SlideShare una empresa de Scribd logo
1 de 14
INTRODUCTION TO   PENFLOW
STATEMENT OF PRODUCT DIRECTION




This statement of product direction sets forth Juniper Networks‟
current intention and is subject to change at any time without
notice. No purchases are contingent upon Juniper Networks
delivering any feature or functionality depicted in this
presentation.




2                     Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW – WHAT IS IT?
Openflow compromises an architecture and a protocol
In a traditional networking device, the control processes and
forwarding functionality reside on the network device

                                                                                                      penflow
     Control                                                           Control            penflow   Controller


    Forwarding                                                          Forwarding

               Traditional                Openflow-enabled

In the Openflow architecture, an interface is created on the
network device through which an external control process known
as a „controller‟, is able the program the packet matching and
forwarding operations of the networking device

3                            Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
OPENFLOW – WHAT IS IT?
The Openflow protocol defines
     A standardized API and communication method between the external
      controller and Openflow process on the networking device
     The use of „Flow-tables‟ held on the networking device which are
      populated by the external controller which are used for matching and
      forwarding packets
Openflow Flow-tables contain
     Header Fields – fields against which a packet can be matched
     Counters – statistics reporting capabilities
     Actions – defining how the packet should be treated (forward, drop,
      modify)

There is no use of static configuration or cli/xml-based programming
via Openflow, nor does Openflow provide functionality to boot or
maintain the networking device



4                          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW 1.0 FLOW TABLE & FIELDS
                    Ingress           Ethernet                        VLAN                          IP                       TCP/UDP
    Header Fields     Port    SA         DA         Type         ID      Priority      SA      DA        Proto   TOS        Src   Dst




                         Classifier                      Action                        Statistics
                         Classifier                      Action                        Statistics
    Flow Table           Classifier                      Action                        Statistics
    OF1.0 style




                                                             …
                         Classifier                      Action                        Statistics

                                                                       Physical Port
                                                                                      ALL
                                                                               CONTROLLER
    Actions                                 Forward            Virtual
                                                                                    LOCAL
                                                                Port
                                                                                    TABLE
                                                                                    IN_PORT
                                                                                                         Mandatory Action
                                                                      Drop
                                                               Virtual              NORMAL                Optional Action
                                            Forward
                                                                Port                FLOOD
                                                                Enqueue
                                                               Modify Field

5                                  Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

                                                                                                                     Actions
OPENFLOW – WHAT IS IT?
Two components
     Openflow controller
       Controls one or more switches
       Computes paths, maintains state, formulates flows and programs
        Openflow Switches
     Openflow Switch
       Receives commands (flow entries, queries) from the Openflow
        controller in order to populate entries in the flow-table
       Holds the flow-table in volatile memory

Flow-table population can occur in two modes
     Reactive – Flow-table programmed in response to received packet
     Proactive – Flow-table is populated with pre-provisioned entries



6                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MODES OF OPERATION

    Reactive – Data plane driven                                            Pro-active – Configuration driven
                                                                            •        Like Static routes & LSPs
            Base principle of flow caching
                                                                            •        Not stored in configuration file



              Controller         FIB                                                  Controller           FIB

                                       C
                            4



                      Switch     FIB                                                              Switch   FIB

                1                2                3                                      1                 2            3


        1.     Receive packet                                                   1.     Receive packet
        2.     Perform lookup in local FIB                                      2.     Perform lookup in local FIB
        3.     Hit: forward to port                                             3.     Hit: forward to port
        4.     Miss: forward to controller                                      4.     Miss: DROP
                 Controller inspects packet
                 Performs route computation
                 C: Inserts new flow entry

7                                          Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
OPENFLOW SWITCH / NETWORK DESIGN

                                   Switch Control Plane
                                          Applications                                                  Switch Control Plane:
                                                                                                        • Logically centralized
                                       OpenFlow Controller
                                                                                                        • Physically distributed in one
                                                                                                          or more compute devices
                                                                                                        • Embedded OF Controller to
                        OpenFlow                                                                          communicate with switches
                        Protocol

                                                                          penflow switch
                                  penflow switch


                penflow switch                     penflow switch



                                 penflow switch                          penflow switch




Source: OpenFlow.org




8                                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE ISSUE:
APPLICATIONS DON’T COMMUNICATE WITH THE NETWORK

           THE HUMAN WORLD                                                           THE NETWORK WORLD


          Network Aware Applications:                                                     Application Aware Networking:
          Applications blindly probe the network                                          Networks spy on traffic to try to
          to understand what it can deliver                                               understand applications


             Game ping-stats, Doppler, Geo-                                                  Deep Packet Inspection, Deep
              location, whois, proprietary                                                     Flow Inspection
              codecs, proprietary control
                                                                                              Approximate application by
              channels in VBRB
                                                                                               fingerprinting
             Approximate topology/location
                                                                                              Service specific overlay topologies
              thru:
                                                                                              Application-based Quality of
             Active/game-based broadcast,
                                                                                               Service profiles
              passive derivation



      Current approximation techniques are barely sufficient and inefficient
  9                                Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OPENFLOW HELPS BY ENABLING NETWORK
          PROGRAMMABILITY FOR COMMUNICATION




       APPLICATION                     NETWORK                               NETWORK                       APPLICATION



         Applications made better by                                    Networks made better by information
          information from network                                               from application
      Understanding of end-device                                           Bandwidth and resource optimization
       capabilities                                                          New service topologies
      Real location / topology                                              Security identification
      Adjust behavior to real-time usage                                    Service-specific packet treatment
      Billing granularity




     Flexibility of service placement                                                Control of resources from
                                                                                           applications

10                                 Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
HOW DO YOU MAKE THIS HAPPEN?
THE APPLICATION WORLD                                                                             THE APPLICATION WORLD

                                                  Real-time topology
                                                    understanding
                                                   (ALTO, BGP-TE)                                    SI       ISV      Service             Research             Enterprise
                                                                                                   Partner   Partner   Provider            Institution          Customer




                                                Steering traffic through                                        Web Services API
                                                    optimal paths
                                                        (PCE)
                             Network                                                                    Orchestration Across Networks
                          Programmability
                                               Selecting specific traffic




                                                                                                                                                                   OpenFlow
                                                                                                                                  BGP-TE
                                                    (OpenFlow)




                                                                                                                          ALTO




                                                                                                                                                         Mgmt
                                                                                                                                              PCE
                                                                                                   Network APIs




                                                                                                                                                                              …
                                              Opening more touchpoints
                                             to control: Gateways, billing
                                                  collectors, service
                                              appliances, CDN, DPI/IDP


THE NETWORK WORLD                                                                                   THE NETWORK WORLD
   11
  Programmable Networking is SFW            Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
AN EXAMPLE: BE “IN THE NETWORK”
Weak architecture = one-legged tap dancing                             Continuous, real-time streaming of surrounding
                                                                             content, resources, places, people



Where am I?                              I am here!
                                                                                                                           And this is
                                                                        You’re here!                                      around you:
                                    Active broadcast                    <access>
                                    Game broadcast                                                                        <content>
                                                                        <capability>                                      <resources>
                                    Passive                               <BW>
                                     derivation                                                                             <places>
                                                                          <profile>                                         <people>
                                                                                                                               …




         !     “Above the topology”
              “Visualize the topology”
               “Below the topology”
                                                                                                 “In the topology”



      Low value in navigational coordinates                                                       APPLICATION   NETWORK




12                                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
WANT MORE ON OPENFLOW?
Useful URLs:
Open Networking Foundation https://www.opennetworking.org/
Openflow Whitepaper
http://www.openflow.org//documents/openflow-wp-latest.pdf
Openflow protocol
https://www.opennetworking.org/standards/open-flow/50-
openflow




13                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
Introduction to PenFlow: OpenFlow and Programmable Networking

Más contenido relacionado

La actualidad más candente

FEX -PPT By NETWORKERS HOME
FEX -PPT By NETWORKERS HOMEFEX -PPT By NETWORKERS HOME
FEX -PPT By NETWORKERS HOMEnetworkershome
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and CloudPriyanka Aash
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWSounil Yu
 
C7 Réseaux : couche transport
C7 Réseaux : couche transportC7 Réseaux : couche transport
C7 Réseaux : couche transportPRONETIS
 
VTP(Virtual Trunking Protocol)
VTP(Virtual Trunking Protocol)VTP(Virtual Trunking Protocol)
VTP(Virtual Trunking Protocol)Sirine Ibrahim
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-expressNguyen Thanh
 
RYU Introduction
RYU IntroductionRYU Introduction
RYU IntroductionNCTU
 
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : Commutation
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : CommutationAlphorm.com Formation CCNP ENCOR 350-401 (1of8) : Commutation
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : CommutationAlphorm
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
Alphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm
 
Audit et sécurité informatique
Audit et sécurité informatiqueAudit et sécurité informatique
Audit et sécurité informatiqueMohamed Habib Jomaa
 
PTS_Hardware_Installation_Guide_A29.pdf
PTS_Hardware_Installation_Guide_A29.pdfPTS_Hardware_Installation_Guide_A29.pdf
PTS_Hardware_Installation_Guide_A29.pdfElisngelaMateus
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorialopenflow
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
Designing Multi-tenant Data Centers Using EVPN
Designing Multi-tenant Data Centers Using EVPNDesigning Multi-tenant Data Centers Using EVPN
Designing Multi-tenant Data Centers Using EVPNAnas
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 

La actualidad más candente (20)

FEX -PPT By NETWORKERS HOME
FEX -PPT By NETWORKERS HOMEFEX -PPT By NETWORKERS HOME
FEX -PPT By NETWORKERS HOME
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
C7 Réseaux : couche transport
C7 Réseaux : couche transportC7 Réseaux : couche transport
C7 Réseaux : couche transport
 
VTP(Virtual Trunking Protocol)
VTP(Virtual Trunking Protocol)VTP(Virtual Trunking Protocol)
VTP(Virtual Trunking Protocol)
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express
 
Introduction XSS
Introduction XSSIntroduction XSS
Introduction XSS
 
RYU Introduction
RYU IntroductionRYU Introduction
RYU Introduction
 
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : Commutation
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : CommutationAlphorm.com Formation CCNP ENCOR 350-401 (1of8) : Commutation
Alphorm.com Formation CCNP ENCOR 350-401 (1of8) : Commutation
 
ONOS
ONOSONOS
ONOS
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Alphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentiel
 
Audit et sécurité informatique
Audit et sécurité informatiqueAudit et sécurité informatique
Audit et sécurité informatique
 
PTS_Hardware_Installation_Guide_A29.pdf
PTS_Hardware_Installation_Guide_A29.pdfPTS_Hardware_Installation_Guide_A29.pdf
PTS_Hardware_Installation_Guide_A29.pdf
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
Designing Multi-tenant Data Centers Using EVPN
Designing Multi-tenant Data Centers Using EVPNDesigning Multi-tenant Data Centers Using EVPN
Designing Multi-tenant Data Centers Using EVPN
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 

Destacado

Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVKingston Smiler
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Radhika Hirannaiah
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginnersDave Neary
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowrjain51
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 

Destacado (6)

Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFV
 
OpenFlow Group Table
OpenFlow Group TableOpenFlow Group Table
OpenFlow Group Table
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 

Similar a Introduction to PenFlow: OpenFlow and Programmable Networking

Open stack with_openflowsdn-torii
Open stack with_openflowsdn-toriiOpen stack with_openflowsdn-torii
Open stack with_openflowsdn-toriiHui Cheng
 
Openflow overview
Openflow overviewOpenflow overview
Openflow overviewopenflowhub
 
Developing SDN apps in Ryu
Developing SDN apps in RyuDeveloping SDN apps in Ryu
Developing SDN apps in RyuChe Wei Lin
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overviewmscohen02
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerHolger Winkelmann
 
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
 
Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC DVClub
 
Introduction to flow analysis
Introduction to flow analysisIntroduction to flow analysis
Introduction to flow analysisProQSys
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleLuis Nagasako
 
Alcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg ErlichAlcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg ErlichAlcatel-Lucent Cloud
 
OpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGOpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGTail-f Systems
 
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 TaiwanPlugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 TaiwanRack Lin
 
Openlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sionOpenlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sionCcie Light
 
Sdn and open flow tutorial 4
Sdn and open flow tutorial 4Sdn and open flow tutorial 4
Sdn and open flow tutorial 4UmaMahesh Sistu
 
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」Sho Shimizu
 

Similar a Introduction to PenFlow: OpenFlow and Programmable Networking (20)

Hybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF SessionHybrid Programmable Forwarding Planes: BoF Session
Hybrid Programmable Forwarding Planes: BoF Session
 
Open stack with_openflowsdn-torii
Open stack with_openflowsdn-toriiOpen stack with_openflowsdn-torii
Open stack with_openflowsdn-torii
 
Openflow overview
Openflow overviewOpenflow overview
Openflow overview
 
Developing SDN apps in Ryu
Developing SDN apps in RyuDeveloping SDN apps in Ryu
Developing SDN apps in Ryu
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overview
 
PLC
PLCPLC
PLC
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow Controller
 
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANG
 
Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC Approaches for Power Management Verification of SOC
Approaches for Power Management Verification of SOC
 
Introduction to flow analysis
Introduction to flow analysisIntroduction to flow analysis
Introduction to flow analysis
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_module
 
SDN – Hybrid architecture
SDN – Hybrid architectureSDN – Hybrid architecture
SDN – Hybrid architecture
 
Alcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg ErlichAlcatel-Lucent ETSI Workshop with Peleg Erlich
Alcatel-Lucent ETSI Workshop with Peleg Erlich
 
OpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANGOpenFlow Switch Management using NETCONF and YANG
OpenFlow Switch Management using NETCONF and YANG
 
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 TaiwanPlugin-able POS Solutions by Javascript @HDM9 Taiwan
Plugin-able POS Solutions by Javascript @HDM9 Taiwan
 
Openlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sionOpenlab.2014 02-13.major.vi sion
Openlab.2014 02-13.major.vi sion
 
XS Boston 2008 XenLoop
XS Boston 2008 XenLoopXS Boston 2008 XenLoop
XS Boston 2008 XenLoop
 
Sdn and open flow tutorial 4
Sdn and open flow tutorial 4Sdn and open flow tutorial 4
Sdn and open flow tutorial 4
 
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
第2回クラウドネットワーク研究会 「OpenFlowコントローラとその実装」
 

Más de Juniper Developer Resources Cooney (13)

An In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDKAn In-Depth Look at Junos Space SDK
An In-Depth Look at Junos Space SDK
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
Junos Space SDK
Junos Space SDKJunos Space SDK
Junos Space SDK
 
Junos SDK Data Sheet
Junos SDK Data SheetJunos SDK Data Sheet
Junos SDK Data Sheet
 
Macadamian And Junos SDK
Macadamian And Junos SDKMacadamian And Junos SDK
Macadamian And Junos SDK
 
For Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about ProgrammabilityFor Developers: Why Should I Care about Programmability
For Developers: Why Should I Care about Programmability
 
Joulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success StoryJoulex & Junos Space SDK: Customer Success Story
Joulex & Junos Space SDK: Customer Success Story
 
Junos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for DevelopersJunos Space SDK: Unlocking Data for Developers
Junos Space SDK: Unlocking Data for Developers
 
Shifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network ProgrammabilityShifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network Programmability
 
The New Network is Programmable with Junos
The New Network is Programmable with JunosThe New Network is Programmable with Junos
The New Network is Programmable with Junos
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Introduction to PenFlow: OpenFlow and Programmable Networking

  • 1. INTRODUCTION TO PENFLOW
  • 2. STATEMENT OF PRODUCT DIRECTION This statement of product direction sets forth Juniper Networks‟ current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted in this presentation. 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. OPENFLOW – WHAT IS IT? Openflow compromises an architecture and a protocol In a traditional networking device, the control processes and forwarding functionality reside on the network device penflow Control Control penflow Controller Forwarding Forwarding Traditional Openflow-enabled In the Openflow architecture, an interface is created on the network device through which an external control process known as a „controller‟, is able the program the packet matching and forwarding operations of the networking device 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. OPENFLOW – WHAT IS IT? The Openflow protocol defines  A standardized API and communication method between the external controller and Openflow process on the networking device  The use of „Flow-tables‟ held on the networking device which are populated by the external controller which are used for matching and forwarding packets Openflow Flow-tables contain  Header Fields – fields against which a packet can be matched  Counters – statistics reporting capabilities  Actions – defining how the packet should be treated (forward, drop, modify) There is no use of static configuration or cli/xml-based programming via Openflow, nor does Openflow provide functionality to boot or maintain the networking device 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. OPENFLOW 1.0 FLOW TABLE & FIELDS Ingress Ethernet VLAN IP TCP/UDP Header Fields Port SA DA Type ID Priority SA DA Proto TOS Src Dst Classifier Action Statistics Classifier Action Statistics Flow Table Classifier Action Statistics OF1.0 style … Classifier Action Statistics Physical Port ALL CONTROLLER Actions Forward Virtual LOCAL Port TABLE IN_PORT Mandatory Action Drop Virtual NORMAL Optional Action Forward Port FLOOD Enqueue Modify Field 5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Actions
  • 6. OPENFLOW – WHAT IS IT? Two components  Openflow controller  Controls one or more switches  Computes paths, maintains state, formulates flows and programs Openflow Switches  Openflow Switch  Receives commands (flow entries, queries) from the Openflow controller in order to populate entries in the flow-table  Holds the flow-table in volatile memory Flow-table population can occur in two modes  Reactive – Flow-table programmed in response to received packet  Proactive – Flow-table is populated with pre-provisioned entries 6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 7. MODES OF OPERATION Reactive – Data plane driven Pro-active – Configuration driven • Like Static routes & LSPs  Base principle of flow caching • Not stored in configuration file Controller FIB Controller FIB C 4 Switch FIB Switch FIB 1 2 3 1 2 3 1. Receive packet 1. Receive packet 2. Perform lookup in local FIB 2. Perform lookup in local FIB 3. Hit: forward to port 3. Hit: forward to port 4. Miss: forward to controller 4. Miss: DROP  Controller inspects packet  Performs route computation  C: Inserts new flow entry 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. OPENFLOW SWITCH / NETWORK DESIGN Switch Control Plane Applications Switch Control Plane: • Logically centralized OpenFlow Controller • Physically distributed in one or more compute devices • Embedded OF Controller to OpenFlow communicate with switches Protocol penflow switch penflow switch penflow switch penflow switch penflow switch penflow switch Source: OpenFlow.org 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. THE ISSUE: APPLICATIONS DON’T COMMUNICATE WITH THE NETWORK THE HUMAN WORLD THE NETWORK WORLD Network Aware Applications: Application Aware Networking: Applications blindly probe the network Networks spy on traffic to try to to understand what it can deliver understand applications  Game ping-stats, Doppler, Geo-  Deep Packet Inspection, Deep location, whois, proprietary Flow Inspection codecs, proprietary control  Approximate application by channels in VBRB fingerprinting  Approximate topology/location  Service specific overlay topologies thru:  Application-based Quality of  Active/game-based broadcast, Service profiles passive derivation Current approximation techniques are barely sufficient and inefficient 9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 10. OPENFLOW HELPS BY ENABLING NETWORK PROGRAMMABILITY FOR COMMUNICATION APPLICATION NETWORK NETWORK APPLICATION Applications made better by Networks made better by information information from network from application  Understanding of end-device  Bandwidth and resource optimization capabilities  New service topologies  Real location / topology  Security identification  Adjust behavior to real-time usage  Service-specific packet treatment  Billing granularity Flexibility of service placement Control of resources from applications 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 11. HOW DO YOU MAKE THIS HAPPEN? THE APPLICATION WORLD THE APPLICATION WORLD Real-time topology understanding (ALTO, BGP-TE) SI ISV Service Research Enterprise Partner Partner Provider Institution Customer Steering traffic through Web Services API optimal paths (PCE) Network Orchestration Across Networks Programmability Selecting specific traffic OpenFlow BGP-TE (OpenFlow) ALTO Mgmt PCE Network APIs … Opening more touchpoints to control: Gateways, billing collectors, service appliances, CDN, DPI/IDP THE NETWORK WORLD THE NETWORK WORLD 11 Programmable Networking is SFW Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 12. AN EXAMPLE: BE “IN THE NETWORK” Weak architecture = one-legged tap dancing Continuous, real-time streaming of surrounding content, resources, places, people Where am I? I am here! And this is You’re here! around you:  Active broadcast <access>  Game broadcast <content> <capability> <resources>  Passive <BW> derivation <places> <profile> <people> … ! “Above the topology” “Visualize the topology” “Below the topology” “In the topology” Low value in navigational coordinates APPLICATION NETWORK 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 13. WANT MORE ON OPENFLOW? Useful URLs: Open Networking Foundation https://www.opennetworking.org/ Openflow Whitepaper http://www.openflow.org//documents/openflow-wp-latest.pdf Openflow protocol https://www.opennetworking.org/standards/open-flow/50- openflow 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Notas del editor

  1. This is just an examples discussion. Imagine what you could do… what if…Bring in architectural changes over last few years … IGP Generic application information can be carried. Separate from routing. You don’t have to break everything. You can target specific devices in the network (ak flooding) …Key is “Network, User and Session Telemetry” for apps and being able to program the network beyond session logon and working within the constraints of IF-Map, Radius/Diameter, COPs, PCMM. Now it’s possible for multiple sources to create a service profile and update it in real time
  2. This is an easy one. Foursquare on steroids.Current, weak architecture:“ above the topology&quot;  - user-interactive layer - (Loopt, burbn, BooYay, Gowalla, micello, foursquare)&quot;on the topology&quot; - visual representation of topo - (SimpleGeo, motricity, tele atlas, navteq, geo api)&quot;below the topology&quot; - HW/SW layer - (android, IOS - Apple, Skyhook, SiRF).These categories are to describe functionality that is beyond tweeting your location, checking-in and geo marking in social media map-ups. As an analogy to the current fubared&apos;ness of the situation ... using straight mobile phone GSM coordinates for marking your location in a social media interface is merely noting the navigational coordinates that has little to do with the interaction/exchange/communication of information of a social network on the internet. It&apos;s less useful that what a dog leaves on a fire hydrant.Advert: SocialbombCommerce:Comm: BlockchalkContent: NavxAnalytics:Social:Gowalla,Loopthis means that the quality of interaction can abandon the three common modes of topologic interaction listed above and enter continuous real time updates and streaming. Really the point in the non-exhaustive list of topo-interested APIs/platforms above is that they are in fact the *orchestration* platforms that &quot;app developers&quot; that go to J1 know about.