Software-Defined Networking For Dummies
Software-Defined Networking For Dummies
SoftwareDefined
Networking
Sonus Special Edition
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Publishers Acknowledgments
Some of the people who helped bring this book to market include the following:
Project Editor: Carrie A. Johnson
Editorial Manager: Rev Mengle
Acquisitions Editor: Katie Mohr
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book......................................................................... 1
Icons Used in This Book............................................................. 2
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
iv
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter1
Introducing SDN
In This Chapter
Getting to know what SDN is all about
Separating control and data
Considering underlay and overlay
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Network intelligence
An SDN divides the data plane from the network intelligence.
So the key to an effective SDN implementation is not just the
SDN controllers but the actual intelligence engine that controls the network. Key aspects of network intelligence are
Network topology discovery: The ability for a controller
to effectively understand the existing network topology
Policy rules: A set of rules that are based on business
policies that are key inputs to determine which routes
traffic should follow
Path computation: A realtime engine that takes the
policy rules and the network topology and determines
the best possible path that packets should take to traverse a network
This path computation intelligence is what makes
changes to the network based on the needs of a specific
packet or IP Flow.
Your customers need to be able to simply specify application
and business priorities and service level requirements. Be
sure that your SDN solution has the intelligence to be able to
translate this information into meaningful input that can perform path computation to select the optimal WAN path.
Shifting priorities
Most organizations are experiencing shifting priorities as
they move away from traditional client/server architecture
toward providing users with more flexibility. Instead of being
tied down to a workstation in the office, users are demanding
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Benefits
A good SDN solution offers a number of benefits for your
organization. These range from cost savings through reduced
time spent on manual tasks to better utilization of existing
resources. Here are a few of the benefits youll see:
Automatic provisioning: Simplified provisioning using
a webbased portal or API means that business policies
are automatically translated into WAN configuration, and
provisioning for network devices can use simple forwarding tables instead of complicated routing. Automation
minimizes, and possibly eliminates the need for any
manual provisioning. Any changes in network topology
are automatically detected and an updated topology is
maintained so future path computations are optimized.
Dynamic allocation: Bandwidth allocation to meet application requirements is managed ondemand. The implementation of WAN changes based on business priorities
can be handled quickly. Examples of these changes
include timeofday adjustments to bandwidth for a
nightly data replication program or ensuring a high priority for every 15-minute backup of critical billing records.
Flexibility: An SDN provides responsiveness to accommodate changes in network topology or changes in network behavior. To resolve a fairly simple yet common
event, such as where network congestion is degrading
application performance, network resources need to be
reallocated in realtime (in milliseconds) to ensure traffic
flows around network congestion points.
Security: Identification of network devices is automated
and access to network devices is protected and limited. If
a network device is unknown, no traffic is allowed to flow
to/from it. If traffic originates with an unknown user or
application, it is not allowed onto the network.
Visibility: From the IT manager to the CIO, ensuring the
expected network behavior matches actual behavior
is crucial, especially for business critical applications.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Understanding Control
versus Data Plane
One of the key elements in SDN is the concept of separating
the control plane from the data plane. The control plane is the
system that makes decisions about where network traffic is
sent and the data plane consists of the systems that actually
forward the traffic to its destination.
Different vendors often use their own terminology for various
SDN elements. For example, you may see the control plane
called the signaling plane and the data plane is sometimes
called the forwarding plane.
Separating the two systems is important because this
separation is what enables network functions to be
automated. By separating the control plane from the data
plane, the architecture of SDN becomes
Programmable: The control of the network can be
handled programatically rather than handson manual
operations.
Centrally controllable: Technicians no longer have to
touch each box in order to control how the network
functions, so the network can be managed from a central
location.
Agile: Its now much easier for the network to meet
changing traffic needs automatically.
Most SDN implementations follow an open standards
approach, which means that you arent tied to products
from a single vendor. One such standard thats often used is
OpenFlow, a protocol that enables communications between
the control and the data plane of the network.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
Looking at Underlay
versus Overlay
In discussions about SDN applied to networks, youll no doubt
encounter the terms underlay and overlay. These terms refer
to how SDN is applied to a network:
Underlay: The underlay model is the ability to fully control the network itself, with direct linkages to every layer
from wavelength/OTN to MPLS/IP, and across differing
vendors. The advantages are network abstraction and
standard data models to minimize the OSStonetwork
integration complexity and to provide global, realtime
network visibility and control so network assets can be
used more efficiently. This method also scales easily
across multiple network layers.
Overlay: The overlay proposition is simple: Leverage
SDN solutions in the data center to extend dynamic
creation of Layer 3 tunnels to other data centers and
to remote sites across any intermediary network. The
advantage is network transparency; the disadvantage is
lack of visibility into any layer other than Layer 3.
Each of these models has relevance and its likely set of use
cases, so its expected that both implementation models will
exist in the future.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
13
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
15
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
17
Managing MultiTenants
Multitenancy is a means that allows a single instance of a
software application to run on a server while multiple tenants
(groups of users) share that instance of the application. Each
tenant has a dedicated share of the application instance, so
each of them has access to both the data and functionality of
the application.
Multitenancy generally results in fairly significant cost savings
because unlike running multiple instances of the application,
multitenant applications share resources such as memory
and processors. In addition, multitenancy can often result in
lower software licensing costs because fewer instances of the
application are needed to serve a larger number of users.
Multitenancy is, in many ways, the modern equivalent of the
time sharing that was often used in the early days of mainframe computers.
Multitenant applications are often provided through the use
of virtualization, which is one of the key elements of SDN.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3
Looking at an Enterprise
Use Case Example
and Its Benefits
In This Chapter
Understanding the issues
Getting the connectivity you need
Making sure you survive
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
21
Optimizing InterOffice
Connectivity
Clearly, improving interoffice connectivity was a very important goal. The enterprise maintained six data centers in
Boston, Chicago, New York, New Jersey, San Francisco, and
Seattle. Interoffice traffic needed to move to any site on the
network without regard to geographical location or the current status of any one data center. But simply throwing more
hardware at the system wasnt going to work and would
cost far more than the organization wanted to spend.
To implement the winning solution, the enterprise took the
following steps:
Deployed the Sonus VellOS solution along with economical white box switches at WAN edge in each site/data
center. Because VellOS is hardware agnostic, there was
no need for far more expensive proprietary switches or
other equipment.
Added dynamic control of intersite network bandwidth
for cost containment. This resulted in a 64 percent reduction in the number of intersite links that were needed
and a fourfold increase in the efficiency of the usage of
those links.
Replaced its MPLS core with Carrier Ethernet and Dark
Fiber. This change reduced monthly operating expenses
by about onethird.
Overall, the changes made a very significant impact on the
bottom line. Before making these changes the enterprise
Cloud exchange network had a total cost of ownership and
operation of $7.13 million for 36 months. Once implemented,
the SDN solution resulted in the 36 month costs falling to
$2.11 million an approximate 70 percent reduction! When
business profit margins are usually measured in single
digit percentages, those kinds of savings are certainly very
impressive.
Although the savings from each of the changes that were
implemented are important, the largest savings resulted from
the greatly improved network utilization. Quite simply, reducing the amount of network resources necessary to handle the
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
23
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Seeing a Service Provider Use Case Example and Its Benefits
27
Table 4-1
Item
Before
After
Customer purchase
Fixed, upfront
Pay as you go
1820 days
Minutes
Network utilization
25% utilization
90% utilization
Services model
Software programmable
services offering
Differentiated SLAs
(Service Level
Agreements)
Not allowed
with fixed
configuration
Flexible allocation of
network bandwidth,
cost, latency, jitter
Network recovery
Standard fault
recovery
Predetermined fault
recovery
Application aware
No one size
fits all
Yes dynamic
applicationspecific SLA
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Seeing a Service Provider Use Case Example and Its Benefits
29
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5
SDN Deployment
In This Chapter
Creating your strategy
Finding the right vendor
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
33
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
35
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6
Translating Application/Business
Policies
Customers need to be able to simply specify application and
business priorities and service level requirements. An SDN
solution must have the intelligence to be able to translate
this information into meaningful input in order to perform
path computation to select the optimal Cloud exchange
network path.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6: Ten Things You Need to Know When Considering an SDN Solution
39
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6: Ten Things You Need to Know When Considering an SDN Solution
41
Ensuring Application
Performance
Each application, as well as aggregate application performance, can be ensured because allocation of Cloud exchange
network resources are aligned with applications/business
priorities. Through realtime monitoring, if actual network
behavior deviates from expected behavior jeopardizing mission critical application performance, then traffic can be
reprioritized and new optimal paths computed to ensure mission critical applications get continued performance to meet
expected SLAs.
SDN enables the ability to allocate the resources needed to
ensure each application functions as efficiently as possible.
Managing Multitenants
Traffic isolation requirements need to be known and managed in situations when multiple customers traffic is carried
in common transport, such as a multitenant building being
served by a managed service provider, or if multiple traffic
types need to be segregated across a common transport, such
as for regulatory compliance reasons across an enterprises
network.
An SDN solution contains the necessary components to effectively manage multiple tenants through automated application
of your defined business policies.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.