SDN-Ethane原版完整课件.pptx
《SDN-Ethane原版完整课件.pptx》由会员分享,可在线阅读,更多相关《SDN-Ethane原版完整课件.pptx(49页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Ethane:Taking Control of the EnterpriseMartn Casado,Michael J.Freedman,Justin Pettit,Jianying Luo,Scott ShenkerACM SIGCOMM,2007Presented by Ye Tian for Course CS05112Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and PerformanceMotivation En
2、terprise network Run a wide variety of applications and protocols Operate under strict reliability and security constraintsMotivation Need manual configuration Expensive and error-prone 62%of network downtime in multi-vendor networks comes from human-error 80%of IT budgets is spent on maintenance an
3、d operations Network management approaches Introduces proprietary middle-boxes,placed at network choke-points.E.g,firewall Add functionality to existing networks.E.g.,add ACL on switch Only hide the complexity,not reduce it.Motivation Question:How could we change the enterprise network architecture
4、to make it more manageable?Three fundamental principles:The network should be governed by policies declared over high-level names.Policy should determine the path that packets follow.Policy might require packets to pass through an intermediate middlebox;Traffic can receive more appropriate service i
5、f its path is controlled;The network should enforce a strong binding between a packet and its origin.Desired RealityGoverned by policies declared over high-level names.Governed by low-level names such as IP address and MAC addressDetermine the path Determine next hopStrong binding between packets an
6、d originOnly inspect destination address in routingCurrent approachLevel-2:forwarding table,one entry per destination MAC addressLevel-3:routing table,one entry per IP address prefixOverview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype and Performa
7、nceOverview Ethane controls the network by not allowing any communication between end-hosts without explicit permission.Two components A central Controller Contains the global network policy and topology Performs route computation for permitted flows.A set of Ethane switches Simple and dumb Consisti
8、ng of a simple flow table and a secure channel to the Controller Forward packets under the instruction of the Controller.Names,Bindings,and Policy Language Keep the namespace consistent as components join,leave and move around the network.How(machine address user)Ethane takes over all the binding of
9、 addresses,behave as a DHCP server Machine is registered on the network Users are required to authenticate with the network Such as the ones in WiFi hotpot.Benefits:The Controller can keep track of where any entity is located;The Controller can journal all bindings and flow-entries in a log for netw
10、ork event reconstruction.Ethane in Use Registration All switches,users,and hosts are registered at the Controller with the credentials necessary to authenticate them.Ethane in Use Bootstrap Switches bootstrap connectivity by creating a spanning tree rooted at the Controller.Each switch authenticates
11、 with and creates a secure channel to the Controller.Ethane in Use Authentication UserA joins the network with hostA,switch 1 initially forward all of hostAs packets to the Controller;HostA sends a DHCP request to the Controller.The Controller binds hostA to IPA,IPA to MACA,and MACA to a physical po
12、rt on switch 1.UserA opens a web browser,whose traffic is directed to the Controller,and authenticates through a web-form.Ethane in Use Flow Setup Switch 1 forwards the packet to the Controller after determining that the packet does not match any active entries in its flow table.The Controller decid
13、es whether to allow or deny the flow,or require it to traverse a set of waypoints.The Controller computes the flows path,adds a new entry to the flow tables of all the Switches along the path.Ethane in Use Forwarding If path is allowed,the Controller sends the packet back to switch 1 which forwards
14、it based on the new flow entry.Subsequent packets from the flow are forwarded directly by the Switch,and are not sent to the Controller.The flow-entry is kept in the switch until it times out.Overview Motivation Overview of Ethane Design Ethane in More Detail The POL-ETH Policy Language Prototype an
15、d PerformanceAn Ethane NetworkEthane Switch An Ethane switch is much simpler than conventional Ethernet switch Doesnt need to learn addresses,support VLANs,check for source-address spoofing,or keep flow-level statistics(?).If layer3,doesnt need to run routing protocols such as OSPF,ISIS,and RIP.Etha
16、ne switchs flow table can be much smaller than the forwarding table in an equivalent Ethernet switch.Ethernet switch needs to remember all the addresses its likely to encounter.Ethane Switch only needs to keep track of flows in-progress.Flow Table and Flow Entries Two common types of entry in the fl
17、ow table:Per-flow entries for flows that should be forwarded,Per-host entries for misbehaving hosts whose packets should be dropped.Entries are removed because Timeout due to inactivity Revoked by the Controller.Local Switch Manager To establish and maintain the secure channel to the Controller Two
18、ways:For Switches that are part of the same physical network as the Controller,use Minimum Spanning Tree protocol.For the Switch that is not within the same broadcast domain as the Controller,create an IP tunnel to it.Switches maintain a list of neighboring switches by broadcasting and receiving nei
19、ghbor-discovery messages.Neighbor lists are sent to the Controller periodically every 15 seconds.Controller The Controller holds the policy file,which is compiled into a fast lookup table The route computation uses the network topology to pick the flows route.The topology is maintained by the switch
20、 manager,which receives link updates from the Switches.Controller Registration All entities that are to be named by the network(i.e.,hosts,protocols,switches,users,and access points7)must be registered.They make up the policy namespace and is used to statically check the policy.Authentication.Does n
21、ot specify a particular host authentication mechanism:e.g.,802.1XController Tracking bindings Track all the bindings between names,addresses,and physical ports on the network event as switches,hosts,and users join,leave,and move around the network.Controller Namespace interface In current networks,i
22、t is almost impossible to figure out user activities very quickly An Ethane Controller can journal all the authentication and binding information,it is possible to determine exactly which user sent a packet,when it was sent,the path it took,and its destination.Controller Permission Check and Access
23、Granting Upon receiving a packet,the Controller checks the policy to see what actions apply to it Enforcing Resource Limits Controller can limit a flows rate,limit the rate at which new flows are setup,or limit the number of IP addresses allocated.Broadcast and Multicast Handling multicast:The Switc
24、h keeps a bitmap for each flow to indicate which ports the packets are to be sent to along the path.The Controller can calculate the multicast tree and assign the appropriate bits during path setup.Example,a 24-bit bitmap for 24 ports on a switch,0/1 means packet should be forwarded/dropped on corre
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SDN Ethane 原版 完整 课件
限制150内