Specialization Software-defined Networking (Winter 2014/2015)
Note: Please register in FlexNow by today |
Details
Workload/ECTS Credits: | 150h, 5 ECTS |
Module: | M.Inf.1230: Specialization Software-defined Networks (SDN) |
Lecturer: | Dr. Mayutan Arumaithurai |
Teaching assistant: | tba |
Time: | March 23-27; 09.00-17.00 |
Place: | IfI 2.101 |
UniVZ | tba |
Course Overview
Software-defined networking (SDN) has recently attracted both researchers in academia and big players in communication technologies, and is currently probably the 'hottest' topic in computer networking. This course is a continuation of the "Introduction to SDN" course and we will focus on gaining an advanced knowledge of SDN. The course is organized as a block course. Please see the following "Schedule" table for a detailed structure. The course will focus on reading and understanding recent papers in the SDN field to gain an in depth understanding of the current state of the art and potential research topics. We will also do a lot of exercises to familiarize ourselves with SDN tools.
For all parts of the course, exercises will be provided, in which students must obtain at least 50% of the total points and active participation in the group discussions to be admitted to the examination of this course. The exam is taken by submitting a report of 10-15 pages summarizing the lessons learned during the lectures and exercises as well as the research papers investigated (a LaTeX template will be provided). Depending on the number of attendees, several parts will be conducted in teams of students.
Schedule
Note: The exercises were changed from the originally planned ones based on the student's experience and difficulty level. See the "Exercises" section for the final exercises that one needs to submit. |
Date | Morning Session I | Morning Session II | Afternoon Session I | Afternoon Session II |
Time | 9:15 - 10:45 | 11:00 - 12:30 | 14:00 - 15:30 | 15:30 - |
23.03.2015 | Lecture I: Enhancing Data Plane | Exercise I: Data Center topology | Group Discussion I | Exercise II: Simple load balancer |
24.03.2015 | Lecture II: Northbound API | Exercise III: Pox Firewall | Group Discussion II | Exercise IV: Pyretic Firewall |
25.03.2015 | Lecture III: Enhancing Data Plane - II | Exercise V: Kinetic Firewall | Group Discussion III | Exercise VI: Kinetic-pox loadbalancer |
26.03.2015 | Preparation for final presentation | Exercise VII: kinetic, pyretic debugging | Group Discussion IV | Exercise VIII: Service Chaining I |
27.03.2015 | Group Discussion V | Exercise IX: Service Chaining II | Final presentations I | Final presentation II |
Requirements
- Basic knowledge in computer networking (e.g., successful completion of the course "Computer Networks") and object oriented programming is required.
- Completion of the course "Introduction to SDN", exceptions can be obtained on a case by case basis.
- Each participant is required to actively attend the course and earn 50% of the points of the exercise.
- Written report at the end of the course. The report should include the following:
- Exercises results + code
- Short report on the group discussion papers
- Report on the paper presented by team-X for the final presentation
Papers for final presentations
Lecture Slides
Exercises
- Pox/Openflow Tutorial
- What to Submit: source code along with screenshots for those who are not exempted
23 March
24 March
- Exercise III: Load balancers (contd. exercise II) [5] (Exempt: All except Thomas)
- Exercise IV: Firewall [6] (Exempt: Khawar, Omar, Martin, Guryash, Siddhartha, Sameer, Eeran)
25 March
- Exercise V: Firewall (contd. ) [7] (Exempt: Khawar, Omar, Martin, Thomas, Sameer, Eeran, Guryash, Siddhartha)
- Exercise VI: Pyretic firewall [8] (Exempt: Khawar, Sameer, Eeran, Thomas, Martin)
26 March
- Exercise VII: Kinetic Firewall Instructions, Starting_Code
- Exercise VIII: Kinetic like firewall using pox instructions Starting_CodeTutorial
27 March
- Exercise IX: Pyretic Debugging
- In this debugging exercise, we take solutions available in the Internet for the gardenwall problem and try to fix bugs in it.
- We have done kinetic firewall in exercise VII and imitated the same firewall using pox in exercise VIII. Now, we will imitate the same firewall using pyretic.
- The basic solution is taken from the Internet [9], test if it is able to block h1 when "infected". Note that we will only use the "infected == True" for this exercise.
- start controller (in /home/mininet/pyretic folder): pyretic.py pyretic.examples.gardenwall_internetcode
- start mininet: sudo mn --controller=remote --topo=single,3 --mac --arp
- check h1 ping h2
- Now infect h1: python json_sender.py -n infected -l True --flow="{srcmac=00:00:00:00:00:01}" -a 127.0.0.1 -p 50001
- check h1 ping h2. We should be able to observe that this traffic is blocked.
- Now, we move on to the debugging part
- check h2 ping h3, what happens?
- Now, modify the given code to allow h2 traffic to pass through to h3, when h1 is "infected".
- If time permits, check if the "exempt" case is working fine too
- If time permits, try fixing this code for the "infected" case.
Group Discussion Papers
- GD III: Discussed the 6 papers that were allocated for the final presentations
- GD IV: Discussion of 5 short papers
Papers for final presentation
- A Network-State Management Service, Sigcomm 2014 [10]
- Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN, Sigcomm 2013 [11]
- ClickOS and the Art of Network Function Virtualization, NSDI 2014 [12]
- Dynamic Scheduling of Network Updates, Sigcomm 2014 [13]
- I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks, NSDI 2014 [14]
- Democratic Resolution of Resource Conflicts Between SDN Control Programs, CoNext 2014 [15]
Extra
- A Distributed and Robust SDN Control Plane for Transactional Network Updates, Infocom 2015 [16]