SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Confiden'al	
  
Netvisor - “The” Network Hypervisor
Pluribus Networks NetvisorOS

Open Fabrics, Analytics, and
Virtualizations
Robert Drost, Ph.D.
Founder and COO
Pluribus	
  Networks	
  –	
  What	
  Do	
  We	
  Do?	
  
A	
  Network	
  (Hypervisor)	
  OS:	
  Netvisor !
Designed to build the easiest	
  to	
  use	
  networks	
  
Leaf	
  and	
  Spine	
  Switches	
  
Turn-­‐key	
  HW+SW ! SW on ODM	
  switches!
Is	
  The	
  Life	
  of	
  Netops	
  GeIng	
  Any	
  Easier?	
  
!  complex
 to
 manage…⋯too
 many
 
protocols,
 too
 many
 boxes
 
 
!  Complex
 to
 troubleshoot…⋯box-by-
box
 
 
!  Expensive
 to
 monitor
 and
 secure…⋯
no
 visibility
 into
 application
 flows
 
and
 behavior
 of
 end
 points
 
Network	
  Monitoring	
  and	
  Security	
  Challenges	
  
 
!  N-S
 perimeter:
 protected
 by
 security
 
tools
 and
 packet
 brokers
 
!  E-W
 fabric:

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

9th SDN Expert Group Seminar - Session2
9th SDN Expert Group Seminar - Session29th SDN Expert Group Seminar - Session2
9th SDN Expert Group Seminar - Session2
 
OpenContrail Overview
OpenContrail OverviewOpenContrail Overview
OpenContrail Overview
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)
 
6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFV
 
Contrail Launch: Capitalize on SDN and Cloud. Now.
Contrail Launch: Capitalize on SDN and Cloud. Now.Contrail Launch: Capitalize on SDN and Cloud. Now.
Contrail Launch: Capitalize on SDN and Cloud. Now.
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
OpenContrail Silicon Valley Meetup Aug 25 2015
OpenContrail Silicon Valley Meetup Aug 25 2015OpenContrail Silicon Valley Meetup Aug 25 2015
OpenContrail Silicon Valley Meetup Aug 25 2015
 
Sdn nfv-day-2016
Sdn nfv-day-2016Sdn nfv-day-2016
Sdn nfv-day-2016
 
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
vCloud NFV - Accelerating deployment of the Telco Cloud (SDN NFV Day ITB 2016)
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Journey to Software-Defined Cloud Networking
Journey to Software-Defined Cloud NetworkingJourney to Software-Defined Cloud Networking
Journey to Software-Defined Cloud Networking
 
Innovations in Switching
Innovations in SwitchingInnovations in Switching
Innovations in Switching
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
Presentación Laboratorio NFV de Telefónica de Antonio Elizondo
Presentación Laboratorio NFV de Telefónica de Antonio ElizondoPresentación Laboratorio NFV de Telefónica de Antonio Elizondo
Presentación Laboratorio NFV de Telefónica de Antonio Elizondo
 

Andere mochten auch

Andere mochten auch (7)

Policy Based Routing
Policy Based RoutingPolicy Based Routing
Policy Based Routing
 
1st SDN Interest Group Seminar - Session2 (121017)
1st SDN Interest Group Seminar - Session2 (121017)1st SDN Interest Group Seminar - Session2 (121017)
1st SDN Interest Group Seminar - Session2 (121017)
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
[OpenStack Day in Korea] 15분만에 구축하는 오픈스택 기반 크라우드 솔루션: HP CloudSystem
[OpenStack Day in Korea] 15분만에 구축하는 오픈스택 기반 크라우드 솔루션: HP CloudSystem[OpenStack Day in Korea] 15분만에 구축하는 오픈스택 기반 크라우드 솔루션: HP CloudSystem
[OpenStack Day in Korea] 15분만에 구축하는 오픈스택 기반 크라우드 솔루션: HP CloudSystem
 
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
 
150114 OpenStack Korea 정기세미나 session3 - OpenStack 네트워크와 SDN
150114 OpenStack Korea 정기세미나 session3 - OpenStack 네트워크와 SDN150114 OpenStack Korea 정기세미나 session3 - OpenStack 네트워크와 SDN
150114 OpenStack Korea 정기세미나 session3 - OpenStack 네트워크와 SDN
 
네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud
 

Ähnlich wie 9th SDN Expert Group Seminar - Session3

Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
OpenSourceIndia
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
suniltomar04
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
Dorian Hernandez
 

Ähnlich wie 9th SDN Expert Group Seminar - Session3 (20)

An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Software Define Network, a new security paradigm ?
Software Define Network, a new security paradigm ?Software Define Network, a new security paradigm ?
Software Define Network, a new security paradigm ?
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
Kubernetes
KubernetesKubernetes
Kubernetes
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
 
Docker Multi Host Networking, Rachit Arora, IBM
Docker Multi Host Networking, Rachit Arora, IBMDocker Multi Host Networking, Rachit Arora, IBM
Docker Multi Host Networking, Rachit Arora, IBM
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Introduction to nfv movilforum
Introduction to nfv   movilforumIntroduction to nfv   movilforum
Introduction to nfv movilforum
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
 
CampusSDN2017 - Jawdat: SDN Technology Evolvement
CampusSDN2017 - Jawdat: SDN Technology EvolvementCampusSDN2017 - Jawdat: SDN Technology Evolvement
CampusSDN2017 - Jawdat: SDN Technology Evolvement
 
A Networking View for the DevOps Crew: SDN
A Networking View for the DevOps Crew: SDNA Networking View for the DevOps Crew: SDN
A Networking View for the DevOps Crew: SDN
 
Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)
 
Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)
 

Mehr von NAIM Networks, Inc.

Mehr von NAIM Networks, Inc. (20)

[White Paper] SDN 기반 공격 탐지차단 강화를 위한 네트워크 관리 정보 구성 방안
[White Paper] SDN 기반 공격 탐지차단 강화를 위한 네트워크 관리 정보 구성 방안[White Paper] SDN 기반 공격 탐지차단 강화를 위한 네트워크 관리 정보 구성 방안
[White Paper] SDN 기반 공격 탐지차단 강화를 위한 네트워크 관리 정보 구성 방안
 
[이동식 원격 데이터센터 컨퍼런스] SDN기반 자동화 기술의 이동식 데이터센터 적용방안-나임네트웍스 김동균 매니저
[이동식 원격 데이터센터 컨퍼런스] SDN기반 자동화 기술의 이동식 데이터센터 적용방안-나임네트웍스 김동균 매니저[이동식 원격 데이터센터 컨퍼런스] SDN기반 자동화 기술의 이동식 데이터센터 적용방안-나임네트웍스 김동균 매니저
[이동식 원격 데이터센터 컨퍼런스] SDN기반 자동화 기술의 이동식 데이터센터 적용방안-나임네트웍스 김동균 매니저
 
[이동식 원격 데이터센터 컨퍼런스] edge computing을 위한 micro data center 기술 및 구축 사례-슈나이더일렉트릭 ...
[이동식 원격 데이터센터 컨퍼런스] edge computing을 위한 micro data center 기술 및 구축 사례-슈나이더일렉트릭 ...[이동식 원격 데이터센터 컨퍼런스] edge computing을 위한 micro data center 기술 및 구축 사례-슈나이더일렉트릭 ...
[이동식 원격 데이터센터 컨퍼런스] edge computing을 위한 micro data center 기술 및 구축 사례-슈나이더일렉트릭 ...
 
[이동식 원격 데이터센터 컨퍼런스] SDDC 구축 사례와 원격 데이터센터 적용의 필요성-인천유시티 이상호 차장
[이동식 원격 데이터센터 컨퍼런스] SDDC 구축 사례와 원격 데이터센터 적용의 필요성-인천유시티 이상호 차장[이동식 원격 데이터센터 컨퍼런스] SDDC 구축 사례와 원격 데이터센터 적용의 필요성-인천유시티 이상호 차장
[이동식 원격 데이터센터 컨퍼런스] SDDC 구축 사례와 원격 데이터센터 적용의 필요성-인천유시티 이상호 차장
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
 
Sdn and Security
Sdn and SecuritySdn and Security
Sdn and Security
 
SDN입문 (Overlay and Underlay)
SDN입문 (Overlay and Underlay)SDN입문 (Overlay and Underlay)
SDN입문 (Overlay and Underlay)
 
ONK2015-Jive:SDN/NFV Based Enterprise IoT Management Solution
ONK2015-Jive:SDN/NFV Based Enterprise IoT Management SolutionONK2015-Jive:SDN/NFV Based Enterprise IoT Management Solution
ONK2015-Jive:SDN/NFV Based Enterprise IoT Management Solution
 
9th SDN Expert Group Seminar - Session4
9th SDN Expert Group Seminar - Session49th SDN Expert Group Seminar - Session4
9th SDN Expert Group Seminar - Session4
 
고신뢰 네트워크사업-클라우드와 SDN 보안
고신뢰 네트워크사업-클라우드와 SDN 보안고신뢰 네트워크사업-클라우드와 SDN 보안
고신뢰 네트워크사업-클라우드와 SDN 보안
 
OVNC 2015-High performance Network Function Virtualization & VNF acceleration
OVNC 2015-High performance Network Function Virtualization & VNF accelerationOVNC 2015-High performance Network Function Virtualization & VNF acceleration
OVNC 2015-High performance Network Function Virtualization & VNF acceleration
 
OVNC 2015-SDN을 이용한 IoT 환경 단말보안
OVNC 2015-SDN을 이용한 IoT 환경 단말보안OVNC 2015-SDN을 이용한 IoT 환경 단말보안
OVNC 2015-SDN을 이용한 IoT 환경 단말보안
 
OVNC 2015-차세대 데이터센터 아키텍처, 애플리케이션 중심 인프라스트럭처 ACI
OVNC 2015-차세대 데이터센터 아키텍처, 애플리케이션 중심 인프라스트럭처 ACIOVNC 2015-차세대 데이터센터 아키텍처, 애플리케이션 중심 인프라스트럭처 ACI
OVNC 2015-차세대 데이터센터 아키텍처, 애플리케이션 중심 인프라스트럭처 ACI
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
 
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksOVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성
 
7th SDN Expert Group Seminar - Session4
7th SDN Expert Group Seminar - Session47th SDN Expert Group Seminar - Session4
7th SDN Expert Group Seminar - Session4
 
7th SDN Expert Group Seminar - Session3
7th SDN Expert Group Seminar - Session37th SDN Expert Group Seminar - Session3
7th SDN Expert Group Seminar - Session3
 
7th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session27th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session2
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

9th SDN Expert Group Seminar - Session3

  • 1. Confiden'al   Netvisor - “The” Network Hypervisor Pluribus Networks NetvisorOS Open Fabrics, Analytics, and Virtualizations Robert Drost, Ph.D. Founder and COO
  • 2. Pluribus  Networks  –  What  Do  We  Do?   A  Network  (Hypervisor)  OS:  Netvisor ! Designed to build the easiest  to  use  networks   Leaf  and  Spine  Switches   Turn-­‐key  HW+SW ! SW on ODM  switches!
  • 3. Is  The  Life  of  Netops  GeIng  Any  Easier?   !  complex
  • 11.  
  • 13.  to
  • 15.  
  • 17.  to
  • 19.  and
  • 27.  of
  • 28.  end
  • 30.  
  • 31. Network  Monitoring  and  Security  Challenges  
  • 35.  by
  • 38.  and
  • 45.   to
  • 46.  tap
  • 47.  
  • 48.  
  • 49.  
  • 51.  to
  • 52.  E-W
  • 59.  of
  • 62.  of
  • 66.  to
  • 67.  the
  • 71.  of
  • 72.  any
  • 74.  of
  • 83. Open,
  • 87.  w/o
  • 90.  
  • 91.  for
  • 93.  
  • 98.  to
  • 104.  
  • 105.   The  Promise  Of  Netvisor  
  • 106. Netvisor  Architecture  Layers  At-­‐a-­‐Glance   Integrated Analytics For Security and Monitoring PlugPlay Fabric Orchestration Network Virtualization Orchestration Netvisor® - L2/L3/MLAG/VXLAN Open Networking hardware CLI, Python Ansible Puppet/Chef OpenStack RESTful API Common orchestration, tools and automation C, Java Open,
  • 109.  
  • 112.  
  • 114.  
  • 120.  VMs,
  • 121.  app
  • 123.  
  • 126.  
  • 129.  
  • 130. Netvisor  Control  Plane  Fabric     Single
  • 132.  of
  • 133.  mgmt
  • 137.  
  • 140.  
  • 143.  
  • 146.  over
  • 151.   In
  • 152.  the
  • 154.  
  • 155. Netvisor  Server-­‐Style  Distributed  Architecture   “A  computer  cluster  consists  of  a   set  of  loosely  or  'ghtly  connected   computers  that  work  together  so   that,  in  many  respects,  they  can  be   viewed  as  a  single  system”   Servers
  • 157.  on
  • 159.  and
  • 166.  of
  • 167.  mgmt
  • 169.  
  • 170.  
  • 171.  
  • 172.  
  • 173.  
  • 179.  
  • 180.  
  • 181.  
  • 182.  
  • 186.   and
  • 192.  
  • 193. Netvisor  Server-­‐Style  Control  Plane  Architecture     vSwitch   ovsdb  openflow   controller
  • 195.  
  • 197.  the
  • 200.  
  • 202.  new
  • 204.  i/f
  • 207.  on
  • 208.  PCIe
  • 214.  is
  • 215.  in
  • 219.  just
  • 220.  uses
  • 221.  it
  • 222.  
  • 224.  like
  • 225.  a
  • 227.  OS!
  • 230. One
  • 232.  to
  • 234.  
  • 235.   the
  • 237.  from
  • 238.  any
  • 247.  to
  • 253.  like
  • 254.  a
  • 256.  
  • 257.  
  • 258. One
  • 260.  to
  • 262.  
  • 263.   the
  • 265.  from
  • 266.  any
  • 269.   Fabric  API  For  Netops  and  Devops   Netvisor   API   …⋯or
  • 270.  from
  • 271.  any
  • 272.  
  • 278.  API
  • 280.   For
  • 282.  
  • 285.  C,
  • 287.  
  • 288.  cli,
  • 290. CLI  (network-­‐admin@Leaf2)    vrouter-­‐routes-­‐show  network  101.101.19.0   vrouter-­‐name  network                  type            interface  next-­‐hop      distance  metric     -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐     leaf2          101.101.19.0/24  bgp              eth0.21      99.99.3.1    200            1               leaf3          101.101.19.0/24  bgp              eth0.19      99.99.5.1    200            1               leaf4          101.101.19.0/24  bgp              eth0.17      99.99.7.1    200            1               leaf5          101.101.19.0/24  bgp              eth0.15      99.99.15.1  200            1               leaf6          101.101.19.0/24  bgp              eth0.5        99.99.16.1  200            1               leaf1          101.101.19.0/24  connected  eth0.2220                                                             CLI  (network-­‐admin@Leaf2)    vrouter-­‐routes-­‐show  network  108.108.108.108   vrouter-­‐name  network                        type            interface  next-­‐hop        distance  metric     -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐     leaf2          108.108.108.108/32  connected  lo0                                                                         leaf1          108.108.108.108/32  bgp              eth0.38      99.99.17.1    200            1               leaf3          108.108.108.108/32  bgp              eth0.36      99.99.19.1    200            1               leaf4          108.108.108.108/32  bgp              eth0.40      99.99.21.1    200            1               leaf5          108.108.108.108/32  bgp              eth0.22      99.99.117.1  200            1               leaf6          108.108.108.108/32  bgp              eth0.8        99.99.119.1  200            1               CLI  (network-­‐admin@BGP-­‐Leaf2)       ONE  “FABRIC  CLI”    -­‐  example   troubleshoot
  • 291.  if
  • 293.  are
  • 296.  all
  • 298.  in
  • 299.   the
  • 301.   ssh
  • 302.  into
  • 303.  one
  • 305.  
  • 306. ONE  “FABRIC  CLI”    -­‐  example   admin@Leaf3:~#  cli  -­‐-­‐quiet  vlan-­‐show   switch  id      scope  name            active  stats  ports                  untagged-­‐ports  active-­‐edge-­‐ports     -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐     Leaf3    1        local  default-­‐1  yes        yes      1-­‐6,9-­‐104,254  1-­‐6,9-­‐104,254    29,101                           Leaf3    4091  local  vlan-­‐4091  yes        yes      8,89-­‐104,254    8                            8,101                             Leaf3    4092  local  vlan-­‐4092  yes        yes      7,89-­‐104,254    7                            7,101                             admin@Leaf3:~#  ./vlancreate.sh  500  510   Vlan  500  created   Vlan  501  created   Vlan  502  created   Vlan  503  created   Vlan  504  created   Vlan  505  created   Vlan  506  created   Vlan  507  created   Vlan  508  created   Vlan  509  created   Vlan  510  created   switch  id      scope    name            active  stats  ports                  untagged-­‐ports  active-­‐edge-­‐ports     -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐     Leaf3    1        local    default-­‐1  yes        yes      1-­‐6,9-­‐104,254  1-­‐6,9-­‐104,254    29,101                           Leaf3    500    fabric  vlan-­‐500    yes        yes      89-­‐104,254        none                      none                               Leaf3    501    fabric  vlan-­‐501    yes        yes      89-­‐104,254        none                      none                               Leaf3    502    fabric  vlan-­‐502    yes        yes      89-­‐104,254        none                      none                               Leaf3    503    fabric  vlan-­‐503    yes        yes      89-­‐104,254        none                      none                               Leaf3    504    fabric  vlan-­‐504    yes        yes      89-­‐104,254        none                      none                               Leaf3    505    fabric  vlan-­‐505    yes        yes      89-­‐104,254        none                      none                               Leaf3    506    fabric  vlan-­‐506    yes        yes      89-­‐104,254        none                      none                               Leaf3    507    fabric  vlan-­‐507    yes        yes      89-­‐104,254        none                      none                               Leaf3    508    fabric  vlan-­‐508    yes        yes      89-­‐104,254        none                      none                               Leaf3    509    fabric  vlan-­‐509    yes        yes      89-­‐104,254        none                      none                               Leaf3    510    fabric  vlan-­‐510    yes        yes      89-­‐104,254        none                      none                               Leaf3    4091  local    vlan-­‐4091  yes        yes      8,89-­‐104,254    8                            8,101                             Leaf3    4092  local    vlan-­‐4092  yes        yes      7,89-­‐104,254    7                            7,101                             admin@Leaf3:~#     Create
  • 308.  in
  • 311.  the
  • 313.   ssh
  • 314.  into
  • 315.  one
  • 319.  are
  • 322.  
  • 323. ! ! Netvisor Fabric-Cluster For Simplified Mgmt! ! ! L2! L3! HA block! Distributed peer-to-peer HA cluster. No single point of failure. Node hot-plug.! Classic database ! 3-phase commit for config changes! One logical switch to manage! –! Every Node shares the same view of the Fabric: MAC, IP, connections and app flows! A distributed architecture based on a collection of compute clustering techniques to present ! an open, standard-based Ethernet fabric as ! one logical switch.! Fabric-wide ARP Suppression!
  • 324. Customer  Example:  US  Manufacturing  Company   Fabric  VirtualizaWon  For  Private  Cloud   Pluribus  Architectural  Value:   !  Leaf-­‐Spine  Fabric  simplificaWon     !  Virtual  network  with  HW  vRouters   !  Analy'cs  w/  forensic  recording   !  Enable  inser'on  of  new  services  w/o   HW  sprawl  (e.g.  For'net  FW)   Requirements:   !  Consolida'on  of  legacy  mul'-­‐layer   design  to  leaf-­‐spine   !  Segmenta'on/mul'-­‐tenancy  w/o   dedicated  HW  (routers,  services)   !  E-­‐W  flow  visibility,  compliance,   audi'ng  
  • 327.  
  • 330.  
  • 337.  and
  • 340.  
  • 341. any
  • 343.  any
  • 345.  any
  • 347.  any
  • 348.  time
  • 349.   Netvisor  Global  Fabric  Visibility   from
  • 350.  any
  • 352.  
  • 353. The  Technology  Behind  it:    A  Smarter  TAP!   PCIe
  • 354.   NO
  • 357.  
  • 361.  VM,
  • 363.  port
  • 364.  
  • 365.  
  • 366.   NO
  • 368.  TAPS
  • 374.  
  • 376.  Flow
  • 379.  
  • 380. admin@F64LSpine1:~#  cli  client-­‐server-­‐stats-­‐show  |  egrep  'syn|HDFS|MR|Cassandra’   switch          vlan  vxlan  client-­‐ip            server-­‐ip            server-­‐port                                                syn      est  fin  obytes  ibytes  total-­‐bytes  avg-­‐dur  avg-­‐lat  last-­‐seen-­‐ago     Leaf2            103    0          103.103.103.10  103.103.103.20  HDFS-­‐Namenode-­‐WebUI                                0          0      198  442G      198        442G                10.01s    157us      1m39s                     Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐Namenode-­‐WebUI                                0          0      198  445G      198        445G                10.01s    354us      1m39s                     Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐DataNode-­‐Metadata                          0          0      198  465G      198        465G                10.01s    229us      28s                         Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐Metadata-­‐operations-­‐8020            0          0      198  469G      198        469G                10.01s    207us      1m8s                       Leaf2            103    0          103.103.103.20  103.103.103.10  Cassandra-­‐Client-­‐Thrift                        0          0      197  473G      197        473G                10.01s    277us      10m38s                   Leaf2            103    0          103.103.103.20  103.103.103.10  MR-­‐History-­‐WebUI                                      0          0      197  474G      197        474G                10.01s    199us      14m39s                   Leaf2            103    0          103.103.103.20  103.103.103.10  Cassandra-­‐JMX-­‐Monitoring                      0          0      197  475G      197        475G                10.01s    253us      10m58s                   Leaf2            103    0          103.103.103.20  103.103.103.10  Cassandra-­‐OpsCenter-­‐Agent                    0          0      197  476G      197        476G                10.01s    256us      10m18s                   Leaf2            103    0          103.103.103.20  103.103.103.10  MR-­‐JobTracker                                            0          1      197  477G      197        477G                10.01s    258us      8s                           Leaf2            103    0          103.103.103.10  103.103.103.20  Cassandra-­‐OpsCenter-­‐Agent                    0          0      197  477G      197        477G                10.01s    892us      10m18s                   Leaf2            103    0          103.103.103.20  103.103.103.10  MR-­‐Tasktracket-­‐WebUI                              0          0      197  478G      197        478G                10.01s    222us      14m49s                   Leaf2            103    0          103.103.103.10  103.103.103.20  HDFS-­‐Secondary-­‐NameNode                        0          0      198  480G      198        480G                10.01s    898us      19s                         Leaf2            103    0          103.103.103.20  103.103.103.10  Cassandra-­‐InterNode-­‐Cluster                0          0      197  482G      197        482G                10.01s    195us      11m18s                   Applica'on  Names   Total  Bytes  in  198  Flows   On  Avg  how  long  the  TCP   Connec'ons  lasted   Avg-­‐Latency   For  198  flows   When  the   flow  was   ac've   Last  Seen  TCP  Packet(FLAG)   Indicates    for  1  TCP  flow  TCP  Syn    SYN/ACK  complete  and  session  ongoing   ApplicaWon  Flow  AnalyWcs  
  • 381. CLI  (network-­‐admin@ursa-­‐perf)    client-­‐server-­‐stats-­‐show  start-­‐time  2015-­‐06-­‐01T16:29:00  end-­‐time  2015-­‐06-­‐01T17:59:00   switch        time                      vlan  vxlan  client-­‐ip  server-­‐ip  server-­‐port  syn  est  fin  obytes  ibytes  total-­‐bytes  avg-­‐dur  avg-­‐lat  last-­‐seen-­‐ago     -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐  -­‐-­‐-­‐  -­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐  -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐     ursa-­‐perf  06-­‐01,16:29:54  1        0          1.1.4.1      1.1.4.2      http                0      0      1      2.96G    1            2.96G              10.01s    81.3us    18h40m33s             ursa-­‐perf  06-­‐01,16:30:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      1      2.96G    1            2.96G              10.00s    80.8us    18h39m18s             ursa-­‐perf  06-­‐01,16:32:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      10    11.0G    10          11.0G              10.02s    77.3us    18h37m27s             ursa-­‐perf  06-­‐01,16:34:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      10    11.0G    10          11.0G              10.02s    61.6us    18h35m3s               ursa-­‐perf  06-­‐01,16:35:54  1        0          1.1.4.1      1.1.4.2      ssh                  0      0      10    11.0G    10          11.0G              10.02s    63.3us    18h34m35s             ursa-­‐perf  06-­‐01,16:36:54  1        0          1.1.4.1      1.1.4.2      50010              0      10    0                                                                                          18h33m46s             ursa-­‐perf  06-­‐01,16:38:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      20    32.7G    20          32.7G              1.10m      50.8us    18h31m22s             ursa-­‐perf  06-­‐01,16:40:54  1        0          1.1.4.1      1.1.4.2      50010              0      90    10    23.5G    10          23.5G              2.00m      6.64us    18h29m7s               ursa-­‐perf  06-­‐01,16:42:54  1        0          1.1.4.1      1.1.4.2      nfs                  0      0      100  131G      100        131G                2.00m      45.2us    18h27m7s               ursa-­‐perf  06-­‐01,16:45:54  1        0          1.1.4.1      1.1.4.2      50010              0      1      0                                                                                          18h24m20s             ursa-­‐perf  06-­‐01,16:47:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      1      3.99G    1            3.99G              2.00m      77.0us    18h22m20s             ursa-­‐perf  06-­‐01,16:48:54  1        0          1.1.4.10    1.1.4.2      5001                1      0      0                                                                                          18h21m33s             ursa-­‐perf  06-­‐01,16:48:54  1        0          1.1.4.10    1.1.4.2      50010              0      1      0                                                                                          18h21m10s             ursa-­‐perf  06-­‐01,16:49:54  1        0          1.1.4.1      1.1.4.2      50010              0      1      0                                                                                          18h21m                   ursa-­‐perf  06-­‐01,16:49:54  1        0          1.1.4.10    1.1.4.2      50010              0      4      1      2.96G    1            2.96G              10.00s    15.0us    18h20m18s             ursa-­‐perf  06-­‐01,16:50:54  1        0          1.1.4.10    1.1.4.2      50010              0      0      5      10.8G    5            10.8G              30.01s    138us      18h19m27s             ursa-­‐perf  06-­‐01,16:51:54  1        0          1.1.4.1      1.1.4.2      50010              0      0      1      1.64G    1            1.64G              2.00m      38.4us    18h19m                   ursa-­‐perf  06-­‐01,16:51:54  1        0          1.1.4.10    1.1.4.2      50010              0      0      5      13.7G    5            13.7G              30.01s    59.4us    18h18m57s               Applica'on  Port   Total  Output  Bytes  per  flow   How  long  the  TCP   Connec'on  lasted   Avg-­‐Latency   When  the  flow  was  ac've   Last  Seen  TCP  Packet(FLAG)   Client-­‐Server  AnalyWcs  w/  Time  Machine  
  • 382. admin@F64LSpine1:~#  cli  client-­‐server-­‐stats-­‐show  |  egrep  'syn|HDFS|MR|Cassandra|Nutanix’   switch          vlan  vxlan  client-­‐ip            server-­‐ip            server-­‐port                                                syn      est  fin  obytes  ibytes  total-­‐bytes  avg-­‐dur  avg-­‐lat  last-­‐seen-­‐ago     Leaf2            103    0          103.103.103.10  103.103.103.20  HDFS-­‐Namenode-­‐WebUI                                0          0      197  441G      197        441G                10.01s    158us      1m58s                     Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐Namenode-­‐WebUI                                0          0      197  444G      197        444G                10.01s    351us      1m58s                     Leaf2            103    0          103.103.103.20  103.103.103.10  Nutanix-­‐Stats  Aggregator-­‐Monitor      0          0      196  463G      196        463G                10.01s    258us      8m56s                     Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐DataNode-­‐Metadata                          0          0      197  464G      197        464G                10.01s    230us      48s                         Leaf2            103    0          103.103.103.20  103.103.103.10  Nutanix-­‐Transfer-­‐Manager                      0          0      196  465G      196        465G                10.01s    240us      9m37s                     Leaf2            103    0          103.103.103.20  103.103.103.10  Nutanix-­‐Chronos-­‐Node                              0          0      196  466G      196        466G                10.01s    248us      9m47s                     snip….   Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐Secondary-­‐NameNode                        0          0      197  487G      197        487G                10.01s    247us      38s                         Leaf2            103    0          103.103.103.20  103.103.103.10  HDFS-­‐DataNode-­‐WebUI                                0          0      197  487G      197        487G                10.01s    255us      1m18s     0   200   400   600   800   1000   avg-­‐latency   avg-­‐lat   cli  client-­‐server-­‐stats-­‐show  no-­‐show-­‐headers  parsable-­‐delim  ,  |  egrep  'syn|HDFS|MR|Cassandra|Nutanix'    bigdata1.csv   Excel  ReporWng  using  CSV  format  export  
  • 383. Tracing  CongesWon  Along  The  Path  Of  A  Flow   ./flowtrace_new.py  -­‐n  aquila02  -­‐c  10.9.18.249  -­‐s  10.9.9.73   ==================================vport  info===============================   The  packet  enters  fabric  through  pn-­‐dev01  port  15   The  packet  leaves  pn-­‐dev01  through  port  63  and  enters  aquila02  through  port  10   The  packet  leaves  aquila02  through  port  129(36,40)  and  enters  spine02  through  ports  4,5   The  packet  leaves  fabric  through  spine02  port  17   pn-­‐dev01   aquila02   spine02   15   63   Visibility  into  conges'on  sta's'cs  on  each  port     along  the  path  of  the  applica'on  flows   36,40   4,5   17   10  
  • 384. Top  Talkers  App   Client   Server  Loca'on   Latency   Top  Talkers   Server   Dura'on   Device     Manufacturer  
  • 385. Built-­‐in  PCAP  Capture  Of  Any  Flow  In  The  Fabric   admin@S68-­‐Leaf1:~#  snoop  -­‐v  -­‐d  igb0   Using  device  igb0  (promiscuous  mode)   ETHER:    -­‐-­‐-­‐-­‐-­‐  Ether  Header  -­‐-­‐-­‐-­‐-­‐   ETHER:       ETHER:    Packet  1  arrived  at  18:25:15.03827   ETHER:    Packet  size  =  66  bytes   ETHER:    Destination  =  64:e:94:30:2:4b,     ETHER:    Source            =  78:da:6e:65:1d:58,     ETHER:    Ethertype  =  0800  (IP)   ETHER:       IP:      -­‐-­‐-­‐-­‐-­‐  IP  Header  -­‐-­‐-­‐-­‐-­‐   IP:         IP:      Version  =  4   IP:      Header  length  =  20  bytes   IP:      Type  of  service  =  0x00   IP:                  xxx.  ....  =  0  (precedence)   snip   IP:      Header  checksum  =  2ba6   IP:      Source  address  =  50.203.11.18,  50-­‐203-­‐11-­‐18-­‐ static.hfc.comcastbusiness.net   IP:      Destination  address  =  192.168.1.53,  EBC-­‐Leaf-­‐1   IP:      No  options   IP:         TCP:    -­‐-­‐-­‐-­‐-­‐  TCP  Header  -­‐-­‐-­‐-­‐-­‐   TCP:       TCP:    Source  port  =  63469   TCP:    Destination  port  =  22     TCP:    Sequence  number  =  3984394763   TCP:    Acknowledgement  number  =  3169545619   TCP:    Data  offset  =  32  bytes   TCP:    Flags  =  0x10   TCP:                0...  ....  =  No  ECN  congestion  window  reduced   TCP:                .0..  ....  =  No  ECN  echo   TCP:                ..0.  ....  =  No  urgent  pointer   TCP:                ...1  ....  =  Acknowledgement   TCP:                ....  0...  =  No  push   Snip  
  • 387.  flow
  • 389.  with
  • 394.  
  • 395. Customer  Example:  US  Insurance  Company   Large  Scale  BGP  Fabric  For  Big  Data  ApplicaWon   Pluribus  Architectural  Value:   !  Fabric  management  simplificaWon     !  Monitoring  and  visibility  of  Hadoop   cluster  performance   Requirements:   !  BGP  fabric  with  144  racks   !  Economics   !  Interop  w/  third  party  modular  spine   switch  with  rapid  failover  
  • 396. Integrated  AnalyWcs  Use  Cases:  Financial  Company   Fabric  AnalyWcs  For  AudiWng,  Compliance   Pluribus  Architectural  Value:   !  Fabric  management  simplificaWon   !  E-­‐W  flow  analy'cs  w/  forensic   recording  and  inline  PCAP  capture   !  Granular  flow  control  (vflow)   Requirements:   !  Three  Data  Centers  Chicago-­‐New   York-­‐London     !  Leaf-­‐Spine  architecture   !  Audi'ng,  compliance,  forensic  flow   visibility  
  • 399.  
  • 402.  
  • 405.   And
  • 408.  
  • 411.  in
  • 412.   the
  • 414.  
  • 415.   (no
  • 417.  tax)
  • 418.  
  • 419. ONUG  (Open  Networking  User  Group)   Overlay  Working  Group     VxLan  Lab  Test  Setup  and  Results   May 13-14, 2015
  • 420. Test  Configura'on   VXLAN  Tunnel   L3  CORE   Automatic tunnel provisioning (Zero Config)! On-demand, dynamic VXLAN Encap/Decap! VLAN  100   VLAN  100   VLAN  300   VLAN  300   100K  VMs   •  95%  line  rate@10Gbps     •  0%  packet  drop   •  Convergence:   •  Cold:  25.54sec   •  Warm:  7.35sec     F64  (Intel  FM6000)   E28  (Broadcom  Trident  2)   VLAN  400   VLAN  500   VLAN  500   VLAN  400   VLAN  500   VLAN  500  
  • 421. Unified  Overlay  and  Underlay  w/  Switch  VTEP  Off-­‐load   VXLAN  over  BGP  fabric  or  VXLAN  for  L2   POD  extension       !  Netvisor  SDN  Fabric  to  orchestrate   and  automate  VXLAN  tunnel  offload   on  Leaf  switches   !  Keep  server  networking  simple  and   eliminate  VXLAN  encap/decap   performance  tax   !  ONE  fabric  with  seamless  overlay-­‐ underlay  (VXLAN)  visibility   ! VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM L3# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# IP/ECMP'Fabric' ! VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM L3# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# IP/ECMP'Fabric' VXLAN  Tunnel   POD  #1   POD  #2   L3  CORE   ! VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM L3# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# L2#$#VLAG# IP/ECMP'Fabric' VXLAN  Tunnel   100K  VMs   •  95%  line  rate@10Gbps     •  0%  packet  drop   •  Convergence:   •  Cold:  25.54s   •  Warm:  7.35s    
  • 422. L3  CORE   route   route   route   route   route   route   route   route   route   route   route   route   route   route   route   POD   VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM POD   POD   POD   TradiWonal  Server  Overlays   Centralized                      Controller   VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM L3  CORE  
  • 423. POD   POD   POD   Netvisor  Dynamic  Switch  Overlays   VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM ①  Dynamic  switch-­‐based  VXLAN   encap/decap   ②  Reduce  #  of  tunnels              (e.g.  ~3K+!12)  and  remove                servers  encap/decap     Distributed  Cluster   w/  Overlay  OrchestraOon   L3  CORE   POD  
  • 424. Netvisor  OFV  Architecture   Unify  Overlay    Underlay     ! ! ! L3! VXLAN ! Tunnel endpoint! VXLAN! Eliminate host perf. penalty! (as high as 65% drop) by off-loading tunneling to switch ASIC @ line rate! 0! 1! 2! 3! 4! 5! 6! 7! 8! 9! 10! 64Bytes! 512Bytes! 1450Bytes! Gbps! OVS to OVS performance! Baseline! Switch Overlays! Server Overlays! Fabric-based Overlay tunnel orchestration and segmentation one fabric for physical and virtual! Uncompromised physical/virtual visibility!
  • 425. Netvisor  Fabric  MulW-­‐tenancy  And  SegmentaWon   !  Rapid  provisioning  of  secure  virtual  networks   (aka  VNETs)  with  management,  control  and   data  plane  isola'on     !  Provision  in  minutes  per  tenant  virtual  routers   with  management,  control,  data  plane  isola'on       !  Per  tenant  virtual  services:  vSLB,  vFW,  vCLI,   DNS,  DHCP,  Pixie,  NTP…   !  Per  tenant  visibility  of  flows,  services,  VMs…   VLAN%10(12% VLAN%20(22% VLAN%30(32%
  • 426. App  1   App  100   Customer  Example:  US  Financial  Company   Fabric  VirtualizaWon  For  Cloud  App.  Delivery   PN  Arch.  Value:   !  Consolidate  100  vRouters  under   netops  control  on  2  devices     !  VNET  for  app  developers  control   !  Analy'cs  to  monitor  applicaWon   performance   Requirements:   !  Per  tenant/app  virtual  routers  for  BGP   peering  with  AWS  vRouters     !  Visibility  and  ease  of  troubleshoo'ng     cloud  connec'on     !  Allow  each  tenant  to  manage  and   monitor  its  own  router/virtual  network   App  2  
  • 428.  has
  • 429.  
  • 432.  HA
  • 433.  
  • 436.  to
  • 437.  rest
  • 438.  of
  • 439.  
  • 441.  IaaS
  • 442.  and
  • 443.  PaaS
  • 444.  
  • 445. High-­‐Availability   !  Peer-­‐to-­‐peer  highly  available  cluster  technology  for  the  fabric   !  Distributed,  no  central  controller,  single  point  of  failure   !  Most  fabric  opera'ons  as  atomic  transac'ons,  either  they   succeed  or  fail  across  the  en're  fabric  cluster   !  Networking:   !  Mul'-­‐chassis  LAG  with  sub    200  ms  failover   !  Ac've-­‐Ac've  VRRP  with  sub    200  ms  failover  (no  VRRP   'mer  dependency)   !  BFD  for  BGP  for  sub-­‐second  failover   !  ISSU  across  the  en're  fabric  of  switches  (rolling  upgrade)  
  • 446. !  Netvisor  drivers  support  ML2  based  neutron     plugin  qualified  for  Juno/Icehouse.     The  plugin  repo  is  publicly  available  at     hkps://github.com/PluribusNetworks/pluribus_neutron/tree/master/neutron-­‐plugin-­‐pluribus     !  The  ML2  plugin  supports:     !  Na've  neutron  APIs  for  logical  networks/subnets/port  management   !  L3  agent  APIs  for  logical  router  management   !  NAT  capability  on  the  switches   !  Loadbalancer  API  support     !  In  addi'on  the  ML2  plugin  supports  Netvisor  specific  advanced   extensions:   !  HW  based  rouWng   !  High  availability  (VRRP)  for  logical  routers   !  NFS  backed  store  for  glance  to  deliver  sta'c  image  content   !  Host  analyWcs  /visibility  into  tenant  traffic   !  Flow  programming  (vflow)  across  the  fabric  (vflow)   !  Full  PCAP  vflow  packet  capture   !  Per-­‐tenant  QOS/SLA     !  Tracking  VM  lifecycle  using  virtual  ports  concept  on  Netvisor     Netvisor  OpenStack  Highlights  
  • 447. Summary – Pluribus Netvisor Differentiation Fabric-wide ! Multi-box! management! Simple to Manage! Simple to Monitor! Fabric-wide! Application and VM Visibility/Analytics! w/ Time Machine! Fabric-wide! Programmability,! NFV, Flow ! Programmability! Simple to Program! And Secure! Simple to Virtualize! Fabric-wide! Unified Overlay/ Underlay +! Penalty-free VXLAN Tunnel Orchestration!! Netvisor Server-Style Distributed Cluster ! ONE “Touch Point” For The Entire Fabric!
  • 448. Thank
  • 449.  you
  • 451.