configure bittorrent

Download Report

Transcript configure bittorrent

OpenFlow/Software Defined
Networking
Nick Feamster
Georgia Tech
(some slides courtesy Nick McKeown)
Lithium: Event-Driven Network Control
Nick Feamster, Hyojoon Kim, Russ Clark
Georgia Tech
Andreas Voellmy
Yale University
Pre-GENI Thinking:
Network as Artifact
“There is a tendency in our field to believe that
everything we currently use is a paragon of
engineering, rather than a snapshot of our
understanding at the time. We build great myths
of spin about how what we have done is the only
way to do it to the point that our universities now
teach the flaws to students (and professors and
textbook authors) who don't know better.”
-- John Day
2
What if we could change the
network as easily as applications?
TCP/IP Header in Lego Format.
3
Now, We Can:
Software-Defined Networking
• Before: Network
devices closed,
proprietary
• Now: A single
software program
can control the
behavior of entire
networks.
4
Software-Defined Networking
• Distributed configuration is a bad idea
• Instead: Control the network from a logically
centralized system
2004
2005
RCP
Decision
2008
Dissemination
Discovery
Network
Data
Feamster et al. The Case for Separating Routing from Routers. Proc. SIGCOMM FDNA,
2004
5
Software Defined Networking
6
Background: OpenFlow Switching
OpenFlow Switch specification
OpenFlow Switch
sw Secure
Channel
hw Flow
Table
PC
Controller
Key Idea: Control/Data Separation
8
OpenFlow Forwarding Abstraction
9
OpenFlow 1.0 Flow Table Entry
Rule
Action
Stats
Packet + byte counters
1.
2.
3.
4.
Switch MAC
Port
src
+ mask
MAC
dst
Forward packet to port(s)
Encapsulate and forward to controller
Drop packet
Send to normal processing pipeline
Eth
type
VLAN
ID
IP
Src
IP
Dst
IP
Prot
TCP
sport
TCP
dport
OpenFlow Forwarding Abstraction
• Match
– Match on any header or new header
– Allows any flow granularity
• Action
– Forward to port(s), drop, send to controller
– Overwrite the header
– Forward at a specific bitrate
11
OpenFlow Forwarding Abstraction
• Protocol independent
– Construct Ethernet, IPv4, VLAN, MPLS
– Construct new forwarding methods
• Backwards compatible
– Run in existing networks
• Technology independent
– Switches, routers, WiFi APs
– Cellular basestations
– WDM/TDM circuits
12
Software Defined Network
Management
• Software defined networking (SDN) makes it
easier for network operators to evolve network
capabilities
• Can SDN also help network operators manage
their networks, once they are deployed?
– Campus/Enterprise networks
– Home networks
13
Big Problem: Configuration
Changes Frequently
• Changes to the network
configuration occur daily
– Errors are also frequent
• Operators must
determine
– What will happen in
response to a
configuration change
– Whether the
configuration is correct
14
But, Network Configuration is
Really Just Event Processing!
• Rate limit all Bittorrent traffic between the hours
of 9 a.m. and 5 p.m.
• Do not use more than 100 GB of my monthly
allocation for Netflix traffic
• If a host becomes infected, re-direct it to a
captive portal with software patches
• …
15
Lithium:
Event-Based Network Control
Main Idea: Express network policies as
event-based programs.
Resonance: Inference-Based Access Control for Enterprise Networks. Nayak, Reimers,
Feamster, Clark. ACM SIGCOMM Workshop on Enterprise Networks. August 2009.
16
Extending the Control Model
• OpenFlow only
operates on flow
properties
• Lithium extends the
control model so
that actions can be
taken on time,
history, and user
17
Event-Driven Control Domains
Domain: A condition on which traffic forwarding rules
can be expressed.
18
Dynamic Event Handler
• Reacts to
domain events
• Determines
event source
• Updates state
based on
event type
• Can process
both internal
and external
events
19
Representing Network State:
Finite State Machine
• State: A set of domain values represents a
state. Representation of network state.
• Events: Event-driven control domains invoke
events, which trigger state transitions in the
controller’s finite state machine.
– Intrusions
– Traffic fluctuations
– Arrival/departure of hosts
20
Current Implementation
• NOX Version 0.6.0
• Lithium plumbing: About 1,300 lines of C++
• Policies
– Enterprise network access control: 145 lines of C++
– Home network usage cap management: 130 lines
• Ongoing: Policies without general-purpose
programming
21
Two Real-World Deployments
• Access control in enterprise networks
– Re-implementation of access control on the Georgia
Tech campus network
– Today: Complicated, low-level
– With SDN: Simpler, more flexible
• Usage control in home networks
– Implementation of user controls (e.g., usage cap
management, parental controls) in home networks
– Today: Not possible
– With SDN: Intuitive, simple
22
Example from Campus Network:
Enterprise Access Control
3. VLAN with Private IP
7. REBOOT
Switch
1. New MAC Addr
2. VQP
6. VLAN with Public IP
New Host
4. Web
Authentication
VMPS
5. Authentication
Result
Web Portal
23
Problems with Current Approach
• Access control is too coarse-grained
– Static, inflexible and prone to misconfigurations
– Need to rely on VLANs to isolate infected machines
• Cannot dynamically remap hosts to different
portions of the network
– Needs a DHCP request which for a windows user
would mean a reboot
• Cannot automatically process changes to
network conditions.
24
Lithium: State Machine-Based
Control for Campus Networks
Infection removed or manually fixed
Registration
Failed Authentication
Quarantined
Successful
Authentication
Clean after update
Authenticated
Operation
Vulnerability detected
25
Requirements: Policy Language
• Network policies
– Are dynamic
– Depend on temporal conditions defined in terms of
external events
• Need a way to configure these policies without
resorting to general-purpose programming of
a network controller
• Intuitive user interfaces can ultimately be built on
top of this language
26
Language Design Goals
• Declarative Reactivity: Describing when events
happen, what changes they trigger, and how
permissions change over time.
• Expressive and Compositional Operators:
Building reactive permissions out of smaller reactive components.
• Well-defined Semantics: Simple semantics,
simplifying policy specification.
• Error Checking & Conflict Resolution:
Leveraging well-defined, mathematical
semantics.
27
The Need for Reactive Control
• Simple policies are doable in FML: “Ban the device if
usage exceeds 10 GB in the last 5 days”
• But, adding temporal predicates is difficult!
– “Remove the ban if usage drops below 10 GB.”
– “Remove the ban when an administrator resets.”
• Each condition requires a new predicate.
28
Procera: Programming Reactive,
Event-Based Network Control
Define a signal function for a device
going over (or under) the usage cap:
Define the set of devices over the cap:
• Controller: signal functions and a flow constraint function
• Receives input signals from environment
• Periodically updates a flow constraint function that
controls the forwarding elements
29
Deployment: Campus Network
• Software-defined
network in use
across three
buildings across the
university
• Redesign of network
access control
• Also deployed at
other universities
30
Example From Home Networks:
Usage Control
• Network management in homes is challenging
• One aspect of management: usage control
– Usage cap management
– Parental control
– Bandwidth management
• Idea: Outsource network management/control
– Home router runs OpenFlow switch
– Usage reported to off-site controller
– Controller adjusts behavior of traffic flows
31
Example From Home Networks:
Usage Control
32
Deployment: Home Networks
(Outsourced Home Network Management)
• User monitors
behavior and sets
policies with UI
(next slide)
• Lithium controller
manages policies
and router
behavior
33
uCap: Intuitive Management Interface
Joint work with Boris de Souza, Bethany Sumner, Marshini Chetty.
34
Frontier #1: GENI/SDN @ Home
• OpenFlow deployments in home networks: Slicing
all the way to the end user in the home!
• BISmark (http://projectbismark.net/)
35
Frontier #2: Programmable Substrate
• Augment OpenFlow switches with
custom packet processors
• Device abstraction layer to allow
programmability of this substrate
– Single device
– Network wide
• Applications
– Big data applications
– On-the fly encryption, transcoding,
classification
– Selective deep packet inspection
36
Frontier #3: Policy Languages
• Today’s configuration languages are errorprone, distributed, low-level
• Functional reactive programming
– Support for “boxes and arrows” (or signals and
systems) style programming
– Can support much more complicated conditions
• Procera/Lithium is one example
37
Summary
• Network management is difficult and error-prone
• Lithium: Event-based network control
• Deployment in two real-world settings (campus
and home network)
• Developing a high-level control language that
enables reactive control
38