identity management and resource allocation in the network ... · identity management framework...

1
Identity Management and Resource Allocation in the Network Virtualization Environment N.M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Fida-E Zaheer David R. Cheriton School of Computer Science, University of Waterloo What is Network Virtualization Environment? A network virtualization environment (NVE) is characterized by the decoupling of the roles of the traditional Internet Service Providers (ISPs) into two independent entities: infrastructure providers (InPs), who manage the physical infrastructure; and service providers (SPs), who create virtual networks (VNs) by aggregating resources from multiple InPs to offer heterogeneous end-to-end services. It allows: Proliferation of novel heterogeneous network architectures Instantiation of end-to-end VNs without global coordination Cost and energy efficiency through resource sharing Enhanced security and isolation between cohabiting VNs References 1. N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba, “Network Virtualization: The Past, The Present, and The Future”, IEEE Communications Magazine, July, 2009. 2. N.M. Mosharaf Kabir Chowdhury, Fida-E Zaheer, Raouf Boutaba, “iMark: An Identity Management Framework for Network Virtualization Environment”, IEEE/IFIP IM, June, 2009. 3. N. M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba, “Virtual Network Embedding with Coordinated Node and Link Mapping”, IEEE INFOCOM, April, 2009. Network virtualization environment Infrastructure Provider 1 (InP1) Infrastructure Provider 2 (InP2) Service Provider 1 (SP1) Virtual Network 1 (VN1) Virtual Network 2 (VN2) Parent Virtual Network Child Virtual Network Recursion Revisitation U1 U2 U3 Physical Node Virtual Node End User Physical Link Virtual Link Service Provider 2 (SP2) Why Virtualize the Network? Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates. To fend off this ossification, network virtualization has been propounded as a diversifying attribute of the future inter- networking paradigm. Instead of creating yet another one-size-fits-all architecture, network virtualization promotes an environment that allows coexistence of multiple heterogeneous network architectures on a shared underlying physical network by providing transparent abstraction of network resources. Identity Management Framework (iMark) Local identifiers have little end-to-end significance in an NVE due to the heterogeneity of naming and addressing mechanisms in different VNs. An identity management framework provides necessary mechanisms, functionalities, and components to uniquely identify and locate (mobile) end hosts irrespective of their physical and logical locations through interoperability between heterogeneous identifier spaces. Design Principles iMark design principles aim for maximizing local autonomy with minimal global functionalities: 1. Separation of Identity and Location: iMark separates the identity of an entity from its location to provide inherent support for end host mobility. 2. Local Autonomy: No restriction imposed on individual physical or virtual networks. 3. Global Identifier Space: One globally agreed upon identifier space to connect all heterogeneous namespaces. Architectural Overview Components Controllers: A controller is a logical entity in a VN that provides traditional control functionalities and additional network specific services. A common control space, known as the controller network, connects controllers of multiple VNs to support federations. Multiple federations and VNs are combined to create logical hierarchies. Adapters: Adapters are special entities that act as gateways between two adjoining VNs. Concepts Entities: iMark defines six major entities each with unique functionalities and requirements. Identifier Spaces: Identifier spaces (IDSes) define the relationships between the entities. Mappings: Finally, mappings between different IDSes (stored in Controllers) ensure locating and routing to end hosts’ current locations based on their global identifiers. IMark Operations Primary iMark operations include joining of end hosts to a network that adds new mappings to the Controllers and explicit lookups for connection setup across heterogeneous identifier spaces. 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 0 1 2 3 4 5 6 7 Mean mapping size per controller (in Millions) Hierarchy level Unbalanced Hierarchy Balanced Hierarchy 0 5 10 15 20 25 30 35 40 45 0 1 2 3 4 5 6 7 Mean lookups resolved (in percentage) Hierarchy level Unbalanced Hierarchy Balanced Hierarchy Performance Evaluation iMark faces performance challenges from two main sources: size of the mappings stored at different controllers, and lookup frequency at different levels of the controller. Mean mapping size per Controller Mean lookups resolved at different levels of iMark hierarchy Federation and hierarchy in iMark Entities and identifier spaces Virtual Network Embedding Problem Definition Given a weighted substrate network G S = (N S ,E S ) and online VN requests G V = (N V ,E V ) with requirements and constraints on virtual nodes and virtual links, the VN embedding problem deals with assigning virtual nodes and links onto substrate nodes and paths respectively, by allocating substrate network resources (e.g., CPU, bandwidth). Objectives Over time, Maximize Acceptance Ratio: Percentage of accepted VN requests Average Revenue: Calculated based on resources requested for a VN request Minimize Average Cost: Calculated based on substrate network resources allocated for embedding a VN request C A B D E F G H 60 80 55 50 70 65 85 90 a b c 10 10 10 e f d 20 20 20 a b c d e f 10 10 12 5 5 22 15 12 10 15 27 17 20 25 Substrate Network VN Request 1 VN Request 2 Substrate Graph Augmentation For each VN request, the substrate graph is augmented by considering each virtual node as a meta-node and connecting each meta-node to a cluster of nodes using meta-links. Each meta-link has infinite capacity, and a cluster is selected based on the location constraint of a virtual node. C A B D E F G H 60 80 55 50 70 65 85 90 22 15 12 10 15 27 17 20 25 a b c Cluster Meta-node Meta-edge C A B D E F G H 60 80 55 50 70 65 85 90 22 15 12 10 15 27 17 20 25 a b c Augmented substrate graph for VN request 1 Combined node and link mapping in the MIP solution MIP Formulation and LP Relaxation By considering each virtual link as a commodity and by assigning appropriate binary constraints on meta-links, the VN embedding problem can now be represented as an extended mixed-integer multi-commodity flow (MCF) problem. Binary Constraints on Meta-links Exactly one substrate node is selected for each meta-node At most one meta-node is mapped onto a substrate node Solving the mixed-integer program (MIP) will simultaneously embed virtual nodes and virtual links. However, solving an MIP is known to be NP-hard. A linear program (LP) is generated by relaxing the binary constraints on the meta-links. ViNEYard Algorithms Deterministic and randomized rounding techniques are employed to select meta-links resulting in two algorithms (D-ViNE and R-ViNE respectively), known together as ViNEYard algorithms. Pseudocode 1. Augment the substrate graph to form the MIP 2. Solve the relaxed LP 3. For each virtual node, calculate the probability for each meta-link to be selected for a particular virtual/meta-node D-ViNE: Select the meta-link with the highest probability R-ViNE: Select a meta-link randomly with some probability 4. Use MCF to embed the virtual links 5. Update residual capacities of substrate nodes and links Performance Evaluation

Upload: others

Post on 18-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Identity Management and Resource Allocation in the Network ... · Identity Management Framework (iMark) Local identifiers have little end-to-end significance in an NVE due to the

Identity Management and Resource Allocation in the Network Virtualization EnvironmentN.M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Fida-E ZaheerDavid R. Cheriton School of Computer Science, University of Waterloo

What is Network Virtualization Environment?A network virtualization environment (NVE) is characterized by thedecoupling of the roles of the traditional Internet Service Providers(ISPs) into two independent entities: infrastructure providers (InPs), whomanage the physical infrastructure; and service providers (SPs), whocreate virtual networks (VNs) by aggregating resources from multipleInPs to offer heterogeneous end-to-end services. It allows:

• Proliferation of novel heterogeneous network architectures• Instantiation of end-to-end VNs without global coordination• Cost and energy efficiency through resource sharing• Enhanced security and isolation between cohabiting VNs

References1. N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba, “Network Virtualization: The

Past, The Present, and The Future”, IEEE Communications Magazine, July, 2009.

2. N.M. Mosharaf Kabir Chowdhury, Fida-E Zaheer, Raouf Boutaba, “iMark: AnIdentity Management Framework for Network Virtualization Environment”,IEEE/IFIP IM, June, 2009.

3. N. M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba,“Virtual Network Embedding with Coordinated Node and Link Mapping”, IEEEINFOCOM, April, 2009.

Network virtualization environment

Infrastructure Provider 1 (InP1)

Infrastructure Provider 2 (InP2)

ServiceProvider 1(SP1)

Virtual Network 1 (VN1)

Virtual Network 2 (VN2)

Parent Virtual Network

Child Virtual Network

Recursion

Revisitation

U1 U2 U3

Physical Node

Virtual Node

End User

Physical Link

Virtual Link

ServiceProvider 2(SP2)

Why Virtualize the Network?Due to the existence of multiple stakeholders with conflicting goals andpolicies, alterations to the existing Internet are now limited to simpleincremental updates. To fend off this ossification, network virtualizationhas been propounded as a diversifying attribute of the future inter-networking paradigm.

Instead of creating yet another one-size-fits-all architecture, networkvirtualization promotes an environment that allows coexistence ofmultiple heterogeneous network architectures on a shared underlyingphysical network by providing transparent abstraction of networkresources.

Identity Management Framework (iMark)Local identifiers have little end-to-end significance in an NVE due to theheterogeneity of naming and addressing mechanisms in different VNs.An identity management framework provides necessary mechanisms,functionalities, and components to uniquely identify and locate (mobile)end hosts irrespective of their physical and logical locations throughinteroperability between heterogeneous identifier spaces.

Design PrinciplesiMark design principles aim for maximizing local autonomy withminimal global functionalities:

1. Separation of Identity and Location: iMark separates the identity ofan entity from its location to provide inherent support for end hostmobility.

2. Local Autonomy: No restriction imposed on individual physical orvirtual networks.

3. Global Identifier Space: One globally agreed upon identifier space toconnect all heterogeneous namespaces.

Architectural OverviewComponentsControllers: A controller is a logical entity in a VN that providestraditional control functionalities and additional network specificservices. A common control space, known as the controller network,connects controllers of multiple VNs to support federations. Multiplefederations and VNs are combined to create logical hierarchies.Adapters: Adapters are special entities that act as gateways betweentwo adjoining VNs.

ConceptsEntities: iMark defines six major entities each with uniquefunctionalities and requirements.Identifier Spaces: Identifier spaces (IDSes) define the relationshipsbetween the entities.Mappings: Finally, mappings between different IDSes (stored inControllers) ensure locating and routing to end hosts’ currentlocations based on their global identifiers.

IMark OperationsPrimary iMark operations include joining of end hosts to a network thatadds new mappings to the Controllers and explicit lookups forconnection setup across heterogeneous identifier spaces.

0.0

0.5

1.0

1.5

2.0

2.5

3.0

3.5

0 1 2 3 4 5 6 7

Mea

n m

appi

ng s

ize

per c

ontr

olle

r (in

Mill

ions

)

Hierarchy level

Unbalanced HierarchyBalanced Hierarchy

0

5

10

15

20

25

30

35

40

45

0 1 2 3 4 5 6 7

Mea

n lo

okup

s re

solv

ed(in

per

cent

age)

Hierarchy level

Unbalanced HierarchyBalanced Hierarchy

Performance EvaluationiMark faces performance challenges from two main sources: size of themappings stored at different controllers, and lookup frequency atdifferent levels of the controller.

Mean mapping size per Controller Mean lookups resolved at different levels of iMark hierarchy

Federation and hierarchy in iMark Entities and identifier spaces

Virtual Network EmbeddingProblem DefinitionGiven a weighted substrate network GS = (NS, ES) and online VNrequests GV = (NV, EV) with requirements and constraints on virtualnodes and virtual links, the VN embedding problem deals with assigningvirtual nodes and links onto substrate nodes and paths respectively, byallocating substrate network resources (e.g., CPU, bandwidth).

ObjectivesOver time,MaximizeAcceptance Ratio: Percentage of accepted VN requestsAverage Revenue: Calculated based on resources requested for aVN request

MinimizeAverage Cost: Calculated based on substrate network resourcesallocated for embedding a VN request

C

A B

D E F

G H

60

80 55

50

70 65

85

90

a

b c

10

1010

e

fd

20

20 20

a

b

c

d

e

f

10

10

12

5 5

22

15

12

10

15

27

17

20

25

Substrate Network

VN Request 1

VN Request 2

Substrate Graph AugmentationFor each VN request, the substrate graph is augmented by consideringeach virtual node as a meta-node and connecting each meta-node to acluster of nodes using meta-links. Each meta-link has infinite capacity,and a cluster is selected based on the location constraint of a virtual node.

C

A B

D E F

G H

60

80 55

50

70 65

85

90

22

15

12

10

15

27

17

20

25

a

b

c

∞ ∞

Cluster

Meta-node

Meta-edge

C

A B

D E F

G H

60

80 55

50

70 65

85

90

22

15

12

10

15

27

17

20

25

a

b

c

∞ ∞

Augmented substrate graph forVN request 1

Combined node and link mapping in the MIP solution

MIP Formulation and LP RelaxationBy considering each virtual link as a commodity and by assigningappropriate binary constraints on meta-links, the VN embedding problemcan now be represented as an extended mixed-integer multi-commodityflow (MCF) problem.

Binary Constraints on Meta-linksExactly one substrate node is selected for each meta-nodeAt most one meta-node is mapped onto a substrate node

Solving the mixed-integer program (MIP) will simultaneously embedvirtual nodes and virtual links. However, solving an MIP is known to beNP-hard. A linear program (LP) is generated by relaxing the binaryconstraints on the meta-links.

ViNEYard AlgorithmsDeterministic and randomized rounding techniques are employed toselect meta-links resulting in two algorithms (D-ViNE and R-ViNErespectively), known together as ViNEYard algorithms.

Pseudocode1. Augment the substrate graph to form the MIP2. Solve the relaxed LP3. For each virtual node, calculate the probability for each meta-link tobe selected for a particular virtual/meta-node

D-ViNE: Select the meta-link with the highest probabilityR-ViNE: Select a meta-link randomly with some probability

4. Use MCF to embed the virtual links5. Update residual capacities of substrate nodes and links

Performance Evaluation