This document discusses various concepts related to network virtualization. It begins by explaining virtual LANs (VLANs) and how they create broadcast domains on a physical network using VLAN tags. It then discusses how OpenFlow can implement more flexible VLAN support and how virtual private networks (VPNs) can provide private networks over public infrastructure using IPsec or MPLS. Network virtualization is defined as the ability to run multiple logical networks over a shared physical network. OpenDaylight's Virtual Tenant Network plugin provides multitenant virtual networks on a SDN using VLAN technology. The document concludes with a brief discussion of software-defined infrastructure.
6. Virtual Local Area Network
(VLAN)
• A virtual network abstraction
on top of a physical packet-
switched network.
• A VLAN is essentially a
broadcast domain for a
specified set of switches.
• These switches are required
to be aware of the existence
of VLANs and configured
accordingly, to perform
switching of packets between
devices belonging to the
same VLAN.
Mustufa Sir
7. Defining VLANs
1. Membership by port group
2. Membership by MAC address
3. Membership based on protocol
Mustufa Sir
8. IEEE 802.1Q VLAN Standard
• VLAN is an administratively configured broadcast
domain, consisting of a subset of end stations
attached to a LAN.
• A VLAN is not limited to one switch but can span
multiple interconnected switches.
• In that case, traffic between switches must
indicate VLAN membership.
• This is accomplished in 802.1Q by inserting a tag
with a VLAN identifier (VID) with a value in the
range from 1 to 4094. Each VLAN in a LAN
configuration is assigned a globally unique VID.
Mustufa Sir
9. • A committee of the Institute of Electrical and
Electronics Engineers (IEEE) responsible for
developing standards for local and
metropolitan area networks (LANs).
1. User priority (3 bits): The priority level for this
frame.
2. Canonical format indicator (1 bit): Is always set
to 0 for Ethernet switches. CFI is used for
compatibility between Ethernet type networks
and Token Ring type networks.
3. VLAN identifier (12 bits): The identification of
the VLAN.
Mustufa Sir
10. 2. OPENFLOW VLAN SUPPORT
• OpenFlow, allows for much more flexible
management and control of VLANs.
• It should be clear how OpenFlow can set up
flow table entries for forwarding based on one
or both VLAN tags.
Mustufa Sir
11. 3. VIRTUAL PRIVATE NETWORKS
• A VPN is a private network that is configured
within a public network (a carrier’s network or
the Internet) to take advantage of the
economies of scale and management facilities
of large networks.
Mustufa Sir
12. • IP security (IPsec)
– The principal feature of IPsec that enables it to
support these varied applications is that it can
encrypt/authenticate traffic at the IP level.
– Therefore, all distributed applications, including
remote logon, client/server, e-mail, file transfer,
web access, and so on, can be secured.
Mustufa Sir
15. • Using IPsec to construct a
VPN has the following
benefits:
1. When IPsec is implemented
in a firewall or router, it
provides strong security that
can be applied to all traffic
crossing the perimeter.
2. IPsec in a firewall is resistant
to bypass if all traffic from
the outside must use IP and
the firewall is the only
means of entrance.
3. IPsec is below the transport
layer (TCP, UDP) and so is
transparent to applications.
Mustufa Sir
16. • MPLS
– Multiprotocol Label Switching (MPLS) is a set of (IETF)
specifications for including routing and traffic
engineering information in packets.
– MPLS comprises a number of interrelated protocols.
– It can be used in IP networks but also in other types of
packet-switching networks.
– MPLS is used to ensure that all packets in a particular
flow take the same route over a backbone.
Mustufa Sir
17. • In an MPLS network, a fixed-length label
encapsulates an IP packet or a data link frame.
• The MPLS label contains all the information
needed by an MPLS-enabled router to
perform routing, delivery, QoS, and traffic
management functions.
• An MPLS network or internet consists of a set
of nodes, called label switching routers (LSRs)
capable of switching and routing packets on
the basis of a label appended to each packet.
Mustufa Sir
18. • Labels define a flow of packets between two
endpoints or, in the case of multicast,
between a source endpoint and a multicast
group of destination endpoints.
• For each distinct flow, called a forwarding
equivalence class (FEC), a specific path
through the network of LSRs is defined, called
a label switched path (LSP).
Mustufa Sir
21. Layer 3 MPLS VPN
• Whereas L2VPNs are constructed based on link-
level addresses (for example, MAC addresses),
L3VPNs are based on VPN routes between CEs
based on IP addresses.
• An MPLS-based L3VPN typically uses a stack of
two labels. The inner label identifies a specific
VPN instance; the outer label identifies a tunnel
or route through the MPLS provider network.
Mustufa Sir
28. 5. OPENDAYLIGHT’S VIRTUAL TENANT
NETWORK
• Virtual Tenant Network (VTN) is an
OpenDaylight (ODL) plug-in developed by NEC.
• It provides multitenant virtual networks on an
SDN, using VLAN technology.
• The VTN abstraction functionality enables
users to design and deploy a virtual network
without knowing the physical network
topology or bandwidth restrictions.
Mustufa Sir
29. • VTN consists of two components
– VTN Manager
– VTN Coordinator
Mustufa Sir