Preview

S-Fabric Architecture Analysis

Powerful Essays
Open Document
Open Document
1899 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
S-Fabric Architecture Analysis
1. S-FABRIC ARCHITECTURE In this section, we present the basic concept of S-Fabric. First, we explain the basic terminologies. Then we introduce an example architecture of two interconnected data centers which apply S-Fabric.
1.1 Global topology As presented in Figure 1, S-Fabric defines following types of devices in the architecture:
Host (H) A host can be a physical server, a virtual machine, or a container in S-Fabric network. A host connects to S-Fabric via a leaf switch. A host can be moved within a data center or across multiple data centers. (P3)
Slice Controller (SC) S-Fabric brings up a sliced control plane by assigning a set of flows running on a topology of switches to a slice (P5). A tenant network is consisted of a set
…show more content…
A slice controller keeps track of the mapping between actual MAC address and location MAC address for each IP address. A slice controller install the MAC-address-rewriting rules and packets-forwarding rules for flows within the slice, on all relevant switches of each flow. The installed rules are defined before the initialization of SC, by the orchestrator or manually by administrator, according to SFCs [10] definition of a slice. Furthermore, a slice controller handles ARP requests within one slice. In this way, S-Fabric requires no changes on hosts (P7).
Leaf Switch (L) A leaf switch is defined as a ToR switch of a set of hosts. To serve the entire service function chain, special hosts with network functions such as firewall (FW), load balancer (LB), boarder router (BR), IDS/IPS etc. are also connected to S-Fabric on leaf switches. A leaf switch has a connection to each spine switch within a data center. ECMP is used to load balance host to host flows at leaf switch to decide on which spine switch to forward the packets to.
Spine Switch
…show more content…
Note, it cannot be updated by other controllers. Each entry of this table represents the neighborhood between the current controller and the controller identified with slice_id. The neighborhood means these two controllers can send/receive LoMAC requests and responses with each other.
2.2 Slice topology initialization We define a slice topology during slice initialization. The slice topology indicates the involved switches, subnets/hosts, boarder router, firewall instances, load balancers, NAT routers, IDS/IPS etc. We use a physical view to represent where the involved service functions are physically located and how they are connected to S-Fabric. We use a logical view to define the logical paths of the service function chain. Figures 2 shows an example slice by comparing its physical view to its logical view as for SFCs. A, B1, B2, C are hosts in subnet A, subnet B and subnet C. Subnet C is connected via internet to BR over IPSec VPN.

2.3

Subnet table initialization Each SC maintains a subnet table locally. A subnet table is presented in Table

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The problematic scenario is when the physical sequence has a loop. In this scenario, a switch which is attached to the middlebox literally cannot identify the middlebox segment based on the combination of the input interface and packet header fields. To address this scenario, SIMPLE introduce a ProcState tag that encodes the packet’s processing state inside the packet header fields using either VLAN tags, unused fields in the IP headers i.e., IP ToS fields or MPLS labels depending on the fields supported in the SDN-enabled switches. Therefore, SDN controller installs tag addition forwarding rules at the first switch of each middlebox segment, which is based on packet header fields and input ports of the switch. In addition, downstream switches consider these tags for the matching purpose and perform respective forwarding action. This process continues until the middlebox segment is finished.…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called “levels”. These levels map loosely to the Open Systems Interconnect (OSI) 7 layer model defined by the international standards organisation .…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    framework, we can change the edge priority in CA to meet different requirements. Simulation results…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Satisfactory Essays

    ISDS 550 PS6

    • 438 Words
    • 2 Pages

    Carlson implemented IP SAN to achieve these goals. Multiple IP storage switches connected to the Ethernet switch core to the SAN storage system can build a global network for Carlson, and IP SAN can storage data over IP facilitated integration for Carlson’s enterprise-wide network and further implement an enterprise data warehouse and build an enterprise-wide architecture.…

    • 438 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The network utilization between the hospital and offices mainframe would be that the IBM’s technology offers considerably huge servers within a distinguishing strength conducting a large amount of transactions as well as input/output operations in parallel (Network Management, 2013). However, the mainframe is accomplished by serving a huge numbers of network nodes geographically separated across the world at the same time as conducting a elevated volume of input and output operation to disk storage, printers in addition to other attached computers (Network Management, 2013). Several the capabilities would be the IP communication among huge numbers of Linux as well as z/OS operating systems running as z/VM (Virtual Machine) guest machines (Network Management, 2013).…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Brocade Isl

    • 9602 Words
    • 39 Pages

    This document details SAN topologies supported by Brocade SilkWorm 2x00 switch fabrics and provides guidance on the number of end user ports that can reliably be deployed based on testing done to date. Exceeding these…

    • 9602 Words
    • 39 Pages
    Good Essays
  • Powerful Essays

    Life Span Development

    • 2008 Words
    • 9 Pages

    Any person experiences growth of different aspects of personality during various points of time. In fact, it is the day to day good and bad experiences that shape the personality of an individual. There are different theories of growth of personality of an individual. In this assignment, I will take up the case of well-known figure Oprah Winfrey. Based on different theories of personality, I will study the factors which contributed to the growth of personality of Oprah Winfrey. I will discuss Oprah’s family issues and support systems that may have influenced her developmental growth and adjustment. I will also distinguish between the influences of heredity and environment on her psychological development.…

    • 2008 Words
    • 9 Pages
    Powerful Essays