欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    SDN-Ethane原版完整课件.pptx

    • 资源ID:89741886       资源大小:632.13KB        全文页数:49页
    • 资源格式: PPTX        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    SDN-Ethane原版完整课件.pptx

    Ethane:Taking Control of the EnterpriseMartn Casado,Michael J.Freedman,Justin Pettit,Jianying Luo,Scott ShenkerACM SIGCOMM,2007Presented by Ye Tian for Course CS05112Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and PerformanceMotivation Enterprise network Run a wide variety of applications and protocols Operate under strict reliability and security constraintsMotivation Need manual configuration Expensive and error-prone 62%of network downtime in multi-vendor networks comes from human-error 80%of IT budgets is spent on maintenance and operations Network management approaches Introduces proprietary middle-boxes,placed at network choke-points.E.g,firewall Add functionality to existing networks.E.g.,add ACL on switch Only hide the complexity,not reduce it.Motivation Question:How could we change the enterprise network architecture to make it more manageable?Three fundamental principles:The network should be governed by policies declared over high-level names.Policy should determine the path that packets follow.Policy might require packets to pass through an intermediate middlebox;Traffic can receive more appropriate service if its path is controlled;The network should enforce a strong binding between a packet and its origin.Desired RealityGoverned by policies declared over high-level names.Governed by low-level names such as IP address and MAC addressDetermine the path Determine next hopStrong binding between packets and originOnly inspect destination address in routingCurrent approachLevel-2:forwarding table,one entry per destination MAC addressLevel-3:routing table,one entry per IP address prefixOverview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and PerformanceOverview Ethane controls the network by not allowing any communication between end-hosts without explicit permission.Two components A central Controller Contains the global network policy and topology Performs route computation for permitted flows.A set of Ethane switches Simple and dumb Consisting of a simple flow table and a secure channel to the Controller Forward packets under the instruction of the Controller.Names,Bindings,and Policy Language Keep the namespace consistent as components join,leave and move around the network.How(machine address user)Ethane takes over all the binding of addresses,behave as a DHCP server Machine is registered on the network Users are required to authenticate with the network Such as the ones in WiFi hotpot.Benefits:The Controller can keep track of where any entity is located;The Controller can journal all bindings and flow-entries in a log for network event reconstruction.Ethane in Use Registration All switches,users,and hosts are registered at the Controller with the credentials necessary to authenticate them.Ethane in Use Bootstrap Switches bootstrap connectivity by creating a spanning tree rooted at the Controller.Each switch authenticates with and creates a secure channel to the Controller.Ethane in Use Authentication UserA joins the network with hostA,switch 1 initially forward all of hostAs packets to the Controller;HostA sends a DHCP request to the Controller.The Controller binds hostA to IPA,IPA to MACA,and MACA to a physical port on switch 1.UserA opens a web browser,whose traffic is directed to the Controller,and authenticates through a web-form.Ethane in Use Flow Setup Switch 1 forwards the packet to the Controller after determining that the packet does not match any active entries in its flow table.The Controller decides whether to allow or deny the flow,or require it to traverse a set of waypoints.The Controller computes the flows path,adds a new entry to the flow tables of all the Switches along the path.Ethane in Use Forwarding If path is allowed,the Controller sends the packet back to switch 1 which forwards it based on the new flow entry.Subsequent packets from the flow are forwarded directly by the Switch,and are not sent to the Controller.The flow-entry is kept in the switch until it times out.Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and PerformanceAn Ethane NetworkEthane Switch An Ethane switch is much simpler than conventional Ethernet switch Doesnt need to learn addresses,support VLANs,check for source-address spoofing,or keep flow-level statistics(?).If layer3,doesnt need to run routing protocols such as OSPF,ISIS,and RIP.Ethane switchs flow table can be much smaller than the forwarding table in an equivalent Ethernet switch.Ethernet switch needs to remember all the addresses its likely to encounter.Ethane Switch only needs to keep track of flows in-progress.Flow Table and Flow Entries Two common types of entry in the flow table:Per-flow entries for flows that should be forwarded,Per-host entries for misbehaving hosts whose packets should be dropped.Entries are removed because Timeout due to inactivity Revoked by the Controller.Local Switch Manager To establish and maintain the secure channel to the Controller Two ways:For Switches that are part of the same physical network as the Controller,use Minimum Spanning Tree protocol.For the Switch that is not within the same broadcast domain as the Controller,create an IP tunnel to it.Switches maintain a list of neighboring switches by broadcasting and receiving neighbor-discovery messages.Neighbor lists are sent to the Controller periodically every 15 seconds.Controller The Controller holds the policy file,which is compiled into a fast lookup table The route computation uses the network topology to pick the flows route.The topology is maintained by the switch manager,which receives link updates from the Switches.Controller Registration All entities that are to be named by the network(i.e.,hosts,protocols,switches,users,and access points7)must be registered.They make up the policy namespace and is used to statically check the policy.Authentication.Does not specify a particular host authentication mechanism:e.g.,802.1XController Tracking bindings Track all the bindings between names,addresses,and physical ports on the network event as switches,hosts,and users join,leave,and move around the network.Controller Namespace interface In current networks,it is almost impossible to figure out user activities very quickly An Ethane Controller can journal all the authentication and binding information,it is possible to determine exactly which user sent a packet,when it was sent,the path it took,and its destination.Controller Permission Check and Access Granting Upon receiving a packet,the Controller checks the policy to see what actions apply to it Enforcing Resource Limits Controller can limit a flows rate,limit the rate at which new flows are setup,or limit the number of IP addresses allocated.Broadcast and Multicast Handling multicast:The Switch keeps a bitmap for each flow to indicate which ports the packets are to be sent to along the path.The Controller can calculate the multicast tree and assign the appropriate bits during path setup.Example,a 24-bit bitmap for 24 ports on a switch,0/1 means packet should be forwarded/dropped on corresponding port Handling broadcast discovery protocols:A host is trying to find a server or an address;e.g,ARP,DHCP Given that the Controller knows all,it can reply to a request without creating a new flow and broadcasting the traffic.Replicating the Controller:Fault-Tolerance and Scalability Three techniques for replicating Cold standby:Backup Controllers sit idly-by waiting to take over if needed.If failure,the network will converge on a new root for MST.The backups need only contain the registration state and the network policy.The main advantage is simplicity;the downside is that hosts,switches,and users need to re-authenticate and re-bind upon the primarys failure.Paths need to be re-computed.Replicating the Controller Warm-standby:a separate MST is created for every Controller.The Controllers monitor one anothers liveness and,upon detecting the primarys failure,a secondary Controller takes over based on a static ordering.Need to replicate bindings across Controllers.Some new users and hosts need to re-authenticate.Replicating the Controller Fully-replication:two or more active Controllers.A Switch need only authenticate itself to one Controller and can then spread its flow-requests over the Controllers(e.g.,hashing or round-robin)Gossip to provide a weakly-consistent ordering over events.Others Link failure The Switch removes all flow table entries tied to the failed port and sends its new link-state information to the Controller.The Controller learns the new topology.Bootstraping On startup,the network creates a minimum spanning tree with the Controller advertising itself as the root.If a Switch finds a shorter path to the Controller,it attempts two-way authentication before advertising that path as a valid route.Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and PerformanceOverview Ethane network policy is declared as a set of rules,each consisting of a condition and a corresponding action.Example Condition:if the user initiating the flow is“bob”and the flow protocol is“HTTP”and the flow destination is host“websrv”Action:Actions include allo w,den y,waypoin ts,and outbound-only.Rules are independent and dont contain an intrinsic orderingExample Two parts:group declarations and rules#Groups desktops=griffin,roo;laptops=glaptop,rlaptop;phones=gphone,rphone;server=http_server,nfs_server;private=desktops,laptops;computers=private,server;students=bob,bill,pete;profs=plum;group=students,profs;waps=wap1,wap2;Example Rules#Rules(hsrc=in(server)(hdst=in(private):deny;#Do not allow phones and private computers to communicate(hsrc=in(phones)(hdst=in(computers):deny;(hsrc=in(computers)(hdst=in(phones):deny;#NAT-like protection for laptops(hsrc=in(laptops):outbound-only;#No restrictions on desktops communicating with each other(hsrc=in(desktops)(hdst=in(desktops):allow;#For wireless,non-group members can use http through#a proxy.Group members have unrestricted access.(apsrc=in(waps)(user=in(group):allow;(apsrc=in(waps)(protocol=http):waypoints(http-proxy);(apsrc=in(waps):deny;:allow;#Default-on:by default allow flowsOverview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and Performance ReviewImplementation:Switch Three different Ethane Switches:An 802.11g wireless access point(based on a commercial access point)A wired 4-port Gigabit Ethernet Switch that forwards packets at line-speed(based on the NetFPGA programmable switch platform and written in Verilog)A wired 4-port Ethernet Switch in Linux on a desktop PC Flow table The main tablefor packets that should be forwardedhas 8,192 flow entries A second table with 32K entries for return route of outbound trafficImplementation:Controller Policy compiler:a source-to-source compiler that generates C+from a Pol-Eth policy file.Implemented the Controller on a standard Linux PC Registration:standard database Authentication:use university authentication system Bind Journal and Namespace Interface:use BerkeleyDB for the log,keyed by timestamps Route Computation:using an all pairs shortest path algorithm.Deployment Stanford CS department 19 Ethane switches:11 wired and 8 wireless;About 300 hosts Policy Non-servers are protected from outbound connections from servers.Workstations can communicate uninhibited.Hosts must register a MAC address,but no user authentication.Wireless nodes do not require user authentication.Deployment Policy The VoIP phones are restricted from communicating with non-phones and are statically bound to a single access point to prevent mobility.Performance:Controller Scalability Experiment:30-40 new flow requests per second with a peak of 750 flow requests per second.A single Controller could comfortably handle 10,000 new flow requests per second.Performance During Failures Controller failure:measure the completion time of 275 consecutive HTTP requests,retrieving 63MB in total,under cold-standby failure recovery While the requests were ongoing,we crashed the Controller and restarted it multiple times.Performance During Failures Link failure:All outstanding flows re-contact the Controller in order to re-establish the path Created a topology with redundant pathsso the network can withstand a link-failureand measured the latencies experienced by packets.Performance During Failures Path re-converges in under 40ms,but a packet could be delayed up to a second while the Controller handles the flurry of requests.Performance:Flow Table Sizing Use two network database:An 8,000-host network at Lawrence Berkeley National LAB A 22,000-host network at Stanford Active flows Never exceed 500Performance:Flow Table Sizing Switches closer to the edge will see a number of flows proportional to the number of hosts they connect to.A Switch at the center of a network will likely see more active flows,and so we assume it will see all active flows.Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and Performance Ethanes shortcoming ReviewEthanes shortcoming Broadcast and Service Discovery Protocols Create large numbers of flow entries,lead to lots of traffic.Unless Ethane can interpret the protocol and respond on its behalf.Application-layer routing Ethanes policy can be compromised by communications at a higher layer.For example,if A is allowed to talk to B but not C,and if B can talk to C,then B can relay messages from A to C.Example,TorEthanes shortcoming Knowing what the user is doing Ethanes policy assumes that the transport port numbers indicate what the user is doing.Colluding malicious users or applications can fool Ethane by agreeing to use nonstandard port numbers.Spoofing Ethernet addresses Ethane Switches rely on the binding between a user and Ethernet addresses to identify flows.If a user spoofs a MAC address,it might be possible to fool Ethane into delivering packets to an end-host.Ethanes shortcoming Denial of service attack On switch:flush the flow table On controller:Review Principles Govern by policy with high-level names Policy determine path Know packets origin Component of Ethane Controller Ethane switch Name binding in a Ethane network How two hosts communicate in a Ethane network?Controller replicating Policy Language

    注意事项

    本文(SDN-Ethane原版完整课件.pptx)为本站会员(暗伤)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开