it mean to enterprises? By Clive Hamilton, VP Network Services, NTT Europe Rethinking the enterprise network The typical enterprise network now comprises hundreds or even

More information