BGP Traffic Engineering with SDN Controller, by Shaowen Ma.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
Segment routing is a network technology focused on addressing the pain points of existing IP and Multiprotocol Label Switching (MPLS) networks in terms of simplicity, scale, and ease of operation. It’s a foundation for application engineered routing because it prepares the networks for new business models where applications can direct network behavior.
Segment routing seeks the right balance between distributed intelligence and centralized optimization and programming. It was built for the software-defined networking (SDN) era.
Segment routing enables enhanced packet forwarding behavior. It enables a network to transport unicast packets through a specific forwarding path, other than the normal shortest path that a packet usually takes. This capability benefits many use cases, and you can build those specific paths based on application requirements.
Segment routing uses the source routing paradigm. A node, usually a router but it can also be a switch, a trusted server, or a virtual forwarder running on a hypervisor, steers a packet through an ordered list of instructions, called segments. A segment can represent any instruction, topological or service-based. A segment can have a local semantic to a segment-routing node or global within a segment-routing network. Segment routing allows you to enforce a flow through any topological path and service chain while maintaining per-flow state only at the ingress node to the segment-routing network. To be aligned with modern IP networks, segment routing supports equal-cost multipath (ECMP) by design, and the forwarding within a segment-routing network uses all possible paths, when desired.
TechWiseTV Workshop: Segment Routing for the DatacenterRobb Boyd
(This was a Live Webinar on July 21, 2016 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Watch the Replay at: bit.ly/29Mw58Q
Catch the original TV episode or any other topics at www.techwisetv.com
Description:
Networks are moving toward simplification, increased operational efficiency, and programmability using technologies such as software-defined networking. Cisco continues to demonstrate innovation by introducing the concept of segment routing in the data center, making the network more intelligent and adaptive to the applications running on top of it. Segment routing delivers application-optimized network transport. Encoding the path information directly at the source (that is, either at the virtual switch or at the top of rack) and using per-app policies, segment routing puts control in the hands of the network operators by empowering them to create secure, adaptive, and optimal paths based on the requirements of the application itself.
Please join us in the session to learn how Cisco is helping organizations increase network efficiency by allocating resources on demand and optimizing the network to better support business-critical applications, all while preserving security.
Agenda
Topics to discuss include:
- Introducing segment routing
- Why the need for application-optimized transport
- Features and benefits of segment routing
- Differences between segment routing and MPLS transport
- Relevance of segment routing in the data center
- Use cases and applicability of segment routing
- Summary and conclusion
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
BGP Traffic Engineering with SDN Controller, by Shaowen Ma.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
Segment routing is a network technology focused on addressing the pain points of existing IP and Multiprotocol Label Switching (MPLS) networks in terms of simplicity, scale, and ease of operation. It’s a foundation for application engineered routing because it prepares the networks for new business models where applications can direct network behavior.
Segment routing seeks the right balance between distributed intelligence and centralized optimization and programming. It was built for the software-defined networking (SDN) era.
Segment routing enables enhanced packet forwarding behavior. It enables a network to transport unicast packets through a specific forwarding path, other than the normal shortest path that a packet usually takes. This capability benefits many use cases, and you can build those specific paths based on application requirements.
Segment routing uses the source routing paradigm. A node, usually a router but it can also be a switch, a trusted server, or a virtual forwarder running on a hypervisor, steers a packet through an ordered list of instructions, called segments. A segment can represent any instruction, topological or service-based. A segment can have a local semantic to a segment-routing node or global within a segment-routing network. Segment routing allows you to enforce a flow through any topological path and service chain while maintaining per-flow state only at the ingress node to the segment-routing network. To be aligned with modern IP networks, segment routing supports equal-cost multipath (ECMP) by design, and the forwarding within a segment-routing network uses all possible paths, when desired.
TechWiseTV Workshop: Segment Routing for the DatacenterRobb Boyd
(This was a Live Webinar on July 21, 2016 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Watch the Replay at: bit.ly/29Mw58Q
Catch the original TV episode or any other topics at www.techwisetv.com
Description:
Networks are moving toward simplification, increased operational efficiency, and programmability using technologies such as software-defined networking. Cisco continues to demonstrate innovation by introducing the concept of segment routing in the data center, making the network more intelligent and adaptive to the applications running on top of it. Segment routing delivers application-optimized network transport. Encoding the path information directly at the source (that is, either at the virtual switch or at the top of rack) and using per-app policies, segment routing puts control in the hands of the network operators by empowering them to create secure, adaptive, and optimal paths based on the requirements of the application itself.
Please join us in the session to learn how Cisco is helping organizations increase network efficiency by allocating resources on demand and optimizing the network to better support business-critical applications, all while preserving security.
Agenda
Topics to discuss include:
- Introducing segment routing
- Why the need for application-optimized transport
- Features and benefits of segment routing
- Differences between segment routing and MPLS transport
- Relevance of segment routing in the data center
- Use cases and applicability of segment routing
- Summary and conclusion
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
Slides for lecturing in Alpha Networks Inc.
Introduce the routing mechanism in Trellis, namely Segment Routing, from the upper side of application design
and ONOS core functions, to the lower side of fabric pipelines and flows on OFDPA.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
Slides for lecturing in Alpha Networks Inc.
Introduce the routing mechanism in Trellis, namely Segment Routing, from the upper side of application design
and ONOS core functions, to the lower side of fabric pipelines and flows on OFDPA.
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...Cisco Service Provider
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco video solutions, visit: http://www.cisco.com/c/en/us/products/video/index.html
A brief introduction to the world of Software Defined Networking.
It is a very revolutionary technology which can entirely change the face of network management, if implemented in a network.
The Fundamentals of Networking in AWS: VPC and Connectivity Options - BusinessAmazon Web Services
A successful AWS journey always begins with accessing, creating, and controlling your own isolated network in the cloud. In this session, we will explain the concepts of VPC, how to create it, how to connect to your VPC, and what to take into consideration when managing your environment to ensure that you start off on the right foot with AWS.
Speaker: Amy Romano, Account Manager, Amazon Web Services & Alastair Cousins, Solutions Architect, Amazon Web Services
Featured Customer - William Buck
Data Plane: processing and delivery of packets
Based on state in routers and endpoints
E.g., IP, TCP, Ethernet, etc.
Control Plane: establishing the state in routers
Determines how and where packets are forwarded
Routing, traffic engineering, firewall state, …
Separate control plane and data plane entities
Have programmable data planes—maintain, control and program data plane from a central entity i.e. control plane software called controller.
An architecture to control not just a networking device but an entire network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
Jun Bi
Professor & Director
Tsinghua University
Outline
• Intra-AS (campus level) IPv6 source address validation using OpenFlow (with extension)
– Good for introducing new IP services to network
• Planning next step if we run SDN as a common infrastructure for new services and architectures
– Some personal viewpoints and thoughts on design challenges
– Forwarding abstraction for Post-IP architectures
– Control abstraction for scalable NOS and programmable/manageable virtualization platform
– Inter-AS policies negotiation abstraction
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Openflow for Mobile Broadband service providers_Nov'11Radhakant Das
This is an analysis done on status of Open flow as on 2011 . It has many reasons to be embraced. SDNA architecture under cloud orchestration demands OPENFLOW to come live soon in commercial networks.
Slides from US Ignite Smart Gigabit Community lighting rounds. Part of the US Ignite Wednesday afternoon sessions at the 2017 Smart Cities Connect conference in Austin Texas.
NSF PI Meeting presentation on US Ignite - Nishal MohanUS-Ignite
Presentation by Dr. Nishal Mohan, National Community Leader of US Ignite. Part of the Monday NSF PI meeting sessions of the Smart Cities Connect conference 2017
New Smart Gigabit Community 2017 announcement - Nishal MohanUS-Ignite
Welcoming new US Ignite Smart Gigabit Communities members for 2017. Part of the US Ignite Tuesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanUS-Ignite
Presentation by US Ignite National Community Leader, Dr. Nishal Mohan on the RFP for new members of the Smart Gigabit Communities program. Part of the US Ignite Tuesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Holograms in Your City: Smart Training, Data Visualization and Communication ...US-Ignite
A demonstration on innovative approaches to education and engagement by Professor of Computer Science at Case Western Reserve University, Mark Griswold. Part of the US Ignite Tuesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Innovation in Gigcity, Chattanooga TN - Ken HayesUS-Ignite
Director of the Enterprise Center presents on the incredible success story that is Chattanooga Tennessee. Part of the US Ignite Wednesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Compute for Cancer features an application that harnesses unused computing power in Smart Gigabit Communities and applies the computing power towards efforts to help cure cancer. Part of the US Ignite Wednesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangUS-Ignite
Presentation by Hongwei Zhang, professor of Computer Science at Wayne State University. Part of the US Ignite Wednesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
The Future of Smart & Connected Communities: Driving Science and Community Im...US-Ignite
Erwin Gianchandani, Deputy Assistant Director for Computer & Information Science and Engineering (CISE), National Science Foundation discusses the future of Smart Cities. Part of the US Ignite Tuesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Data-Driven Green Design Case Studies - Dominique DavisonUS-Ignite
Presentation on as part of the demonstration of PlanIT Impact, a smart gigabit application from Kansas City for enable data-driven green design. Part of the US Ignite Wednesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
Innovation in Phoenix: City on the Rise - Dominic PapaUS-Ignite
Presentation on Innovation in the city of Phoenix, AZ by Dominic Papa, Executive Director of the Arizona Institute for Digital Progress. Part of the US Ignite Wednesday morning sessions at the 2017 Smart Cities Connect conference in Austin Texas.
NSF 16-610* is a notification of opportunities to support, foster, and accelerate fundamental research and education that addresses challenges in enabling Smart & Connected Communities (S&CC)
Next Generation Broadband Cities - Lightning TalksUS-Ignite
Lightning Talks fromMegan Smith U.S. Chief Technology Officer
NIST, OSTP, Tech Hire, Maker Movement, CitySDK, Regional Big Data Hubs, Start-up in a Day, Broadband Connectivity Index, ConectED, Community Gigabit Fund
at the Launch of Smart Gigabit Communities event January 26, 2016
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Migration WG whose task it is to examine the existing examples of deploying SDN, ideally with the goal of full transition. Roughly, the idea is to examine the cases where this has been done and gather best practices, etc., from the experiences.
The Charter specifies two migration approaches, depicted in Figure 1. The first approach is the more direct method of upgrading existing networking equipment with OpenFlow Agents and decommissioning the Control Machine in favor of OpenFlow Controllers and Configurators.
The second approach includes a phased approach, illustrated in Figure 2, in which OpenFlow devices are deployed in conjunction with existing devices. Network operations are maintained by both the existing Control Machine and by OpenFlow Controllers and Configurators. Once services have been migrated to the OpenFlow target network, the starting network is decommissioned.
Legacy devices are traditional Switch/Routers with integrated control and forwarding plane. OpenFlow devices are switches with only OpenFlow forwarding planes, with the control plane residing external to the device. Hybrid OpenFlow Switches refers to devices with both legacy control and data plane and OpenFlow capabilities.
Campus Networks are typically composed of multiple buildings, interconnected with a central operations center. Components of the Campus network would include a Campus wide backbone. An egress point to the Wide Area Network is typically associated with a datacenter of some description. Each building will typically have a wiring closet and, in many cases, additional networking/datacenter facilities – be they for different academic departments, administration facilities, or campus wide IT resources. Enterprise Datacenters can range in size, but are typically composed of networking resources used to interconnect various sub-networks of servers (physical or virtual) together with associated storage (e.g. NAS or SAN), security, and networking functions (e.g. WAN acceleration, Load Balancing, etc.). Requirements for software-defined networking can vary, but application driven services rank high on the list. Multi-Tenant Datacenters have benefitted greatly from software-defined networking. These datacenters share many aspects of the typical Enterprise Datacenter, however, multiple tenants must typically share the physical resources. Virtualization of computing resources is almost a necessity, with robust features such as Virtual Machine migration facilitating a variety of capabilities, includingresource balancing, maintenance, and disaster recovery. Soft Switches within the computing resources themselves are a dominant component of the architecture. The net effect is that portions of the datacenter move and change, demanding that the overlay network must move and change to echo those changes. Increasingly, however, software-defined networking devices help address these requirements.Service Provider/Wide AreaNetworks introduce significant diversity. Service providers network architectures and requirements vary. For example, a Mobile Cellular Service Provider will have a radio network; along with a mobile backhaul network which hands off to an access network and ultimately a core network. Different applications of OpenFlow and SDN are being developed and deployed today. Service Providers, such as Google, are using OpenFlow to manage their inter-exchange resources and to ensure appropriate bandwidth is available at appropriate times. Many use cases are being developed by the industry, with software-defined solutions addressing Layer 0 through 7 network domains.
Goal was to create a new environment (co-existence model) and let experimenters use it. Gradual migration of users to OpenFlow over a 2-year period (Jun 2009 to Jun 2011). Use of a variety of switches and controllers, including: HP, NEC, Nicira, BigSwitch. 3 types of networks: wireline, experimental, and wireless (ofwifi with 30 APs). Emphasis on VLAN configuration: make new VLAN, migrate users to it, then introduce OpenFlow. Even so, some problems on a VLAN did take down the whole network. 25 wireline users, 77 wireless users, about 30 APs, in the order of 100 subnets. Flow setup time less than 100ms. Experimental work included traffic engineering and scalability exercises. Use of many existing/custom-built tools, including probing tools and VM-based tools (list can be shared). No major issues with loops. 200-300 flows/second on wireline network and about 700 flows/second on wireless network. Traffic engineering algorithms were key to deployment (throughput and rate limits). 3 major types of tools: additional probes on switches (dummy machines), user-installed software, collection on controller, VM circulated to different campuses (further info can be shared). Same switch had OpenFlow and non-OpenFlow VLANS. Users were moved from one to the other on the same switch.
Manage the Risk in Deploying Eventual Goal: Expand the OF Support to Serveral other L2 VLANs and then Interconnect Them at L3 RouterTool Requirements: oftrace, wiresharkdissector for OF, minnet, ofrewind, Hassel andNetPlumber, ATPGGAP AnalysisAdd safeguards in place within Switch firmware or OF controller to automatically revert configurationsStronger interoperability between the OF network and Non-OF network
Data plane and BGP control plane tightly coupled. Hard to keep up with BGP control plane changes or additional features on vendor specific OS and platforms.Puts extra load on the edge router’s control plane, which can lead to failures.BGP Scale limited by the CPU/Memory resources available on the edge router.Makes BGP configuration, management, monitoring and troubleshooting difficult and complex especially for large-scale deployments.Network operator spends a significant amount of time creating/maintaining BGP peering sessions and policies manually.
In the traditional BGP deployment models, edge router maintains numerous BGP adjacencies as well as large number of BGP routes/paths for multiple address families such as IPv4, IPv6, VPNv4 and VPNv6 etc. In addition, to meet customer SLAs, edge router may be configured with aggressive BGP session or Bidirectional Forwarding Detection (BFD) timers. Handling BGP state machine, processing BGP updates as per configured policies and calculating best paths for each address-family puts a heavy load on the router. Additionaly, by definition, service changes are quite frequent on the edge routers to provision new customers or update customer policies. Because of the limited resources, including CPU and memory, as well as proprietary nature of OS, service acceleration and innovation is dependant on vendor implementation. In the traditional deployment model, Provider Edge (PE) router runs BGP with external BGP speaking peers. In a typical Service provider environment, it is not uncommon for an edge router to maintain 500K+ Internet and/or L3VPN routes. Besides external peerings, edge router also maintains internal peering sessions typically with dual Route Reflectors (RR) as depicted in Figure 19. All the BGP sessions as well as policies are typically configured manually using vendor specific CLI. Data plane and BGP control plane tightly coupled. Hard to keep up with BGP control plane changes or additional features on vendor specific OS and platforms.Puts extra load on the edge router’s control plane, which can lead to failures.BGP Scale limited by the CPU/Memory resources available on the edge router.Makes BGP configuration, management, monitoring and troubleshooting difficult and complex especially for large-scale deployments.Network operator spends a significant amount of time creating/maintaining BGP peering sessions and policies manually. BGP Free Core is becoming popular among network operatorswho run some form of encapsulation in the core. Motivations:– Simplified core architecture– Lower cost of core infrastructure– Increase in core speed– Simplified core management– Better control on traffic patterns in the core– Direct preparation for optical switching
Lessons learnt and deployment practices. High level and not comprehensive but can provide some guidelines for others who are planning to go on similar journey. For example, the lack of fault tolerant OpenFlow controllers can be mitigated by provisioning multiple OpenFlow controllers to provide redundancy. Similarly, the lack of BGP relay agent on the OF enabled device to replicate the BGP sessions to provide resiliency for the BGP Free Edge use case and similarly resiliency for the BGP route controller can be addressed by deploying controller across multiple VMs and across multiple physical servers similar to cloud infrastructure and NFV. More work needed on requirements such as resiliency and redundancy for fault-tolerant OpenFlow controllersAlternative options available to mitigate the resiliency concernsDeploy multiple OpenFlow controllers to provide redundancy Deploy BGP controller across multiple VMs/ multiple physical servers for to avoid single point of failure