UNIT 5
UNIT 5
VIRTUALIZATION UNIT 5
SYLLABUS
• The network is portrayed through modeldriven method for performing some functions
and achieving outcomes by OpenDaylight controller. In order to solve complex
problems OpenDaylight contribute data structures in familiar massaging framework
and data store, and by allowing elegant services to be designed and combined
together.
BUILDING SDN FRAMEWORK
• The open sources controller and idea of SDN to implement four-tier architecture of
SDN and control platform. Application interface, message acceptance and other services
are obtained and managed by establishing the connection with SDN
BUILDING SDN FRAMEWORK
BUILDING SDN FRAMEWORK
• SDN: Embracing change The very heart of networking is about change.Your current
network infrastructure is a platform on which the entire IT portfolio depends for
communication and services. Although the network is made of many physical elements,
such as routers, switches, and firewalls, it is for all practical purposes a single system. A
change in any part of the network can cause a failure of the whole. This wholesale
interdependence has led to a fear of change among network operators that prevents new
services, new features, and even good operational practices. SDN is a network
architecture that changes how we design, manage, and operate the entire network so
that changes to the network become practical and reliable.
BUILDING SDN FRAMEWORK
BUILDING SDN FRAMEWORK
• Planes of operation The internal architecture of a network device has three planes of
operation. The management plane handles external user interaction and administrative
tasks like authentication, logging, and configuration via a Web interface or CLI. The
control plane administers the internal device operations, providing the instructions used
by the silicon engines to direct the packets. The control plane runs the routing and
switching protocols and feeds operational data back to the management plane. The data
plane is the engine room that moves packets through the device, using the forwarding
table supplied by the control plane to determine the output port.
BUILDING SDN FRAMEWORK
BUILDING SDN FRAMEWORK
• Planes of operation, continued In networking today, the control plane on each device
communicates with the control planes on all other devices in the network using
protocols like OSPF or Spanning Tree. As a result, networking is a system of distributed
computing in which all of the system elements must be coherent for the network to
function as a whole. Although network protocols are well proven, networking remains
less than perfect because 1) distributed computing systems are limited by "eventual
consistency" (for networks, that means outage during reconvergence), and 2) we’re
constrained by poor features like destination-based routing (when source/destination
would be better).
NETWORK FUNCTIONS VIRTUALIZATION
• NFV allows virtual network function to run on a standard generic server, controlled by a hypervisor,
which is far less expensive than purchasing proprietary hardware devices. Network configuration and
management is much simpler with a virtualized network. Best of all, network functionality can be changed
or added on demand because the network runs on virtual machines that are easily provisioned and
managed.
NETWORK FUNCTIONS VIRTUALIZATION
• Physical security controls are not effective:Virtualizing network components increases their vulnerability
to new kinds of attacks compared to physical equipment that is locked in a data center.
• Malware is difficult to isolate and contain: It is easier for malware to travel among virtual components
that are all running off of one virtual machine than between hardware components that can be isolated
or physically separated.
• Network traffic is less transparent:Traditional traffic monitoring tools have a hard time spotting
potentially malicious anomalies within network traffic that is traveling east-west between virtual
machines, so NFV requires more fine-grained security solutions.
• Complex layers require multiple forms of security: Network functions virtualization environments are
inherently complex, with multiple layers that are hard to secure with blanket security policies.
NETWORK FUNCTIONS VIRTUALIZATION
• Single Root I/O Virtualization (SR-IOV) - is a standard that makes a single PCI hardware
device appear as multiple virtual PCI devices. It works by introducing Physical Functions (PFs)
which are the full featured PCIe functions representing the physical hardware ports and
Virtual Functions (VFs) that are lightweight functions that can be assigned to the virtual
machines. The virtual machines see the VF as a regular NIC that communicates directly with
the hardware. NICs support multiple VFs.
INTRODUCTION –VIRTUALIZATION AND DATA
PLANE I/O –
• NFV Data Plane Options:
• Open vSwitch (OVS) - is an open source software switch that is designed to be used
as a virtual switch within a virtualized server environment. OVS supports the capabilities
of a regular L2-L3 switch and also offers support to the SDN protocols such as
OpenFlow to create user-defined overlay networks (for example,VXLAN). OVS uses
linux kernel networking to switch packets between virtual machines and across hosts
using physical NIC.
INTRODUCTION –VIRTUALIZATION AND DATA
PLANE I/O –
• NFV Data Plane Options:
• Data Plane Development Kit (DPDK) - consists of a set of libraries and poll mode
drivers (PMD) for fast packet processing. It is designed to run mostly in the user-space,
enabling applications to perform their own packet processing directly from/to the NIC.
DPDK reduces latency and allows more packets to be processed. DPDK Poll Mode
Drivers (PMDs) run in busy loop, constantly scanning the NIC ports on host and vNIC
ports in guest for arrival of packets.
SERVICE LOCATIONS AND CHAINING
• A ‘service chain’ is a set of network services which are performed in a specific order and
‘service chaining’ refers to steering the traffic through such a “chain”. It’s like a recipe where
actions are performed in a preordained order. Services can be performed in parallel or in
serial, depending on the situation. The chain can be implemented by cabling individual devices
together or, increasingly, by using software provisioning to control the flow of data through
the selected services. Monitoring tools that are linked together in this way are sometimes
referred to as a daisy-chain. The use of service chains is linked to the automation of functions
that have been either embedded in single purpose hardware devices, dictated by physical
topologies, or performed manually--which are increasingly perceived as too costly and
inflexible in our fast-moving digital economy.
SERVICE LOCATIONS AND CHAINING -TRADITIONAL /
STATIC SERVICE CHAIN IMPLEMENTED BY OPERATOR
SERVICE LOCATIONS AND CHAINING
• In the example scenario illustrated in the previous slide(“Example service function chain
implemented by network operators today”), Subscriber 1 wishes to access video content
on their mobile device. The user would simply need the video optimization service, as
well as basic firewalling. However, the user’s traffic will have to traverse the entire chain.
Adding to this, services must often be applied in a specific order, which implies the need
for complex routing techniques and VLANs to ensure that this performed correctly. This
example highlights the sub-optimal use of network and compute resources, as the entire
service chain has to be traversed, regardless of whether this is required or not.
SERVICE LOCATIONS AND CHAINING
• Service chaining is one of several approaches that make it possible to centrally manage and direct the
operation of IT resources, to increase efficiency and time-to-market, as well as decrease costs.
• Use Case - Real-Time Network Monitoring
• With real-time monitoring, you need to keep traffic moving quickly and your security tools working
efficiently. Chaining tools together allows to you to pass only the suspicious traffic to additional tools for
deeper inspection or to a honeypot to be quarantined. Packets without anomalies are moved along
quickly, to maintain maximum response time. A common example is the use of a Security Information
and Event Management (SIEM) solution to filter out suspicious traffic for further analysis by other tools
in the daisy-chain. Traffic without exception is quickly sent back through the network to support the
fastest possible response time.
SERVICE LOCATIONS AND CHAINING
• Based on the previous slide diagram when traffic arrives at the network gateways, it is
now labelled by a dedicated classification device with the use of deep packet inspection
(DPI). The traffic is then intelligently forwarded to the required services, based on the
service identifier. The identifier itself can be derived from a field in the traffic such as:
network service header (NSH), virtual local area network (VLAN), Source MAC Address
(SMAC), or it can be directly programmed in the switch flow-tables. This allows for
network and compute resources to be used more efficiently, as traffic only flows through
the required services. The provider is thereby relieved from continuously having to over-
provision the network.
SERVICE LOCATIONS AND CHAINING
• Enable Network Function Virtualization (NFV): Once upon a time, specialized network appliances
ruled the data center and in many places they still do. When you consider their purpose, however, you
can identify multiple functions taking place inside each appliance. For instance, a firewall might perform
network address translation, deep packet inspection, and access control. The hardware appliance was
designed to perform these functions at wire speed. But in recent years, many of the functions once
performed by expensive hardware appliances are being redesigned as software functions that can be run
on any generic and low-cost CPUs. This process is called network function virtualization and the goal is
to achieve the same results as the appliance, but at greater efficiency and less cost.
SERVICE LOCATIONS AND CHAINING
• The SDN use cases, from data center fabrics and programmable network taps to WAN optimization and
policy enforcement. The webinar focuses on SDN use cases that have been deployed in production or
pilot networks and covers these categories:
• Data center fabrics
• Forwarding optimizations and exception routing
• WAN optimizations
• Centralized traffic engineering
• Programmable network taps and tap aggregation networks
• Network monitoring
• Network services insertion
APPLICATIONS – USE CASES OF SDNS
• Modern data center networking architectures leverage full-stack networking and security virtualization
platforms that support a rich set of data services connecting everything from VMs, containers, and bare
metal applications while enabling centralized management and granular security controls.
• This model of data center networking represents a significant shift from the standard networking model
in data centers not long ago. From on-premises physical servers, to virtualized infrastructure, to an
integrated edge-to-cloud model of networking and security that is present wherever apps and data live,
data center networking has evolved greatly in a short time.
DATA CENTER NETWORKING
• Automation. Achieving speed and agility in modern data centers depends greatly on
automated provisioning of networking services for applications. Far faster and more
reliable than a human administrator, modern networking platforms not only find the most
efficient way to program a network, balance workloads, and automate time-consuming
tasks, they also respond dynamically to changes in usage.
• Consistent policies. With modern data center networking responsible for integrating
resources from edge to cloud, consistent application of policies is essential.
• Single pane of glass. Typically connecting resources located both on-premises, in the cloud,
and at the edge, modern data center networking platforms offer centralized management
from a single console.
DATA CENTER NETWORKING
• Granular security. Today’s data center networking platforms often feature integrated
security controls that can include micro-segmentation and IDS/IPS.
• Global visibility. Most data center networking platforms can display a visual
representation of the network and its interconnections, which makes troubleshooting
network issues much easier.
DATA CENTER NETWORKING
• The overlay creates a new layer where traffic can be programmatically directed through
new virtual network routes or paths instead of requiring physical links. Overlays enable
administrators to define and manage traffic flows, irrespective of the underlying physical
infrastructure.
• SDN is a quickly growing network strategy where the network operating system
separates the data plane (packet handling) from the control plane (the network topology
and routing rules). SDN acts as an overlay, running on the distributed switches,
determining how packets are handled, instead of a centralized router handling those
tasks.
OVERLAYS
• SDN is a quickly growing network strategy where the network operating system
separates the data plane (packet handling) from the control plane (the network topology
and routing rules). SDN acts as an overlay, running on the distributed switches,
determining how packets are handled, instead of a centralized router handling those
tasks.
BIG DATA
• Big data refers to data that is so large, fast or complex that it’s difficult or impossible to
process using traditional methods. The act of accessing and storing large amounts of
information for analytics has been around for a long time. But the concept of big data
gained momentum in the early 2000s when industry analyst Doug Laney articulated the
now-mainstream definition of big data as the three V’s:
BIG DATA
• Volume. Organizations collect data from a variety of sources, including transactions, smart
(IoT) devices, industrial equipment, videos, images, audio, social media and more. In the
past, storing all that data would have been too costly – but cheaper storage using data
lakes, Hadoop and the cloud have eased the burden.
• Velocity. With the growth in the Internet of Things, data streams into businesses at an
unprecedented speed and must be handled in a timely manner. RFID tags, sensors and
smart meters are driving the need to deal with these torrents of data in near-real time.
• Variety. Data comes in all types of formats – from structured, numeric data in traditional
databases to unstructured text documents, emails, videos, audios, stock ticker data and
financial transactions.