SlideShare une entreprise Scribd logo
1  sur  81
Télécharger pour lire hors ligne
Monitoring a virtual network infrastructure
summary of the paper in Computer Communication Review
                       Nov. 2010
           DOI:10.1145/1880153.1880161


                 Augusto Ciuffoletti


                  24 gennaio 2012
Provisioning networking for an IaaS infrastructure


• The IaaS approach has been initially aimed mainly at
  storage/computing resources
Provisioning networking for an IaaS infrastructure


• The IaaS approach has been initially aimed mainly at
  storage/computing resources
• Technology is ready to support the provision of network
  resources as well
Provisioning networking for an IaaS infrastructure


• The IaaS approach has been initially aimed mainly at
  storage/computing resources
• Technology is ready to support the provision of network
  resources as well
• There is demand for composite networking infrastructures
  (like Grids)
Provisioning networking for an IaaS infrastructure


• The IaaS approach has been initially aimed mainly at
  storage/computing resources
• Technology is ready to support the provision of network
  resources as well
• There is demand for composite networking infrastructures
  (like Grids)
• However IaaS providers still offer flat LANs
Provisioning networking for an IaaS infrastructure


• The IaaS approach has been initially aimed mainly at
  storage/computing resources
• Technology is ready to support the provision of network
  resources as well
• There is demand for composite networking infrastructures
  (like Grids)
• However IaaS providers still offer flat LANs
• We claim that the problem is in the interface between user
  and provider
Why IaaS networking is difficult




• It is more difficult to describe a network than a host
Why IaaS networking is difficult




• It is more difficult to describe a network than a host
• Quite evident: (topology, technology, throughput) versus
  single option (small, medium, large)
Why IaaS networking is difficult




• It is more difficult to describe a network than a host
• Quite evident: (topology, technology, throughput) versus
  single option (small, medium, large)
• Monitoring and controlling the network is more complex
Why IaaS networking is difficult




• It is more difficult to describe a network than a host
• Quite evident: (topology, technology, throughput) versus
  single option (small, medium, large)
• Monitoring and controlling the network is more complex
• Less evident: explaining why and how to cope with is the
  topic of the paper
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
• This technology is mature and available OTS
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
• This technology is mature and available OTS
• Implements an ethernet LAN over an arbitrary (bridged)
  topology
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
• This technology is mature and available OTS
• Implements an ethernet LAN over an arbitrary (bridged)
  topology
• Frames (layer 2) labeled with a virtual network identifier (VNI)
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
• This technology is mature and available OTS
• Implements an ethernet LAN over an arbitrary (bridged)
  topology
• Frames (layer 2) labeled with a virtual network identifier (VNI)
• Bridges route labeled frames across ports based on a VNI
How to implement a network in the cloud



• The key technology is the virtual bridge (IEEE802.1Q)
• This technology is mature and available OTS
• Implements an ethernet LAN over an arbitrary (bridged)
  topology
• Frames (layer 2) labeled with a virtual network identifier (VNI)
• Bridges route labeled frames across ports based on a VNI
• The same port can be associated with multiple VNI
Example




• An enterprise in a 3 floor building
Example




• An enterprise in a 3 floor building
• Logistics motivate a per floor cabling (left)
Example




• Usual bridges force network topology to follow logistics
Example




• Usual bridges force network topology to follow logistics
• Instead enterprise organization might prefer a different
  arrangement...
Example




• Enterprise might prefer separate networks for desktops
  (VLAN1), printers (VLAN2) and archive (VLAN3)
Example




• Enterprise might prefer separate networks for desktops
  (VLAN1), printers (VLAN2) and archive (VLAN3)
• Each having an interface on each floor
Example




• The introduction of IEEE802.1Q bridges solves the
  problem (right)
Example




• The introduction of IEEE802.1Q bridges solves the
  problem (right)
• Virtual LANs span across floors
Example




• The introduction of IEEE802.1Q bridges solves the
  problem (right)
• Virtual LANs span across floors
• Frames do not leak outside each VLAN (security)
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
• Virtual hosts appear as sharing a LAN
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
• Virtual hosts appear as sharing a LAN
• Routing through the provider infrastructure is transparent to
  the user
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
• Virtual hosts appear as sharing a LAN
• Routing through the provider infrastructure is transparent to
  the user
• Frames are confined within user’s virtual infrastructure
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
• Virtual hosts appear as sharing a LAN
• Routing through the provider infrastructure is transparent to
  the user
• Frames are confined within user’s virtual infrastructure
• Frame routing is efficiently managed at layer 2
Bridging virtual hosts

• Inside a IaaS cloud, a real host in a data-centre implements
  several virtual hosts
• An internal software bridge splits communication across
  virtual TAP interfaces
• Virtual hosts appear as sharing a LAN
• Routing through the provider infrastructure is transparent to
  the user
• Frames are confined within user’s virtual infrastructure
• Frame routing is efficiently managed at layer 2
• Virtual networks can be dynamically configured using a
  spanning tree protocol
Network monitoring (in the age of the cloud)



• The user needs to monitor the performance of the network
Network monitoring (in the age of the cloud)



• The user needs to monitor the performance of the network
• One basic need is load balancing
Network monitoring (in the age of the cloud)



• The user needs to monitor the performance of the network
• One basic need is load balancing
• Network load is not covered by ordinary load balancing
  services
Network monitoring (in the age of the cloud)



• The user needs to monitor the performance of the network
• One basic need is load balancing
• Network load is not covered by ordinary load balancing
  services
• In a composite network (not a 2-tiers WS), the provider
  cannot anticipate what part of the network is under stress at a
  certain time
Example: Grid in the Cloud




• Depending on processing phase, different links are
  under stress
Example: Grid in the Cloud




• Collection of experimental data: Data acquisition to
  Storage
Example: Grid in the Cloud




• Data retrieval: Storage to Web Server
Example: Grid in the Cloud




• Data processing: Storage to Computing resources
User configurable monitoring



• Under such circumstances, network monitoring requests
  cannot be anticipated by the provider
User configurable monitoring



• Under such circumstances, network monitoring requests
  cannot be anticipated by the provider
• The network monitoring activity should be dynamically
  configured by the user
User configurable monitoring



• Under such circumstances, network monitoring requests
  cannot be anticipated by the provider
• The network monitoring activity should be dynamically
  configured by the user
• Configuration requires access to real and virtual network
  interfaces and to switching devices
User configurable monitoring



• Under such circumstances, network monitoring requests
  cannot be anticipated by the provider
• The network monitoring activity should be dynamically
  configured by the user
• Configuration requires access to real and virtual network
  interfaces and to switching devices
• The provider wants to maintain control over these devices
The network monitoring proxy



• A proxy interacts with the user willing to implement network
  monitoring
The network monitoring proxy



• A proxy interacts with the user willing to implement network
  monitoring
• A network of proxies covers the complex networking
  infrastructure of the provider
The network monitoring proxy



• A proxy interacts with the user willing to implement network
  monitoring
• A network of proxies covers the complex networking
  infrastructure of the provider
• The proxy configures network probes so that they are ready to
  respond to user requests in the expected way
The network monitoring proxy



• A proxy interacts with the user willing to implement network
  monitoring
• A network of proxies covers the complex networking
  infrastructure of the provider
• The proxy configures network probes so that they are ready to
  respond to user requests in the expected way
• A proxy has an authority that may be limited to a part of the
  provider infrastructure
The network monitoring interface


• An interface must be provided between the user application
  and the proxy
The network monitoring interface


• An interface must be provided between the user application
  and the proxy
• The interface should inform the user about relevant changes
  in the virtual topology
The network monitoring interface


• An interface must be provided between the user application
  and the proxy
• The interface should inform the user about relevant changes
  in the virtual topology
• The interface has the effect of restricting the authority of a
  user controlled sensor to owned traffic trunks
The network monitoring interface


• An interface must be provided between the user application
  and the proxy
• The interface should inform the user about relevant changes
  in the virtual topology
• The interface has the effect of restricting the authority of a
  user controlled sensor to owned traffic trunks
• The interface may be implemted using tools like SOAP,
  possibly embedded in a Enterprise System Bus
The network monitoring interface


• An interface must be provided between the user application
  and the proxy
• The interface should inform the user about relevant changes
  in the virtual topology
• The interface has the effect of restricting the authority of a
  user controlled sensor to owned traffic trunks
• The interface may be implemted using tools like SOAP,
  possibly embedded in a Enterprise System Bus
• For performance reasons the same interface is not used to
  transfer streams of sensor results
Data streaming




• Data are treated as a stream flowing from the sensor to the
  user
Data streaming




• Data are treated as a stream flowing from the sensor to the
  user
• The stream may be encoded for security purposes
Data streaming




• Data are treated as a stream flowing from the sensor to the
  user
• The stream may be encoded for security purposes
• The stream may travel using owned traffic trunks
Grid legacy: Monalisa



• Distributed infrastructure management
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Dynamic control of sensors
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Dynamic control of sensors
• Fully deployed
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Dynamic control of sensors
• Fully deployed
• BUT
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Dynamic control of sensors
• Fully deployed
• BUT
• Monitoring controlled by Grid Admin
Grid legacy: Monalisa



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Dynamic control of sensors
• Fully deployed
• BUT
• Monitoring controlled by Grid Admin
• Data stored in SQL repositories and retrieved to users
Grid legacy: Monalisa



  • Distributed infrastructure management
  • Glues together diverse monitoring tools
  • Dynamic control of sensors
  • Fully deployed
  • BUT
  • Monitoring controlled by Grid Admin
  • Data stored in SQL repositories and retrieved to users

Rigid, hardly scalable
Grid legacy: GD2



• Distributed infrastructure management
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Sensors are controlled by user application
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Sensors are controlled by user application
• Monitoring sessions activated on demand
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Sensors are controlled by user application
• Monitoring sessions activated on demand
• Data returned to the user with an UDP stream
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Sensors are controlled by user application
• Monitoring sessions activated on demand
• Data returned to the user with an UDP stream
• BUT
Grid legacy: GD2



• Distributed infrastructure management
• Glues together diverse monitoring tools
• Sensors are controlled by user application
• Monitoring sessions activated on demand
• Data returned to the user with an UDP stream
• BUT
• only a proof of concept implementation
Grid legacy: GD2




• Host A issues a network monitoring request (e.g.,
  bandwidth from X to Y)...
Grid legacy: GD2




• Host A issues a network monitoring request (e.g.,
  bandwidth from X to Y)...
• that is taken in charge by the proxy in A’s domain...
Grid legacy: GD2




• that has authority to control a relevant sensor (agent in
  gd2 terms)...
Grid legacy: GD2




• that has authority to control a relevant sensor (agent in
  gd2 terms)...
• and data are returned to the originating host as a
  stream.
Grid legacy: GD2




In principle this might be implemented in a virtual
infrastructure, using virtual components
Conclusions



• the techniques for complex networks in the cloud are available
  OTS
Conclusions



• the techniques for complex networks in the cloud are available
  OTS
• the hard issue is the control of the virtual network
Conclusions



• the techniques for complex networks in the cloud are available
  OTS
• the hard issue is the control of the virtual network
• network monitoring must be translated from virtual to real
  (and back)
Conclusions



• the techniques for complex networks in the cloud are available
  OTS
• the hard issue is the control of the virtual network
• network monitoring must be translated from virtual to real
  (and back)
• an effective infrastructure takes into accout multi-domain use
  cases for scalability
Thank you!



Full reference:
Augusto Ciuffoletti. Monitoring a virtual network infrastructure: an IaaS
perspective. SIGCOMM Comput. Commun. Rev. 40, 5 47-52.
DOI=10.1145/1880153.1880161
http://doi.acm.org/10.1145/1880153.1880161
  Download published version

  Download preliminary version

Contenu connexe

Tendances

Chapter 2 Service Model
Chapter 2 Service ModelChapter 2 Service Model
Chapter 2 Service Modelnewbie2019
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika WijayatungaIndonesia Network Operators Group
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
 
DNS Openness
DNS OpennessDNS Openness
DNS OpennessAPNIC
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingSachin Gowda
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...David Wallom
 
Big Data 2107 for Ribbon
Big Data 2107 for RibbonBig Data 2107 for Ribbon
Big Data 2107 for RibbonSamuel Dratwa
 
Openstack Neutron and SDN
Openstack Neutron and SDNOpenstack Neutron and SDN
Openstack Neutron and SDNinakipascual
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud CurtainSagi Brody
 
Network Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureNetwork Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureShahryar Ali
 
Open stack networking_101_update_2014
Open stack networking_101_update_2014Open stack networking_101_update_2014
Open stack networking_101_update_2014yfauser
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
 
Navigating OpenStack Networking
Navigating OpenStack NetworkingNavigating OpenStack Networking
Navigating OpenStack NetworkingPLUMgrid
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)GulshanKumar368
 

Tendances (20)

Chapter 2 Service Model
Chapter 2 Service ModelChapter 2 Service Model
Chapter 2 Service Model
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
Cont0519
Cont0519Cont0519
Cont0519
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
Software Defined Networking
Software Defined NetworkingSoftware Defined Networking
Software Defined Networking
 
DNS Openness
DNS OpennessDNS Openness
DNS Openness
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
 
Big Data 2107 for Ribbon
Big Data 2107 for RibbonBig Data 2107 for Ribbon
Big Data 2107 for Ribbon
 
Cloud computing_Final
Cloud computing_FinalCloud computing_Final
Cloud computing_Final
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Openstack Neutron and SDN
Openstack Neutron and SDNOpenstack Neutron and SDN
Openstack Neutron and SDN
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
 
Network Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureNetwork Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services Infrastructure
 
Open stack networking_101_update_2014
Open stack networking_101_update_2014Open stack networking_101_update_2014
Open stack networking_101_update_2014
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
 
Navigating OpenStack Networking
Navigating OpenStack NetworkingNavigating OpenStack Networking
Navigating OpenStack Networking
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
 

En vedette

ネットを信じていいですか?
ネットを信じていいですか?ネットを信じていいですか?
ネットを信じていいですか?sirousagi1989
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesAugusto Ciuffoletti
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast mediaAugusto Ciuffoletti
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technologyAugusto Ciuffoletti
 

En vedette (6)

ネットを信じていいですか?
ネットを信じていいですか?ネットを信じていいですか?
ネットを信じていいですか?
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 

Similaire à Monitoring a virtual network infrastructure - An IaaS perspective

Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookMuhammad Shafiq
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureNiviV4
 
Operators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksOperators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksJakub Pavlik
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networksKishor Satpathy
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
CV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfCV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfoumaimaziat1
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationAkhilesh Dhawan
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxNiviV4
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittalbuildacloud
 
CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestke4qqq
 
Kubernetes networking in AWS
Kubernetes networking in AWSKubernetes networking in AWS
Kubernetes networking in AWSZvika Gazit
 
An introduction to cloud stack networking
An introduction to cloud stack networkingAn introduction to cloud stack networking
An introduction to cloud stack networkingShanker Balan
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack NetworkingChiradeep Vittal
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysAdam Johnson
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
Virt july-2013-meetup
Virt july-2013-meetupVirt july-2013-meetup
Virt july-2013-meetupnvirters
 

Similaire à Monitoring a virtual network infrastructure - An IaaS perspective (20)

Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management book
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
Operators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksOperators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 Networks
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
CV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfCV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdf
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittal
 
CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWest
 
Kubernetes networking in AWS
Kubernetes networking in AWSKubernetes networking in AWS
Kubernetes networking in AWS
 
An introduction to cloud stack networking
An introduction to cloud stack networkingAn introduction to cloud stack networking
An introduction to cloud stack networking
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack Networking
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization Overlays
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Virt july-2013-meetup
Virt july-2013-meetupVirt july-2013-meetup
Virt july-2013-meetup
 

Plus de Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorAugusto Ciuffoletti
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoAugusto Ciuffoletti
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolAugusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membershipAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 

Plus de Augusto Ciuffoletti (17)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
The wandering token
The wandering tokenThe wandering token
The wandering token
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membership
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 

Dernier

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Monitoring a virtual network infrastructure - An IaaS perspective

  • 1. Monitoring a virtual network infrastructure summary of the paper in Computer Communication Review Nov. 2010 DOI:10.1145/1880153.1880161 Augusto Ciuffoletti 24 gennaio 2012
  • 2. Provisioning networking for an IaaS infrastructure • The IaaS approach has been initially aimed mainly at storage/computing resources
  • 3. Provisioning networking for an IaaS infrastructure • The IaaS approach has been initially aimed mainly at storage/computing resources • Technology is ready to support the provision of network resources as well
  • 4. Provisioning networking for an IaaS infrastructure • The IaaS approach has been initially aimed mainly at storage/computing resources • Technology is ready to support the provision of network resources as well • There is demand for composite networking infrastructures (like Grids)
  • 5. Provisioning networking for an IaaS infrastructure • The IaaS approach has been initially aimed mainly at storage/computing resources • Technology is ready to support the provision of network resources as well • There is demand for composite networking infrastructures (like Grids) • However IaaS providers still offer flat LANs
  • 6. Provisioning networking for an IaaS infrastructure • The IaaS approach has been initially aimed mainly at storage/computing resources • Technology is ready to support the provision of network resources as well • There is demand for composite networking infrastructures (like Grids) • However IaaS providers still offer flat LANs • We claim that the problem is in the interface between user and provider
  • 7. Why IaaS networking is difficult • It is more difficult to describe a network than a host
  • 8. Why IaaS networking is difficult • It is more difficult to describe a network than a host • Quite evident: (topology, technology, throughput) versus single option (small, medium, large)
  • 9. Why IaaS networking is difficult • It is more difficult to describe a network than a host • Quite evident: (topology, technology, throughput) versus single option (small, medium, large) • Monitoring and controlling the network is more complex
  • 10. Why IaaS networking is difficult • It is more difficult to describe a network than a host • Quite evident: (topology, technology, throughput) versus single option (small, medium, large) • Monitoring and controlling the network is more complex • Less evident: explaining why and how to cope with is the topic of the paper
  • 11. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q)
  • 12. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q) • This technology is mature and available OTS
  • 13. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q) • This technology is mature and available OTS • Implements an ethernet LAN over an arbitrary (bridged) topology
  • 14. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q) • This technology is mature and available OTS • Implements an ethernet LAN over an arbitrary (bridged) topology • Frames (layer 2) labeled with a virtual network identifier (VNI)
  • 15. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q) • This technology is mature and available OTS • Implements an ethernet LAN over an arbitrary (bridged) topology • Frames (layer 2) labeled with a virtual network identifier (VNI) • Bridges route labeled frames across ports based on a VNI
  • 16. How to implement a network in the cloud • The key technology is the virtual bridge (IEEE802.1Q) • This technology is mature and available OTS • Implements an ethernet LAN over an arbitrary (bridged) topology • Frames (layer 2) labeled with a virtual network identifier (VNI) • Bridges route labeled frames across ports based on a VNI • The same port can be associated with multiple VNI
  • 17. Example • An enterprise in a 3 floor building
  • 18. Example • An enterprise in a 3 floor building • Logistics motivate a per floor cabling (left)
  • 19. Example • Usual bridges force network topology to follow logistics
  • 20. Example • Usual bridges force network topology to follow logistics • Instead enterprise organization might prefer a different arrangement...
  • 21. Example • Enterprise might prefer separate networks for desktops (VLAN1), printers (VLAN2) and archive (VLAN3)
  • 22. Example • Enterprise might prefer separate networks for desktops (VLAN1), printers (VLAN2) and archive (VLAN3) • Each having an interface on each floor
  • 23. Example • The introduction of IEEE802.1Q bridges solves the problem (right)
  • 24. Example • The introduction of IEEE802.1Q bridges solves the problem (right) • Virtual LANs span across floors
  • 25. Example • The introduction of IEEE802.1Q bridges solves the problem (right) • Virtual LANs span across floors • Frames do not leak outside each VLAN (security)
  • 26. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts
  • 27. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces
  • 28. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces • Virtual hosts appear as sharing a LAN
  • 29. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces • Virtual hosts appear as sharing a LAN • Routing through the provider infrastructure is transparent to the user
  • 30. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces • Virtual hosts appear as sharing a LAN • Routing through the provider infrastructure is transparent to the user • Frames are confined within user’s virtual infrastructure
  • 31. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces • Virtual hosts appear as sharing a LAN • Routing through the provider infrastructure is transparent to the user • Frames are confined within user’s virtual infrastructure • Frame routing is efficiently managed at layer 2
  • 32. Bridging virtual hosts • Inside a IaaS cloud, a real host in a data-centre implements several virtual hosts • An internal software bridge splits communication across virtual TAP interfaces • Virtual hosts appear as sharing a LAN • Routing through the provider infrastructure is transparent to the user • Frames are confined within user’s virtual infrastructure • Frame routing is efficiently managed at layer 2 • Virtual networks can be dynamically configured using a spanning tree protocol
  • 33. Network monitoring (in the age of the cloud) • The user needs to monitor the performance of the network
  • 34. Network monitoring (in the age of the cloud) • The user needs to monitor the performance of the network • One basic need is load balancing
  • 35. Network monitoring (in the age of the cloud) • The user needs to monitor the performance of the network • One basic need is load balancing • Network load is not covered by ordinary load balancing services
  • 36. Network monitoring (in the age of the cloud) • The user needs to monitor the performance of the network • One basic need is load balancing • Network load is not covered by ordinary load balancing services • In a composite network (not a 2-tiers WS), the provider cannot anticipate what part of the network is under stress at a certain time
  • 37. Example: Grid in the Cloud • Depending on processing phase, different links are under stress
  • 38. Example: Grid in the Cloud • Collection of experimental data: Data acquisition to Storage
  • 39. Example: Grid in the Cloud • Data retrieval: Storage to Web Server
  • 40. Example: Grid in the Cloud • Data processing: Storage to Computing resources
  • 41. User configurable monitoring • Under such circumstances, network monitoring requests cannot be anticipated by the provider
  • 42. User configurable monitoring • Under such circumstances, network monitoring requests cannot be anticipated by the provider • The network monitoring activity should be dynamically configured by the user
  • 43. User configurable monitoring • Under such circumstances, network monitoring requests cannot be anticipated by the provider • The network monitoring activity should be dynamically configured by the user • Configuration requires access to real and virtual network interfaces and to switching devices
  • 44. User configurable monitoring • Under such circumstances, network monitoring requests cannot be anticipated by the provider • The network monitoring activity should be dynamically configured by the user • Configuration requires access to real and virtual network interfaces and to switching devices • The provider wants to maintain control over these devices
  • 45. The network monitoring proxy • A proxy interacts with the user willing to implement network monitoring
  • 46. The network monitoring proxy • A proxy interacts with the user willing to implement network monitoring • A network of proxies covers the complex networking infrastructure of the provider
  • 47. The network monitoring proxy • A proxy interacts with the user willing to implement network monitoring • A network of proxies covers the complex networking infrastructure of the provider • The proxy configures network probes so that they are ready to respond to user requests in the expected way
  • 48. The network monitoring proxy • A proxy interacts with the user willing to implement network monitoring • A network of proxies covers the complex networking infrastructure of the provider • The proxy configures network probes so that they are ready to respond to user requests in the expected way • A proxy has an authority that may be limited to a part of the provider infrastructure
  • 49. The network monitoring interface • An interface must be provided between the user application and the proxy
  • 50. The network monitoring interface • An interface must be provided between the user application and the proxy • The interface should inform the user about relevant changes in the virtual topology
  • 51. The network monitoring interface • An interface must be provided between the user application and the proxy • The interface should inform the user about relevant changes in the virtual topology • The interface has the effect of restricting the authority of a user controlled sensor to owned traffic trunks
  • 52. The network monitoring interface • An interface must be provided between the user application and the proxy • The interface should inform the user about relevant changes in the virtual topology • The interface has the effect of restricting the authority of a user controlled sensor to owned traffic trunks • The interface may be implemted using tools like SOAP, possibly embedded in a Enterprise System Bus
  • 53. The network monitoring interface • An interface must be provided between the user application and the proxy • The interface should inform the user about relevant changes in the virtual topology • The interface has the effect of restricting the authority of a user controlled sensor to owned traffic trunks • The interface may be implemted using tools like SOAP, possibly embedded in a Enterprise System Bus • For performance reasons the same interface is not used to transfer streams of sensor results
  • 54. Data streaming • Data are treated as a stream flowing from the sensor to the user
  • 55. Data streaming • Data are treated as a stream flowing from the sensor to the user • The stream may be encoded for security purposes
  • 56. Data streaming • Data are treated as a stream flowing from the sensor to the user • The stream may be encoded for security purposes • The stream may travel using owned traffic trunks
  • 57. Grid legacy: Monalisa • Distributed infrastructure management
  • 58. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools
  • 59. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors
  • 60. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors • Fully deployed
  • 61. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors • Fully deployed • BUT
  • 62. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors • Fully deployed • BUT • Monitoring controlled by Grid Admin
  • 63. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors • Fully deployed • BUT • Monitoring controlled by Grid Admin • Data stored in SQL repositories and retrieved to users
  • 64. Grid legacy: Monalisa • Distributed infrastructure management • Glues together diverse monitoring tools • Dynamic control of sensors • Fully deployed • BUT • Monitoring controlled by Grid Admin • Data stored in SQL repositories and retrieved to users Rigid, hardly scalable
  • 65. Grid legacy: GD2 • Distributed infrastructure management
  • 66. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools
  • 67. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools • Sensors are controlled by user application
  • 68. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools • Sensors are controlled by user application • Monitoring sessions activated on demand
  • 69. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools • Sensors are controlled by user application • Monitoring sessions activated on demand • Data returned to the user with an UDP stream
  • 70. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools • Sensors are controlled by user application • Monitoring sessions activated on demand • Data returned to the user with an UDP stream • BUT
  • 71. Grid legacy: GD2 • Distributed infrastructure management • Glues together diverse monitoring tools • Sensors are controlled by user application • Monitoring sessions activated on demand • Data returned to the user with an UDP stream • BUT • only a proof of concept implementation
  • 72. Grid legacy: GD2 • Host A issues a network monitoring request (e.g., bandwidth from X to Y)...
  • 73. Grid legacy: GD2 • Host A issues a network monitoring request (e.g., bandwidth from X to Y)... • that is taken in charge by the proxy in A’s domain...
  • 74. Grid legacy: GD2 • that has authority to control a relevant sensor (agent in gd2 terms)...
  • 75. Grid legacy: GD2 • that has authority to control a relevant sensor (agent in gd2 terms)... • and data are returned to the originating host as a stream.
  • 76. Grid legacy: GD2 In principle this might be implemented in a virtual infrastructure, using virtual components
  • 77. Conclusions • the techniques for complex networks in the cloud are available OTS
  • 78. Conclusions • the techniques for complex networks in the cloud are available OTS • the hard issue is the control of the virtual network
  • 79. Conclusions • the techniques for complex networks in the cloud are available OTS • the hard issue is the control of the virtual network • network monitoring must be translated from virtual to real (and back)
  • 80. Conclusions • the techniques for complex networks in the cloud are available OTS • the hard issue is the control of the virtual network • network monitoring must be translated from virtual to real (and back) • an effective infrastructure takes into accout multi-domain use cases for scalability
  • 81. Thank you! Full reference: Augusto Ciuffoletti. Monitoring a virtual network infrastructure: an IaaS perspective. SIGCOMM Comput. Commun. Rev. 40, 5 47-52. DOI=10.1145/1880153.1880161 http://doi.acm.org/10.1145/1880153.1880161 Download published version Download preliminary version