Preview

S-Fabric Architecture Analysis

Powerful Essays
Open Document
Open Document
1899 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
S-Fabric Architecture Analysis
1. S-FABRIC ARCHITECTURE In this section, we present the basic concept of S-Fabric. First, we explain the basic terminologies. Then we introduce an example architecture of two interconnected data centers which apply S-Fabric.
1.1 Global topology As presented in Figure 1, S-Fabric defines following types of devices in the architecture:
Host (H) A host can be a physical server, a virtual machine, or a container in S-Fabric network. A host connects to S-Fabric via a leaf switch. A host can be moved within a data center or across multiple data centers. (P3)
Slice Controller (SC) S-Fabric brings up a sliced control plane by assigning a set of flows running on a topology of switches to a slice (P5). A tenant network is consisted of a set
…show more content…
A slice controller keeps track of the mapping between actual MAC address and location MAC address for each IP address. A slice controller install the MAC-address-rewriting rules and packets-forwarding rules for flows within the slice, on all relevant switches of each flow. The installed rules are defined before the initialization of SC, by the orchestrator or manually by administrator, according to SFCs [10] definition of a slice. Furthermore, a slice controller handles ARP requests within one slice. In this way, S-Fabric requires no changes on hosts (P7).
Leaf Switch (L) A leaf switch is defined as a ToR switch of a set of hosts. To serve the entire service function chain, special hosts with network functions such as firewall (FW), load balancer (LB), boarder router (BR), IDS/IPS etc. are also connected to S-Fabric on leaf switches. A leaf switch has a connection to each spine switch within a data center. ECMP is used to load balance host to host flows at leaf switch to decide on which spine switch to forward the packets to.
Spine Switch
…show more content…
Note, it cannot be updated by other controllers. Each entry of this table represents the neighborhood between the current controller and the controller identified with slice_id. The neighborhood means these two controllers can send/receive LoMAC requests and responses with each other.
2.2 Slice topology initialization We define a slice topology during slice initialization. The slice topology indicates the involved switches, subnets/hosts, boarder router, firewall instances, load balancers, NAT routers, IDS/IPS etc. We use a physical view to represent where the involved service functions are physically located and how they are connected to S-Fabric. We use a logical view to define the logical paths of the service function chain. Figures 2 shows an example slice by comparing its physical view to its logical view as for SFCs. A, B1, B2, C are hosts in subnet A, subnet B and subnet C. Subnet C is connected via internet to BR over IPSec VPN.

2.3

Subnet table initialization Each SC maintains a subnet table locally. A subnet table is presented in Table

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The problematic scenario is when the physical sequence has a loop. In this scenario, a switch which is attached to the middlebox literally cannot identify the middlebox segment based on the combination of the input interface and packet header fields. To address this scenario, SIMPLE introduce a ProcState tag that encodes the packet’s processing state inside the packet header fields using either VLAN tags, unused fields in the IP headers i.e., IP ToS fields or MPLS labels depending on the fields supported in the SDN-enabled switches. Therefore, SDN controller installs tag addition forwarding rules at the first switch of each middlebox segment, which is based on packet header fields and input ports of the switch. In addition, downstream switches consider these tags for the matching purpose and perform respective forwarding action. This process continues until the middlebox segment is finished.…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It240 Lan Topologies

    • 268 Words
    • 2 Pages

    13. Your network’s physical topology is that of a star configuration. From time to time, each workstation will hold a packet called a token, during which time it will transmit data and then pass the token along to the next workstation. What is the logical topology of your network?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh interlinked switches uses Spanning Tree Protocol (STP) to detect and prevent loops. A loop occurs when there are multiple active paths to the same switch and this causes the system to crash.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The genome4u is a scientific study project at a large university that is intended to provide an order of the genomes of a hundred thousand volunteers. This genome lab setup has various amounts of routing protocols, in which the task would be getting the protocols interlinked so that design can be changed. The different Cisco switches represent the various VLANs that can be configured for the different project teams in the lab (Oppenheimer, 2005). Router-EIGRPs are the internal routers of the research lab network. Router-EIGRP/OSPFs and Router-EIGRP/RIPs are the routers that are at the Fundraising office interface and the Biology lab interface respectively. The file servers are where the volunteer’s data files will be stored. The design will now spread apart similar data to travel across it from different internet connections.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called “levels”. These levels map loosely to the Open Systems Interconnect (OSI) 7 layer model defined by the international standards organisation .…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    ISDS 550 PS6

    • 438 Words
    • 2 Pages

    Carlson implemented IP SAN to achieve these goals. Multiple IP storage switches connected to the Ethernet switch core to the SAN storage system can build a global network for Carlson, and IP SAN can storage data over IP facilitated integration for Carlson’s enterprise-wide network and further implement an enterprise data warehouse and build an enterprise-wide architecture.…

    • 438 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    framework, we can change the edge priority in CA to meet different requirements. Simulation results…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    Throughout the state of Texas, there are many political problems, and they all revolve around one central idea. In Texas's case, some bases of their politics are a mixture between classical liberalism, social conservatism, and populism ("Political Culture and Political Ideology in Texas"). Classical liberalism consists of "doing your own thing", and is elaborated as political freedom as well as civil liberty independence ("Political Culture and Political Ideology in Texas"). Social conservatism is based on the traditional way of doing things, which explains why the Republican Party has had the majority vote, since Texas has always been historically Republicans ("Political Culture and Political Ideology…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Life Span Development

    • 2008 Words
    • 9 Pages

    Any person experiences growth of different aspects of personality during various points of time. In fact, it is the day to day good and bad experiences that shape the personality of an individual. There are different theories of growth of personality of an individual. In this assignment, I will take up the case of well-known figure Oprah Winfrey. Based on different theories of personality, I will study the factors which contributed to the growth of personality of Oprah Winfrey. I will discuss Oprah’s family issues and support systems that may have influenced her developmental growth and adjustment. I will also distinguish between the influences of heredity and environment on her psychological development.…

    • 2008 Words
    • 9 Pages
    Powerful Essays