Diverter: a new approach to networking within virtualized infrastructures

As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale and complexity introduce new challenges that especially affect the networking layer. Multiple customers' requirements for varying logical network topologies must be simultaneously accommodated on the shared, underlying network fabric in a secure manner. Diverter is a new approach to network virtualization that targets these highly flexible, large-scale, multi-tenanted environments and advances the current state-of-the-art by implementing an efficient, fully distributed virtualized routing system that allows end-to-end communication between any endpoint with just a single network "hop". We have implemented a prototype of this solution that, in certain network configurations, achieves a throughput improvement of at least 66 % compared to alternative approaches.

[1]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[2]  Hans Eriksson,et al.  MBONE: the multicast backbone , 1994, CACM.

[3]  Russ Housley,et al.  EtherIP: Tunneling Ethernet Frames in IP Datagrams , 2002, RFC.

[4]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[5]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[6]  HarrisTim,et al.  Xen and the art of virtualization , 2003 .

[7]  Chris I. Dalton,et al.  SoftUDC: a software-based data center for utility computing , 2004, Computer.

[8]  David E. Culler,et al.  Operating Systems Support for Planetary-Scale Network Services , 2004, NSDI.

[9]  Xuxian Jiang,et al.  VIOLIN: Virtual Internetworking on Overlay Infrastructure , 2004, ISPA.

[10]  Mitsuhisa Sato,et al.  Low-cost high-bandwidth tree network for PC clusters based on tagged-VLAN technology , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[11]  M. Schunter,et al.  An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement , 2006 .

[12]  Radia Perlman,et al.  Rbridges: Base Protocol Specification , 2006 .

[13]  Chris I. Dalton,et al.  Towards automated provisioning of secure virtualized networks , 2007, CCS '07.

[14]  Jennifer Rexford,et al.  Floodless in seattle: a scalable ethernet architecture for large enterprises , 2008, SIGCOMM '08.

[15]  Andrea Leganza Approved for External Publication , 2005 .