Editor's note: This article is following the Service-aware network architecture based on SDN,NFV For further analysis of DPI , the three deployment scenarios that may occur in SDN are analyzed, and the 4-7 The business requirements of the tier and the business-aware network architecture are described in depth.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/A2/wKiom1S2HUTguLXUAAK9f2hn5gg396.jpg "style=" float: none; "title=" 1.jpg "alt=" Wkiom1s2hutgulxuaak9f2hn5gg396.jpg "/>
Deploying DPI in an SDN network
sdn dpi in traffic shaping, user analysis, qoe and network security may be embedded in three layers, Just to name a few. These deployment scenarios allow dpi information shared within the network To save the and energy consumption. Unified dpi simplified management, Because all devices share a "similar view" of the flow of information. Have provided The main benefit of the service infrastructure is that application developers no longer need to put dpi merger-there is no need to reinvent.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/9F/wKioL1S2Hg_jSAEiAAJFue2l0Dg758.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiol1s2hg_jsaeiaajfue2l0dg758.jpg "/>
Three possible deployment scenarios:
Business Application Layer
DPI software can be embedded relatively easily in the business application layer. However, some applications may need to be redesigned to minimize the impact of potential bottlenecks caused by lengthy communication paths. For example, some information flows must be through a path from the node to the SDN controller to the application running the DPI engine. Once the information flow is recognized, the application sends policy rules to the node to guide the flow of information, so only a small fraction of the traffic is sent from the node to the application network. Given the potential for latency, this DPI deployment is best used for applications that are not sensitive, such as analysis capabilities.
Control layer
dpi software can be deployed in SDN in the controller, it can apply network intelligence to its own control service, or through the north-to-interface api Send to the network application layer. A node (such as a switch, network device) processes the first non-empty packet sent by the stream to the sdn Controller for l4-l7 analysis, possibly using the openflow Some of the extended functionality of the Protocol will continue to be discussed later. Put Placement in the controller avoids the cost growth of the node, however, some of the information flow (possibly less than 10%
Node Layer
Network nodes can also run DPI software, identify application IDs and metadata, and they can also:
Apply pre-defined policies directly
Send this information to an SDN controller or network application, and then accept the policy or rule.
WhenSDNThe controller acts as the recipient of the extracted information, and it can instruct the node to apply a specific policy after some form of dialogue with the network application. After that, all the same types of information flow do not need to beDPIanalyzed. Compared to other options, execution at the node layerDPIMinimizing the wait time, but this method is also the most expensive, because it requires the greatest amount ofDPIthe instance is in the network. Future,DPIcan be reduced by marking or transmitting end-to-end information, as in the recentIETFDraft by joining the Network Service header (NSH) Recommendations for enhanced recommendations. There are also some workarounds for the idea of using tags/tags, configure channels, and so on.
OpenFlow expansion requires l4-l7 devices
openflow as SDN South protocol for carrying switches and l4-l7 Smart will extend to existing openflow agreement, Beyond the user-configurable dpi "field may become a universal format that is used by all switches, controllers and applications.
This can be implemented in a type-length-value element introduced in the OpenFlow protocol to support the encoding of optional information, such as the following fields.
Rules: Identify protocols, applications (app IDs), and metadata
Operations: such as dropping packets, encapsulating and forwarding packets to the controller, or forwarding packets to the port
Statistics: These include computed metadata,http hostname,http cookie, and vendor-specific attributes (VSA)
Shows how the application ID, metadata fields, and operations are added to the OpenFlow protocol.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/A2/wKiom1S2HUWhubOkAAIGmFwW_eM913.jpg "style=" float: none; "title=" 3.jpg "alt=" Wkiom1s2huwhubokaaigmfww_em913.jpg "/>
Business-Aware Network architecture
operator deployment based on sdn and NFV dpi Network intelligence is implemented to provide new services and to better manage bandwidth. dpi By helping operators identify and oversee the wide range of services and applications they carry out, they provide operators with more control over their networks. by calculating and dpi technology, which is all achievable. dpi Make smarter decisions for your controllers and applications to save costs and increase revenue opportunities for network operators.
This article comes from Sdnlab , you can click this Read the original . If you are interested in this article, you can participate in the following interactive ways to communicate with the author in close range.
if you to this article interested, can participate in following interact in close proximity to the author.
(1) Micro-Blog ( http://weibo.com/sdnlab/ )
650) this.width=650, "src=" http://s3.51cto.com/wyfs02/M02/58/A2/wKiom1S2HZ6To9TNAACRj-P-jzw549.jpg "title=" Weibo. jpg "alt=" Wkiom1s2hz6to9tnaacrj-p-jzw549.jpg "/>
(2) ( account No. :sdnlab)
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/58/9F/wKioL1S2Ho2hlBEQAACT9kgFKuI916.jpg "title=". jpg " alt= "Wkiol1s2ho2hlbeqaact9kgfkui916.jpg"/>
(3) QQ Group
SD N Research Group (214146842)
Opendaylight Research Group (194240432)
The next chapter of service-aware network architecture based on SDN,NFV