Creation of a Virtual Overlay Network with Sdn and Vxlan

Total Page:16

File Type:pdf, Size:1020Kb

Creation of a Virtual Overlay Network with Sdn and Vxlan CREATION OF A VIRTUAL OVERLAY NETWORK WITH SDN AND VXLAN A Degree Thesis Submitted to the Faculty of the Escola Tècnica d'Enginyeria de Telecomunicació de Barcelona Universitat Politècnica de Catalunya by Fernando Lama Ruano In partial fulfilment of the requirements for the degree in Telematics ENGINEERING Advisor: Jose Luis Muñoz Tapia Barcelona, June 2017 Abstract The developed project has consisted in the creation of a virtual overlay VXLAN (Virtual Extensible LAN) between several nodes using SDN (Software Defined Networks) and more specifically the RYU framework. The idea of VXLAN is to connect two physically separated networks using the same IP block. The switches used are OVS (Open vSwitch), in them you can manually implement the VXLAN tunnel and you can also implement the SDN technology in them. But in this project we will use the framework Ryu, it is fully developed in python and with it we will create a controller that will manage and manage all the ovs of the network creating the overlay and managing the flows of each port of each switch. 1 Resum El projecte desenvolupat ha consistit en la creació d'una superposició virtual VXLAN (Virtual Extensible LAN) entre diversos nodes utilitzant SDN (Software Defined Networks) i més concretament el framework RYU. La idea d'VXLAN és connectar dues xarxes separades físicament utilitzant el mateix bloc IP. Els switchs utilitzats són OVS (Open vSwitch), en ells es pot implementar manualment el tunnel VXLAN i també es pot implementar la tecnologia SDN en ells. Però en aquest projecte utilitzarem el framework Ryu, aquesta desenvolupat íntegrament en python i amb el crearem un controlador que administrarà i gestionarà tots els OVS de la xarxa creant la superposició i gestionant els fluxos de cada port de cada switch. 2 Resumen El proyecto desarrollado ha consistido en la creación de una overlay virtual VXLAN ( Virtual Extensible LAN) entre varios nodos utilizando SDN (Software Defined Networks) y más concretamente el framework RYU. La idea de VXLAN es conectar dos redes separadas físicamente utilizando el mismo bloque IP. Los switchs utilizados son OVS ( Open vSwitch ), en ellos se puede implementar manualmente el tunnel VXLAN y también se puede implementar la tecnologia SDN en ellos. Pero en este proyecto utilizaremos el framework Ryu, esta desarrollado integramente en python y con el crearemos un controlador que administrará y gestionará todos los ovs de la red creando la overlay y gestionando los flujos de cada puerto de cada switch. 3 Acknowledgements I would like to express my gratitude to this project advisor, Jose Luis Muñoz Tapia, for having proposed this thesis' topic, as well as for keeping a periodical tracking of the thesis and suggesting ideas to improve it. 4 Revision history and approval record Revision Date Purpose 0 16/06/2017 Document creation 1 20/06/2017 Document revision DOCUMENT DISTRIBUTION LIST Name e-mail Fernando Lama Ruano [email protected] Jose Luis Muñoz Tapia [email protected] Written by: Reviewed and approved by: Fernando Lama Ruano Jose Luis Muñoz Tapia Date 16/06/2017 Date 20/06/2017 Name Fernando Lama Ruano Name Jose Luis Muñoz Tapia Position Project Author Position Project Supervisor 5 Table of contents The table of contents must be detailed. Each chapter and main section in the thesis must be listed in the “Table of Contents” and each must be given a page number for the location of a particular text. Abstract.............................................................................................................................1 Resum...............................................................................................................................2 Resumen...........................................................................................................................3 Acknowledgements............................................................................................................4 Revision history and approval record.................................................................................5 Table of contents................................................................................................................6 1.Introduction.....................................................................................................................8 1.1.Objectives................................................................................................................8 1.2.Requeriments and Specifications.............................................................................9 1.3.Methods and Procedures review..............................................................................9 1.4.Third-party resources...............................................................................................9 1.5.Work Plan.................................................................................................................9 1.6.Deviations from the original plan............................................................................12 2.State of the art of the technology used or applied in this thesis:...................................13 2.1.LXC........................................................................................................................13 2.2.OVS.......................................................................................................................13 2.3.VXLAN...................................................................................................................13 2.4.SDN.......................................................................................................................14 2.5.RYU.......................................................................................................................14 3.Methodology / project development:.............................................................................15 3.1.Getting Started in Ryu............................................................................................15 3.2.Defining the scenario..............................................................................................15 3.3.Configuration file....................................................................................................16 3.4.Implementing Ryu Controller..................................................................................17 3.5.REST API...............................................................................................................17 4.Results..........................................................................................................................18 4.1.Testing....................................................................................................................18 4.2.Testing REST API...................................................................................................19 5.Budget..........................................................................................................................22 6 6.Conclusions and future development:...........................................................................23 Bibliography:....................................................................................................................24 Glossary..........................................................................................................................25 Appendices:.....................................................................................................................26 7 1. Introduction An Introduction that clearly states the rationale of the thesis that includes: a. Statement of purpose (objectives). b. Requirements and specifications. c. Methods and procedures, citing if this work is a continuation of another project or it uses applications, algorithms, software or hardware previously developed by other authors. d. Work plan with tasks, milestones and a Gantt diagram. e. Description of the deviations from the initial plan and incidences that may have occurred. The minimum chapters that this thesis document should have are described below, nevertheless they can have different names and more chapters can be added. In the introductory section an overview of the project is explained, including: Objectives, requirements and specifications, methods and procedures, work plan, deviations from the initial plan and incidences. 1.1. Objectives The purpose of this project has been to learn how to use the Ryu framework in order to create and manage the VXLAN overlay in a specific scenario. The basic objectives have been to understand how all the technologies involved work: VXLAN, SDN, LXC, OVS, RYU. In order to know the possibilities and potential of each one of them. The main objectives have been: - Create a VXLAN tunnel between two OVS with RYU. - Manage the flows of each port with a RYU controller. - Make the two previous goals scalable to create the overlay between more nodes. - Add REST API functionality to the controller. 8 1.2. Requeriments and Specifications The requirements of this project can be separated into two groups: Theoretical requirements: o Knowledge of VXLAN overlay. o Knowledge of SDN. o Knowledge of Ryu APi and python. Practical requirements: o Use of Linux. o LXC virtual containers (virtual machines in the scenarios). o Use of OVS (Open vSwitch) 1.3. Methods and Procedures review The following procedures have been done during the project: Studying how works VXLAN. Studying how works SDN in OVS. Studying Ryu API. Develop
Recommended publications
  • Cisco Nexus 1000V Switch for KVM Data Sheet
    Data Sheet Cisco Nexus 1000V Switch for KVM Product Overview Bring enterprise-class networking features to OpenStack cloud operating system environments. The Cisco Nexus ® 1000V Switch for the Ubuntu Kernel-based Virtual Machine (KVM) reduces the operating complexity associated with virtual machine networking. Together with the OpenStack cloud operating system, this switch helps you gain control of large pools of computing, storage, and networking resources. The Cisco Nexus 1000V Switch provides a comprehensive and extensible architectural platform for virtual machine and cloud networking. This switch is designed to accelerate your server virtualization and multitenant cloud deployments in a secure and operationally transparent manner. Operating as a distributed switching platform, the Cisco Nexus 1000V enhances the visibility and manageability of your virtual and cloud networking infrastructure. It supports multiple hypervisors and many networking services and is tightly integrated with multiple cloud management systems. The Cisco Nexus 1000V Switch for KVM offers enterprise-class networking features to OpenStack cloud operating system environments, including: ● Advanced switching features such as access control lists (ACLs) and port-based access control lists (PACLS). ● Support for highly scalable, multitenant virtual networking through Virtual Extensible LAN (VXLAN). ● Manageability features such as Simple Network Management Protocol (SNMP), NETCONF, syslog, and advanced troubleshooting command-line interface (CLI) features. ● Strong north-bound management interfaces including OpenStack Neutron plug-in support and REST APIs. Benefits The Cisco Nexus 1000V Switch reduces the operational complexity associated with virtual machine networking and enables you to accomplish the following: ● Easily deploy your Infrastructure-as-a-service (IaaS) networks ◦ As the industry’s leading networking platform, the Cisco Nexus 1000V delivers performance, scalability, and stability with familiar manageability and control.
    [Show full text]
  • CCNA-Cloud -CLDFND-210-451-Official-Cert-Guide.Pdf
    ptg17120290 CCNA Cloud CLDFND 210-451 Official Cert Guide ptg17120290 GUSTAVO A. A. SANTANA, CCIE No. 8806 Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii CCNA Cloud CLDFND 210-451 Official Cert Guide CCNA Cloud CLDFND 210-451 Official Cert Guide Gustavo A. A. Santana Copyright© 2016 Pearson Education, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing April 2016 Library of Congress Control Number: 2015957536 ISBN-13: 978-1-58714-700-5 ISBN-10: 1-58714-7009 Warning and Disclaimer ptg17120290 This book is designed to provide information about the CCNA Cloud CLDFND 210-451 exam. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
    [Show full text]
  • Solving the Virtualization Conundrum
    White Paper Solving the Virtualization Conundrum Collapsing hierarchical, multi-tiered networks of the past into more compact, resilient, feature rich, two-tiered, leaf- spine or SplineTM networks have clear advantages in the data center. The benefits of more scalable and more stable layer 3 networks far outweigh the challenges this architecture creates. Layer 2 networking fabrics of the past lacked stability and scale. This legacy architecture limited workload size, mobility, and confined virtual workloads to a smaller set of physical servers. As virtualization scaled in the data center, the true limitations of these fabrics quickly surfaced. The economics of workload convergence drives compute density and network scale. Similarly, to meet dynamic needs of business stakeholders, growing data centers must deliver better mobility and its administration must be automated. In essence, virtualized networks must scale, be stable and be programmatically administered! What the Internet has taught us is that TCP/IP architectures are reliable, fault tolerant, and built to last. Why create yet another fabric when we can leverage open standards and all the benefits that layer 3 networks provide. With this settled, we can work to develop an overlay technology to span layer two networks over a stable IP infrastructure. This is how Virtual eXtensible LAN (VXLAN) was born. arista.com White Paper At Arista we work to bring VXLAN to the mainstream by co-authoring the standard with industry virtualization leaders. We’re also innovating programmatic services and APIs that automate virtualized workflow management, monitoring, visualization and troubleshooting. VXLAN is designed from the ground up to leverage layer 3 IP underlays and the scale and stability it provides.
    [Show full text]
  • Understanding Linux Internetworking
    White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Introduction Layer 2 vs. Layer 3 Internetworking................ 2 The Internet: the largest internetwork ever created. In fact, the Layer 2 Internetworking on term Internet (with a capital I) is just a shortened version of the Linux Systems ............................................... 3 term internetwork, which means multiple networks connected Bridging ......................................................... 3 together. Most companies create some form of internetwork when they connect their local-area network (LAN) to a wide area Spanning Tree ............................................... 4 network (WAN). For IP packets to be delivered from one Layer 3 Internetworking View on network to another network, IP routing is used — typically in Linux Systems ............................................... 5 conjunction with dynamic routing protocols such as OSPF or BGP. You c an e as i l y use Linux as an internetworking device and Neighbor Table .............................................. 5 connect hosts together on local networks and connect local IP Routing ..................................................... 6 networks together and to the Internet. Virtual LANs (VLANs) ..................................... 7 Here’s what you’ll learn in this paper: Overlay Networks with VXLAN ....................... 9 • The differences between layer 2 and layer 3 internetworking In Summary ................................................. 10 • How to configure IP routing and bridging in Linux Appendix A: The Basics of TCP/IP Addresses ....................................... 11 • How to configure advanced Linux internetworking, such as VLANs, VXLAN, and network packet filtering Appendix B: The OSI Model......................... 12 To create an internetwork, you need to understand layer 2 and layer 3 internetworking, MAC addresses, bridging, routing, ACLs, VLANs, and VXLAN. We’ve got a lot to cover, so let’s get started! Understanding Linux Internetworking 1 Layer 2 vs.
    [Show full text]
  • Infrastructure : Netapp Solutions
    Infrastructure NetApp Solutions NetApp October 06, 2021 This PDF was generated from https://docs.netapp.com/us-en/netapp-solutions/infra/rhv- architecture_overview.html on October 06, 2021. Always check docs.netapp.com for the latest. Table of Contents Infrastructure . 1 NVA-1148: NetApp HCI with Red Hat Virtualization. 1 TR-4857: NetApp HCI with Cisco ACI . 84 Workload Performance. 121 Infrastructure NVA-1148: NetApp HCI with Red Hat Virtualization Alan Cowles, Nikhil M Kulkarni, NetApp NetApp HCI with Red Hat Virtualization is a verified, best-practice architecture for the deployment of an on- premises virtual datacenter environment in a reliable and dependable manner. This architecture reference document serves as both a design guide and a deployment validation of the Red Hat Virtualization solution on NetApp HCI. The architecture described in this document has been validated by subject matter experts at NetApp and Red Hat to provide a best-practice implementation for an enterprise virtual datacenter deployment using Red Hat Virtualization on NetApp HCI within your own enterprise datacenter environment. Use Cases The NetApp HCI for Red Hat OpenShift on Red Hat Virtualization solution is architected to deliver exceptional value for customers with the following use cases: 1. Infrastructure to scale on demand with NetApp HCI 2. Enterprise virtualized workloads in Red Hat Virtualization Value Proposition and Differentiation of NetApp HCI with Red Hat Virtualization NetApp HCI provides the following advantages with this virtual infrastructure solution: • A disaggregated architecture that allows for independent scaling of compute and storage. • The elimination of virtualization licensing costs and a performance tax on independent NetApp HCI storage nodes.
    [Show full text]
  • Hypervisor Based Password Security
    HyperPass: Hypervisor Based Password Security James "Murphy" McCauley, Radhika Mittal Abstract Phishing attacks: It has been shown that it is quite Passwords are the linchpin in the security of an increasing possible to fool users into divulging passwords and other number of online services – services that range from private data [11]. While some are quick to dismiss such social networking to business communication to banking. attacks as “user error”, phishing can be coupled with Given their importance, it is unfortunate that passwords network-based attacks or can incorporate techniques such are relatively easily stolen using a number of different as homograph domain names to create user experiences types of attack. We introduce HyperPass: an approach that are very difficult to differentiate from legitimate ones. and proof-of-concept system that aims to prevent some of Attacking hosts: By compromising a user’s machine, these attacks by moving passwords from a user’s normal passwords can be stolen directly in any of several operating environment into a secure hypervisor. Notably, ways, e.g., by examining HTTP post data, reading them this is done while maintaining compatibility with existing from browser password managers, or logging keystrokes. online services, applications, and operating systems. These techniques have been used by botnets (the Torpig botnet alone steals a password every second [30]) as well 1 Introduction as by off-the-shelf “spyware” which has even been pre- installed on rental computers [24]. While preventing Passwords are the linchpin of online security. Certainly, this sort of host compromise is an ongoing effort by both there are other major technologies involved in cyberse- industry and academia, it continues to be an elusive goal.
    [Show full text]
  • Oracle® Linux Virtualization Manager Getting Started Guide
    Oracle® Linux Virtualization Manager Getting Started Guide F25124-11 September 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Circuit‐Based Logical Layer 2 Bridging in Software‐Defined Data Center Networking
    Received: 2 November 2018 Revised: 3 May 2019 Accepted: 13 July 2019 DOI: 10.1002/dac.4128 RESEARCH ARTICLE Circuit‐based logical layer 2 bridging in software‐defined data center networking Yao‐Chun Wang | Ying‐Dar Lin Computer Science, National Chiao Tung Summary University, Hsinchu, Taiwan With the expansion of the size of data centers, software‐defined networking Correspondence (SDN) is becoming a trend for simplifying the data center network manage- Yao‐Chun Wang, Computer Science, National Chiao Tung University, Hsinchu, ment with central and flexible flow control. To achieve L2 abstractions in a Taiwan. multitenant cloud, Open vSwitch (OVS) is commonly used to build overlay Email: [email protected] tunnels (eg, Virtual eXtensible Local Area Network [VXLAN]) on top of existing underlying networks. However, the poor VXLAN performance of OVS is of huge concern. Instead of solving the performance issues of OVS, in this paper, we proposed a circuit‐based logical layer 2 bridging mechanism (CBL2), which builds label‐switched circuits and performs data‐plane multicasting in a software‐defined leaf‐spine fabric to achieve scalable L2 without overlay tunneling. Our evaluations indicate that direct transmission in OVS improves throughput performance by 58% compared with VXLAN tunneling, and data‐ plane multicasting for ARP reduces address resolution latency from 149 to 0.5 ms, compared with control‐plane broadcast forwarding. The evaluation results also show that CBL2 provides 0.6, 0.4, and 11‐ms protection switching time, respectively, in the presence of switch failure, link failure, and port shutdown in practical deployment. KEYWORDS cloud, datacenter, layer 2, multitenancy, network virtualization, OpenFlow, SDN 1 | INTRODUCTION Infrastructure‐as‐a‐Service (IaaS)1 providers enable enterprise customers (who are also called tenants) to obtain flex- ible and on‐demand virtualized infrastructures, by using virtualization technologies that share the computing resources (eg, servers, storages, and networks) in a data center.
    [Show full text]
  • Increase Nfvi Performance and Flexibility
    SOLUTION BRIEF Telecommunications Server Performance Increase NFVi Performance and Flexibility Offload processing from software to hardware to create efficiency with HCL’s 50G Open vSwitch acceleration solution on the Intel® FPGA Programmable Acceleration Card (PAC) N3000. Eliminating the Performance Bottleneck In order to survive in a wildly competitive and ever-evolving industry, communications service providers (CoSPs) need to achieve the best performance possible, overcoming the bottlenecks that slow down their servers. With consistently growing numbers of subscribers, numbers of competitors, and advances in technology, the need for a CoSP to differentiate itself grows concurrently. The need for power efficiency is ever-present, as is the pressure to manage total cost of ownership (TCO) with cost-effective solutions. Intel and HCL had these challenges in mind when they collaborated on a joint solution that features Intel hardware and HCL software. Using the Intel FPGA Programmable Acceleration Card (Intel FPGA PAC) N3000, HCL has created a solution that can dramatically increase performance and preserve flexibility for network functions virtualization infrastructure (NFVi) routing and switching. Open vSwitch (OvS) is a production-quality, multilayer virtual switch that can also implement a software-defined networking (SDN)-based What Is the Intel FPGA approach that is crucial to creating a closed-loop, fully automated solution in NFVi. PAC N3000? With aggressive software optimization to offload NFVi forwarding functionalities The Intel FPGA Programmable to the Intel FPGA PAC N3000, Intel and HCL have created a system that can provide Acceleration Card (Intel FPGA the Intel FPGA–based solution, supported by selected NFVi suppliers. PAC) N3000 is a PAC that has OvS can either forward packets through a kernel-based datapath or by using the the right memory mixture for Linux Data Plane Development Kit (DPDK).
    [Show full text]
  • Linux Networking 101
    The Gorilla ® Guide to… Linux Networking 101 Inside this Guide: • Discover how Linux continues its march toward world domination • Learn basic Linux administration tips • See how easy it can be to build your entire network on a Linux foundation • Find out how Cumulus Linux is your ticket to networking freedom David M. Davis ActualTech Media Helping You Navigate The Technology Jungle! In Partnership With www.actualtechmedia.com The Gorilla Guide To… Linux Networking 101 Author David M. Davis, ActualTech Media Editors Hilary Kirchner, Dream Write Creative, LLC Christina Guthrie, Guthrie Writing & Editorial, LLC Madison Emery, Cumulus Networks Layout and Design Scott D. Lowe, ActualTech Media Copyright © 2017 by ActualTech Media. All rights reserved. No portion of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations. The information provided within this eBook is for general informational purposes only. While we try to keep the information up- to-date and correct, there are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained in this book for any purpose. Any use of this information is at your own risk. ActualTech Media Okatie Village Ste 103-157 Bluffton, SC 29909 www.actualtechmedia.com Entering the Jungle Introduction: Six Reasons You Need to Learn Linux ....................................................... 7 1. Linux is the future ........................................................................ 9 2. Linux is on everything .................................................................. 9 3. Linux is adaptable ....................................................................... 10 4. Linux has a strong community and ecosystem ........................... 10 5.
    [Show full text]
  • Network Service in Openstack Cloud
    Network Service in OpenStack Cloud Yaohui Jin email: [email protected] Sina Weibo: @bright_jin (The slides will be shared in Sina Weipan & Slideshare ) Network & Information Center © jinyh@sjtu Acknowledgement Team: Dr. Xuan Luo, Pengfei Zhang, Xiaosheng Zuo, Zhixing Xu, Xinyu Xu, Jianwen Wei, Baoqing Huang, etc. Prof. Hongfang Yu and team with UESTC Prof. Jianping Wang with CityU HK Engineers, discussion and slides from Intel, SINA, IBM, Cisco, Dell, VMware/EMC, H3C, Huawei, IXIA, … OpenStack Community China OpenStack User Group (COSUG) China OpenStack Cloud League (COSCL) Technical blogs such as blog.ioshints.info, ipspace.net, … © jinyh@sjtu 2 About me 上海交通大学 教授,以前做光通信的,现在改行 做云计算了。。。 上海交通大学 网络信息中心 副主任,其实就是 个苦逼的挨踢网管啊。。。 研究兴趣: 数据中心网络,海量流式数据分析, 云计算架构 © jinyh@sjtu 3 OpenStack in Academia for Research & Operation USC, Information Science Institute Purdue University University of Melbourne San Diego Supercomputer Center Brookhaven National Lab., DOE Argonne National Lab., DOE European Organization for Nuclear Research (CERN) Shanghai Jiao Tong University University of Science & Technology of China University of Electrical Science & Technology of China …… © jinyh@sjtu 4 Agenda Introduction SDN and OpenFlow Network Virtualization Network Virtualization in OpenStack Our Work © jinyh@sjtu 5 The Service Trend "Decoupling infrastructure management from service management can lead to innovation, new business models, and a reduction in the complexity of running services. It is happening in the world of computing, and is poised to happen in networking.“ Jennifer Rexford Professor, Princeton University Last month, VMware paid $1.2B to acquire Nicira for software defined networking (SDN). © jinyh@sjtu 6 Why is Nicira worth $1.2 billion? © jinyh@sjtu 7 SDN and OpenFlow © jinyh@sjtu Software Defined Network (SDN) A network architecture in which the network control plane (OS) is decoupled from the physical topology using open protocols such as OpenFlow.
    [Show full text]
  • A Performance Study of VM Live Migration Over the WAN
    Master Thesis Electrical Engineering April 2015 A Performance Study of VM Live Migration over the WAN TAHA MOHAMMAD CHANDRA SEKHAR EATI Department of Communication Systems Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering on Telecommunication Systems. The thesis is equivalent to 40 weeks of full time studies. Contact Information: Author(s): Taha Mohammad, Chandra Sekhar Eati. E-mail: [email protected], [email protected]. University advisor(s): Dr. Dragos Ilie, Department of Communication Systems. University Examiner(s): Prof. Kurt Tutschku, Department of Communication Systems. School of Computing Blekinge Institute of Technology Internet : www.bth.se SE-371 79 Karlskrona Phone : +46 455 38 50 00 Sweden Fax : +46 455 38 50 57 Abstract Virtualization is the key technology that has provided the Cloud computing platforms a new way for small and large enterprises to host their applications by renting the available resources. Live VM migration allows a Virtual Machine to be transferred form one host to another while the Virtual Machine is active and running. The main challenge in Live migration over WAN is maintaining the network connectivity during and after the migration. We have carried out live VM migration over the WAN migrating different sizes of VM memory states and presented our solutions based on Open vSwitch/VXLAN and Cisco GRE approaches. VXLAN provides the mobility support needed to maintain the network connectivity between the client and the Virtual machine.
    [Show full text]