Remote Network Labs: An On-Demand Network Cloud for Configuration Testing Huan Liu, Dan Orban Accenture Technology Labs.

Slides:



Advertisements
Similar presentations
© Copyright 2007 Exempler Telecom Test Automation System Exempler - We pride ourselves with providing lightweight robust engineering solutions.
Advertisements

1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco TunnelBuilder, 5/2002 Cisco MPLS Tunnel Builder Product Details ITD Product Management.
© NetBrain Technologies Inc. All rights reserved NetBrain In Action Real World Use Cases:
1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
Setup Organizing Teams Starting PVP Minecraft is a popular world building video game that enables its user to build, collaborate and innovate using virtual.
© Copyright 2012 HP 1 Hoe uw netwerk afstemmen op de evolutie van uw datacenter? Raf Peeters, HP Geert De Ron, RealDolmen.
Chapter 1: Introduction to Scaling Networks
© 2003, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Microsoft Office Illustrated Fundamentals Unit C: Getting Started with Unit C: Getting Started with Microsoft Office 2010 Microsoft Office 2010.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement VTP LAN Switching and Wireless – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
HetnetIP Ethernet BackHaul Configuration Automation Demo.
Introducing Campus Networks
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
Presenters: Marc Tomkinson – Director of Product Innovation Nicholas Couture – President / CTO Yard Smart 4.2 Seeing it All.
Transparent Caching The art of caching network traffic without requiring user / browser side configuration.
Deliver your Technology-Based Labs with VMware Lab Manager 5/6/2010 Michael Fudge.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Manasa Guduru Sai Prasanth Sridhar Malini srinivasan Sinduja Narasimhan Reference: Aymerich, F. M., Fenu, G., & Surcis, S. (2008). An approach to a cloud.
Computer Network (MASQ/NAT/PROXY)
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Packet Tracer 4.1: Novice Session
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 8 – Implementing Virtual Private Networks.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—1-1 Small Network Implementation Introducing the Review Lab.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Special Project Group 03 Chintan Shah Nisharg Patel Cynthia York.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
11 Copyright © 2009 Juniper Networks, Inc. ANDY INGRAM VP FST PRODUCT MARKETING & BUSINESS DEVELOPMENT.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
ALMA Archive Operations Impact on the ARC Facilities.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
I Copyright © 2007, Oracle. All rights reserved. Module i: Siebel 8.0 Essentials Training Siebel 8.0 Essentials.
Routing and Routing Protocols
Operating-System Structures
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
© 2002, Cisco Systems, Inc. All rights reserved..
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Intro To Virtualization Mohammed Morsi
Configuring Network Devices
Chapter 6: Securing the Cloud
Instructor Materials Chapter 1: LAN Design
© 2002, Cisco Systems, Inc. All rights reserved.
Ebusiness Infrastructure Platform
Presentation transcript:

Remote Network Labs: An On-Demand Network Cloud for Configuration Testing Huan Liu, Dan Orban Accenture Technology Labs

Configuration is hard A few reasons –Many SW images for each box IOS: 5+ trains, 8 packages for routers, 5 packages for switches –Primitive CLI interface –Commands may behave differently a design may work on paper, but not in practice –Local configuration at a switch/router could have global impact Sample manifestations –More outages are caused by operator errors rather than equipment failures 1,2 –3 in 4 new BGP prefix advertisements are results of misconfiguration ( prefixes/day) 3 –Average 7.17 to 9.63 errors per firewall config 4 1.Configuration management delivers business resiliency, The Yankee Group, Nov D. Oppenheimer, A. Ganapathi, and D. Patterson, Why internet services fail and what can be done about these, in Proc. USENIX USITS, Oct R. Mahajan, D. Wetherall and T. Anderson, Understanding BGP Misconfiguration, SIGCOMM A. Wool, A Quantitative Study of Firewall Configuration Errors, Computer,

Current solutions and their problems Solution 1: Simulator (e.g., RouterSim, OPNET) –Cannot capture all aspects of real hardware (e.g., many IOS images) –Support limited # of commands –Have simulation models for a limited number of routers Solution 2: Emulator (Dynamips) –Limited set of interfaces are simulated –Support a limited set of Cisco routers Solution 3: Build a smaller scale network in Lab to mimic the production network, and test in lab before roll out –Costly investment (routers are not cheap) –Poorly utilized (only during testing), yet necessary in case configuration changes again –May not be available when you need it (spare parts problem) –Time consuming to wire up –Hard to make sure the test network is the same as designed on paper. 3

What your lab looks like?

Our solution: Remote Network Labs Setup a virtual lab, then test –Equipment could be anywhere (no longer needs to be co-located) –Design from anywhere (no longer needs to be physically on site) –Quickly and easily reconfigurable Advantages –Enable efficient sharing of equipment between projects No more procurement delay Essential zero cost to each project No need for physical lab space –Enable design from a Web browser Everything digitized, including the wiring –Save/restore legacy environment –Fully automate lab set up No physical work to mount equipment and wire Reduce travel (go Green) 5

Distributed architecture Internet San Jose Chicago Client site Web browsers 6

How it works Internet Interface SW Interface SW When press Deploy button, send instruction to build tunnel Front endBack end 7

Making a router/firewall/server part of the lab inventory Internet Interface SW 8

User defines mapping 9 Copyright © 2007 Accenture All Rights Reserved.

Key differences from prior work 10 Copyright © 2007 Accenture All Rights Reserved. Real routerDistributedWire EmulabNNL2 tunnel PlanetLabNYL3 ONLNNL2 tunnel VININYL3 tunnel WAILYNReal wire RNLYYL2 + L3 tunnel

Use case 1 (layer 2 config) Configuring failover using Cisco Catalyst 6500 switches with a Firewall Services Module (FWSM) Can also capture transient behavior 11 Copyright © 2007 Accenture All Rights Reserved.

Use case 2 (test automation) Full automation (from setup to teardown) –Implementing web services API –Implementing library for traffic generation/capture, CLI parsing. Add delay/jitter Inject/observe anywhere 12 Copyright © 2007 Accenture All Rights Reserved. Inject Observe Add delay/jitter WAN

Challenges/drawbacks Additional delay WAN bandwidth is not free L2 interface diversity Performance testing (see paper for more details) 13 Copyright © 2007 Accenture All Rights Reserved.