SlideShare a Scribd company logo
1 of 28
Download to read offline
Software-Defined
Network Management
Nick Feamster
Georgia Tech
(with Joon Kim, Marshini Chetty, Srikanth Sundaresan)
Network Management is Hard!
• Manual, error-prone, complex
• Network configurations change continually
– Provisioning of new users and devices
– Adjustments to access control
– Response to incidents
• Changes result in errors
Software Defined Network Management
• Software defined networking makes it easier for
network operators to evolve network capabilities
• Can SDN also help network operators manage
their networks, once they are deployed?
– Campus/Enterprise networks
– Home networks
3
Why is network management
so hard today?
4
Configuration is Complex, Low-Level
• A campus network may have
– More than one million lines of configuration
– Thousands of devices
– Hundreds of thousands of changes every year
• Home networks can be complex, too
5
Network State is Dynamic
• Enterprise and campus networks are dynamic
– Hosts continually coming and leaving
– Hosts may become infected
• Today, configuration is static, and poorly integrated
with the network
• Instead: Dynamic network configuration
– Track state of each host on the network
– Update forwarding state of switches per host as these
states change
6
Too Much Complexity is Exposed
Network Devices are
Heterogeneous
• Many components “bolted on” after the fact
– Campus: Firewalls, VLANs, Web authentication portal,
vulnerability scanner
– Home: Set-top boxes, cameras, laptops, desktops,
phones
• Separate (and competing) devices for performing
different functions
– Registration (based on MAC addresses)
– Vulnerability scanning
– Filtering
– Rate limiting
8
Retrofit: Configuration Checkers
Intermediate
Representation
Correctness
Specification
Constraints
Faults
Distributed router
configurations
• Downloaded and used by hundreds of ISPs
• Configuration faults found in every network
Feamster and Balakrishnan, Detecting BGP Configuration Faults with Static
Analysis. Proc NSDI, 2005. Best Paper Award
Better: Software-Defined Networking
• Distributed configuration is a bad idea
• Instead: Control the network from a logically
centralized system
• Policies become high-level programs
10
Feamster et al. The Case for Separating Routing from Routers. Proc. SIGCOMM FDNA,
2004
Network
RCP
2004 2005
Decision
Dissemination
Discovery
Data
2008
Resonance: Don’t Configure the
Network, Program It!
• Today: Configuring networks with low-level,
distributed, vendor-specific configuration
• With SDN: Writing network policies and
protocols as programs
– More expressive
– More predictable
– More evolvable
– More usable
11
Resonance: Approach
12
Challenge Approach
Dynamic State Event Listener w/State
Machine
Low-Level Configuration High-Level Policy
Language
Exposed Complexity Refactoring Functions
Heterogeneity Standard Control
Protocols
Processing Dynamic Events
• Idea: Express network policies as event-based
programs.
13
Events Actions
• Policies can be expressed as centralized programs
State Machines
• Step 1: Associate each host with generic states
and security classes
• Step 2: Specify a state machine for moving
machines from one state to the other
• Step 3: Control forwarding state in switches
based on the current state of each machine
– Actions from other network elements, and distributed
inference, can affect network state
14
High-Level Policy Language
• Defines states,
actions, transitions
• High-level, logically
centralized
– Easier testing and
analysis
– Less complex
• Design is still in-
progress
15
Standard Controls
• Events: Heterogeneous devices generate
standard events that a dynamic listener
processes
• Actions: OpenFlow channel between controller
and switches controls behavior
16
Refactoring Functions
• Current interfaces: Decisions only about
whether to hide or display complexity
• Instead: Changing where function is placed in
the system can make the system more usable
– Only expose information if it
• Improves situational awareness
• Is actionable
17
Two Case Studies
• Access control in enterprise networks
– Re-implementation of access control on the Georgia
Tech campus network
– Today: Complicated, low-level
– With SDN: Simpler, more flexible
• Usage control in home networks
– Implementation of user controls (e.g., usage cap
management, parental controls) in home networks
– Today: Not possible
– With SDN: Intuitive, simple
18
19
Case Study:
Enterprise Access Control
3. VLAN with Private IP
6. VLAN with Public IP
1. New MAC Addr 2. VQP
7. REBOOT
Web Portal
4. Web
Authentication 5. Authentication
Result
VMPS
Switch
New Host
Problems with Current Architecture
• Access Control is too coarse-grained
– Static, inflexible and prone to misconfigurations
– Need to rely on VLANs to isolate infected machines
• Cannot dynamically remap hosts to different
portions of the network
– Needs a DHCP request which for a windows user
would mean a reboot
• Monitoring is not continuous
20
Express policies that incorporate network dynamics.
21
Handling Dynamics: State Machine
Registration
Authenticated
Operation
Quarantined
Successful
Authentication
Vulnerability detected
Clean after update
Failed Authentication
Infection removed or manually fixed
Georgia Tech Campus Deployment
23
Case Study:
Usage Controls in Home Networks
• Network management in homes is challenging
• One aspect of management: usage control
– Usage cap management
– Parental control
– Bandwidth management
• Idea: Outsource network management/control
– Home router runs OpenFlow switch
– Usage reported to off-site controller
– Controller adjust behavior of traffic flows
24
Usage Cap Management in Homes:
Design and Implementation
• User monitors
behavior and sets
policies with UI
• Resonance
controller
(OpenFlow)
manages policies
and router
behavior
25
Intuitive Usage and Policies
26
Interface design: Bethany Summer
Conclusion: Software-Defined
Network Management
• Many problems result from the fact that
configuration is low-level and distributed
• Resonance: Program the network from a
logically centralized control point.
– Higher-level configuration language
– Handling of dynamic events, heterogeneity
– Enables refactoring of function
• Two case studies
– Access control in enterprise networks
– Usage control in home networks
27

More Related Content

What's hot

What's hot (20)

OpenConfig: collaborating to enable programmable network management
OpenConfig: collaborating to enable programmable network managementOpenConfig: collaborating to enable programmable network management
OpenConfig: collaborating to enable programmable network management
 
Openconfig
OpenconfigOpenconfig
Openconfig
 
Introduction to Data Models & Cisco's NextGen Device Level APIs: an overview
Introduction to Data Models & Cisco's NextGen Device Level APIs: an overviewIntroduction to Data Models & Cisco's NextGen Device Level APIs: an overview
Introduction to Data Models & Cisco's NextGen Device Level APIs: an overview
 
Netconf yang
Netconf yangNetconf yang
Netconf yang
 
NETCONF YANG tutorial
NETCONF YANG tutorialNETCONF YANG tutorial
NETCONF YANG tutorial
 
netconf, restconf, grpc_basic
netconf, restconf, grpc_basicnetconf, restconf, grpc_basic
netconf, restconf, grpc_basic
 
Quick Yang v1.0
Quick Yang v1.0Quick Yang v1.0
Quick Yang v1.0
 
Learning netconf yang from scratch
Learning netconf yang from scratchLearning netconf yang from scratch
Learning netconf yang from scratch
 
WebRTC Infrastructure Design
WebRTC Infrastructure DesignWebRTC Infrastructure Design
WebRTC Infrastructure Design
 
Webinar: Applying REST to Network Management – An Implementor’s View
Webinar: Applying REST to Network Management – An Implementor’s View Webinar: Applying REST to Network Management – An Implementor’s View
Webinar: Applying REST to Network Management – An Implementor’s View
 
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
 
DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
 
Module 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANGModule 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANG
 
Dynamic Service Configuration and Automated Network Configuration with NETCON...
Dynamic Service Configuration and Automated Network Configuration with NETCON...Dynamic Service Configuration and Automated Network Configuration with NETCON...
Dynamic Service Configuration and Automated Network Configuration with NETCON...
 
Tail f - Why ConfD
Tail f - Why ConfDTail f - Why ConfD
Tail f - Why ConfD
 
Getting started with YANG
Getting started with YANGGetting started with YANG
Getting started with YANG
 
Microservice Powered Orchestration
Microservice Powered OrchestrationMicroservice Powered Orchestration
Microservice Powered Orchestration
 
Tail-f - Why NETCONF
Tail-f - Why NETCONFTail-f - Why NETCONF
Tail-f - Why NETCONF
 
ProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center NetworkProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center Network
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
 

Similar to Software-Defined Network Management

Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 

Similar to Software-Defined Network Management (20)

Lithium: Event-Driven Network Control
Lithium: Event-Driven Network ControlLithium: Event-Driven Network Control
Lithium: Event-Driven Network Control
 
4_SDN.pdf
4_SDN.pdf4_SDN.pdf
4_SDN.pdf
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Network management
Network managementNetwork management
Network management
 
unit1.pdf
unit1.pdfunit1.pdf
unit1.pdf
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
E018113036
E018113036E018113036
E018113036
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Software-Defined Networking Layers presentation
Software-Defined Networking Layers presentationSoftware-Defined Networking Layers presentation
Software-Defined Networking Layers presentation
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
SDN Introduction
SDN IntroductionSDN Introduction
SDN Introduction
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdf
 
Open programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devicesOpen programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devices
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
The Need for Complex Analytics from Forwarding Pipelines
The Need for Complex Analytics from Forwarding Pipelines The Need for Complex Analytics from Forwarding Pipelines
The Need for Complex Analytics from Forwarding Pipelines
 

More from Open Networking Summits

[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4
Open Networking Summits
 

More from Open Networking Summits (20)

CORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a DatacenterCORD: Central Office Re-architected as a Datacenter
CORD: Central Office Re-architected as a Datacenter
 
[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4
 
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
 
Learnings from Carrier SDN Deployments
Learnings from Carrier SDN DeploymentsLearnings from Carrier SDN Deployments
Learnings from Carrier SDN Deployments
 
Software Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile WorkplaceSoftware Defined Networking: Enabling The Mobile Workplace
Software Defined Networking: Enabling The Mobile Workplace
 
Application Driven SDN
Application Driven SDNApplication Driven SDN
Application Driven SDN
 
Software Defined Networks Network Function Virtualization Pivotal Technologies
Software Defined Networks Network Function Virtualization Pivotal TechnologiesSoftware Defined Networks Network Function Virtualization Pivotal Technologies
Software Defined Networks Network Function Virtualization Pivotal Technologies
 
NFV & SDN Customer Deployments
NFV & SDN Customer DeploymentsNFV & SDN Customer Deployments
NFV & SDN Customer Deployments
 
Automation of end-to-end QOS
Automation of end-to-end QOSAutomation of end-to-end QOS
Automation of end-to-end QOS
 
Building a Digital Telco
Building a Digital TelcoBuilding a Digital Telco
Building a Digital Telco
 
Spreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesSpreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use cases
 
BeHop : SDN for Dense WiFi Networks
BeHop : SDN for Dense WiFi NetworksBeHop : SDN for Dense WiFi Networks
BeHop : SDN for Dense WiFi Networks
 
Ranges & Cross-Entrance Consistency with OpenFlow
Ranges & Cross-Entrance Consistency with OpenFlowRanges & Cross-Entrance Consistency with OpenFlow
Ranges & Cross-Entrance Consistency with OpenFlow
 
On the Necessity of Time-based Updates in SDN
On the Necessity of Time-based Updates in SDNOn the Necessity of Time-based Updates in SDN
On the Necessity of Time-based Updates in SDN
 
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
Control Exchange Points: Providing QoS-en abled End-to-End Services via SDN-b...
 
ESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDNESPRES: Easy Scheduling and Prioritization for SDN
ESPRES: Easy Scheduling and Prioritization for SDN
 
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATIONSDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
 
SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs
SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANsSoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs
SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs
 
RadioVisor - A Slicing Plane for Radio Access Networks
RadioVisor - A Slicing Plane for Radio Access NetworksRadioVisor - A Slicing Plane for Radio Access Networks
RadioVisor - A Slicing Plane for Radio Access Networks
 
Enabling SDN in old school networks with Software-Controlled Routing Protocols
Enabling SDN in old school networks with Software-Controlled Routing ProtocolsEnabling SDN in old school networks with Software-Controlled Routing Protocols
Enabling SDN in old school networks with Software-Controlled Routing Protocols
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Software-Defined Network Management

  • 1.
  • 2.
  • 3. Software-Defined Network Management Nick Feamster Georgia Tech (with Joon Kim, Marshini Chetty, Srikanth Sundaresan)
  • 4. Network Management is Hard! • Manual, error-prone, complex • Network configurations change continually – Provisioning of new users and devices – Adjustments to access control – Response to incidents • Changes result in errors
  • 5. Software Defined Network Management • Software defined networking makes it easier for network operators to evolve network capabilities • Can SDN also help network operators manage their networks, once they are deployed? – Campus/Enterprise networks – Home networks 3
  • 6. Why is network management so hard today? 4
  • 7. Configuration is Complex, Low-Level • A campus network may have – More than one million lines of configuration – Thousands of devices – Hundreds of thousands of changes every year • Home networks can be complex, too 5
  • 8. Network State is Dynamic • Enterprise and campus networks are dynamic – Hosts continually coming and leaving – Hosts may become infected • Today, configuration is static, and poorly integrated with the network • Instead: Dynamic network configuration – Track state of each host on the network – Update forwarding state of switches per host as these states change 6
  • 9. Too Much Complexity is Exposed
  • 10. Network Devices are Heterogeneous • Many components “bolted on” after the fact – Campus: Firewalls, VLANs, Web authentication portal, vulnerability scanner – Home: Set-top boxes, cameras, laptops, desktops, phones • Separate (and competing) devices for performing different functions – Registration (based on MAC addresses) – Vulnerability scanning – Filtering – Rate limiting 8
  • 11. Retrofit: Configuration Checkers Intermediate Representation Correctness Specification Constraints Faults Distributed router configurations • Downloaded and used by hundreds of ISPs • Configuration faults found in every network Feamster and Balakrishnan, Detecting BGP Configuration Faults with Static Analysis. Proc NSDI, 2005. Best Paper Award
  • 12. Better: Software-Defined Networking • Distributed configuration is a bad idea • Instead: Control the network from a logically centralized system • Policies become high-level programs 10 Feamster et al. The Case for Separating Routing from Routers. Proc. SIGCOMM FDNA, 2004 Network RCP 2004 2005 Decision Dissemination Discovery Data 2008
  • 13. Resonance: Don’t Configure the Network, Program It! • Today: Configuring networks with low-level, distributed, vendor-specific configuration • With SDN: Writing network policies and protocols as programs – More expressive – More predictable – More evolvable – More usable 11
  • 14. Resonance: Approach 12 Challenge Approach Dynamic State Event Listener w/State Machine Low-Level Configuration High-Level Policy Language Exposed Complexity Refactoring Functions Heterogeneity Standard Control Protocols
  • 15. Processing Dynamic Events • Idea: Express network policies as event-based programs. 13 Events Actions • Policies can be expressed as centralized programs
  • 16. State Machines • Step 1: Associate each host with generic states and security classes • Step 2: Specify a state machine for moving machines from one state to the other • Step 3: Control forwarding state in switches based on the current state of each machine – Actions from other network elements, and distributed inference, can affect network state 14
  • 17. High-Level Policy Language • Defines states, actions, transitions • High-level, logically centralized – Easier testing and analysis – Less complex • Design is still in- progress 15
  • 18. Standard Controls • Events: Heterogeneous devices generate standard events that a dynamic listener processes • Actions: OpenFlow channel between controller and switches controls behavior 16
  • 19. Refactoring Functions • Current interfaces: Decisions only about whether to hide or display complexity • Instead: Changing where function is placed in the system can make the system more usable – Only expose information if it • Improves situational awareness • Is actionable 17
  • 20. Two Case Studies • Access control in enterprise networks – Re-implementation of access control on the Georgia Tech campus network – Today: Complicated, low-level – With SDN: Simpler, more flexible • Usage control in home networks – Implementation of user controls (e.g., usage cap management, parental controls) in home networks – Today: Not possible – With SDN: Intuitive, simple 18
  • 21. 19 Case Study: Enterprise Access Control 3. VLAN with Private IP 6. VLAN with Public IP 1. New MAC Addr 2. VQP 7. REBOOT Web Portal 4. Web Authentication 5. Authentication Result VMPS Switch New Host
  • 22. Problems with Current Architecture • Access Control is too coarse-grained – Static, inflexible and prone to misconfigurations – Need to rely on VLANs to isolate infected machines • Cannot dynamically remap hosts to different portions of the network – Needs a DHCP request which for a windows user would mean a reboot • Monitoring is not continuous 20 Express policies that incorporate network dynamics.
  • 23. 21 Handling Dynamics: State Machine Registration Authenticated Operation Quarantined Successful Authentication Vulnerability detected Clean after update Failed Authentication Infection removed or manually fixed
  • 24. Georgia Tech Campus Deployment 23
  • 25. Case Study: Usage Controls in Home Networks • Network management in homes is challenging • One aspect of management: usage control – Usage cap management – Parental control – Bandwidth management • Idea: Outsource network management/control – Home router runs OpenFlow switch – Usage reported to off-site controller – Controller adjust behavior of traffic flows 24
  • 26. Usage Cap Management in Homes: Design and Implementation • User monitors behavior and sets policies with UI • Resonance controller (OpenFlow) manages policies and router behavior 25
  • 27. Intuitive Usage and Policies 26 Interface design: Bethany Summer
  • 28. Conclusion: Software-Defined Network Management • Many problems result from the fact that configuration is low-level and distributed • Resonance: Program the network from a logically centralized control point. – Higher-level configuration language – Handling of dynamic events, heterogeneity – Enables refactoring of function • Two case studies – Access control in enterprise networks – Usage control in home networks 27