A Comparative Analysis on Network Virtualization Techniques

Similar documents
Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking

Lecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

VXLAN Overview: Cisco Nexus 9000 Series Switches

NETWORK OVERLAYS: AN INTRODUCTION

Cloud e Datacenter Networking

Cloud e Datacenter Networking

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

CS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization

Lecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Architecting Scalable Clouds using VXLAN and Nexus 1000V

Category: Informational ISSN: September NVGRE: Network Virtualization Using Generic Routing Encapsulation

Mapping of Address and Port Using Translation

VXLAN Design with Cisco Nexus 9300 Platform Switches

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Data Center Configuration. 1. Configuring VXLAN

IP Mobility Design Considerations

Implementing IP in IP Tunnel

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN in DataCenter

BIG-IP TMOS : Tunneling and IPsec. Version 13.0

INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2

Cisco IOS LISP Application Note Series: Access Control Lists

SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc.

Internet Protocols (chapter 18)

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Cisco Nexus 7000 Series NX-OS LISP Configuration Guide

IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Table of Contents HOL-PRT-1305

VXLAN Functionality Cubro EXA48600 & EXA32100

VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters

HPE FlexFabric 7900 Switch Series

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN

Locator ID Separation Protocol (LISP) Overview

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Virtual Security Gateway Overview

Multi-site Datacenter Network Infrastructures

Position of IP and other network-layer protocols in TCP/IP protocol suite

Contents. EVPN overview 1

Intended status: Standards Track. Cisco Systems October 22, 2018

IPv6 over IPv4 GRE Tunnels

White Paper. Huawei Campus Switches VXLAN Technology. White Paper

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design

VXLAN Deployment Use Cases and Best Practices

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

The Internetworking Problem. Internetworking. A Translation-based Solution

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

#nwsau17. Future campus design. James Horne. Enterprise Services Technical Consultant Networking, AARNet

Optimizing your virtual switch for VXLAN. Ron Fuller, VCP-NV, CCIE#5851 (R&S/Storage) Staff Systems Engineer NSBU

Cisco CSR 1000V VxLAN Support 2

Nexus 1000V in Context of SDN. Martin Divis, CSE,

Introduction to MPLS. What is MPLS? 1/23/17. APNIC Technical Workshop January 23 to 25, NZNOG2017, Tauranga, New Zealand. [201609] Revision:

Open Compute Network Operating System Version 1.1

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

OSI Data Link & Network Layer

BESS work on control planes for DC overlay networks A short overview

Virtual Extensible LAN (VXLAN) Overview

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

CSCI-1680 Network Layer:

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Data Link & Network Layer

TCP/IP Protocol Suite

Networks Fall This exam consists of 10 problems on the following 13 pages.

Transport Area Working Group

UDP Encapsulation in Linux netdev0.1 Conference February 16, Tom Herbert

QuickSpecs. HP Z 10GbE Dual Port Module. Models

IP over IPv6 Tunnels. Information About IP over IPv6 Tunnels. GRE IPv4 Tunnel Support for IPv6 Traffic

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

Introduction to MPLS APNIC

Computer Networks Security: intro. CS Computer Systems Security

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Configuring Local SPAN and ERSPAN

Network Layer (1) Networked Systems 3 Lecture 8

Multiprotocol Label Switching

Cloud Networking From Theory to Practice. Ivan Pepelnjak NIL Data Communications

TCP /IP Fundamentals Mr. Cantu

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Communication Systems DHCP

EEC-484/584 Computer Networks

Configuring Cache Services Using the Web Cache Communication Protocol

Centralization of Network using Openflow Protocol

Configure Virtual LANs in Layer 2 VPNs

Exam Name: VMware Certified Associate Network Virtualization

Configuring Web Cache Services By Using WCCP

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Cisco Nexus 7000 Series NX-OS LISP Configuration Guide

Virtual Private Networks (VPN)

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Tunneling Configuration Guide for Enterprise

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

H3C S9500 QoS Technology White Paper

IPv6 over IPv4 GRE Tunnels

IPv6 over IPv4 GRE Tunnels

LECTURE WK4 NETWORKING

Transcription:

Volume 119 No. 10 2018, 719-728 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A Comparative Analysis on Network Virtualization Techniques 1 Aravind Krishnan, 2 Joji Jose, 3 M. Arjun and 4 Leena Vishnu Namboothiri 1 Department of Computer Science and IT, Amrita School of Arts and Sciences, Kochi, Amrita Vishwa Vidyapeetham, India. aravindkrishnan423@gmail.com 2 Department of Computer Science and IT, Amrita School of Arts and Sciences, Kochi, Amrita Vishwa Vidyapeetham, India. jojijose66@gmail.com 3 Department of Computer Science and IT, Amrita School of Arts and Sciences, Kochi, Amrita Vishwa Vidyapeetham, India. arjunrated007@gmail.com 4 Department of Computer Science and IT, Amrita School of Arts and Sciences, Kochi, Amrita Vishwa Vidyapeetham, India. vleena@gmail.com Abstract Network virtualization plays a major role in the networking research community and has been growing steadily for the past few decades. Nowadays IT based organizations are finding newer ways or possibilities for the advancement path in network virtualization to the future internet by organizing or by deploying different protocols and architectures over a shared physical infrastructure. In this paper, we study about different network technologies used in network virtualization and compare them based on their performance, scalability and other features. The purpose of this study is to know about differentiation of each network techniques that are currently used in network virtualization and we will be able to know the reason that why most of the organizations are using these techniques. Key Words:Network virtualization, VXLAN, NVGRE, STT, LISP 719

720

1. Introduction In recent years, the internet has change successfully by modeling the way we access and exchanging information in the modern world and not even that its architecture has proven its capability by providing support for mass number of distributed application and extensive variety of network techniques that currently runs over it. However due to its capabilities it has become a highly potential barrier to its future growth [1][2][3]. In the past few decades, the concept Network virtualization has strike a significant attention in most of the networking research community and also IT based organizations on how to bring or remodel the next generation networking pattern that can replace the existing internet[4]. Network virtualization is combination of software, hardware, networking facilities (switches, routers, etc.) and network functionalities into single software-based administrative unit. [9] Network virtualization is characterized into two: 1. Internal network virtualization 2. External network virtualization Internal network virtualization gives network functionality based on software [10]. The term virtualization is described as the capability of creating virtual version of storage devices, network and operating system [11]. The external network virtualization is described as the permutation of one or more LAN (Local Area Network) into virtual network so that it can improve the data centers and large network effectiveness. By the use of external network virtualization the system administrators can configure the systems by attaching to the same local network into separate virtual networks [10]. The main objective of virtualization is to manage huge amount of workload by transforming the operations of computers making it more scalable. Network virtualization has been the key to the future global internet architecture. Each decades a new components have come to exist that helps in enabling the coexistence of multiple networking techniques,and thus conquering the present internet problems and stimulating the development of advanced application and deployment of new networking technologies [3]. Network virtualization promises to promote diversity, provides flexibility, promises security and also increases manageability [4]. There are certain methods used in network virtualization to improve the capacity of network and its performance to the great extend. These methods can extend the magnitude of the network to support trillions of virtual networks and each VN (virtual network) can be deployed to support traffic related to one holder, but possibly more. The methods that are used in network virtualization to improve the performance and the capacity of network are as follows 721

2. Network Virtualization Techniques VXLAN VXLAN (Virtual Extensible Local Area Network) is a network virtualization technique that seeks to address the scalability problems that are correlated with cloud computing deployments [14]. Each network overlay is termed as VXLAN segment [5]. Network overlay is defined as telecommunication network that is build on top of another real or physical network. Figure 1: A Sample Overlay Network The specifications of VXLAN are mainly backed by Cisco, VMware and Arista networks. Virtual machines can communicate with each other only when they are within the same VXLAN segment and this is now currently being executed in VMware VCloud Products. Each VXLAN section is scanned and analyzed through a 24 bit segment, describes the VNI (VXLAN Network Identifier).VXLAN Network Identifier is a 24-bit long as compared to12-bits of VLAN (Virtual Local Area Network) and it provides unique ID approximately up to 16 million sections of VXLAN to be configured within a local network [5]. VXLAN Network Identifier is included in outer VXLAN header that encapsulates the inner Ethernet frame that is transmitted by a virtual machine on a server or by the server. The VXLAN headers are attached to the inner Ethernet frame that is referred to as a Virtual Tunnel End Point (VTEP).The Virtual Tunnel End Point connect a virtual switch to the IP network. The VXLAN Network Identifier confines the inner Media Access Control (MAC) (Layer 2) frame that is originated by virtual machines. NVGRE Network Virtualization using Generic Routing Encapsulation (NVGRE) is a network virtualization technique that can reduce the scalability problems relating to cloud computing development.it uses a GRE (Generic Routing Encapsulation) to tunnel layer 2 packets that is the data link layer over layer 3 packets that is the network layer [14]. Every virtual layer 2 network in NVGRE is associated with 24 bit Identifier, called VSID (Virtual Subnet Identifier) [6].VSID specifies the virtual subnet identifier of virtual IP address. 722

The 24-bit VSID supports approximately up to 16million virtual subnet in the same administration domain. Each VSID (Virtual Subnet Identifier) performs a virtual layer 2 (network layer) Broadcast domain that is used to identify a virtual subnet of a given holder [6]. GRE provides a way for covering random protocol over IP. NVGRE (Network Virtualization using Generic Routing Encapsulation) weights the GRE header to carry information of VSID in each packet. Each information of VSID in each packet can be used to construct multi-tenantaware-tools for analyzing, inspecting and monitoring network traffic. Another term that comes in is NVGRE (Network Virtualization using Generic Routing Encapsulation) endpoints.nvgre endpoints are the entry and exit between virtual network and physical network.nvgre endpoints can be either any physical or network devices and it performs functions that are similar to the functions that are performed by VTEP (Virtual Tunnel End Points) in a VXLAN (Virtual Extensible Local Area Network) environment.[6] They are responsible for applying confinement polices based on VSID (Virtual Subnet Identifier) and for applying layer 2 interpretations. STT STT (Stateless Transport Tunneling) defined as a network virtualization technique that comes along the path of VXLAN (Virtual Extensible Local Area Network) and NVGRE (Network Virtualization using Generic Routing Encapsulation). This type of technique is most commonly used for the communication between server based Vswitches.STT encapsulation structure is used by VMware [7][14]. Tunneling are enclosed messages formatted in one transmission protocol with header of another transmission protocol. V Switches (Virtual Switches) is a kind of software application that is most commonly used for communication between virtual machines. Stateless Transport tunneling was created or designed to carry large data packets approximately up to 64 kilobytes and also to make use of TCP (Transmission Control Protocol) capabilities in NIC (Network Interface Card ) [7]. NIC (Network Interface Card) is a circuit board or a card that is planted inside a computer so that network can be established. STT(Stateless Transport Tunneling) mechanism is sophisticated complicated and much more involved than VXLAN (Virtual Extensible Local Area Network) and NVGRE (Network Virtualization using Generic Routing Encapsulation).STT (Stateless Transport Tunneling) can take Ethernet packets approximately up to 64 kilobytes from a virtual machine that is on the server and it tunnels to its destination.this frame has to be slashed into smaller fragments to match the maximum transmission unit (MTU) of a real network. [7] 723

Maximum Transmission Unit in computer networking is the size of the maximum network layer data unit that can be communicated on a single network administration. Physical network has a disadvantage on the size of the packet that can be carried. Normal MTU (maximum transmission unit) of an Ethernet was used to be approximately 1500bytes but in the past recent days most of the Ethernet devices can support oversized packets and permits packets of 9 or approximately 16 kilobytes (KB) in size. Another concept that comes under this topic is the STT frame header. The length of the STT header is 18 bytes and the key field that is used in STT header is the context ID [14]. The Con text ID is 16 bit field in length. Its design and functionalities is somewhat similar to the VNI (VXLAN Network Identifier) or the NVGRE VSID (Virtual Subnet Identifier). Stateless Transport Tunneling (STT) has a tool to create collapse for the physical network to analyze the flow from each other. STT (Stateless Transport Tunneling) is said to be much efficient than VXLAN (Virtual Extensible Local Area Network) and NVGRE (Network Virtualization using Generic Routing Encapsulation) because it unloads segmentation and reassembly (SAR). SAR is a type of a telecommunication network that is used in breaking down the packets into smaller units before sending and reassembles them into correct order at the receiving or the gathering end of the communication. LISP LISP (Locater /Identifier Separation Protocol) is a network technique also a map and encapsulate protocol that provides a new connotation for IP addressing [15]. In this technique both the device identifier and the locator can be IP address like a set of MAC address.the current addressing architecture and IP routing uses a single statistical space, the IP address to explicit two fragment of Instruction: The way in which the network is attached to the device Device ID The architecture design of LISP (Locater /Identifier Separation Protocol) routing splits the device ID or EID (Endpoint Identifier) from its position, location or from its RLOC (Routing Locator) into two distinctive numbering spaces [16]. Endpoint Identifiers is an IPV4 or IPV6 address used to specify and describe the endpoints on the network. These Endpoint Identifiers helps to imprint the gateway where the spotter or locator provides the necessary data about the descriptive region of the endpoints and the locator allowing information will not change the region of the endpoints if it changes the region. The reason behind this is that the endpoint identification takes place using endpoint identifiers. Separating the Endpoint Identifiers (EID) and Routing Locator (RLOC) operations yields different advantages [16]. 724

3. Detailed Analysis of STT and NVGRE in Network Virtualization STT (Stateless Transport Tunneling) is much more efficient and simple than that of NVGRE (Network Virtualization using Generic Routing Encapsulation) the reason is that it unlade the SAR (Segmentation and Re-assembly).Segmentation and Re-assembly which is also known in short term as SAR is a type of telecommunication network which is in the form of packet switched, is the method of dividing the packets into smaller components before sending and receiving them. It fetches much more overhead than NVGRE (Network Virtualization using Generic Routing Encapsulation) in additional header information in lesser packets [7]. Stateless Transport Tunneling (STT) includes 80 bytes of headers that are newly created to a virtual machine originated Ethernet packets for the first division of this packet and for rest of the division 62 bytes [7][14]. Compare that with each of the NVGRE (Network Virtualization using Generic Routing Encapsulation) encapsulated packets of stable 46 bytes and for the traffic that is between the virtual machines on the same server may not be that much of a problem but it absolutely does for traffic that is carried across the physical or the real network [7][14][17]. The largest size of a enclosed data for Stateless Transport Tunneling (STT) is approximately up to 64 kilobyte (KB) and huge data areanecdotal in the Network Interface Card (NIC), determined by Maximum Transmission Unit (which is also know in short term as MTU) of the hidden physical network[14]. In STT the resembling is necessary at the destination which must be performed by the receiving Network Interface Card (NIC).Same port that is from the source should be used for all division of one STT frame. In NVGRE (Network Virtualization using Generic Routing Encapsulation) the maximum transmission unit of a network is approximately up to 42 bytes and the size is determined by the Virtual Network Interface Card (vnic) MTU in the vm (virtual machine )[14][17]. There is no information about the displacement of encapsulated data in Stateless Transport Tunneling but it only uses the maximum transmission unit interface and TCP segmentation, But for NVGRE (Network Virtualization using Generic Routing Encapsulation) it drafts Remote Function Call (RFC proposes using the Maximum transmission unit (MTU)path discovery and positioning the DF bit on the exterior header to evade fragmentation after the encapsulation [7][14]. In Stateless Transport Tunneling there is no encapsulated information or data and the size restraint is up to 64 Kilobytes (KB) and in NVGRE there is no information available in draft RFC. In STT TCP-based encapsulation is used and also this technique uses a nonstandard stateless Transmission Control Protocol (TCP) but for in NVGRE GRE-based encapsulation is used. Context 725

ID is the key field that is used for STT frame in Stateless Transport Tunneling and for the NVGRE 24-bit VSID (Virtual Subnet Identifier) along with an 8-bit flow ID [14], In Stateless Transport Tunneling there are two sources that is included by Draft RFC to handle the quality of service in a tunneling protocol, first one is the reference to RFC 2983 that is for mapping Differentiated Service Code Point (DSCP) from both inner and outer header along with that there are 2 models that can be used one is the uniform and the other one is pipe.another one is the reference to RFC 6040 which is for handling Explicit Congestion Notification (ECN) setting but for NVGRE (Network Virtualization using Generic Routing Encapsulation) there is no information or detail in draft RFC [14]. In STT technique it uses a TCP Segmentation Offload which is also known is short as TSO an LSO (Large Receive Offload) efficiency that are common on Network Interface Card but there is methods or process information that is explained on the above statement in NVGRE. 4. Conclusion Based on our analysis we came to know that network virtualization is the key to the next generation architecture in networking. In this paper we came to a conclusion that STT is much better and efficient than NVGRE. We have compared these two techniques on the basis of type of encapsulation overhead, and its maximum size used in data payroll that is encapsulated. Then we also have compared these both techniques on its data transfer, fragmentation of and after encapsulation, and its offload to Network Interface Card and also compared with quality of service that is used in both of these techniques. References [1] Sherwood R., Gibb G., Yap K.K., Appenzeller G., Casado M., Parulkar G., Flowvisor: A network virtualization layer, Deutsche Telekom Inc. R&D Lab (2009). [2] Jain R., Paul S., Network virtualization and software defined networking for cloud computing: a survey, IEEE Communications Magazine 51(11) (2013), 24-31. [3] Carapinha J., Jiménez J., Network virtualization: a view from the bottom, Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures (2009), 73-80. [4] Chowdhury N.M.K., Boutaba R., Network virtualization: state of the art and research challenges, IEEE Communications magazine 47(7) (2009). [5] Mahalingam M., Dutt D., Duda K., Agarwal P., Kreeger L., Sridhar T., VXLAN: a framework for overlaying virtualized layer 2 726

networks over layer 3 networks, Internet Engineering Task Force [internet draft] (2012). [6] Garg P., Wang Y.S., NVGRE: Network virtualization using generic routing encapsulation (2015). [7] Marten Terpstra, Stateless Transport Tunneling (STT) meets the Network (2014). [8] Network Virtualization https://en.wikipedia.org/wiki/network_virtualization [9] What is Internal Network Virtualization and External Network Virtualization [10] Virtualization [11] Vxlan http://searchservervirtualization.techtarget.com/definition/virtualiz ation [12] Sridharan M., Greenberg A., Venkataramiah N., Wang Y., Duda K., Ganga I., Lin G., Pearson M., Thaler P., Tumuluri C., NVGRE: Network virtualization using generic routing encapsulation, IETF draft (2011). [13] Virtual Extensible LAN https://en.wikipedia.org/wiki/virtual_extensible_lan [14] Data Center Overlay Technologie https://www.cisco.com/c/en/us/products/collateral/switches/nexus -9000-series-switches/white-paper-c11-730116.pdf [15] Locator Identifier Separatio https://en.wikipedia.org/wiki/locator/identifier_separation_protoc ol [16] Cisco Locator ID Separation Protocol (LISP) http://virtualizationtutor.com/what-is-internal-networkvirtualization-and-externalnetworkvirtualization https://sites.google.com/site/amitsciscozone/home/datacenter/vxlan https://www.cisco.com/c/en/us/products/ios-nx-ossoftware/locator-id-separation-protocol-lisp/index.html [17] Davie B., A Stateless Transport Tunneling Protocol for Network Virtualization (STT), Nicira Networks, Inc (2012), 1-19. 727

728