Network Virtualization
S. Kingston Smiler (kingstonsmiler@gmail.com)
Agenda
Need for Network Virtualization
Enablers of Network Virtualization
Overlay & Underlay Network
Virtual Tenant Network
Underlay Network
Overlay Network
Use Cases
Introduction
• Process of segregating the user traffic
from one group of user is getting
forwarded into the same group of user
without any logical isolation of the
network infrastructure
• Example VLAN, VRF etc
Definition
1
• Process of splitting the physical network
entities like Switches, Routers, Firewall
etc into multiple logical network entities
for isolating the user traffic from different
instances
• Example VTN
Definition
2
Need For Network Virtualization
Why Network Virtualization?
Efficient, Flexible and scalable usage of
network
Logically segregating the underlay
administrative domain with the overlay
domain
To accommodate the dynamic nature of
server virtualization
Providing security and isolation of traffic
and network details from one user to
another
To Cope Up with the virtualization
techniques in other areas (Compute and
Storage)
Traditional Computing Vs Modern Computing
Computing Provisioning Methods
Source: Adopted from Transforming the Network With Open SDN by Big Switch Network
Modern Networking Complexity
Ref: Javvin
Networking Provisioning Methods
Source: Adopted from Transforming the Network With Open SDN by Big Switch Network
Computing Vs Networking
Source: Adopted from Transforming the Network With Open SDN by Big Switch Network
Computing Vs Networking
Source: Adopted from http://bradhedlund.com/2013/05/28/what-is-network-virtualization/
Enablers For Network Virtualization
Key NV Enablers
Cloud and
Server
Virtualizati
on
SDN
NFV
Data Center Cloud
Cloud Requirement
• Three Tier Application
Architecture
• Each Tier has group of
servers, wherein the
services are deployed
either in VM / containers.
• VMs are not treated as
legacy servers in the
networking world
• East-West traffic is poorly
managed
15
Web
Tier
Application
Tier
Database
Tier
SDN
SDN Definition
Centralization of control of the
network
Separation of control logic to off-
device compute, that
Enables automation and
orchestration of network services
Open programmatic interfaces
SDN Benefits
Efficiency: optimize existing
applications, services, and
infrastructure
Scale: rapidly grow existing
applications and services
Innovation: create and deliver
new types of applications and
services and business models
What is SDN?
17Source: Adopted from SDN Central (Software-Defined Networking (SDN) Use Cases)
What is SDN?
18
SDN Innovation & Components
19
SDN Controller/ Network Operating System
App App App App
OpenFlow
Packet-Forwarding
Hardware
OpenFlow compliant
OS
Packet-Forwarding
Hardware
OpenFlow compliant
OS
Packet-Forwarding
Hardware
OpenFlow compliant
OS
Well-defined
Open API
Source: Adopted from SDN Central (Software-Defined Networking (SDN) Use Cases)
20SDN Central
SDN Approach
Current Network Vs OpenFlow Vs SDN Network
Server Abstraction Vs SDN Abstraction
22SDN Central
SDN – Game changer?
23
• Complete removal of control plane may be
harmful. Exact division of control plane
between centralized controller and
distributed forwarders is yet to be worked
out.
• SDN is easy if control plane is centralized
but not necessary. Distributed solutions may
be required for legacy equipment and for
fail-safe operation.
Source: Adopted from Introduction to Software Defined Software Defined Networking (SDN) Networking (SDN) by Prof. Raj Jain
Key Attributes for SDN Success
Architecture for a Network Operating System
with a service/application oriented
namespace
Resource virtualization, elasticity and
aggregation (pooling to achieve scaling)
Appropriate abstractions to foster
simplification
Decouple topology, traffic and inter-layer
dependencies
Dynamic multi-layer networking
SDN – Challenges
25
NFV
What is NFV?
27
 Network Functions Virtualization (NFV) is a network
architecture concept that proposes using IT
virtualization related technologies, to virtualize entire
classes of network node functions into building blocks
that may be connected, or chained, together to create
communication services.
 Concept of NFV originated from SDN.
 NFV and SDN are complementary. One does not
depend upon the other. You can do SDN only, NFV
only, or SDN and NFV together.
 Specification comes from ETSI Industry Specification
Group.
Part III - Open Flow Applications
28
NFV vs SDN
Source: Adopted from http://www.overturenetworks.com/blog/2013/04/12/network-function-virtualization-and-software-defined-networking-whats-difference
29
NFV Innovations
Source: Adopted from SDN and NFV: Facts, Extensions, and Carrier Opportunities by Prof. Raj Jain
Network Virtualization Concepts
Classifications of Network Virtualization
Network
Virtualization
Device Level
Virtual Interface
NIC
TUN/TAP Interface
Bridge, OVS
Virtual Router
Network Level
Network Slicing /
VTN
Packet Level
VLAN
802.1X
802.1AD
MPLS VPN
L2VPN
L3VPN
Interface Level
VRF-lite
OpenFlow SIN
In-Device Virtualization
 In-Device Network
Virtualization
 vNIC
 vBridge
 OVS
 TUN/TAP
Packet Level Virtualization
 The packet carries
information related to a set
of user for isolation network
traffic.
 Example is VLAN, L2VPN,
L3PVN etc
 In VLAN case, the packet will
carry the VLAN tag which is
used to limit the broadcast
domain of a switch / bridge
 The traffic which is flowing
from a user from one VLAN
will not be forwarded to
other VLAN
Interface Level Virtualization
 In this case the traffic
isolation is provided by
assigning set of ports or
interface to a particular
customer.
 The packets from these
ports will be only forwarded
to the interface which is
part of the same VRF.
 Very good example is VRF-
lite
Network Level Virtualization
 In Network Level
Virtualization, the entire
physical network is sliced into
multiple logical networks
each assigning to a customer
/ group of customer.
 This kind of network is
termed as virtual tenant
network (VTN)
The network slices are mapped to a customer / tenant and hence termed as
VTN
VTN Concepts
Hypervisor
Underlay
Overlay
Underlay Networks
 Underlay network comprises of the
physical network devices like hubs,
switches, routers.
 Underlay network provides the
backbone or foundation for the
overlay network.
 Typically underlay network is a L3
network which runs BGP / OSPF for
exchanging the complete route
information
 Will have reachability information to
all the network nodes until the
physical server.
Overlay Networks
 It’s a virtual network of nodes and logical link built on top of
one or more networks
 Provides additional level of virtualization to the network
without any redesign.
 Doesn’t impose any additional overhead to the underlay
network.
 Requires underlay network
39
Overlays v Underlays
VXLAN disassociates workloads from physical networks, allowing for
possible transition to cloud based providers
Overlay Technologies
Overlay
Technologies
Traditional SP
MPLS
Tunneling
Carrier
Ethernet
GRE
Data Center
Centric
VxLAN NvGRE STT
SDN
SDN Fabric
Types of Overlays
Overlay Types
Physical
Overlay
Traditional SP
Overlays
Virtual
Overlay
Data Center
Centric
Overlays
Hybrid
Overlay
Data Center
Centric
Overlays
Physical Overlay (MPLS Tunneling)
The Overlay Starts from the physical device. The starting node of the
overlay is also part of the underlay
Virtual Overlay (VxLAN)
The Overlay Starts from the virtual device.
Virtual Access
Core
IP Backbone
Aggregation
Access
Hosts
VM
OS
VM
OS
Virtual Physical
Hybrid Overlay (VxLAN Gateway)
The Overlay Starts from virtual device and ends to a physical device and
vice versa
Virtual Access
Core
IP Backbone
Aggregation
Access
Hosts
VM
OS
VM
OS
Virtual Physical
Use Cases
Data Center
• Wiki
– Facility used to
• house computer systems (Servers, VMs,
Hypervisor etc)
• and associated components, such
as telecommunications (Switches, Routers,
Hypervisor, SAN)
• and storage systems (Storage arrays, SAN)
• It generally includes redundant or
backup power supplies, redundant data
communications connections,
environmental controls (e.g., air
conditioning, fire suppression)
• Various security devices (Services like).
Datacenter Key Terminologies
47
■ Racks (48 Servers)
■ Group of servers placed in a
physical racks. Typically 48
servers will be placed in a
rack.
■ Top of Rack Switch (2 per rack)
■ Network Equipment that
directly connects to servers
■ EoR Switch (2 per Row) (T1)
■ Network Equipment that
connects to TORs
■ Aggregation Switch (T2)
■ Network Equipment that
aggregates access layer
devices to provide
connectivity across access
layer
■ Core Layer (T3)
■ Network Equipment that
interconnects multiple
aggregation layer nodes
Data Center
Data Center Virtualization
Network Virtualization in TELCO
Network Virtualization in TELCO
Thank you
kingstonsmiler@gmail.com

Network Virtualization

  • 1.
    Network Virtualization S. KingstonSmiler (kingstonsmiler@gmail.com)
  • 2.
    Agenda Need for NetworkVirtualization Enablers of Network Virtualization Overlay & Underlay Network Virtual Tenant Network Underlay Network Overlay Network Use Cases
  • 3.
    Introduction • Process ofsegregating the user traffic from one group of user is getting forwarded into the same group of user without any logical isolation of the network infrastructure • Example VLAN, VRF etc Definition 1 • Process of splitting the physical network entities like Switches, Routers, Firewall etc into multiple logical network entities for isolating the user traffic from different instances • Example VTN Definition 2
  • 4.
    Need For NetworkVirtualization
  • 5.
    Why Network Virtualization? Efficient,Flexible and scalable usage of network Logically segregating the underlay administrative domain with the overlay domain To accommodate the dynamic nature of server virtualization Providing security and isolation of traffic and network details from one user to another To Cope Up with the virtualization techniques in other areas (Compute and Storage)
  • 6.
    Traditional Computing VsModern Computing
  • 7.
    Computing Provisioning Methods Source:Adopted from Transforming the Network With Open SDN by Big Switch Network
  • 8.
  • 9.
    Networking Provisioning Methods Source:Adopted from Transforming the Network With Open SDN by Big Switch Network
  • 10.
    Computing Vs Networking Source:Adopted from Transforming the Network With Open SDN by Big Switch Network
  • 11.
    Computing Vs Networking Source:Adopted from http://bradhedlund.com/2013/05/28/what-is-network-virtualization/
  • 12.
    Enablers For NetworkVirtualization
  • 13.
    Key NV Enablers Cloudand Server Virtualizati on SDN NFV
  • 14.
  • 15.
    Cloud Requirement • ThreeTier Application Architecture • Each Tier has group of servers, wherein the services are deployed either in VM / containers. • VMs are not treated as legacy servers in the networking world • East-West traffic is poorly managed 15 Web Tier Application Tier Database Tier
  • 16.
  • 17.
    SDN Definition Centralization ofcontrol of the network Separation of control logic to off- device compute, that Enables automation and orchestration of network services Open programmatic interfaces SDN Benefits Efficiency: optimize existing applications, services, and infrastructure Scale: rapidly grow existing applications and services Innovation: create and deliver new types of applications and services and business models What is SDN? 17Source: Adopted from SDN Central (Software-Defined Networking (SDN) Use Cases)
  • 18.
  • 19.
    SDN Innovation &Components 19 SDN Controller/ Network Operating System App App App App OpenFlow Packet-Forwarding Hardware OpenFlow compliant OS Packet-Forwarding Hardware OpenFlow compliant OS Packet-Forwarding Hardware OpenFlow compliant OS Well-defined Open API Source: Adopted from SDN Central (Software-Defined Networking (SDN) Use Cases)
  • 20.
  • 21.
    Current Network VsOpenFlow Vs SDN Network
  • 22.
    Server Abstraction VsSDN Abstraction 22SDN Central
  • 23.
    SDN – Gamechanger? 23 • Complete removal of control plane may be harmful. Exact division of control plane between centralized controller and distributed forwarders is yet to be worked out. • SDN is easy if control plane is centralized but not necessary. Distributed solutions may be required for legacy equipment and for fail-safe operation. Source: Adopted from Introduction to Software Defined Software Defined Networking (SDN) Networking (SDN) by Prof. Raj Jain
  • 24.
    Key Attributes forSDN Success Architecture for a Network Operating System with a service/application oriented namespace Resource virtualization, elasticity and aggregation (pooling to achieve scaling) Appropriate abstractions to foster simplification Decouple topology, traffic and inter-layer dependencies Dynamic multi-layer networking
  • 25.
  • 26.
  • 27.
    What is NFV? 27 Network Functions Virtualization (NFV) is a network architecture concept that proposes using IT virtualization related technologies, to virtualize entire classes of network node functions into building blocks that may be connected, or chained, together to create communication services.  Concept of NFV originated from SDN.  NFV and SDN are complementary. One does not depend upon the other. You can do SDN only, NFV only, or SDN and NFV together.  Specification comes from ETSI Industry Specification Group.
  • 28.
    Part III -Open Flow Applications 28 NFV vs SDN Source: Adopted from http://www.overturenetworks.com/blog/2013/04/12/network-function-virtualization-and-software-defined-networking-whats-difference
  • 29.
    29 NFV Innovations Source: Adoptedfrom SDN and NFV: Facts, Extensions, and Carrier Opportunities by Prof. Raj Jain
  • 30.
  • 31.
    Classifications of NetworkVirtualization Network Virtualization Device Level Virtual Interface NIC TUN/TAP Interface Bridge, OVS Virtual Router Network Level Network Slicing / VTN Packet Level VLAN 802.1X 802.1AD MPLS VPN L2VPN L3VPN Interface Level VRF-lite OpenFlow SIN
  • 32.
    In-Device Virtualization  In-DeviceNetwork Virtualization  vNIC  vBridge  OVS  TUN/TAP
  • 33.
    Packet Level Virtualization The packet carries information related to a set of user for isolation network traffic.  Example is VLAN, L2VPN, L3PVN etc  In VLAN case, the packet will carry the VLAN tag which is used to limit the broadcast domain of a switch / bridge  The traffic which is flowing from a user from one VLAN will not be forwarded to other VLAN
  • 34.
    Interface Level Virtualization In this case the traffic isolation is provided by assigning set of ports or interface to a particular customer.  The packets from these ports will be only forwarded to the interface which is part of the same VRF.  Very good example is VRF- lite
  • 35.
    Network Level Virtualization In Network Level Virtualization, the entire physical network is sliced into multiple logical networks each assigning to a customer / group of customer.  This kind of network is termed as virtual tenant network (VTN) The network slices are mapped to a customer / tenant and hence termed as VTN
  • 36.
  • 37.
    Underlay Networks  Underlaynetwork comprises of the physical network devices like hubs, switches, routers.  Underlay network provides the backbone or foundation for the overlay network.  Typically underlay network is a L3 network which runs BGP / OSPF for exchanging the complete route information  Will have reachability information to all the network nodes until the physical server.
  • 38.
    Overlay Networks  It’sa virtual network of nodes and logical link built on top of one or more networks  Provides additional level of virtualization to the network without any redesign.  Doesn’t impose any additional overhead to the underlay network.  Requires underlay network
  • 39.
    39 Overlays v Underlays VXLANdisassociates workloads from physical networks, allowing for possible transition to cloud based providers
  • 40.
  • 41.
    Types of Overlays OverlayTypes Physical Overlay Traditional SP Overlays Virtual Overlay Data Center Centric Overlays Hybrid Overlay Data Center Centric Overlays
  • 42.
    Physical Overlay (MPLSTunneling) The Overlay Starts from the physical device. The starting node of the overlay is also part of the underlay
  • 43.
    Virtual Overlay (VxLAN) TheOverlay Starts from the virtual device. Virtual Access Core IP Backbone Aggregation Access Hosts VM OS VM OS Virtual Physical
  • 44.
    Hybrid Overlay (VxLANGateway) The Overlay Starts from virtual device and ends to a physical device and vice versa Virtual Access Core IP Backbone Aggregation Access Hosts VM OS VM OS Virtual Physical
  • 45.
  • 46.
    Data Center • Wiki –Facility used to • house computer systems (Servers, VMs, Hypervisor etc) • and associated components, such as telecommunications (Switches, Routers, Hypervisor, SAN) • and storage systems (Storage arrays, SAN) • It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) • Various security devices (Services like).
  • 47.
    Datacenter Key Terminologies 47 ■Racks (48 Servers) ■ Group of servers placed in a physical racks. Typically 48 servers will be placed in a rack. ■ Top of Rack Switch (2 per rack) ■ Network Equipment that directly connects to servers ■ EoR Switch (2 per Row) (T1) ■ Network Equipment that connects to TORs ■ Aggregation Switch (T2) ■ Network Equipment that aggregates access layer devices to provide connectivity across access layer ■ Core Layer (T3) ■ Network Equipment that interconnects multiple aggregation layer nodes
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.

Editor's Notes