33
Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott Shenker CAP for Networks UC Berkeley, KTH, VMware, ICSI Or: How to Stop Worrying and Embrace Failure=

Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Embed Size (px)

Citation preview

Page 1: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott Shenker

CAP for Networks

UC Berkeley, KTH, VMware, ICSI

Or: How to Stop Worrying and Embrace Failure=

Page 2: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Keshav raps about SDN

Page 3: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

CAP Theorem

In the presence of network Partitions pick one of

•Service Correctness

•Service Availability

Page 4: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

CAP Theorem: ImpactDivides the database community (even today)

NoSQLAvailability above all

SQLCorrectness above all

Page 5: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

How does the CAP theorem apply to

networks?

Page 6: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

What about Networks?

Page 7: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

What about Networks?

Traditionally connectivity was the only concern

•Correctness: Deliver packets to destination

•Availability: Deliver packets to destination

•Correctness is the same as Availability

Page 8: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

The move to SDN

Page 9: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

The move to SDN

SDN provides more sophisticated functionality:

•Tenant isolation (ACL enforcement)

• Fine grained load balancing

•Virtualization

Page 10: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

The move to SDN

SDN provides more sophisticated functionality:

•Tenant isolation (ACL enforcement)

• Fine grained load balancing

•VirtualizationControl plane partitions no longer imply data plane partitions

•Control traffic often does not use data plane network

Page 11: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Availability ≠ Correctness

During control plane partitions

•Data plane connected => Deliver packets (Availability)

• Inconsistent control plane data (Correctness)

•Availability does not imply Correctness

Page 12: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

How does the CAP theorem apply to networks SDN?

Page 13: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

How does the CAP theorem apply to networks SDN?

Can one provide correct isolation and availability in the presence of link failures?

Page 14: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Network Model

• Out-of-band control network.

Controller 1

Switch

A10.1.1.1

Controller 2

B10.1.1.2

Switch

C10.1.2.1

D10.1.2.2

Page 15: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Network Model

• Out-of-band control network.

• Routing and forwarding based on addresses.

Controller 1

Switch

A10.1.1.1

Controller 2

B10.1.1.2

Switch

C10.1.2.1

D10.1.2.2

Page 16: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Network Model

• Out-of-band control network.

• Routing and forwarding based on addresses.

• Policy specification using end-host names.

Controller 1

Switch

A10.1.1.1

Controller 2

B10.1.1.2

Switch

C10.1.2.1

D10.1.2.2

Page 17: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Network Model

• Out-of-band control network.

• Routing and forwarding based on addresses.

• Policy specification using end-host names.

• Controller only aware of local name-address bindings.

Controller 1

Switch

A10.1.1.1

Controller 2

B10.1.1.2

Switch

C10.1.2.1

D10.1.2.2

A 10.1.1.1B 10.1.1.2

C 10.1.2.1D 10.1.2.2

Page 18: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Isolation Result

• Consider policy isolating A from B.

A10.1.1.1

B10.1.1.2 D

10.1.2.2

Controller 1 Controller 2

Switch Switch

A 10.1.1.1B 10.1.1.2

D 10.1.2.2

Page 19: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Isolation Result

• Consider policy isolating A from B.• A control network partition occurs.

A10.1.1.1

B10.1.1.2 D

10.1.2.2

Controller 1 Controller 2

Switch Switch

A 10.1.1.1B 10.1.1.2

D 10.1.2.2

Page 20: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Isolation Result

• Consider policy isolating A from B.• A control network partition occurs.

A10.1.1.1

B10.1.1.2 D

10.1.2.2B

10.1.2.1

Controller 1 Controller 2

Switch Switch

A 10.1.1.1 D 10.1.2.2B 10.1.2.1

Page 21: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Isolation Result

• Consider policy isolating A from B.• A control network partition occurs.• Only possible choices

A10.1.1.1

B10.1.1.2 D

10.1.2.2B

10.1.2.1

Controller 1 Controller 2

Switch Switch

A 10.1.1.1 D 10.1.2.2B 10.1.2.1

Page 22: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

10.1.1.1 ! 10.1.2.1

Isolation Result

• Consider policy isolating A from B.• A control network partition occurs.• Only possible choices•Let all packets through (including from A to B) (Correctness)

A10.1.1.1

B10.1.1.2 D

10.1.2.2B

10.1.2.1

Controller 1 Controller 2

Switch Switch

A 10.1.1.1 D 10.1.2.2B 10.1.2.1

Page 23: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

10.1.1.1 ! 10.1.2.1

Isolation Result

• Consider policy isolating A from B.• A control network partition occurs.• Only possible choices•Let all packets through (including from A to B) (Correctness)•Drop all packets (including from A to D) (Availability)

A10.1.1.1

B10.1.1.2 D

10.1.2.2B

10.1.2.1

10.1.1.1 ! 10.1.2.2

Controller 1 Controller 2

Switch Switch

A 10.1.1.1 D 10.1.2.2B 10.1.2.1

Page 24: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Workarounds for Isolation

•Identity-Address disconnect underlies isolation result

Page 25: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Workarounds for Isolation

•Identity-Address disconnect underlies isolation result

•Network can label packets with sender’s identity

Page 26: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Workarounds for Isolation

•Identity-Address disconnect underlies isolation result

•Network can label packets with sender’s identity

•Route based on identity instead of address

Page 27: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Workarounds not General

Edge Disjoint Traffic Engineering

• Two flows must traverse disjoint links

• Requires consistent topology across controllers

Page 28: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Can one provide correct isolation and availability in

the presence of link failures?

Page 29: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Can one provide correct isolation and availability in

the presence of link failures?Not in general

Page 30: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

In the Paper

• More policies and proofs

• More details on workarounds

• Other ways to model the network

Page 31: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

CAP for Networks?Choices for network architects

Availability above allCorrectness above all

ICING?Security Policies?

BGPTraditional Routing?

NOX Routing

Page 32: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Backup Slides

Page 33: Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott

Host Migration•Our model assumes host migrations without controller involvement.

• In part this is because host migrations are surprisingly common

• Soundararajan and Govil 2010: 6 migrations/day/VM

• In a datacenter ~480,000 migrations/day

• 5.5 migrations per second

•Controller involvement is too expensive in datacenters

•NVP and Floodlight work in a similar manner

• In enterprises controller involvement complicated by mobility.