The document presents a proposal for a network architecture that uses software defined networking (SDN) with OpenFlow, OpenStack Cinder for block storage, and OwnCloud for file sharing. The goals are to automate network and storage provisioning, improve security, and reduce costs. SDN and OpenFlow are used to virtualize the private network and provision storage as a service. OpenStack Cinder automates block storage allocation through its API. OwnCloud then integrates the block storage and provides a web interface and syncing for authorized users over the private VPN.
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
This document summarizes a presentation on the security of Docker containers. It begins with introductions and then outlines the container pipeline and risk areas. It discusses security issues related to images, the container runtime, and approaches for enterprises. It presents a holistic view of the container security pipeline and risks at different stages. It concludes by taking questions and providing references for further information.
This document provides an overview of Docker image security presented by Manideep Konakandla. It begins with introductions and then outlines the following:
1. A brief introduction to containers in 45 seconds.
2. An overview of the container pipeline and risk areas including images security.
3. Details on securing Dockerfiles, building images, maintaining/consuming images, and enterprise practices.
4. Introduction of a benchmark for assessing the security of Docker images.
The presentation aims to educate attendees on Docker image security best practices across the software development lifecycle.
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016Manideep Konakandla
The document provides an agenda for a presentation on breaking and securing Docker container environments. The presentation covers introducing containers and Docker, risks areas for containers like images and runtimes, how to break and secure images, runtimes, daemons, and hosts. It also discusses securing the entire container pipeline including communication and registries. The presentation concludes with discussing the future of container security and references.
Manideep Konakandla is a security researcher who has extensively studied container security. He gives an overview of container security risks across the container pipeline. This includes securing images during building and distribution, hardening the container runtime environment, and other considerations for enterprises deploying containers like implementing security controls on daemons and hosts. He outlines best practices for minimizing risks at different stages and emphasizes the importance of maintaining up-to-date software and implementing custom security measures according to organizational needs.
This document provides an overview of key blockchain and distributed ledger concepts including Bitcoin, Ethereum, Hyperledger, smart contracts, and related technologies like IoT and AI. It discusses the blockchain layers of immutability, authorization, and consensus for Bitcoin and Ethereum. It also summarizes the consensus approaches of proof of work, proof of stake, and PBFT used by different platforms.
This document proposes a new model called OAuthing for federated identity, access control, and data sharing in IoT. It describes the growth of IoT devices and privacy/security issues. The model includes a Device Identity Provider (DIdP) that provides anonymous identities and tokens, a Personal Cloud Middleware (PCM) that runs on behalf of each user to filter data, and an Intelligent Gateway (IG) that routes requests based on identities. It presents the implementation including a device bootloader, and prototype results showing it can support 400 brokers handling 10 messages/second each with low latency. Comparisons are made to related work which don't provide the same anonymous identities, registration processes, or personal middleware capabilities.
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
This document summarizes a presentation on the security of Docker containers. It begins with introductions and then outlines the container pipeline and risk areas. It discusses security issues related to images, the container runtime, and approaches for enterprises. It presents a holistic view of the container security pipeline and risks at different stages. It concludes by taking questions and providing references for further information.
This document provides an overview of Docker image security presented by Manideep Konakandla. It begins with introductions and then outlines the following:
1. A brief introduction to containers in 45 seconds.
2. An overview of the container pipeline and risk areas including images security.
3. Details on securing Dockerfiles, building images, maintaining/consuming images, and enterprise practices.
4. Introduction of a benchmark for assessing the security of Docker images.
The presentation aims to educate attendees on Docker image security best practices across the software development lifecycle.
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016Manideep Konakandla
The document provides an agenda for a presentation on breaking and securing Docker container environments. The presentation covers introducing containers and Docker, risks areas for containers like images and runtimes, how to break and secure images, runtimes, daemons, and hosts. It also discusses securing the entire container pipeline including communication and registries. The presentation concludes with discussing the future of container security and references.
Manideep Konakandla is a security researcher who has extensively studied container security. He gives an overview of container security risks across the container pipeline. This includes securing images during building and distribution, hardening the container runtime environment, and other considerations for enterprises deploying containers like implementing security controls on daemons and hosts. He outlines best practices for minimizing risks at different stages and emphasizes the importance of maintaining up-to-date software and implementing custom security measures according to organizational needs.
This document provides an overview of key blockchain and distributed ledger concepts including Bitcoin, Ethereum, Hyperledger, smart contracts, and related technologies like IoT and AI. It discusses the blockchain layers of immutability, authorization, and consensus for Bitcoin and Ethereum. It also summarizes the consensus approaches of proof of work, proof of stake, and PBFT used by different platforms.
This document proposes a new model called OAuthing for federated identity, access control, and data sharing in IoT. It describes the growth of IoT devices and privacy/security issues. The model includes a Device Identity Provider (DIdP) that provides anonymous identities and tokens, a Personal Cloud Middleware (PCM) that runs on behalf of each user to filter data, and an Intelligent Gateway (IG) that routes requests based on identities. It presents the implementation including a device bootloader, and prototype results showing it can support 400 brokers handling 10 messages/second each with low latency. Comparisons are made to related work which don't provide the same anonymous identities, registration processes, or personal middleware capabilities.
By the end of the session, participants will have learned and used professional communication forms. They will identify, assess, and evaluate branding techniques to project a professional personal image. The document discusses what brands are, introducing brand archetypes as collective images that provide shortcuts to meaning. It analyzes E4 television's jester archetype and Apple's association with Steve Jobs and the magician archetype. Participants brainstorm that the hero and sage archetypes best represent Team Up for focusing on creating positive change and research-backed solutions. Personal branding with hero and sage words is discussed. Participants are asked to write a 150-word personal profile reflecting Team Up's brand identity and follow its social media.
This document describes a visual connect round with pictures related to fluid flow dimensionless numbers. It instructs the player that the first and last slides will contain 3 pictures each connected by a common theme, while the inner slides will each contain 1 picture. Points are awarded for correct connections added or lost for incorrect guesses. The answer then lists 9 dimensionless numbers from fluid mechanics along with the scientists they are named after.
Dokumen tersebut membahas tentang pengantar Arduino. Arduino adalah platform fisik komputasi terbuka yang terdiri dari papan input/output dan perangkat lunak yang mudah digunakan untuk membangun proyek elektronik dan robotik interaktif. Dokumen ini menjelaskan berbagai jenis papan Arduino, bagian-bagiannya, perangkat lunak Arduino, dan cara kerjanya.
The document discusses how becoming a vegetarian changed the author's life. It describes how the author weighed over 500 pounds and was told by their doctor to lose weight or risk their health. The author decided to try becoming a vegetarian for 30 days. This led to weight loss of 45 pounds, normal blood pressure, and no longer needing to limp. The main points made are that becoming vegetarian can 1) reduce the amount of red meat stored in the body, 2) lead to healthy weight loss without fad diets, and 3) restore lost energy and eliminate feelings of sluggishness. The author encourages readers to try vegetarianism for 30 days to experience the life-changing benefits.
This document promotes the health benefits of a plant-based diet and lifestyle. It suggests that many chronic diseases like heart disease, diabetes and cancer can be prevented or even reversed by avoiding animal products and eating a whole food, plant-based diet. The document provides statistics on leading causes of death and cites evidence that a plant-based diet can help prevent these illnesses. It addresses common questions and objections about obtaining protein and nutrients on a plant-based diet. Overall, the document encourages readers to take control of their health by adopting a plant-based lifestyle.
The document discusses using calculators in elementary mathematics education. It notes that calculators can help students focus on concepts rather than calculations, but others argue it prevents learning of basic facts. The document advocates restricting calculator use until students have mastered written calculations, but allowing occasional use for projects. When used, students should learn to estimate answers and understand which operations to use. Suggested calculator activities include exploring patterns and place value.
Michael Milnes has worked as a physical therapist in Rochester, Minnesota since 1996, helping many people with mobility issues. He is dedicated to his career and believes exercise is key to overcoming injuries. He obtained his Doctor of Physical Therapy degree from the University of Minnesota and continues to learn new techniques to help his patients return to normal lives.
This document summarizes challenges in the global payments industry and emerging trends. Cash is still widely used for small transactions but declining as electronic payments rise. Cheque usage is also declining in most countries. Electronic bank transfers like debit and credit are gaining popularity, especially for business-to-consumer and government payments. Regulations and technologies are driving changes like SEPA in Europe and real-time payment systems provide faster access to funds. The payments landscape is transforming rapidly under these forces.
Michael Milnes knew from a young age that he wanted to be a physical therapist. He earned a double Bachelor's in Physical Education and Biology as well as a Doctorate in Physical Therapy from the University of Minnesota. After graduating, Michael opened his own physical therapy practice in Rochester, Minnesota where he helps patients return to normal life after injury.
This document is a quiz containing 40 multiple choice questions. For each question, there is a brief explanation or context provided before stating the question. Questions 5, 10, 15, 20, 25, 30, 35, and 40 are worth more points as "star marked questions." The quiz taker is Ankur Singh.
This document is a congratulatory message for Fernando from his family on Producciones Eraso-Monge. It thanks J.F. Monge for his role as Billy The Kid, A. Vázquez as Mor Earl, grandfather for his role as the main character from Up, and grandmother for her role as piruja Witch. It also notes additional starring roles from M.José Lobé, Sara Vázquez, and M.E. Vázquez.
This document discusses software-defined networking (SDN), network functions virtualization (NFV), network virtualization (NV), and open networking. It provides definitions of these concepts and compares the hardware-defined data center and software-defined data center approaches. Diagrams show the network overlay and underlay in NV. Open networking organizations and initiatives like OpenFlow, Open Network Install Environment (ONIE), Open Network Linux (ONL), OpenNSL, and OPNFV are also mentioned. Lastly, the benefits of different approaches are noted.
Federating Infrastructure as a Service cloud computing systems to create a un...David Wallom
This paper details the state of the art, the design, development and deployment of the EGI Federated Cloud platform, an e-infrastructure offering scalable and flexible models of utilization to the European research community. While continuing support for the traditional High Throughput Computing model, the EGI Cloud Platform extends its reach to other models of utilization such as long-lived services and on demand computation. Following a two-year period of development, the EGI Federated Cloud platform was officially launched in May 2014 offering resources provided by trusted academic and research organisations from within the user communities and consistently with their standard funding regime. Since then, the use cases supported have significantly increased both in total number and diversity of model of service required, validating both the choice of enforcing cloud technology agnosticism and of supporting service mobility and portability by means of open standards. These design choices have also allowed for the inclusion of commercial cloud providers into an infrastructure previously supported only by academic institutions. This contributes to a wider goal of funding agencies to create economic and social impact from supported research activities.
Dr Matthew Berryman, IT Architect, presented an overview of his research as part of the SMART Seminar Series on 15 November 2016.
More information: http://smart.uow.edu.au/events/UOW223675.html
MidoNet is an open, software-only, highly scalable and resilient, network virtualization system. With its distributed architecture it allows enterprises and service providers to build, run, and manage virtual networks at scale with increased control, security and flexibility.
MidoNet allows users to build isolated networks in software and overlays the existing network hardware infrastructure.
http://www.midokura.com/
By the end of the session, participants will have learned and used professional communication forms. They will identify, assess, and evaluate branding techniques to project a professional personal image. The document discusses what brands are, introducing brand archetypes as collective images that provide shortcuts to meaning. It analyzes E4 television's jester archetype and Apple's association with Steve Jobs and the magician archetype. Participants brainstorm that the hero and sage archetypes best represent Team Up for focusing on creating positive change and research-backed solutions. Personal branding with hero and sage words is discussed. Participants are asked to write a 150-word personal profile reflecting Team Up's brand identity and follow its social media.
This document describes a visual connect round with pictures related to fluid flow dimensionless numbers. It instructs the player that the first and last slides will contain 3 pictures each connected by a common theme, while the inner slides will each contain 1 picture. Points are awarded for correct connections added or lost for incorrect guesses. The answer then lists 9 dimensionless numbers from fluid mechanics along with the scientists they are named after.
Dokumen tersebut membahas tentang pengantar Arduino. Arduino adalah platform fisik komputasi terbuka yang terdiri dari papan input/output dan perangkat lunak yang mudah digunakan untuk membangun proyek elektronik dan robotik interaktif. Dokumen ini menjelaskan berbagai jenis papan Arduino, bagian-bagiannya, perangkat lunak Arduino, dan cara kerjanya.
The document discusses how becoming a vegetarian changed the author's life. It describes how the author weighed over 500 pounds and was told by their doctor to lose weight or risk their health. The author decided to try becoming a vegetarian for 30 days. This led to weight loss of 45 pounds, normal blood pressure, and no longer needing to limp. The main points made are that becoming vegetarian can 1) reduce the amount of red meat stored in the body, 2) lead to healthy weight loss without fad diets, and 3) restore lost energy and eliminate feelings of sluggishness. The author encourages readers to try vegetarianism for 30 days to experience the life-changing benefits.
This document promotes the health benefits of a plant-based diet and lifestyle. It suggests that many chronic diseases like heart disease, diabetes and cancer can be prevented or even reversed by avoiding animal products and eating a whole food, plant-based diet. The document provides statistics on leading causes of death and cites evidence that a plant-based diet can help prevent these illnesses. It addresses common questions and objections about obtaining protein and nutrients on a plant-based diet. Overall, the document encourages readers to take control of their health by adopting a plant-based lifestyle.
The document discusses using calculators in elementary mathematics education. It notes that calculators can help students focus on concepts rather than calculations, but others argue it prevents learning of basic facts. The document advocates restricting calculator use until students have mastered written calculations, but allowing occasional use for projects. When used, students should learn to estimate answers and understand which operations to use. Suggested calculator activities include exploring patterns and place value.
Michael Milnes has worked as a physical therapist in Rochester, Minnesota since 1996, helping many people with mobility issues. He is dedicated to his career and believes exercise is key to overcoming injuries. He obtained his Doctor of Physical Therapy degree from the University of Minnesota and continues to learn new techniques to help his patients return to normal lives.
This document summarizes challenges in the global payments industry and emerging trends. Cash is still widely used for small transactions but declining as electronic payments rise. Cheque usage is also declining in most countries. Electronic bank transfers like debit and credit are gaining popularity, especially for business-to-consumer and government payments. Regulations and technologies are driving changes like SEPA in Europe and real-time payment systems provide faster access to funds. The payments landscape is transforming rapidly under these forces.
Michael Milnes knew from a young age that he wanted to be a physical therapist. He earned a double Bachelor's in Physical Education and Biology as well as a Doctorate in Physical Therapy from the University of Minnesota. After graduating, Michael opened his own physical therapy practice in Rochester, Minnesota where he helps patients return to normal life after injury.
This document is a quiz containing 40 multiple choice questions. For each question, there is a brief explanation or context provided before stating the question. Questions 5, 10, 15, 20, 25, 30, 35, and 40 are worth more points as "star marked questions." The quiz taker is Ankur Singh.
This document is a congratulatory message for Fernando from his family on Producciones Eraso-Monge. It thanks J.F. Monge for his role as Billy The Kid, A. Vázquez as Mor Earl, grandfather for his role as the main character from Up, and grandmother for her role as piruja Witch. It also notes additional starring roles from M.José Lobé, Sara Vázquez, and M.E. Vázquez.
This document discusses software-defined networking (SDN), network functions virtualization (NFV), network virtualization (NV), and open networking. It provides definitions of these concepts and compares the hardware-defined data center and software-defined data center approaches. Diagrams show the network overlay and underlay in NV. Open networking organizations and initiatives like OpenFlow, Open Network Install Environment (ONIE), Open Network Linux (ONL), OpenNSL, and OPNFV are also mentioned. Lastly, the benefits of different approaches are noted.
Federating Infrastructure as a Service cloud computing systems to create a un...David Wallom
This paper details the state of the art, the design, development and deployment of the EGI Federated Cloud platform, an e-infrastructure offering scalable and flexible models of utilization to the European research community. While continuing support for the traditional High Throughput Computing model, the EGI Cloud Platform extends its reach to other models of utilization such as long-lived services and on demand computation. Following a two-year period of development, the EGI Federated Cloud platform was officially launched in May 2014 offering resources provided by trusted academic and research organisations from within the user communities and consistently with their standard funding regime. Since then, the use cases supported have significantly increased both in total number and diversity of model of service required, validating both the choice of enforcing cloud technology agnosticism and of supporting service mobility and portability by means of open standards. These design choices have also allowed for the inclusion of commercial cloud providers into an infrastructure previously supported only by academic institutions. This contributes to a wider goal of funding agencies to create economic and social impact from supported research activities.
Dr Matthew Berryman, IT Architect, presented an overview of his research as part of the SMART Seminar Series on 15 November 2016.
More information: http://smart.uow.edu.au/events/UOW223675.html
MidoNet is an open, software-only, highly scalable and resilient, network virtualization system. With its distributed architecture it allows enterprises and service providers to build, run, and manage virtual networks at scale with increased control, security and flexibility.
MidoNet allows users to build isolated networks in software and overlays the existing network hardware infrastructure.
http://www.midokura.com/
PhD Defense: Enabling Smart Homes Using Web TechnologiesAndreas Kamilaris
Andreas Kamilaris defended his PhD thesis titled "Enabling Smart Homes Using Web Technologies" in December 2012 at the University of Cyprus. His thesis investigated using web principles and RESTful interfaces to interconnect smart home devices in an interoperable way. He proposed a framework that modeled device services as resources that could be manipulated via HTTP requests. This approach aimed to achieve flexibility and performance while integrating heterogeneous devices. The framework included request queues and caching to enhance reliability and response times in smart home environments. Kamilaris evaluated his approach through simulations of sensor network topologies and smart home usage scenarios.
This document provides an overview of software defined networking (SDN) and network virtualization. It discusses how SDN separates the control plane from the data plane in networking equipment to provide more agility, speed, and flexibility. Network functions can be virtualized and run in software rather than proprietary hardware. Use cases for SDNs include improving issues in telecommunications networks like vendor lock-in. The document also outlines NSX, VMware's SDN solution, which provides a virtual network that is decoupled from physical hardware and allows distributed network and security services.
Gaetano Borgione's presentation from the 2017 Open Networking Summit.
Networking is vital for cloud-native apps where distributed computing and development models require speed, simplicity, and scale for massive number of ephemeral containers. Two of the most prevalent container networking models are CNI and CNM for developers using Docker, Mesos, or Kubernetes. This session will present an overview of distributed development, how CNI and CNM models work, and how container frameworks use these models for networking. Gaetano will also discuss the additional functions users need to consider in the control plane and data plane to achieve operational scale and efficiency.
This document summarizes Dr. Anita Goel's presentation on cloud computing infrastructure at the Workshop on Big Data and Cloud Computing in India in 2016. The presentation included an introduction to cloud computing concepts like virtualization and software defined networking and storage. It discussed the need for cloud computing to improve processor and energy efficiency. It also defined cloud computing according to NIST and described common cloud service models. The remainder of the presentation outlined research directions in cloud computing architecture and control layers and listed several related publications by Dr. Goel and collaborators.
OpenStack and OpenDaylight Workshop: ONUG Spring 2014mestery
This was a presentation I gave at the Open Networking Users Group (ONUG), Spring 2014. This talk covers some background on OpenStack and OpenDaylight, walks through Group Based Policy and OpFlex, and ends with a tutorial walk through of installing and using OpenStack with OpenDaylight.
Lisa Caywood and Colin Dixon's presentation at the 2017 Open Networking Summit.
OpenDaylight has become a nexus for open source integration, creating a new open networking stack and enabling a new generation of open source, agile IT infrastructure. The fifth “Boron” release provides new tooling and documentation to support application developers, as well as greater integration with industry frameworks from OPNFV and OpenStack to CORD and Atrium. Boron also brings a practical focus on two leading types of deployments: (1) direct control of virtual switches to provide network virtualization and NFV and (2) management and orchestration of existing networks to provide new features and automation. This talk will cover trends in open SDN and cloud networking, with a focus on Boron milestones. In particular, it dives into the architecture across OpenStack and OpenDaylight to enable OpenStack service function chaining support in OpenDaylight.
VI GUIDE (Global Universities In Distance Education) conference Athens 2013. Interoute and University Marconi: Case study on how Interoute's IaaS cloud solution VDC was able to save Uni Marconi money, increase flexibility yet remain in control.
Lana Kalashnyk presented on transitioning to Java microservices on Docker. Key points included:
- Microservices involve breaking applications into small, independent services that communicate via APIs. Docker containers help deploy and manage microservices.
- The presentation demonstrated a Java microservice that polls a Bitcoin node for block height updates. It was packaged into a Docker container using Wildfly Swarm and exposed via REST APIs.
- A React web page displayed the data from the microservice. This illustrated how microservices and containers could replace outdated .NET web services.
- Benefits of microservices include independent deployability, fault isolation, and infrastructure automation using containers. Challenges include managing transactions and data
On-Demand Cloud Computing for Life Sciences Research and EducationMatthew Vaughn
The Jetstream cloud is a collaboration between Cyverse partners TACC and University of Arizona, University of Chicago, Johns Hopkins University, and Indiana University to bring the flexibility and ease-of-use of CyVerse Atmosphere to the entire community of science, at a much larger scale. Jetstream is a cloud resource operated as part of XSEDE, and built from two independent OpenStack clusters, each capable of supporting thousands of virtual machines and data volumes. The clusters are integrated via the user-friendly "Atmosphere" interface developed by CyVerse, with authentication enabled by Globus, and, unlike the CyVerse cloud also offer full access to Openstack web service APIs. Jetstream features a diverse catalog virtual machine templates. One can launch a personal Galaxy server, do advanced biostatistics, use Matlab, or experiment with new technologies like Docker, all on Jetstream. This talk highlights the unique capabilities of Jetstream and provides information about how researchers from all over can access it.
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document discusses Ethernet fabrics and the On-Demand Data Center (ODDC). It provides an overview of Brocade's fabric technology and how it enables automation, efficiency, and scale in data center networks. It also discusses how Brocade supports software-defined networking, network functions virtualization, and building on-demand data centers through its portfolio of networking solutions.
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...Cloud Native Day Tel Aviv
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With Advanced Network and Storage Interconnect Technologies, OpenStack Israel 2015
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Finalpresentation
1. Presentation by:-
Ankita Vinod Mandekar (13MIT0108)
2nd year MTech IT(Networking),
School of Information Technology and Engineering,
VIT University
Guided by:-
Dr. Krishna Chandramouli
Associate Professor,
Division of Enterprise and Cloud Computing,
School of Information Technology and Engineering,
VIT University
VIT university and Ecodenetworks 1
2. Outline
1. Motivation
2. Literature Survey
3. Proposed System Architecture
4. VPN with SDN
5. Floodlight SDN Controller
6. Openstack Cinder
7. Owncloud
8. Result
9. Conclusion
10. Future Work
11. References VIT university and Ecodenetworks 2
3. 1. Motivation
Data Center issues
• Increase in the requirement -> Increase in Physical Infrastructure
• Maintenance of cables overhead
• Hard to Manage and detect failure in data center
• Hard to maintain the Power Effective Unit
• More Capital and Operational Expenses
VIT university and Ecodenetworks 3
4. 1. Motivation
Traditional Cloud Computing with data center issues:
1. Storage as a Service by cloud provider
2. Design cloud network in data center
3. Generation of Hybrid Cloud by interconnecting to private cloud of organization
4. Hard to secure sensitive data
5. Maintenance and Management of sensitive data by third party service provider
6. XSS attack on Amazon in 2010
7. Network traffic and signalling barrier
8. Limited IPV4 address space in each subnet VIT university and Ecodenetworks 4
6. 1. Motivation
Traditional Network Complexities issues
• Distributed network
• Routing protocol as BGP,RIP
• Services, security ,ACL, QOS on single device
• Hard to detect failure in large organization
network
• Hard to manage and monitor network
• No automation of network function
• More CAPEX and OPEX
VIT university and Ecodenetworks 6
7. 1. Motivation
• Organization located in multiple location across the globe
• Employee onsite working for office
• Working from home
• No automation of creation of storage space and allocation
• Ticketing service to service provider
• No scalability automation
• No security over the private network
• Monitoring the virtual network devices and NAS device
So, We need VPN
So, We need owncloud
So, We need Cinder and
SDN
VIT university and Ecodenetworks 7
8. 2. Literature Survey
1. Open Network Foundation “Openflow Switch Specification version 1.4.0” Oct 2013
• Openflow standard design to reduce network device complexities by decoupling control
plane and data plane
• Flow forwarding
• Flow table with Match field, priority, counters, instruction, timeout, cookie entries
• Open Virtual Switch with OpenWRT OS
• Network Function Virtualization
VIT university and Ecodenetworks 8
9. 2. Literature Survey
2. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling Innovation in Campus
Network”,December 2008.
• The network is designed with Software Defined Networking using openflow protocol
• The migration of traditional network devices to SDN using openflow enabled switches and centralized
SDN controller
3. Open Networking Foundation “ NBI Information Model – User – Experience Monitor “ , Jan 2011
• Development of Monitoring tool, load balancing tool, proactive flow entry tool using Rest API exposed by SDN
Controller
4. Openstack Foundation “OpenStack Block Storage API v2 Reference”, April 2015
• Cinder Openstack block storage module help to orchestrate the north bound API
• Automation for creating block, tenants.
VIT university and Ecodenetworks 9
10. 2. Literature Survey
5. Bruno Astuno A. Nunes and Marc Mendonca “A survey of Software-Defined Networking: Past, Present and
Future Programmable Networks”, April 2010.
• The idea of programmable network facilitates network evolution
• It promises to dramatically simplify network management and enable innovation and evolution.
• the network intelligence is logically centralized in software-based controllers (the control plane), and
network devices become simple packet forwarding devices (the data plane) that can be programmed
via an open interface
6. The Art of Service “Cloud Computing Specialist Certification Kit Virtualization”, June 2009
• Cloud Service “Storage as a Service” is elaborated
• The network infrastructure can be virtualized using network function virtualization technology
• The cloud infrastructure has been virtualized to manage PEU, CAPEX and OPEX in data center
VIT university and Ecodenetworks 10
12. 4. Deployment of VPN using SDN
• Channel from Host to VOS is data channel
from VOS to FSC is control channel
• Data channel is secure by Layer 2
tunnelling protocol
• Control channel is secure by Generic
outing Encapsulation tunnelling protocol
• Host from one private network can
communicate over the internet
• Flow entries in VOS is managed by
centralized FSC
VIT university and Ecodenetworks 12
13. 5. Floodlight SDN Controller
• Floodlight is the centralized SDN
controller developed by Big Switch
in 2012
• Opensource FSC have topology, flow
forwarding, device details module
• It exposes topology, switch details,
host details, control statistics, link
statistics, Firewall rest API
• The northbound API can be develop
to monitor, secure the network
• Easy to overcome any network
failure
VIT university and Ecodenetworks 13
14. 6. Openstack Cinder
• Openstack is the opensource project developed by NASA and Rackspace for management of network,
storage and network virtual function devices
• Allows the orchestration of north bound API for management and monitoring network and storage
• Cinder is the block storage module developed to allocate block storage for organization
• Virtualizes pools of block storage devices and provides end users with a self-service API to request
• With the help of Cinder Rest API the creation, deletion and allocation of block of LVM is automated,
simulated and managed.
• To allocate the block on the NAS device the following functions are automated using Java programs:
1. Creation of token ID
2. Creation of tenant
3. Creation of storage volume
4. Endpoint
VIT university and Ecodenetworks 14
18. 4. Endpoint
6. Openstack Cinder
• Endpoint is created for each storage block
• It provides public URL, internal URL for usage in automation program
JSON request:
{
"OS-KSCATALOG:endpointTemplate": {
"id": 1
}
}
JSON response:
{
"endpoint": {
"id": 1,
"tenantId": 1,
"region": "North",
"type": "compute",
"publicURL": "https://compute.north.public.com/v1",
"internalURL": "https://compute.north.internal.com/v1",
"adminURL": "https://compute.north.internal.com/v1",
}
}
URL: http://<Openstack IP>:35357/v2.0/tenants/{tenantId}/OS-KSCATALOG/endpoints
VIT university and Ecodenetworks 18
19. 7. Owncloud
• Owncloud is the opensource software which can integrate to external storage device or service
• It can automate the integration of cinder block to the VPN user and provides network attached storage
(NAS)
• Java Script Object Notification (JSON) is used for integration
VIT university and Ecodenetworks 19
20. 7. Owncloud
• Cinder automation program on owncloud
VIT university and Ecodenetworks 20
21. 7. Owncloud
• Integration of WebDAV (remote.php) to windows VPN connected host
• Following steps are automated in program:
VIT university and Ecodenetworks 21
22. 8. Result
• New registered organization will get the NAS immediately after connecting to
virtual private network
• Network engineer can get the output for cinder as:
• Easy to manage the NAS device memory space and for billing purpose to
organization
VIT university and Ecodenetworks 22
23. 8. Result
• The centralized FSC and openflow enabled virtual switches forward the cloud storage traffic over data channel
towards Openstack with NAS instance.
• The registered storage space is given to user.
• The space allocation is automate using owncloud software.
• The WebDAV file of windows operating gives access to openflow WebDAV program to create network drive.
VIT university and Ecodenetworks 23
24. 9. Conclusion
• The private network is virtualized and provision the services to authorized company’s employee across the
globe. The cloud Storage as a Service is provision using Software Defined Network, Virtual Private Network
and Network Attached Storage technology.
• Using SDN, the reachability to the network attached drive in the cloud is speed up without delay in the
service. The programmability of network and storage automate their security and maintenance.
• The increase in security using L2TP, GRE, AES and Monitoring NBI makes the network robust to failure and
prevent from interpretation of malicious user.
• The project decreases the Operational Expenditure (OPEX) and Capital Expenditure (CAPEX) for NaaS and
StaaS provider and customers also.
VIT university and Ecodenetworks 24
25. 10. Future Work
• Nowadays, data centers are facing problem in management and maintenance of physical
infrastructure. Maintenance of Power Effective Unit is getting costly. Virtualization technology used
in this project can decrease the PEU and increase CPU usage by 40-60 %.
• The Firewall, load balancing Northbound API for SDN controller should be develop for security and
management in the VPN.
• During a disaster or other emergency, Organization may face the problem of physical infrastructure
loss. The SDN controller can initiate the live migration to safe instance upon intimation of any
disaster. The SDN controller will increase the priority (port) to high for making migration fast and
safe.
VIT university and Ecodenetworks 25
26. 11. References
1. In May 2014, Centralization of network using Openflow Protocol.
2. Owncloud Architecture overview
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved=0CC8QFjA
F&url=https%3A%2F%2Fowncloud.com%2Fwp-
ontent%2Fuploads%2F2013%2F08%2Foc_architecture_overview.pdf
3. Nick McKeown, Tom Anderson, and Hari Balakrishnan “OpenFlow: Enabling Innovation in Campus
Network” ,December 2008
4. Bruno Astuno A. Nunes and Marc Mendonca “A survey of Software-Defined Networking: Past, Present
and Future Programmable Networks”, April 2010.
5. Openflow-spec-v1.3.3.pdf https://www.opennetworking.org/images/stories/downloads/sdn-
resources/onf-specifications/openflow/openflow-spec-v1.3.3.pdf
VIT university and Ecodenetworks 26