Duke’s SDN Journey CSG Winter 2015 – 01/14/15 – First Session.

Slides:



Advertisements
Similar presentations
Duke University SDN Approaches and Uses GENI CIO Workshop – July 12, 2012.
Advertisements

NETWORK TRANSFORMATION THROUGH VIRTUALIZATION
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
1 IU Campus GENI/Openflow Experience Matt Davy Quilt Meeting, July 22nd 2010.
UTC-N Overview of Campus Networks Design.
Guide to Network Defense and Countermeasures Second Edition
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Title or Title Event/Date Presenter, PresenterTitle, Internet2 Network Virtualization & the Internet2 Innovation Platform To keep our community at the.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Campus LAN Overview. Objectives Identify the technical considerations in campus LAN design Identify the business considerations in campus LAN design Describe.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Internet2 Network: Convergence of Innovation, SDN, and Cloud Computing Eric Boyd Senior Director of Strategic Projects.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Firewall Configuration Strategies
Ch.6 - Switches CCNA 3 version 3.0.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
COS 461: Computer Networks
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
We will be covering VLANs this week. In addition we will do a practical involving setting up a router and how to create a VLAN.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Data Center Network Redesign using SDN
Chapter 1: Hierarchical Network Design
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
Barracuda Load Balancer Server Availability and Scalability.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Software-Defined Networks Jennifer Rexford Princeton University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Enterprise Architecture and Infrastructure Progress Report for Committee on Technology and Architecture March 2012 Mark Day Dept. of Radiology & Biomedical.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Chapter 8: Virtual LAN (VLAN)
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
Operating Wide-Area Ethernet Networks Matt Davy Global NOC Matt Davy Global NOC.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Internet Protocol Storage Area Networks (IP SAN)
Exploration 3 Chapter 1. Access layer The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest.
Slide 1 E-Science: The Impact of Science DMZs on Research Presenter: Alex Berryman Performance Engineer, OARnet Paul Schopis, Marcio Faerman.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
100GE Upgrades at FNAL Phil DeMar; Andrey Bobyshev CHEP 2015 April 14, 2015.
Chapter-1 LAN Design. Introduction Hierarchical network When building a LAN that satisfies the needs of a small- or medium-sized business, your plan.
UNM SCIENCE DMZ Sean Taylor Senior Network Engineer.
Network Concepts.
CompTIA Security+ Study Guide (SY0-401)
Lab A: Planning an Installation
SECURITY ZONES.
Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes
Virtual Local Area Networks (VLANs) Part I
Semester 4 - Chapter 3 – WAN Design
Planning and Troubleshooting Routing and Switching
Operating Wide-Area Ethernet Networks
Chapter 5: Inter-VLAN Routing
Introduction to Networks
IS3120 Network Communications Infrastructure
CompTIA Security+ Study Guide (SY0-401)
Module 5 - Switches CCNA 3 version 3.0.
Routing and Switching Essentials v6.0
Internet and Web Simple client-server model
Specialized Cloud Architectures
Presentation transcript:

Duke’s SDN Journey CSG Winter 2015 – 01/14/15 – First Session

Part 1 - Planning Definitions Infrastructure Considerations Use Cases Service Delivery / Management Considerations User Engagement

Part 2 – Rollout Strategies: Benefits & Gotchas After the break and Mark’s Demo Infrastructure Readiness Operational Readiness Staff Readiness – Network, DevOps, Security Culture Services/System Security Controller Selection(s) Rule Management

Definitions SDN at Duke is the implementation of an OpenFlow software controller that manages network traffic flow on a set of network devices. It is focused on the edge of the network more than traffic within a data center. The primary goal is to improve the speed, reliability, and overall performance of the network used by researchers.

What Is The Current State at Duke? SDN Switches deployed in production Hub and Spoke Model Production controller – Ryu based (forking our code – Vex?) Production rule manager – SwitchBoard (Mark to Demo) Funding through EAGER and CC-NIE perfSONAR nodes deployed across campus In the middle of upgrading to new version (Puppet’izing) Efforts led to redesign of Duke core network Duke uses an MPLS core and can switch to a VRF easily – so routing is everywhere

Infrastructure Considerations Dedicated Science Network? Converged/Unified Network? Fiber Infrastructure? Needs at the Core? Needs at the Edge?

Planning For SDN – Lessons Learned At Duke Test, Test, Test in controlled fashion perfSONAR is your friend (more about that later) Oversubscription – Accidental or Intentional Span Ports, Layer 2/3 Domains 10G Cannons aimed at your network Measurement of Real Bandwidth Availability Firewalls – what are the real limits – per stream / overall How do they fall over / fail? IPS – where is traffic inspected, white listing, how often? How do they fall over / fail open/closed? IDS – Passive

Planning for SDN (Continued) It’s another network upgrade But it’s not fully documented And it’s changing Keep the core a significant multiplier of the edge QOS Is Important if you have converged services Voice, Video Use case documentation Bypass Network / Large Predictable Data Flows Science DMZ Protected Data Data Migration Health System – University “Bridges”

General SDN Model At Duke Integrated – hosts connect to A network Hybrid – network fabric has multiple options for routing Did not want to build, deploy, and manage a separate infrastructure Leverage MPLS Core and VRFs to route traffic to production network

General SDN Model At Duke (Continued) Hosts connect to SDN Enabled switches at 10G Default path for traffic is to the production network Application applies rules to controller to route certain traffic over alternate path. Typically subnet to subnet or host to host VLAN tagging supported Want to add more functionality (port restrictions, VLAN flipping)

Use Case –Science DMZ Traffic coming from off campus to a specially routed IP address Route traffic to SDN Hub If rule setup – allow host to communicate w/o any additional inspection/overhead/firewalls

Use Case - AL2S Path Allow for dynamically built connections to resources at multiple universities on essentially a flat layer 2 network. AL2S Connection Terminates on SDN Hub Switch Traffic mapped to correct VLAN and rules enabled to route traffic

Use Case –Inspection Bypass Avoid latency of IPS and Firewalls Avoid saturation of IPS and Firewalls for “routine traffic” Map connections with source/destination networks Examples Storage replication from instruments to central storage Storage replication from central storage to dedicated HPC resources Backups! Latency sensitive apps in multiple buildings

Use Case - Bandwidth/Capacity Expansion Add capacity to a specific lab and route traffic over a second pair of fiber interconnects Provide alternate paths for different performance scenarios Low Latency path High Bandwidth path Same switch

Use Duke – Data Migrations Duke has a protected research data network VMs provisioned Firewalled ACLs on routing between subnets VPN for general access Jump boxes/SSH/RDP servers Bottlenecks on getting data into the network Use an SDN path to migrate encrypted traffic into the network Could apply to both external and internal connections One time or potentially recurring use (external protected feeds)

Use Case - Research Support – Duke Medicine and University Separate IT support services Separate Networks to the server and desktop Many shared services – Health System include Sch of Med/Nursing Common core financial system - SAP Common student system – PeopleSoft University provides/manages all University manages internet exchange Common technology (recent change) – MPLS Different Security Postures

Security Planning - Where Does Security Fit In Science DMZ = No Security? Not really, limited set of connections, dynamic/open Use for Protected Data – encrypted blobs Separation of Data Plane and Control Plane Control plane should only have controller and switch management Duke uses a dedicated VRF for Control Plane Proxy/Firewall and Controller Separation Multiple Controllers Can Be Used (FlowVisor) – But … All the usual hardening (OS/WebApp/DB)

Security – Continued Who is allowed to communicate with Controller? Mark will talk about Switchboard next – is that the only thing? Other management servers (OSCARS or …) for AL2S? Rest – of course Accidental or intentional DOS attacks? You can shoot off your own foot – easy to put traffic on the switch that has to query the controller and insert rule – can overload the switch

User Engagement Monthly planning luncheons with participation from Computer Science, OIT management, OIT network, OIT Systems Good broad discussions Need to get better at identifying additional research needs/users More about this later

Production Topology – Setting Up Mark

Part 2 – Rollout Strategies: Benefits & Gotchas Switch Evaluations Infrastructure Readiness perfSONAR is your friend Operational Readiness Reliability of the controller and management tools Fiber evaluation – likely will need to be re-terminated Staff Readiness – Network, DevOps, Security Culture – Programmers and Systems guys loose in the network! Services/System Security Controller – it can be a religious choice Rule Management End point networks/subnets/hosts – permissions model

Switch Evaluation What Did Duke do to evaluate switches? Test switches under load from: Rules – 100/300/700 rules/second while transferring files between multiple servers Saturate the network Load up the CPU Use Ryu Simple Switch or POX Look for packet drops Look for the switch to fall over Confirm that the switches supported simple systems Measure traffic flows/cpu load with SNMP polls

What did we evaluate? NEC Brocade – at the time - didn’t support flood all (needed for ARP) Arista Cisco 4500X Support hybrid mode – more on that later

A Test Lab Is A Requirement! We have had a test lab for evaluating switches since the beginning Load tests in the lab bled to campus network very unexpectedly Code black for the hospital Not a good day Consolidate test lab Isolated from the network Influenced the redesign of the network Testing done without impact

Test Lab Needs to Map to Typical Edge Usage Lab has switches from NEC, Arista, Cisco Lab will be connected to the core the same as research building Lab has pre-production controller and switchboard environment Lab has 12 dedicated Dell blades with 10G networking

Network Redesign Keep MPLS Separate Functions (VRF transitions, Routing, Aggregation, Edge) Move IPS to the edge But still keep the dorms and “foreign” networks behind the IPS Use IDS internally Add an edge routing layer Provide 10G or better connectivity to Science buildings

perfSONAR is your friend Designed for WAN connections typically Measures latency and bandwidth on a regular schedule Place nodes at multiple places on the network Older version had to split measurements of bandwidth and latency New version allow you to split across different interfaces Use it to prove that your network is capable of passing the traffic you expect – bandwidth measurements are very useful Help to prove that your network performs as expected Puppet or other management integration important (but challenging)

Bandwidth Measurements

Bandwidth Examples

Bandwidth Examples – Used for Operational Monitoring

Bandwidth Examples

End User Engagement Sometimes it’s all about having the fastest connection But that doesn’t always help Complicated workflows that get around current or legacy issues – things are done to avoid problems that were fixed years ago If the system doesn’t work as expected, science will go on Usual stuff – disk drives from Best Buy, Sneakernet with Thumbdrives

Cisco 4500X – An Interesting Beast OpenFlow implemented as a virtual machine inside the switch A single switch can support both traditional Cisco IOS ports and OpenFlow ports. How would this work?

Cisco 4500X – Hybrid Mode Duke has deployed 4500X as the standard building aggregation switch Can enable SDN services to any building using a 4500X

SDN Still is a work in progress Mixed support for required and optional pieces of the OpenFlow standards Netflow data is not “built in” Accidental DOS attacks are possible – deliberate as well Need to program in services like DHCP As we scale up – need to be able to have effective time-out of rules that are not active – only so much capacity

Acknowledgements Work Supported by NSF on the following grants: NSF OCI CC-NIE NSF CNS EAGER