SlideShare a Scribd company logo
INTRODUCTION TO   PENFLOW
STATEMENT OF PRODUCT DIRECTION




This statement of product direction sets forth Juniper Networks‟
current intention and is subject to change at any time without
notice. No purchases are contingent upon Juniper Networks
delivering any feature or functionality depicted in this
presentation.




2                     Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW – WHAT IS IT?
Openflow compromises an architecture and a protocol
In a traditional networking device, the control processes and
forwarding functionality reside on the network device

                                                                                                      penflow
     Control                                                           Control            penflow   Controller


    Forwarding                                                          Forwarding

               Traditional                Openflow-enabled

In the Openflow architecture, an interface is created on the
network device through which an external control process known
as a „controller‟, is able the program the packet matching and
forwarding operations of the networking device

3                            Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
OPENFLOW – WHAT IS IT?
The Openflow protocol defines
     A standardized API and communication method between the external
      controller and Openflow process on the networking device
     The use of „Flow-tables‟ held on the networking device which are
      populated by the external controller which are used for matching and
      forwarding packets
Openflow Flow-tables contain
     Header Fields – fields against which a packet can be matched
     Counters – statistics reporting capabilities
     Actions – defining how the packet should be treated (forward, drop,
      modify)

There is no use of static configuration or cli/xml-based programming
via Openflow, nor does Openflow provide functionality to boot or
maintain the networking device



4                          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW 1.0 FLOW TABLE & FIELDS
                    Ingress           Ethernet                        VLAN                          IP                       TCP/UDP
    Header Fields     Port    SA         DA         Type         ID      Priority      SA      DA        Proto   TOS        Src   Dst




                         Classifier                      Action                        Statistics
                         Classifier                      Action                        Statistics
    Flow Table           Classifier                      Action                        Statistics
    OF1.0 style




                                                             …
                         Classifier                      Action                        Statistics

                                                                       Physical Port
                                                                                      ALL
                                                                               CONTROLLER
    Actions                                 Forward            Virtual
                                                                                    LOCAL
                                                                Port
                                                                                    TABLE
                                                                                    IN_PORT
                                                                                                         Mandatory Action
                                                                      Drop
                                                               Virtual              NORMAL                Optional Action
                                            Forward
                                                                Port                FLOOD
                                                                Enqueue
                                                               Modify Field

5                                  Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

                                                                                                                     Actions
OPENFLOW – WHAT IS IT?
Two components
     Openflow controller
       Controls one or more switches
       Computes paths, maintains state, formulates flows and programs
        Openflow Switches
     Openflow Switch
       Receives commands (flow entries, queries) from the Openflow
        controller in order to populate entries in the flow-table
       Holds the flow-table in volatile memory

Flow-table population can occur in two modes
     Reactive – Flow-table programmed in response to received packet
     Proactive – Flow-table is populated with pre-provisioned entries



6                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MODES OF OPERATION

    Reactive – Data plane driven                                            Pro-active – Configuration driven
                                                                            •        Like Static routes & LSPs
            Base principle of flow caching
                                                                            •        Not stored in configuration file



              Controller         FIB                                                  Controller           FIB

                                       C
                            4



                      Switch     FIB                                                              Switch   FIB

                1                2                3                                      1                 2            3


        1.     Receive packet                                                   1.     Receive packet
        2.     Perform lookup in local FIB                                      2.     Perform lookup in local FIB
        3.     Hit: forward to port                                             3.     Hit: forward to port
        4.     Miss: forward to controller                                      4.     Miss: DROP
                 Controller inspects packet
                 Performs route computation
                 C: Inserts new flow entry

7                                          Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
OPENFLOW SWITCH / NETWORK DESIGN

                                   Switch Control Plane
                                          Applications                                                  Switch Control Plane:
                                                                                                        • Logically centralized
                                       OpenFlow Controller
                                                                                                        • Physically distributed in one
                                                                                                          or more compute devices
                                                                                                        • Embedded OF Controller to
                        OpenFlow                                                                          communicate with switches
                        Protocol

                                                                          penflow switch
                                  penflow switch


                penflow switch                     penflow switch



                                 penflow switch                          penflow switch




Source: OpenFlow.org




8                                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE ISSUE:
APPLICATIONS DON’T COMMUNICATE WITH THE NETWORK

           THE HUMAN WORLD                                                           THE NETWORK WORLD


          Network Aware Applications:                                                     Application Aware Networking:
          Applications blindly probe the network                                          Networks spy on traffic to try to
          to understand what it can deliver                                               understand applications


             Game ping-stats, Doppler, Geo-                                                  Deep Packet Inspection, Deep
              location, whois, proprietary                                                     Flow Inspection
              codecs, proprietary control
                                                                                              Approximate application by
              channels in VBRB
                                                                                               fingerprinting
             Approximate topology/location
                                                                                              Service specific overlay topologies
              thru:
                                                                                              Application-based Quality of
             Active/game-based broadcast,
                                                                                               Service profiles
              passive derivation



      Current approximation techniques are barely sufficient and inefficient
  9                                Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW HELPS BY ENABLING NETWORK
          PROGRAMMABILITY FOR COMMUNICATION




       APPLICATION                     NETWORK                               NETWORK                       APPLICATION



         Applications made better by                                    Networks made better by information
          information from network                                               from application
      Understanding of end-device                                           Bandwidth and resource optimization
       capabilities                                                          New service topologies
      Real location / topology                                              Security identification
      Adjust behavior to real-time usage                                    Service-specific packet treatment
      Billing granularity




     Flexibility of service placement                                                Control of resources from
                                                                                           applications

10                                 Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
HOW DO YOU MAKE THIS HAPPEN?
THE APPLICATION WORLD                                                                             THE APPLICATION WORLD

                                                  Real-time topology
                                                    understanding
                                                   (ALTO, BGP-TE)                                    SI       ISV      Service             Research             Enterprise
                                                                                                   Partner   Partner   Provider            Institution          Customer




                                                Steering traffic through                                        Web Services API
                                                    optimal paths
                                                        (PCE)
                             Network                                                                    Orchestration Across Networks
                          Programmability
                                               Selecting specific traffic




                                                                                                                                                                   OpenFlow
                                                                                                                                  BGP-TE
                                                    (OpenFlow)




                                                                                                                          ALTO




                                                                                                                                                         Mgmt
                                                                                                                                              PCE
                                                                                                   Network APIs




                                                                                                                                                                              …
                                              Opening more touchpoints
                                             to control: Gateways, billing
                                                  collectors, service
                                              appliances, CDN, DPI/IDP


THE NETWORK WORLD                                                                                   THE NETWORK WORLD
   11
  Programmable Networking is SFW            Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
AN EXAMPLE: BE “IN THE NETWORK”
Weak architecture = one-legged tap dancing                             Continuous, real-time streaming of surrounding
                                                                             content, resources, places, people



Where am I?                              I am here!
                                                                                                                           And this is
                                                                        You’re here!                                      around you:
                                    Active broadcast                    <access>
                                    Game broadcast                                                                        <content>
                                                                        <capability>                                      <resources>
                                    Passive                               <BW>
                                     derivation                                                                             <places>
                                                                          <profile>                                         <people>
                                                                                                                               …




         !     “Above the topology”
              “Visualize the topology”
               “Below the topology”
                                                                                                 “In the topology”



      Low value in navigational coordinates                                                       APPLICATION   NETWORK




12                                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
WANT MORE ON OPENFLOW?
Useful URLs:
Open Networking Foundation https://www.opennetworking.org/
Openflow Whitepaper
http://www.openflow.org//documents/openflow-wp-latest.pdf
Openflow protocol
https://www.opennetworking.org/standards/open-flow/50-
openflow




13                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OpenFlow Overview

More Related Content

What's hot

IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
Seraphic Nazir
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
Cisco Canada
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
Unisys Corporation
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecurityExploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
 
High Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft AzureHigh Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft Azure
Sanjay Willie
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
Sounil Yu
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Sounil Yu
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Priyanka Aash
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 

What's hot (20)

IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecurityExploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
High Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft AzureHigh Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft Azure
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Viewers also liked

Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVKingston Smiler
 
OpenFlow Group Table
OpenFlow Group TableOpenFlow Group Table
OpenFlow Group Table
Toshiki Tsuboi
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1
Radhika Hirannaiah
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
Dave Neary
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
rjain51
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
rjain51
 

Viewers also liked (6)

Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFV
 
OpenFlow Group Table
OpenFlow Group TableOpenFlow Group Table
OpenFlow Group Table
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 

Similar to OpenFlow Overview

Hybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF SessionHybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF Session
Juniper Developer Resources Cooney
 
Open stack with_openflowsdn-torii
Open stack with_openflowsdn-toriiOpen stack with_openflowsdn-torii
Open stack with_openflowsdn-torii
Hui Cheng
 
Openflow overview
Openflow overviewOpenflow overview
Openflow overview
openflowhub
 
Developing SDN apps in Ryu
Developing SDN apps in RyuDeveloping SDN apps in Ryu
Developing SDN apps in Ryu
Che Wei Lin
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overview
mscohen02
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
Ja-seop Kwak
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerHolger Winkelmann
 
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Systems
 
Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC DVClub
 
Introduction to flow analysis
Introduction to flow analysisIntroduction to flow analysis
Introduction to flow analysis
ProQSys
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleLuis Nagasako
 
Alcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg ErlichAlcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent Cloud
 
OpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGOpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGTail-f Systems
 
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 TaiwanPlugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
Rack Lin
 
Openlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sionOpenlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sion
Ccie Light
 
XS Boston 2008 XenLoop
XS Boston 2008 XenLoopXS Boston 2008 XenLoop
XS Boston 2008 XenLoop
The Linux Foundation
 
Sdn and open flow tutorial 4
Sdn and open flow tutorial 4Sdn and open flow tutorial 4
Sdn and open flow tutorial 4
UmaMahesh Sistu
 
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」Sho Shimizu
 

Similar to OpenFlow Overview (20)

Hybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF SessionHybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF Session
 
Open stack with_openflowsdn-torii
Open stack with_openflowsdn-toriiOpen stack with_openflowsdn-torii
Open stack with_openflowsdn-torii
 
Openflow overview
Openflow overviewOpenflow overview
Openflow overview
 
Developing SDN apps in Ryu
Developing SDN apps in RyuDeveloping SDN apps in Ryu
Developing SDN apps in Ryu
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overview
 
PLC
PLCPLC
PLC
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow Controller
 
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
 
Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC
 
Introduction to flow analysis
Introduction to flow analysisIntroduction to flow analysis
Introduction to flow analysis
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_module
 
SDN – Hybrid architecture
SDN – Hybrid architectureSDN – Hybrid architecture
SDN – Hybrid architecture
 
Alcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg ErlichAlcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg Erlich
 
OpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGOpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANG
 
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 TaiwanPlugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
 
Openlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sionOpenlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sion
 
XS Boston 2008 XenLoop
XS Boston 2008 XenLoopXS Boston 2008 XenLoop
XS Boston 2008 XenLoop
 
Sdn and open flow tutorial 4
Sdn and open flow tutorial 4Sdn and open flow tutorial 4
Sdn and open flow tutorial 4
 
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
 

More from Juniper Developer Resources Cooney

An In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDKAn In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDK
Juniper Developer Resources Cooney
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
Juniper Developer Resources Cooney
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
Juniper Developer Resources Cooney
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
Juniper Developer Resources Cooney
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
Juniper Developer Resources Cooney
 
Junos Space SDK
Junos Space SDKJunos Space SDK
Junos SDK Data Sheet
Junos SDK Data SheetJunos SDK Data Sheet
Macadamian And Junos SDK
Macadamian And Junos SDKMacadamian And Junos SDK
Macadamian And Junos SDK
Juniper Developer Resources Cooney
 
For Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about ProgrammabilityFor Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about Programmability
Juniper Developer Resources Cooney
 
Joulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success StoryJoulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success Story
Juniper Developer Resources Cooney
 
Junos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for DevelopersJunos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for Developers
Juniper Developer Resources Cooney
 
Shifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network ProgrammabilityShifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network Programmability
Juniper Developer Resources Cooney
 
The New Network is Programmable with Junos
The New Network is Programmable with JunosThe New Network is Programmable with Junos
The New Network is Programmable with Junos
Juniper Developer Resources Cooney
 

More from Juniper Developer Resources Cooney (13)

An In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDKAn In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDK
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
Junos Space SDK
Junos Space SDKJunos Space SDK
Junos Space SDK
 
Junos SDK Data Sheet
Junos SDK Data SheetJunos SDK Data Sheet
Junos SDK Data Sheet
 
Macadamian And Junos SDK
Macadamian And Junos SDKMacadamian And Junos SDK
Macadamian And Junos SDK
 
For Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about ProgrammabilityFor Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about Programmability
 
Joulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success StoryJoulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success Story
 
Junos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for DevelopersJunos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for Developers
 
Shifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network ProgrammabilityShifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network Programmability
 
The New Network is Programmable with Junos
The New Network is Programmable with JunosThe New Network is Programmable with Junos
The New Network is Programmable with Junos
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

OpenFlow Overview

  • 1. INTRODUCTION TO PENFLOW
  • 2. STATEMENT OF PRODUCT DIRECTION This statement of product direction sets forth Juniper Networks‟ current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted in this presentation. 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. OPENFLOW – WHAT IS IT? Openflow compromises an architecture and a protocol In a traditional networking device, the control processes and forwarding functionality reside on the network device penflow Control Control penflow Controller Forwarding Forwarding Traditional Openflow-enabled In the Openflow architecture, an interface is created on the network device through which an external control process known as a „controller‟, is able the program the packet matching and forwarding operations of the networking device 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. OPENFLOW – WHAT IS IT? The Openflow protocol defines  A standardized API and communication method between the external controller and Openflow process on the networking device  The use of „Flow-tables‟ held on the networking device which are populated by the external controller which are used for matching and forwarding packets Openflow Flow-tables contain  Header Fields – fields against which a packet can be matched  Counters – statistics reporting capabilities  Actions – defining how the packet should be treated (forward, drop, modify) There is no use of static configuration or cli/xml-based programming via Openflow, nor does Openflow provide functionality to boot or maintain the networking device 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. OPENFLOW 1.0 FLOW TABLE & FIELDS Ingress Ethernet VLAN IP TCP/UDP Header Fields Port SA DA Type ID Priority SA DA Proto TOS Src Dst Classifier Action Statistics Classifier Action Statistics Flow Table Classifier Action Statistics OF1.0 style … Classifier Action Statistics Physical Port ALL CONTROLLER Actions Forward Virtual LOCAL Port TABLE IN_PORT Mandatory Action Drop Virtual NORMAL Optional Action Forward Port FLOOD Enqueue Modify Field 5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Actions
  • 6. OPENFLOW – WHAT IS IT? Two components  Openflow controller  Controls one or more switches  Computes paths, maintains state, formulates flows and programs Openflow Switches  Openflow Switch  Receives commands (flow entries, queries) from the Openflow controller in order to populate entries in the flow-table  Holds the flow-table in volatile memory Flow-table population can occur in two modes  Reactive – Flow-table programmed in response to received packet  Proactive – Flow-table is populated with pre-provisioned entries 6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 7. MODES OF OPERATION Reactive – Data plane driven Pro-active – Configuration driven • Like Static routes & LSPs  Base principle of flow caching • Not stored in configuration file Controller FIB Controller FIB C 4 Switch FIB Switch FIB 1 2 3 1 2 3 1. Receive packet 1. Receive packet 2. Perform lookup in local FIB 2. Perform lookup in local FIB 3. Hit: forward to port 3. Hit: forward to port 4. Miss: forward to controller 4. Miss: DROP  Controller inspects packet  Performs route computation  C: Inserts new flow entry 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. OPENFLOW SWITCH / NETWORK DESIGN Switch Control Plane Applications Switch Control Plane: • Logically centralized OpenFlow Controller • Physically distributed in one or more compute devices • Embedded OF Controller to OpenFlow communicate with switches Protocol penflow switch penflow switch penflow switch penflow switch penflow switch penflow switch Source: OpenFlow.org 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. THE ISSUE: APPLICATIONS DON’T COMMUNICATE WITH THE NETWORK THE HUMAN WORLD THE NETWORK WORLD Network Aware Applications: Application Aware Networking: Applications blindly probe the network Networks spy on traffic to try to to understand what it can deliver understand applications  Game ping-stats, Doppler, Geo-  Deep Packet Inspection, Deep location, whois, proprietary Flow Inspection codecs, proprietary control  Approximate application by channels in VBRB fingerprinting  Approximate topology/location  Service specific overlay topologies thru:  Application-based Quality of  Active/game-based broadcast, Service profiles passive derivation Current approximation techniques are barely sufficient and inefficient 9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 10. OPENFLOW HELPS BY ENABLING NETWORK PROGRAMMABILITY FOR COMMUNICATION APPLICATION NETWORK NETWORK APPLICATION Applications made better by Networks made better by information information from network from application  Understanding of end-device  Bandwidth and resource optimization capabilities  New service topologies  Real location / topology  Security identification  Adjust behavior to real-time usage  Service-specific packet treatment  Billing granularity Flexibility of service placement Control of resources from applications 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 11. HOW DO YOU MAKE THIS HAPPEN? THE APPLICATION WORLD THE APPLICATION WORLD Real-time topology understanding (ALTO, BGP-TE) SI ISV Service Research Enterprise Partner Partner Provider Institution Customer Steering traffic through Web Services API optimal paths (PCE) Network Orchestration Across Networks Programmability Selecting specific traffic OpenFlow BGP-TE (OpenFlow) ALTO Mgmt PCE Network APIs … Opening more touchpoints to control: Gateways, billing collectors, service appliances, CDN, DPI/IDP THE NETWORK WORLD THE NETWORK WORLD 11 Programmable Networking is SFW Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 12. AN EXAMPLE: BE “IN THE NETWORK” Weak architecture = one-legged tap dancing Continuous, real-time streaming of surrounding content, resources, places, people Where am I? I am here! And this is You’re here! around you:  Active broadcast <access>  Game broadcast <content> <capability> <resources>  Passive <BW> derivation <places> <profile> <people> … ! “Above the topology” “Visualize the topology” “Below the topology” “In the topology” Low value in navigational coordinates APPLICATION NETWORK 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 13. WANT MORE ON OPENFLOW? Useful URLs: Open Networking Foundation https://www.opennetworking.org/ Openflow Whitepaper http://www.openflow.org//documents/openflow-wp-latest.pdf Openflow protocol https://www.opennetworking.org/standards/open-flow/50- openflow 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Editor's Notes

  1. This is just an examples discussion. Imagine what you could do… what if…Bring in architectural changes over last few years … IGP Generic application information can be carried. Separate from routing. You don’t have to break everything. You can target specific devices in the network (ak flooding) …Key is “Network, User and Session Telemetry” for apps and being able to program the network beyond session logon and working within the constraints of IF-Map, Radius/Diameter, COPs, PCMM. Now it’s possible for multiple sources to create a service profile and update it in real time
  2. This is an easy one. Foursquare on steroids.Current, weak architecture:“ above the topology&quot;  - user-interactive layer - (Loopt, burbn, BooYay, Gowalla, micello, foursquare)&quot;on the topology&quot; - visual representation of topo - (SimpleGeo, motricity, tele atlas, navteq, geo api)&quot;below the topology&quot; - HW/SW layer - (android, IOS - Apple, Skyhook, SiRF).These categories are to describe functionality that is beyond tweeting your location, checking-in and geo marking in social media map-ups. As an analogy to the current fubared&apos;ness of the situation ... using straight mobile phone GSM coordinates for marking your location in a social media interface is merely noting the navigational coordinates that has little to do with the interaction/exchange/communication of information of a social network on the internet. It&apos;s less useful that what a dog leaves on a fire hydrant.Advert: SocialbombCommerce:Comm: BlockchalkContent: NavxAnalytics:Social:Gowalla,Loopthis means that the quality of interaction can abandon the three common modes of topologic interaction listed above and enter continuous real time updates and streaming. Really the point in the non-exhaustive list of topo-interested APIs/platforms above is that they are in fact the *orchestration* platforms that &quot;app developers&quot; that go to J1 know about.