SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Network Abstractions at
Different Layers of the
Stack

Mohammad Banikazemi
November 2013
IBM Research
Outline
IBM Research

Network Abstractions at Different Layers
 Neutron: The OpenStack Networking
 Application-centric Abstractions for
Neutron: Policy Extension Framework
 Application-centric Network Policies
 Conclusion

Different Layers
IBM Research







Neutron is the
OpenStack networking
Higher layers consume
networking resources
through the Neutron API
Lower layers realize
these networking
resources through a
pluggable architecture

App

App

App

App

Cloud
Orchestrator

Heat
Nova
Neutron

Network Controller
Abstractions at Higher Layers
IBM Research




Simple and application centric
Non-network centric: Interested in the needed
network functions and not how they are
Tier 2
realized
Tier 1

Tier 3
External Network
Internet

Firewall

Load
Balancer

QoS
Abstractions in Lower Layers
IBM Research

Network centric
 Device oriented (switches/routers)
 Topology aware
 Packet forwarding/routing, Path
computation
 No standard northbound API


* M. Banikazemi, D. Olshefski, A. Shaikh, J. Tracey, and G. Wang,
Meridian: An SDN Platform for Cloud Network Services, IEEE Communications Magazine, Feb
Neutron: A Quantum Approach
IBM Research



Defines a minimal set of interfaces required for
setting up networks for users
Network

•network: isolated layer-2 broadcast domain;
private/shared

Subnet

•Subnet: CIDR IP address block associated
with a network; optionally associated
gateway, DNS/DHCP servers
•port: virtual switch port on a network; has
MAC and IP address properties

Port



Extendable
Neutron Expansion
throughExtensions




IBM Research

Physical networks
Layer 3 networking
Layers 4-7 services
Router
NAT, Floating IP

Network

Provider
Network
Multi-Provider
Network

Subnet

Port Binding

LBaaS, FWaaS
VPNaaS,

Port

Security Group
Neutron: The 3-tier App
Example


IBM Research

One possible implementation using a single
router
External Network
Router
Network/subnet

Network/subnet

Network/subnet

Port
Realizing the Application
IBM Research

Consider part of the 3-tier app:

GROUP:WEB

GROUP:Inet
FW

LB

(Not including calls for creation of
Security Groups, FW and LB)
neutron net-create inet --router:external=True

neutron subnet-create inet 172.16.1.0/24 --disable-dhcp –
name inet

neutron net-create web

neutron subnet-create web 10.0.0.0/24 web –name web
neutron router-create router1
neutron router-interface-add router1 web
neutron router-gateway-set router1 inet
The Problem
IBM Research

Neutron abstractions are closer to
physical devices
 Not easily understood and consumed by
higher layers and users
 The Policy Extension Framework adds
application centric abstractions to Neutron

Neutron: Policy Extension
Framework


IBM Research

Basic abstractions we need:
 Connectivity

Groups: Grouping of endpoints
 Policy: Specifying the network functions
governing connectivity of these groups

Extending the current Neutron object
model
 Using the existing Neutron resources


* Icehouse

Design Summit Session (IBM and Cisco joint proposal) : ” Groupbased Policy Abstractions” aka “Connectivity Group Extension API” or “Policy
Extension Framework”
Policy Extension Framework
IBM Research



Simple, application-oriented network model
group
logical grouping of VMs
• traditional: MAC, IP, port
• abstract/cloud: virtual network, application group

policy
•
•
•
•

between pairs of groups
establish communication
attach properties to the communication
e.g., ACLs, middleboxes, QoS, reliability, etc.
Policy Rules and Policy Sets
IBM Research






Policy: made of Policy Rules
Policy Rule: applies actions to selected net
traffic
Policy Set: An aggregation of policies; Can
represent an application pattern

Policyrule
Traffic: Http Action: Allow

Policyset
Policies: [policy_web, policy_db]
Policy: The Hierarchy
IBM Research

Policy

Policy Set

Connectivity Groups

Policy
Policy
Policy

(Source & Destination)

Policy Rule

Traffic
Classifier

Action

Policy Rules
Policy Rules
Policy Rules
Policy Rule
Policy Rule: Action Types
IBM Research





Basic connectivity
ACL
Service chaining (Middleboxes)
 List

of services
 Neutron services (*aaS) and/or other services
 Service configuration



QoS and Monitoring
Logical middleboxes
Proposed Neutron CLI
IBM Research
GROUP:WEB

Policy:Web
GROUP:Inet
FW1

LB1

neutron connectivitygroup-create inet –external
neutron connectivitygroup-create web
neutron policy-rule-create policyrule-web --protocol http,https --action fw1,lb1
neutron policy-create policy-web-ingress --policy-endpoints inet,web --policyrule
policyrule-web
The 3-tier App Example:
Revisited

IBM Research

GROUP:LOGIC
GROUP:Web
Policy:Web

Policy:DB
GROUP:DB

GROUP:Inet
Heat Template Sketch for 3-tier
App

IBM Research

Policy_web_ingress:

cg_inet:

Type: OS::Neutron::policy

Type: OS::Neutron::connectivity_group

Properties:

Properties:

connectivity_groups: {“cg_inet”, “cg_web”}
endpoints: {“inet”}
Policy_rules: [“policy_rule_web”]

configuration: “external”

Policy_rule_web:

cg_web:

Type: OS::Neutron::policy_rule

Type: OS::Neutron::connetivity_group

Properties:
traffic_spec:
ports: 80,443

Properties:
endpoints: { “webserver1”, “webserver2”,
webserver3”}

protocol: “tcp”

action_type:
service_chain: {FW1, LB1}
service_conf: {}



Endpoints:



Current Neutron resources
Neutron resource creation can be explicit or implicit; Can be
automated at higher layers
Extending Heat
IBM Research



Expanding the role of
Heat



Open Specifications:
TOSCA

Software
Orchestration

Infrastructure
Orchestration
Heat

Nova

Cinder

Neutron
Application-centric Network
Services
IBM Research

With the basic abstractions in
place, we can build on how
networking resources are used
 Provide interesting application-centric
functionalities
 Let us look at a few example use
cases

Dynamic Updates
IBM Research



Updating the Connectivity Group will also
notify components of the associated policy
Logical Middlebox: Monitoring
IBM Research








Monitoring defined as policy
Collecting network specific statistics for
applications
Aggregate based on flows, endpoint, groups of
endpoints, applications
Feeds to the comprehensive closed-loop
processing
Closed-loop Processing
IBM Research



Standard MAPE
(Monitor, Analyze, Plan, Execute) model with
application-centric network monitoring
 Application

specifies the service level required
 Application publishes the service level it is
experiencing
 If service level is not met, application level
monitoring data is analyzed
 If the problem is deemed to be network
related, actions are taken by modifying the
network policies
 Rerouting

paths
 Bandwidth reservation and throttling
Topology Based Policies
IBM Research





Network controllers provide a wide selection of
topology related information and features
Make those available at higher layers through
policies
 Colocation/Anti-colocation


for network routes

Non-overlapping routes

 Asymmetric
 Separate

 Network

routes

routes on each direction

hop-count limit
Beyond Single Tenant Policies
IBM Research

The policy extension is defined for a given
tenant
 Can be extended such that network
functions can be provided by a tenant to
one or more tenants and/or external users
 Require to setup the networks across
tenants
 Admin based vs. tenant centric

Conclusion
IBM Research



Different abstractions are useful at
different layers



OpenStack Networking needs to be able
to support and use these



The framework for new applicationcentric network abstractions being
proposed



Let us discuss the details at the design session
“Connectivity Group Extension” (“Group-based
Policy Abstractions for Neutron”) on Friday Nov.
8th @ 3:10pm
Acknowledgement
IBM Research






Anees Shaikh
David Olshefski and John Tracey
Marcio Silva
Thank You
IBM Research

* Photo credit: wikiHow

Weitere ähnliche Inhalte

Was ist angesagt?

Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
 
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...IEEEMEMTECHSTUDENTSPROJECTS
 
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi RadiosE-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi RadiosUniversitasGadjahMada
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
 
method for enhancement of coexistence between e gsm and cdma systems in borde...
method for enhancement of coexistence between e gsm and cdma systems in borde...method for enhancement of coexistence between e gsm and cdma systems in borde...
method for enhancement of coexistence between e gsm and cdma systems in borde...INFOGAIN PUBLICATION
 
ViPMesh
ViPMeshViPMesh
ViPMeshNimi T
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001IJARTES
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networksCatherineProtas
 
Group 7.3 - Infrastructure Design
Group 7.3 - Infrastructure DesignGroup 7.3 - Infrastructure Design
Group 7.3 - Infrastructure DesignKweku Ocran
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...ieeepondy
 
BACnet Networking Guide
BACnet Networking GuideBACnet Networking Guide
BACnet Networking GuideRich Johnson
 
Network Topologies
Network Topologies Network Topologies
Network Topologies Ali Haider
 

Was ist angesagt? (18)

Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding engines
 
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
 
Self Organizing Network
Self Organizing NetworkSelf Organizing Network
Self Organizing Network
 
A dhoc networks
A dhoc networksA dhoc networks
A dhoc networks
 
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi RadiosE-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios
E-MICE: Energy-Efficient Concurrent Exploitation of Multiple Wi-Fi Radios
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
Heterogeneous Network Project Topics
Heterogeneous Network Project TopicsHeterogeneous Network Project Topics
Heterogeneous Network Project Topics
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
method for enhancement of coexistence between e gsm and cdma systems in borde...
method for enhancement of coexistence between e gsm and cdma systems in borde...method for enhancement of coexistence between e gsm and cdma systems in borde...
method for enhancement of coexistence between e gsm and cdma systems in borde...
 
ViPMesh
ViPMeshViPMesh
ViPMesh
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networks
 
Group 7.3 - Infrastructure Design
Group 7.3 - Infrastructure DesignGroup 7.3 - Infrastructure Design
Group 7.3 - Infrastructure Design
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...
 
BACnet Networking Guide
BACnet Networking GuideBACnet Networking Guide
BACnet Networking Guide
 
Network Topologies
Network Topologies Network Topologies
Network Topologies
 

Ähnlich wie Mb openstack-nov2013v7

Neutron Networking: Service Groups, Policies and Chains
Neutron Networking: Service Groups, Policies and ChainsNeutron Networking: Service Groups, Policies and Chains
Neutron Networking: Service Groups, Policies and ChainsDaniel Krook
 
Docker meetup oct14
Docker meetup   oct14Docker meetup   oct14
Docker meetup oct14Vipin Jain
 
Configurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksConfigurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksIJMER
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesTowards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesHong-Linh Truong
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
 
Final PhD Defense Presentation
Final PhD Defense PresentationFinal PhD Defense Presentation
Final PhD Defense PresentationDr Piyush Charan
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
 
Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Kalman Graffi
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research HelpMatlab Simulation
 

Ähnlich wie Mb openstack-nov2013v7 (20)

Neutron Networking: Service Groups, Policies and Chains
Neutron Networking: Service Groups, Policies and ChainsNeutron Networking: Service Groups, Policies and Chains
Neutron Networking: Service Groups, Policies and Chains
 
Docker meetup oct14
Docker meetup   oct14Docker meetup   oct14
Docker meetup oct14
 
Netkit
NetkitNetkit
Netkit
 
Configurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain NetworksConfigurable Monitoring For Multi-Domain Networks
Configurable Monitoring For Multi-Domain Networks
 
TFI2014 Session I - State of SDN - Scott Sneddon
TFI2014 Session I - State of SDN - Scott SneddonTFI2014 Session I - State of SDN - Scott Sneddon
TFI2014 Session I - State of SDN - Scott Sneddon
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesTowards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
Final PhD Defense Presentation
Final PhD Defense PresentationFinal PhD Defense Presentation
Final PhD Defense Presentation
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
Camp finall
Camp finallCamp finall
Camp finall
 
Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007
 
DNIS in SRC
DNIS in SRCDNIS in SRC
DNIS in SRC
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research Help
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Mb openstack-nov2013v7

  • 1. Network Abstractions at Different Layers of the Stack Mohammad Banikazemi November 2013 IBM Research
  • 2. Outline IBM Research Network Abstractions at Different Layers  Neutron: The OpenStack Networking  Application-centric Abstractions for Neutron: Policy Extension Framework  Application-centric Network Policies  Conclusion 
  • 3. Different Layers IBM Research    Neutron is the OpenStack networking Higher layers consume networking resources through the Neutron API Lower layers realize these networking resources through a pluggable architecture App App App App Cloud Orchestrator Heat Nova Neutron Network Controller
  • 4. Abstractions at Higher Layers IBM Research   Simple and application centric Non-network centric: Interested in the needed network functions and not how they are Tier 2 realized Tier 1 Tier 3 External Network Internet Firewall Load Balancer QoS
  • 5. Abstractions in Lower Layers IBM Research Network centric  Device oriented (switches/routers)  Topology aware  Packet forwarding/routing, Path computation  No standard northbound API  * M. Banikazemi, D. Olshefski, A. Shaikh, J. Tracey, and G. Wang, Meridian: An SDN Platform for Cloud Network Services, IEEE Communications Magazine, Feb
  • 6. Neutron: A Quantum Approach IBM Research  Defines a minimal set of interfaces required for setting up networks for users Network •network: isolated layer-2 broadcast domain; private/shared Subnet •Subnet: CIDR IP address block associated with a network; optionally associated gateway, DNS/DHCP servers •port: virtual switch port on a network; has MAC and IP address properties Port  Extendable
  • 7. Neutron Expansion throughExtensions    IBM Research Physical networks Layer 3 networking Layers 4-7 services Router NAT, Floating IP Network Provider Network Multi-Provider Network Subnet Port Binding LBaaS, FWaaS VPNaaS, Port Security Group
  • 8. Neutron: The 3-tier App Example  IBM Research One possible implementation using a single router External Network Router Network/subnet Network/subnet Network/subnet Port
  • 9. Realizing the Application IBM Research Consider part of the 3-tier app: GROUP:WEB GROUP:Inet FW LB (Not including calls for creation of Security Groups, FW and LB) neutron net-create inet --router:external=True neutron subnet-create inet 172.16.1.0/24 --disable-dhcp – name inet neutron net-create web neutron subnet-create web 10.0.0.0/24 web –name web neutron router-create router1 neutron router-interface-add router1 web neutron router-gateway-set router1 inet
  • 10. The Problem IBM Research Neutron abstractions are closer to physical devices  Not easily understood and consumed by higher layers and users  The Policy Extension Framework adds application centric abstractions to Neutron 
  • 11. Neutron: Policy Extension Framework  IBM Research Basic abstractions we need:  Connectivity Groups: Grouping of endpoints  Policy: Specifying the network functions governing connectivity of these groups Extending the current Neutron object model  Using the existing Neutron resources  * Icehouse Design Summit Session (IBM and Cisco joint proposal) : ” Groupbased Policy Abstractions” aka “Connectivity Group Extension API” or “Policy Extension Framework”
  • 12. Policy Extension Framework IBM Research  Simple, application-oriented network model group logical grouping of VMs • traditional: MAC, IP, port • abstract/cloud: virtual network, application group policy • • • • between pairs of groups establish communication attach properties to the communication e.g., ACLs, middleboxes, QoS, reliability, etc.
  • 13. Policy Rules and Policy Sets IBM Research    Policy: made of Policy Rules Policy Rule: applies actions to selected net traffic Policy Set: An aggregation of policies; Can represent an application pattern Policyrule Traffic: Http Action: Allow Policyset Policies: [policy_web, policy_db]
  • 14. Policy: The Hierarchy IBM Research Policy Policy Set Connectivity Groups Policy Policy Policy (Source & Destination) Policy Rule Traffic Classifier Action Policy Rules Policy Rules Policy Rules Policy Rule
  • 15. Policy Rule: Action Types IBM Research    Basic connectivity ACL Service chaining (Middleboxes)  List of services  Neutron services (*aaS) and/or other services  Service configuration   QoS and Monitoring Logical middleboxes
  • 16. Proposed Neutron CLI IBM Research GROUP:WEB Policy:Web GROUP:Inet FW1 LB1 neutron connectivitygroup-create inet –external neutron connectivitygroup-create web neutron policy-rule-create policyrule-web --protocol http,https --action fw1,lb1 neutron policy-create policy-web-ingress --policy-endpoints inet,web --policyrule policyrule-web
  • 17. The 3-tier App Example: Revisited IBM Research GROUP:LOGIC GROUP:Web Policy:Web Policy:DB GROUP:DB GROUP:Inet
  • 18. Heat Template Sketch for 3-tier App IBM Research Policy_web_ingress: cg_inet: Type: OS::Neutron::policy Type: OS::Neutron::connectivity_group Properties: Properties: connectivity_groups: {“cg_inet”, “cg_web”} endpoints: {“inet”} Policy_rules: [“policy_rule_web”] configuration: “external” Policy_rule_web: cg_web: Type: OS::Neutron::policy_rule Type: OS::Neutron::connetivity_group Properties: traffic_spec: ports: 80,443 Properties: endpoints: { “webserver1”, “webserver2”, webserver3”} protocol: “tcp” action_type: service_chain: {FW1, LB1} service_conf: {}  Endpoints:   Current Neutron resources Neutron resource creation can be explicit or implicit; Can be automated at higher layers
  • 19. Extending Heat IBM Research  Expanding the role of Heat  Open Specifications: TOSCA Software Orchestration Infrastructure Orchestration Heat Nova Cinder Neutron
  • 20. Application-centric Network Services IBM Research With the basic abstractions in place, we can build on how networking resources are used  Provide interesting application-centric functionalities  Let us look at a few example use cases 
  • 21. Dynamic Updates IBM Research  Updating the Connectivity Group will also notify components of the associated policy
  • 22. Logical Middlebox: Monitoring IBM Research     Monitoring defined as policy Collecting network specific statistics for applications Aggregate based on flows, endpoint, groups of endpoints, applications Feeds to the comprehensive closed-loop processing
  • 23. Closed-loop Processing IBM Research  Standard MAPE (Monitor, Analyze, Plan, Execute) model with application-centric network monitoring  Application specifies the service level required  Application publishes the service level it is experiencing  If service level is not met, application level monitoring data is analyzed  If the problem is deemed to be network related, actions are taken by modifying the network policies  Rerouting paths  Bandwidth reservation and throttling
  • 24. Topology Based Policies IBM Research   Network controllers provide a wide selection of topology related information and features Make those available at higher layers through policies  Colocation/Anti-colocation  for network routes Non-overlapping routes  Asymmetric  Separate  Network routes routes on each direction hop-count limit
  • 25. Beyond Single Tenant Policies IBM Research The policy extension is defined for a given tenant  Can be extended such that network functions can be provided by a tenant to one or more tenants and/or external users  Require to setup the networks across tenants  Admin based vs. tenant centric 
  • 26. Conclusion IBM Research  Different abstractions are useful at different layers  OpenStack Networking needs to be able to support and use these  The framework for new applicationcentric network abstractions being proposed  Let us discuss the details at the design session “Connectivity Group Extension” (“Group-based Policy Abstractions for Neutron”) on Friday Nov. 8th @ 3:10pm
  • 27. Acknowledgement IBM Research    Anees Shaikh David Olshefski and John Tracey Marcio Silva
  • 28. Thank You IBM Research * Photo credit: wikiHow

Hinweis der Redaktion

  1. 1- Neutron is the openstacknetworking layer. 2- Higher layers … 3- Lower Layers … before we look at Neutron abstraction lets look at other layers.
  2. Now, let us focus on Neutron and see what abstractions it provides
  3. ---- physical network / device oriented Physical data center structureprovider network Layer 3 networking (router)NATfloating IPs (for externally accessible services)---- modeled after Amazon VPC Security groupsaccess control rules for ingress / egress traffic on Neutron ports---- vendor device modelsL4 – L7 servicesload balancer as a service (LBaaS)other service APIs being developed (firewall, VPN, …)