SlideShare a Scribd company logo
1 of 35
Software is Eating
the World
Gary Berger
Technical Leader, Cisco Systems Inc.
gaberger@cisco.com
Image: http://www.crunchzilla.com/code-monster
Mobile computing continues to dominate
capacity
0
2
4
6
8
10
12
2011 2012 2013 2014 2015 2016
Mobile Data Traffic
(Exabytes/Month)
0%
20%
40%
60%
80%
100%
Mobile Data Transfer
Distribution
Other
Web
Video
Source: Cisco VNI Mobile 2012 Source: ByteMobile Mobile Analytics Report 2012
Internet Economy
Advancing towards Services
• Time shared
system
• Explicit
control
• Restricted
scope
• Tightly
Coupled
• Vertically
Integrated
Database CentricClient Centric Service CentricHost Centric
• Desktop
applications
• Centralized
File & Print
• Many
dependencies
• Low network
utilization
• Evolution of
Client/Server
• 4GL
Programming
• Stored
Procedures
• Vertically
Integrated
• Proprietary
“Technical Debt”
• Loosely
coupled
components
• Web based
interactions
• Activities
across
multiple hosts
• Global scope
• Data driven
constraints
Web Centric
• Normalized
Presentation
Layer
• Activities
scheduled off
isolated hosts
• Self-Described
Data
“New Economy”
Sparse to Dense
Software Defined Everything?
Software Defined Networking
Software Defined Storage
Software Defined Security
Etc..
Open Network Foundation
“The physical separation of the network control plane from the
forwarding plane, and where a control plane controls several
devices”[1]
Software Defined Networking?
1. https://www.opennetworking.org/sdn-resources/sdn-definition
“A software-defined network can be flexible enough to
avoid the application assumptions of designers of
previous kinds of networks”.
Derived from Staple, Werbach “The End Of Spectrum
Scarcity”
Software Defined Networking
Adoption
The “Power Wall”, 2004
Herb Sutter “Free Lunch is Over”, 2005
Economic crash, 2008
Data, Data, Data..
Many Contributing Factors
1. Managing the network at scale!
2. Control access to network resources through declarative
(policy) and compositional (predicate) based
programming paradigms
3. Leverage the increasing network node degree (higher bi-
sectional bandwidth) for performance and availability
4. Static -> dynamic configuration and reconfiguration
5. Enabling an architecture for Ubiquitous Computing
6. Everything and Anything at the moment!
What is it about!
What its mostly about:
Leveraging Global Information to
optimize for:
• Traffic Engineering
• Admission control
• Isolation
• Filtering and
• Forwarding
OpenDayLight
Known problems have gone back 40 years.
Quite possibly vendors have been listening to the wrong
people?
Many attempts at programming the network but the
consumer demanded a weak and confusing interface
(i.e. CLI, SNMP, NetCONF) which have polluted the
design space
We still don’t have a formal way of thinking about
network architecture
The Network Disruption
5 Oct 201112
RINA Architecture
As many layers as you need
“Layers contain distributed state of a specific scope”
Geomorphic View of Classic Internet
Application 1
Application 2
1 2 3 4
Gateway Gateway
Internet Core
LAN 1 LAN 2 LAN 3
NetAPI
Programmatic Forwarding
Secure communications
Policy Driven Inter-domain routing (i.e. Pathlets)
Framework for Internet Innovation
But really distributed computing is
hard!!
Concurrency
Contention
Coherency
Universal Scalability Law
C(N) =
N
1+a(N -1)+ bN(N -1)
Contention
(e.g. serialization, locking)
Coherency
(i.e. penalty incurred for
maintaining consistency of shared
writeable data)
Source: A General Theory of Computational Scalability Based on Rational Functions, Gunther 2008
Concurrency
SDN Scaling still under active
research
How many
controllers?
Devices per
controller?
Partitioning
strategy?
Controller Clusters
Connectivity
CA B
Deeper analysis shows we cannot
just throw away peer communication
• Data
dissemination
• Discovery
• Availability
The cost of deadlock free consensus
   1+(N-1)+[N*(N-1)]+N+1
0
50
100
150
200
250
300
2 3 4 5 6 7 8 9 10 11 12 13 14 15
Messages
Messages
N = # of Acceptors
Acceptors/Learners
Note: Classic Multi-Paxos without optimization
SDN Continuum
A spectrum which encompasses
in-network state distribution at
one extreme and complete
separation of control and
dataplane as the other extreme
The purpose of which can result in
either a discovery of an invariant
protocol architecture which
provides the foundation for the
next generation Internet or paves
the way for complete protocol
customization.
Standards
IETF Bottleneck
Count by Publication Status
Total
BEST CURRENT PRACTICE 213
DRAFT STANDARD 145
EXPERIMENTAL 417
HISTORIC 267
INFORMATIONAL 2164
INTERNET STANDARD 96
PROPOSED STANDARD 2597
UNKNOWN 906
Grand Total 6805
RFC By Year
0
50
100
150
200
250
300
350
400
450
500 1968
1971
1974
1977
1980
1983
1986
1989
1992
1995
1998
2001
2004
2007
2010
2013
Average of 265/yr
over past decade
Gap is widening
0
50
100
150
200
250
300
1968
1971
1974
1977
1980
1983
1986
1989
1992
1995
1998
2001
2004
2007
2010
2013
BEST CURRENT PRACTICE
DRAFT STANDARD
EXPERIMENTAL
HISTORIC
INFORMATIONAL
INTERNET STANDARD
PROPOSED STANDARD
UNKNOWN
Getting To Internet Standard?
1. There are at least two independent interoperating implementations with
widespread deployment and successful operational experience.
2. There are no errata against the specification that would cause a new
implementation to fail to interoperate with deployed ones.
3. There are no unused features in the specification that greatly increase
implementation complexity.
4. If the technology required to implement the specification
requires patented or otherwise controlled technology, then the
set of implementations must demonstrate at least two independent,
separate and successful uses of the licensing process.
RFC 6410
“Network Virtualization is the abstraction of the control
plane into layers”.. Scott Shenker
Abstract the invariants from the set of complex
control plane protocols
Vertex
Edge
Property (tenant, vlan, min bw, min
latency, open, closed, etc.)
Network Virtualization
Address Virtualization
Policy Virtualization
Topology Virtualization
Virtualization Profile
Address Coupling
Application
Node
L2 (MAC)
L3 (IP)
Socket
(local)
Route Path
Application
Node
L2 (MAC)
L3 (IP)
Socket
(local)
L2 and L3 address
point to the
interface not the
node
Strict dependencies of identity and address force coupling of
policy, telemetry and state..
Programming models still being thought about
(Languages, Compilers, Runtimes)
Virtualization provides the illusion of infinite resources but we must
have “Mechanical Sympathy” (i.e. TCAM Space, SRAM, CPU Cycles)
Encapsulation provides a means to decouple identity from location
by adding a logical name space over a location dependent address
space (i.e. TRILL, FabricPath, LISP, STT, VXLAN, NVGRE, etc..)
Proper abstractions provide the invariant interfaces but do we have
the right ones?
Centralizing control provides a global view. Are we willing to throw
away the local view (BFD, LAG, etc..)?
Conclusion
Innovation at the Server
NFV Enablement
L3 Performance
Source: http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/communications-packet-processing-brief.pdf
Application Budgets
BYOS (Bring Your Own Stack)
1400
881
341
69
3000
1962
881
338
4920
3259
1530
661
10Mpps 14.8Mpps(1x10GE) 29.6Mpps(2x10GE) 59.5Mpps(1x40GE)
Intel E5-2600
@200 Cycles
8Core@2Ghz 16Core@2Ghz 16Core@3.2GHz Optimizations
DPDK
NETMAP
PF_RING/LI
BZERO
"The only way to get increased performance for new
applications is for developers to be aware of new
features in these chips. They have to be aware of what’s
inside to make their code more efficient.”
Krste Asanovic, UC Berkley
Systems Driven Networking
SDN is a manifestation of over 20 years of technical debt
which can no longer be swept under the rug
IETF process is antiquated
Crowd Sourcing + Parallel Programming + CMP allows for
rapid prototyping
Things are going to change..
“Network innovation is stifled by applying a limited set of
design principals along with craft-like patching in a rigid
architecture”
Conclusion

More Related Content

What's hot

What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...BDDazza
 
Game Changing Multilayer Networking - TNC 2017
Game Changing Multilayer Networking - TNC 2017Game Changing Multilayer Networking - TNC 2017
Game Changing Multilayer Networking - TNC 2017Sigal Biran-Nagar
 
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologies
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless TechnologiesSoftware Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologies
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologiesspirit conference
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverOpen Networking Summit
 
443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptxAbdulqader Al-kaboudei
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFVCoreStack
 
Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Michelle Holley
 
Evolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkEvolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkOpen Networking Summits
 
SDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsSDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsCisco Service Provider
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013Ryan Koop
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVKingston Smiler
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
 
Recent Advances in Network Automation Standards
Recent Advances in Network Automation StandardsRecent Advances in Network Automation Standards
Recent Advances in Network Automation StandardsLaurent Ciavaglia
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Stefano Salsano
 

What's hot (20)

What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
 
Netsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop PanelNetsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop Panel
 
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of ThingsTowards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
 
Game Changing Multilayer Networking - TNC 2017
Game Changing Multilayer Networking - TNC 2017Game Changing Multilayer Networking - TNC 2017
Game Changing Multilayer Networking - TNC 2017
 
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologies
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless TechnologiesSoftware Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologies
Software Defined Networks (SDN) and Cloud Computing in 5G Wireless Technologies
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking Forever
 
443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?
 
Evolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkEvolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier Network
 
SDN Research Projects Guidance
SDN Research Projects GuidanceSDN Research Projects Guidance
SDN Research Projects Guidance
 
SDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsSDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox Communications
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities Report
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFV
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
Recent Advances in Network Automation Standards
Recent Advances in Network Automation StandardsRecent Advances in Network Automation Standards
Recent Advances in Network Automation Standards
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
 
5G Americas_Network Slicing
5G Americas_Network Slicing5G Americas_Network Slicing
5G Americas_Network Slicing
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
 

Viewers also liked

Zwaar Vervoer Overzee
Zwaar Vervoer OverzeeZwaar Vervoer Overzee
Zwaar Vervoer Overzeeguest771e9
 
Presentation1
Presentation1Presentation1
Presentation1rparken25
 
Mortgage Shopping 101
Mortgage Shopping 101Mortgage Shopping 101
Mortgage Shopping 101David DeCarlo
 
Using The What If Scenarios In Excel
Using The What If Scenarios In ExcelUsing The What If Scenarios In Excel
Using The What If Scenarios In Excelrparken25
 
Revenue Analysis Dashboards
Revenue Analysis DashboardsRevenue Analysis Dashboards
Revenue Analysis Dashboardsrparken25
 
Towards Shared Learning Services
Towards Shared Learning ServicesTowards Shared Learning Services
Towards Shared Learning Servicesdkavvadias
 
Hallie Delia Hayley Lisa China
Hallie Delia Hayley Lisa ChinaHallie Delia Hayley Lisa China
Hallie Delia Hayley Lisa Chinaharothman
 
Steve's presentation at ICCC 2009(Stephen Mc Intyre)
Steve's presentation at ICCC 2009(Stephen Mc Intyre)Steve's presentation at ICCC 2009(Stephen Mc Intyre)
Steve's presentation at ICCC 2009(Stephen Mc Intyre)Wladimir Illescas
 
The Home Buyer Quiz V1.1
The Home Buyer Quiz V1.1The Home Buyer Quiz V1.1
The Home Buyer Quiz V1.1David DeCarlo
 

Viewers also liked (16)

RCML-DSL
RCML-DSLRCML-DSL
RCML-DSL
 
Zwaar Vervoer Overzee
Zwaar Vervoer OverzeeZwaar Vervoer Overzee
Zwaar Vervoer Overzee
 
Sdn version2.0
Sdn version2.0Sdn version2.0
Sdn version2.0
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mortgage Shopping 101
Mortgage Shopping 101Mortgage Shopping 101
Mortgage Shopping 101
 
Big problems
Big problemsBig problems
Big problems
 
Using The What If Scenarios In Excel
Using The What If Scenarios In ExcelUsing The What If Scenarios In Excel
Using The What If Scenarios In Excel
 
Everything Mobile 2.0
Everything Mobile 2.0Everything Mobile 2.0
Everything Mobile 2.0
 
Revenue Analysis Dashboards
Revenue Analysis DashboardsRevenue Analysis Dashboards
Revenue Analysis Dashboards
 
Towards Shared Learning Services
Towards Shared Learning ServicesTowards Shared Learning Services
Towards Shared Learning Services
 
Scaffold
ScaffoldScaffold
Scaffold
 
Ratio Analyisis
Ratio AnalyisisRatio Analyisis
Ratio Analyisis
 
Hallie Delia Hayley Lisa China
Hallie Delia Hayley Lisa ChinaHallie Delia Hayley Lisa China
Hallie Delia Hayley Lisa China
 
Steve's presentation at ICCC 2009(Stephen Mc Intyre)
Steve's presentation at ICCC 2009(Stephen Mc Intyre)Steve's presentation at ICCC 2009(Stephen Mc Intyre)
Steve's presentation at ICCC 2009(Stephen Mc Intyre)
 
Top 10 Ways
Top 10 WaysTop 10 Ways
Top 10 Ways
 
The Home Buyer Quiz V1.1
The Home Buyer Quiz V1.1The Home Buyer Quiz V1.1
The Home Buyer Quiz V1.1
 

Similar to Software is Eating the World: How SDN and NFV are Transforming Networking

Networking Challenges for the Next Decade
Networking Challenges for the Next DecadeNetworking Challenges for the Next Decade
Networking Challenges for the Next DecadeOpen Networking Summit
 
The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudMarco Rodrigues
 
WTSA-16_SG13_Presentation.pptx
WTSA-16_SG13_Presentation.pptxWTSA-16_SG13_Presentation.pptx
WTSA-16_SG13_Presentation.pptxlionofsouth
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
Distributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingDistributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingUS-Ignite
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumvideos
 
OpenDaylight-in-NextGenNetworkServices
OpenDaylight-in-NextGenNetworkServicesOpenDaylight-in-NextGenNetworkServices
OpenDaylight-in-NextGenNetworkServicesCharles Eckel
 
Cisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready InfrastructureCisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready InfrastructureCisco Canada
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfThomasGraf40
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationNikolay Milovanov
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric eraDESMOND YUEN
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
Resume_052715
Resume_052715Resume_052715
Resume_052715Phu Sam
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)Cisco Service Provider Mobility
 
Open Ethernet: an open-source approach to modern network design
Open Ethernet: an open-source approach to modern network designOpen Ethernet: an open-source approach to modern network design
Open Ethernet: an open-source approach to modern network designAlexander Petrovskiy
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analyticsconfluent
 

Similar to Software is Eating the World: How SDN and NFV are Transforming Networking (20)

Networking Challenges for the Next Decade
Networking Challenges for the Next DecadeNetworking Challenges for the Next Decade
Networking Challenges for the Next Decade
 
The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco Cloud
 
WTSA-16_SG13_Presentation.pptx
WTSA-16_SG13_Presentation.pptxWTSA-16_SG13_Presentation.pptx
WTSA-16_SG13_Presentation.pptx
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Distributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingDistributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined Networking
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 Introduction
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
OpenDaylight-in-NextGenNetworkServices
OpenDaylight-in-NextGenNetworkServicesOpenDaylight-in-NextGenNetworkServices
OpenDaylight-in-NextGenNetworkServices
 
Cisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready InfrastructureCisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready Infrastructure
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Resume_052715
Resume_052715Resume_052715
Resume_052715
 
The Impact of Cloud
The Impact of CloudThe Impact of Cloud
The Impact of Cloud
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Open Ethernet: an open-source approach to modern network design
Open Ethernet: an open-source approach to modern network designOpen Ethernet: an open-source approach to modern network design
Open Ethernet: an open-source approach to modern network design
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Software is Eating the World: How SDN and NFV are Transforming Networking

  • 1. Software is Eating the World Gary Berger Technical Leader, Cisco Systems Inc. gaberger@cisco.com Image: http://www.crunchzilla.com/code-monster
  • 2. Mobile computing continues to dominate capacity 0 2 4 6 8 10 12 2011 2012 2013 2014 2015 2016 Mobile Data Traffic (Exabytes/Month) 0% 20% 40% 60% 80% 100% Mobile Data Transfer Distribution Other Web Video Source: Cisco VNI Mobile 2012 Source: ByteMobile Mobile Analytics Report 2012
  • 3. Internet Economy Advancing towards Services • Time shared system • Explicit control • Restricted scope • Tightly Coupled • Vertically Integrated Database CentricClient Centric Service CentricHost Centric • Desktop applications • Centralized File & Print • Many dependencies • Low network utilization • Evolution of Client/Server • 4GL Programming • Stored Procedures • Vertically Integrated • Proprietary “Technical Debt” • Loosely coupled components • Web based interactions • Activities across multiple hosts • Global scope • Data driven constraints Web Centric • Normalized Presentation Layer • Activities scheduled off isolated hosts • Self-Described Data “New Economy” Sparse to Dense
  • 4. Software Defined Everything? Software Defined Networking Software Defined Storage Software Defined Security Etc..
  • 5. Open Network Foundation “The physical separation of the network control plane from the forwarding plane, and where a control plane controls several devices”[1] Software Defined Networking? 1. https://www.opennetworking.org/sdn-resources/sdn-definition
  • 6. “A software-defined network can be flexible enough to avoid the application assumptions of designers of previous kinds of networks”. Derived from Staple, Werbach “The End Of Spectrum Scarcity” Software Defined Networking
  • 8. The “Power Wall”, 2004 Herb Sutter “Free Lunch is Over”, 2005 Economic crash, 2008 Data, Data, Data.. Many Contributing Factors
  • 9. 1. Managing the network at scale! 2. Control access to network resources through declarative (policy) and compositional (predicate) based programming paradigms 3. Leverage the increasing network node degree (higher bi- sectional bandwidth) for performance and availability 4. Static -> dynamic configuration and reconfiguration 5. Enabling an architecture for Ubiquitous Computing 6. Everything and Anything at the moment! What is it about! What its mostly about: Leveraging Global Information to optimize for: • Traffic Engineering • Admission control • Isolation • Filtering and • Forwarding
  • 11. Known problems have gone back 40 years. Quite possibly vendors have been listening to the wrong people? Many attempts at programming the network but the consumer demanded a weak and confusing interface (i.e. CLI, SNMP, NetCONF) which have polluted the design space We still don’t have a formal way of thinking about network architecture The Network Disruption
  • 12. 5 Oct 201112 RINA Architecture As many layers as you need “Layers contain distributed state of a specific scope”
  • 13. Geomorphic View of Classic Internet Application 1 Application 2 1 2 3 4 Gateway Gateway Internet Core LAN 1 LAN 2 LAN 3
  • 14. NetAPI Programmatic Forwarding Secure communications Policy Driven Inter-domain routing (i.e. Pathlets) Framework for Internet Innovation
  • 15. But really distributed computing is hard!! Concurrency Contention Coherency
  • 16. Universal Scalability Law C(N) = N 1+a(N -1)+ bN(N -1) Contention (e.g. serialization, locking) Coherency (i.e. penalty incurred for maintaining consistency of shared writeable data) Source: A General Theory of Computational Scalability Based on Rational Functions, Gunther 2008 Concurrency
  • 17. SDN Scaling still under active research How many controllers? Devices per controller? Partitioning strategy?
  • 19. Deeper analysis shows we cannot just throw away peer communication • Data dissemination • Discovery • Availability
  • 20. The cost of deadlock free consensus    1+(N-1)+[N*(N-1)]+N+1 0 50 100 150 200 250 300 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Messages Messages N = # of Acceptors Acceptors/Learners Note: Classic Multi-Paxos without optimization
  • 21. SDN Continuum A spectrum which encompasses in-network state distribution at one extreme and complete separation of control and dataplane as the other extreme The purpose of which can result in either a discovery of an invariant protocol architecture which provides the foundation for the next generation Internet or paves the way for complete protocol customization.
  • 23. IETF Bottleneck Count by Publication Status Total BEST CURRENT PRACTICE 213 DRAFT STANDARD 145 EXPERIMENTAL 417 HISTORIC 267 INFORMATIONAL 2164 INTERNET STANDARD 96 PROPOSED STANDARD 2597 UNKNOWN 906 Grand Total 6805
  • 24. RFC By Year 0 50 100 150 200 250 300 350 400 450 500 1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 2001 2004 2007 2010 2013 Average of 265/yr over past decade
  • 25. Gap is widening 0 50 100 150 200 250 300 1968 1971 1974 1977 1980 1983 1986 1989 1992 1995 1998 2001 2004 2007 2010 2013 BEST CURRENT PRACTICE DRAFT STANDARD EXPERIMENTAL HISTORIC INFORMATIONAL INTERNET STANDARD PROPOSED STANDARD UNKNOWN
  • 26. Getting To Internet Standard? 1. There are at least two independent interoperating implementations with widespread deployment and successful operational experience. 2. There are no errata against the specification that would cause a new implementation to fail to interoperate with deployed ones. 3. There are no unused features in the specification that greatly increase implementation complexity. 4. If the technology required to implement the specification requires patented or otherwise controlled technology, then the set of implementations must demonstrate at least two independent, separate and successful uses of the licensing process. RFC 6410
  • 27. “Network Virtualization is the abstraction of the control plane into layers”.. Scott Shenker Abstract the invariants from the set of complex control plane protocols Vertex Edge Property (tenant, vlan, min bw, min latency, open, closed, etc.) Network Virtualization
  • 28. Address Virtualization Policy Virtualization Topology Virtualization Virtualization Profile
  • 29. Address Coupling Application Node L2 (MAC) L3 (IP) Socket (local) Route Path Application Node L2 (MAC) L3 (IP) Socket (local) L2 and L3 address point to the interface not the node
  • 30. Strict dependencies of identity and address force coupling of policy, telemetry and state.. Programming models still being thought about (Languages, Compilers, Runtimes) Virtualization provides the illusion of infinite resources but we must have “Mechanical Sympathy” (i.e. TCAM Space, SRAM, CPU Cycles) Encapsulation provides a means to decouple identity from location by adding a logical name space over a location dependent address space (i.e. TRILL, FabricPath, LISP, STT, VXLAN, NVGRE, etc..) Proper abstractions provide the invariant interfaces but do we have the right ones? Centralizing control provides a global view. Are we willing to throw away the local view (BFD, LAG, etc..)? Conclusion
  • 31. Innovation at the Server NFV Enablement
  • 33. Application Budgets BYOS (Bring Your Own Stack) 1400 881 341 69 3000 1962 881 338 4920 3259 1530 661 10Mpps 14.8Mpps(1x10GE) 29.6Mpps(2x10GE) 59.5Mpps(1x40GE) Intel E5-2600 @200 Cycles 8Core@2Ghz 16Core@2Ghz 16Core@3.2GHz Optimizations DPDK NETMAP PF_RING/LI BZERO
  • 34. "The only way to get increased performance for new applications is for developers to be aware of new features in these chips. They have to be aware of what’s inside to make their code more efficient.” Krste Asanovic, UC Berkley Systems Driven Networking
  • 35. SDN is a manifestation of over 20 years of technical debt which can no longer be swept under the rug IETF process is antiquated Crowd Sourcing + Parallel Programming + CMP allows for rapid prototyping Things are going to change.. “Network innovation is stifled by applying a limited set of design principals along with craft-like patching in a rigid architecture” Conclusion

Editor's Notes

  1. Ate the time, people lived closer to one another, long distance calls were non-existent, costly and rare.
  2. Ate the time, people lived closer to one another, long distance calls were non-existent, costly and rare.
  3. 2. All web traffic should be forwarded to this load balancer, If web traffic is > x reroute to load balancer YUbiquitous Computing is anywhere, anytime, anydevice.IoT, M2M, etc..
  4. LAGBFD
  5. 6=4310=11114-211
  6. Protocol Oblivious ForwardingPathlets
  7. RFC 6410 Moves to a two-tier model
  8. Average over past 20 years is 266RFC’s per Year
  9. 2011
  10. Tenant, Location, Fairness, Isolation
  11. Routing on a path causes liveness issues.
  12. Additional namespaces and state
  13. Source: http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/communications-packet-processing-brief.pdf
  14. Intel® Xeon® processor E5-2658 (2 sockets) at 2.1 GHz, 20 MB L3 Cache, 90W; Intel® C604 chipset; 16 x 4 GB RDIMM DDR3-133 MHz Three I/O controllers per socket provide a total of 80 PCIe express lanes supporting latest gen. 3 technology of up to 8Gbps per lane.67.2ns interval40 PCIe * 8GHz = 320Gbps?