Revisiting Ethernet: Plug-and-play made scalable and efficient

Slides:



Advertisements
Similar presentations
Interconnection: Switching and Bridging
Advertisements

Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Shortest Path Bridging IEEE 802
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
ARP: Address Resolution Protocol
Data Center Fabrics. Forwarding Today Layer 3 approach: – Assign IP addresses to hosts hierarchically based on their directly connected switch. – Use.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim, and Jennifer Rexford Princeton University.
Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Chang Kim, and Jennifer Rexford Princeton.
Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim and Jennifer Rexford Princeton University.
Projects Related to Coronet Jennifer Rexford Princeton University
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Tesseract A 4D Network Control Plane
COS 461: Computer Networks
A Scalable, Commodity Data Center Network Architecture.
SEATTLE - SEATTLE - A Scalable Ethernet Architecture for Large Enterprises T – Special Course in Future Internet Technologies M.Sc.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Homework Assignment #1 1. Homework Assignment Part 1: LAN setup –All nodes are hosts (including middle nodes) –Each link is its own LAN, with its own.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
“Hashing Out” the Future of Enterprise and Data-Center Networks Jennifer Rexford Princeton University Joint with Changhoon.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Objectives After completing this chapter you will be able to: Describe the different types of bridging: Transparent, Source Route and Translate Describe.
CS470 Computer Networking Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 4. Internetworking.
1 Chapter 4: Internetworking (Introduction) Dr. Rocky K. C. Chang 16 March 2004.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Introduction to Networks
Chapter 16– Connecting LANs
Scaling the Network Chapters 3-4 Part 2
IP: Addressing, ARP, Routing
Link Layer 5.1 Introduction and services
Chapter 21 Address Mapping
Routing Jennifer Rexford.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
MAC Addresses and ARP 32-bit IP address:
Bridging.
3. Internetworking (part 2: switched LANs)
ICMP ICMP – Internet Control Message Protocol
ARP: Address Resolution Protocol
Introduction to Networking
IS3120 Network Communications Infrastructure
Intra-Domain Routing Jacob Strauss September 14, 2006.
Introduction to Networks
Module 8: Ethernet Switching
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Dr. Rocky K. C. Chang 23 February 2004
EVPN a very short introduction
Scaling the Network: The Internet Protocol
Revisiting Ethernet: Plug-and-play made scalable and efficient
Ch 17 - Binding Protocol Addresses
Implementing Multicast
Reconciling Zero-conf with Efficiency in Enterprises
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Revisiting Ethernet: Plug-and-play made scalable and efficient

An “All Ethernet” Enterprise Network? “All Ethernet” makes network management easier Zero-configuration of end-hosts and network due to Flat addressing Self-learning Location independent and permanent addresses also simplify Host mobility Network troubleshooting Access-control policies

But, Ethernet bridging does not scale Flooding-based delivery Frames to unknown destinations are flooded Broadcasting for basic service Bootstrapping relies on broadcasting Vulnerable to resource exhaustion attacks Inefficient forwarding paths Loops are fatal due to broadcast storms; use the STP Forwarding along a single tree leads to inefficiency

State of the Practice: A Hybrid Architecture Enterprise networks comprised of Ethernet-based IP subnets interconnected by routers Ethernet Bridging - Flat addressing - Self-learning - Flooding - Forwarding along a tree R R IP Routing - Hierarchical addressing - Subnet configuration - Host configuration - Forwarding along shortest paths R R R

Motivation Neither bridging nor routing is satisfactory. Can’t we take only the best of each? Architectures Features Ethernet Bridging IP Routing Ease of configuration   Optimality in addressing Mobility support Path efficiency Load distribution Convergence speed Tolerance to loop SEATTLE 

Avoiding Flooding Bridging uses flooding as a routing scheme Unicast frames to unknown destinations are flooded Does not scale to a large network Objective #1: Unicast unicast traffic Need a control-plane mechanism to discover and disseminate hosts’ location information “Send it everywhere! At least, they’ll learn where the source is.” “Don’t know where destination is.”

Restraining Broadcasting Liberal use of broadcasting for bootstrapping (DHCP and ARP) Broadcasting is a vestige of shared-medium Ethernet Very serious overhead in switched networks Objective #2: Support unicast-based bootstrapping Need a directory service Sub-objective #2.1: Support general broadcast However, handling broadcast should be more scalable

Keeping Forwarding Tables Small Flooding and self-learning lead to unnecessarily large forwarding tables Large tables are not only inefficient, but also dangerous Objective #3: Install hosts’ location information only when and where it is needed Need a reactive resolution scheme Enterprise traffic patterns are better-suited to reactive resolution

Ensuring Optimal Forwarding Paths Spanning tree avoids broadcast storms. But, forwarding along a single tree is inefficient. Poor load balancing and longer paths Multiple spanning trees are insufficient and expensive Objective #4: Utilize shortest paths Need a routing protocol Sub-objective #4.1: Prevent broadcast storms Need an alternative measure to prevent broadcast storms

Backwards Compatibility Objective #5: Do not modify end-hosts From end-hosts’ view, network must work the same way End hosts should Use the same protocol stacks and applications Not be forced to run an additional protocol

SEATTLE in a Slide Flat addressing of end-hosts Switches use hosts’ MAC addresses for routing Ensures zero-configuration and backwards-compatibility (Obj # 5) Automated host discovery at the edge Switches detect the arrival/departure of hosts Obviates flooding and ensures scalability (Obj #1, 5) Hash-based on-demand resolution Hash deterministically maps a host to a switch Switches resolve end-hosts’ location and address via hashing Ensures scalability (Obj #1, 2, 3) Shortest-path forwarding between switches Switches run link-state routing with only their own connectivity info Ensures data-plane efficiency (Obj #4)

How does it work? y x C A D B E Optimized forwarding Deliver to x directly from D to A Deliver to x y x C Host discovery or registration A Traffic to x Tunnel to egress node, A Hash (F(x) = B) Tunnel to relay switch, B Hash (F(x) = B) D Entire enterprise (A large single IP subnet) LS core Notifying <x, A> to D B Store <x, A> at B Switches E End-hosts Control flow Data flow

cut-through forwarding Terminology Dst x < x, A > cut-through forwarding Src y A Ingress Egress D < x, A > Ingress applies a cache eviction policy to this entry Relay (for x) B < x, A >

Responding to Topology Changes Consistent Hash [Karger et al.,STOC’97] minimizes re-registration h h A E h h F B h h h h h D h C

Every switch on a ring is Single Hop Look-up y sends traffic to x y x A E Every switch on a ring is logically one hop away B F(x) D C

Responding to Host Mobility Old Dst < x, G > x < x, A > Src y when cut-through forwarding is used A D < x, A > < x, G > Relay (for x) G B New Dst < x, G > < x, A > < x, G >

Unicast-based Bootstrapping ARP Ethernet: Broadcast requests SEATTLE: Hash-based on-demand address resolution Exactly the same mechanism as location resolution Proxy resolution by ingress switches via unicasting DHCP Ethernet: Broadcast requests and replies SEATTLE: Utilize DHCP relay agent (RFC 2131)

Conclusions SEATTLE is a plug-and-playable enterprise architecture ensuring both scalability and efficiency Enabling design choices Hash-based location management Reactive location resolution and caching Shortest-path forwarding Lessons Trading a little data-plane efficiency for huge control-plane scalability makes a qualitatively different system Traffic patterns (small static COIs, and short flow interarrival times) are our friends