architecture of dynamic vpns in openflow

20
1 Architecture of dynamic VPNs in OpenFlow Michiel Appelman [email protected] Supervisor: Rudolf Strijkers [email protected]

Upload: michiel-appelman

Post on 20-Jun-2015

279 views

Category:

Technology


0 download

DESCRIPTION

To conclude my MSc Systems and Network Engineering education, I researched the viability of Dynamic Layer 2 VPNs in networks using contemporary technologies versus network using SDN and OpenFlow technologies. This presentation shows the differences between the two implementations and gives some recommendations when considering OpenFlow as a solution.

TRANSCRIPT

Page 1: Architecture of dynamic VPNs in OpenFlow

1

Architecture of dynamic VPNs in OpenFlow

Michiel [email protected]

Supervisor:Rudolf Strijkers

[email protected]

Page 2: Architecture of dynamic VPNs in OpenFlow

2

Observations

• Network Management Systems are growing in complexity

• VPNs used to share network resources and growing in numbers

➡ complex network management

• Growing demand for application specific VPNs

• Leading to “Dynamic VPNs”

Page 3: Architecture of dynamic VPNs in OpenFlow

3

Dynamic VPNs

• Requirements:

• All VPN features

• Automated VPN creation, modification and deletion

• Manage member ports

• Adapt Paths to Network Resources and DVPN Requirements

Page 4: Architecture of dynamic VPNs in OpenFlow

4

Problem

• To implement DVPNs in the network:

• Solve complexity of network management

• Allow for granular control over network resources

Page 5: Architecture of dynamic VPNs in OpenFlow

5

Potential Solution

• OpenFlow and SDN

• Why the momentum?

• State of the art

• “Not supported”

OSI Reference Model — H. Zimmermann — 1980

Page 6: Architecture of dynamic VPNs in OpenFlow

6

Research Questions

• Can DVPNs be implemented using contemporary technologies?

• Can DVPNs be implemented using OpenFlow?

• What are the differences?

Page 7: Architecture of dynamic VPNs in OpenFlow

7

VPN Service

• Provider Provisioned VPN

• Layer 2 Ethernet broadcast domain

• Transparent to Customer

• No exchange of routing info between provider and customer

Page 8: Architecture of dynamic VPNs in OpenFlow

8

VPN Transport

• VPN “coloring”

• Ethernet frame encapsulation

Page 9: Architecture of dynamic VPNs in OpenFlow

9

VPN Transport

• Additional requirements for Carrier DVPN service:

• MAC Scalability

• Traffic Engineering (TE)

• Load Sharing (ECMP)

• Operations, Administration and Management (OAM)

• Fast Failover

• Rate Limiting of DVPN traffic

• Rate Limiting of BUM traffic

Page 10: Architecture of dynamic VPNs in OpenFlow

10

DVPN Provisioning

• Base network to provide VPNs

• Install routes between PEs

• Automated VPN creation, modification and deletion:

• Manage member ports

• Adapt Paths to Network Resources and DVPN Requirements

Page 11: Architecture of dynamic VPNs in OpenFlow

11

MPLS Implementation

• MPLS with VPLS

• Paths and VPN Coloring

• Protocol Stack Dependencies

• Complex configuration

• Requires custom NMS

• Lack of defined API

• Fast Failover using RSVP (another label)

• E-VPN MAC learning (draft)

Page 12: Architecture of dynamic VPNs in OpenFlow

12

MPLS Implementation

• Provisioning of DVPNs through NMS

• Needs topology information to provide paths

• Installs paths in RSVP, end-points in VPLS

Page 13: Architecture of dynamic VPNs in OpenFlow

13

OpenFlow Implementation

• SDN Architecture with OpenFlow 1.3

• Abstraction of the network

• Centralized Applications

• MAC Learning

• Traffic Engineering

• ECMP

• Fast Failover..

• MPLS labels

• Rate Limiting per Flow

Page 14: Architecture of dynamic VPNs in OpenFlow

14

OpenFlow Implementation

• Provisioning of DVPNs through Applications

• Has topology information available

• Traffic Engineering Application allows rerouting

• Install Paths in all intermediate P’s

Page 15: Architecture of dynamic VPNs in OpenFlow

15

Research Answers

• Can DVPNs be implemented using contemporary technologies?

• Yes, but management is complex and lacks control

• Can DVPNs be implemented using OpenFlow?

• Yes, using MPLS labels and custom applications

• What are the differences?

Page 16: Architecture of dynamic VPNs in OpenFlow

16

Comparison

MPLS OpenFlow/SDN

Tagging of VPN Traffic VPLS MPLS

MAC Scalability yes yes

Topology Discovery OSPF centralized

Path Provisioning RSVP / LDP centralized

Traffic Engineering RSVP centralized

ECMP yes yes, using Groups

BUM limiting dependent on HW per flow

BUM traffic handling flood controller

Exchange C-MACs E-VPN (draft) centralized

Traffic Rate Limiting dependent on HW per flow

Fast Failover FRR and BFD yes, using Groups*

OAM LSP Ping centralized

Page 17: Architecture of dynamic VPNs in OpenFlow

17

MPLS

Pro’s Con’s

• Known technology • Large protocol stack• No consistent

management interface• Complex NMS• E-VPN in draft

Page 18: Architecture of dynamic VPNs in OpenFlow

18

OpenFlow

Pro’s Con’s

• Learn from MPLS• MAC Exchange on PEs• Rate Limiting per Flow

• No forwarding plane monitoring

• No Northbound standard

• Reimplement intelligence

Page 19: Architecture of dynamic VPNs in OpenFlow

19

Conclusion

• MPLS lacks in manageability

• SDN architecture solves complexity

• OpenFlow missing essential carrier function

Page 20: Architecture of dynamic VPNs in OpenFlow

20

Questions?