Week3 Flashcards

1
Q

What is/are the problem(s) with manual configuration of packet routing policy?

A

Manual intervention

  1. is complex
  2. makes scaling slow and leads to overload
  3. is a potential cause of failures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it mean the stateful NFs require attention to affinity?
What is flow affinity? What is session affinity?

A

Packets of a given flow should be processed by the same NF instance.
If NFs (like stateful intrusion detection system) require
both direction of traffic it is called “session affinity”. Otherwise, affinity for packet of a given flow in one direction is called “flow affinity”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of misconfigurations that can lead to failures?

A
  1. Administrators need to train employees with new hardware in cases of hardware upgrades.
  2. Misconfiguration software after an upgrade
  3. Misconfiguration can be due to incorrect IP addresses, incorrect routing/load-balancing configuration after scaling NF instances.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the basic requirements of control plane for middlebox management?

A
  1. Deploy chains of NFs

2. Dynamically scale them based on workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is OpenStack?

A

OpenStack is a platform that allows a cluster of servers to be converted to a cloud-like IaaS (Infrastructure as a Service), using a number of microservice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the OpenFlow functions that are typically used for implementing custom traffic forwarding paths?

A

*SDN allows programming switches to implement custom traffic forwarding paths.

Switches need to be compliant with OpenFlow.
SDN programs a switch by specifying which port a packet should be forwarded to based on its packet headers.
Switch can also be programmed to modify packet headers, e.g., change destination MAC address or add VLAN Tag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main tasks of the network programming?

A
  1. How to setup complex forwarding between NFs
  2. How to ensure affinity constraints of NFs, namelu:
    all packets of a given flow must be processed by the same NF instance (flow affinity), or packets in both directions of a connection should be processed by same NF instance (session affinity)
  3. Ensure consistent routing for output packets of NFs that modify packet header (for example, NAT changes IP header)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main tasks relevant to network programming?

A
  1. How to setup complex forwarding between NFs
  2. How to ensure affinity constraints of NFs, namely:
    all packets of a given flow must be processed by the same NF instance (flow affinity), or packets in both directions of a connection should be processed by same NF instance (session affinity or connection affinity)
  3. Ensure consistent routing despite the presence of header modifying NFs (for example, NAT changes IP header)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are possible types of packet modification made by middleboxes?

A
  1. No packet modification - Firewall, IDS=Intrusion Detection System, IPS=Intrusion Prevention System (TCP/IP headers match exactly)
  2. Header modification - NAT, Load balancer - packet payload matches exactly, packet transformation occurs at the timescale of each flow
  3. Payload modification - WAN Optimization, HTTP proxy (change HTTP header) - high correlation in packet payload, packet transformation occurs at the timescale of each session.
  4. Complex modification - Encrypted VPN, compression
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two possible solution being used to ensure affinity?

A

Flow correlation - collect packet at SDN controller, calculate payload similarity (approximately). Doesn’t work on complex modification such as compression or encryption.

FlowTags - Allows middleboxes to “tag” packets based on the internal context. Perform tag based forwarding using OpenFlow. Deterministic approach, but requires middleboxes to follow FlowTags API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of information are required to perform “right-sizing” of the network function instances?

A

Use initial estimates of expected traffic rate to determine load on an NF and per-core capacity to determine number of instance of each NF.

*One of the considerations of the orchestrator is the placement of network functions. This includes to determine the right sizing of the NFs - i.e., how many instances of each NF are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the minimization of inter-server traffic bandwidth important?

A
  1. Intra-server traffic can happen much faster through software forwarding.
  2. Inter-server link bandwidth is a limited resource

*inter means outside while intra means inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What information can be used by the NFV Orchestrator to determine the NF chain that a packet belongs to?

A

Use TCP/IP headers to identify the NF chain that the packet is part of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can the NFV control plane keep track of which segment of an NF chain that a given packet belongs to?

A

To determine which segment of the chain that this packet is part of:

  1. can embed chain segment information using dest MAC addr, VLAN tags, MPLS tags or unused fields in IP header
  2. Tag each packet of a flow on very first switch it encounters.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an important challenge in exposing the header-transformation state of the middleboxes to the NFV Orchestrator?

A

achieving standardized APIs and requiring vendors to expose internal states does not appear to be a viable near-term solution because of:

  1. vast array of middleboxes and middleboxes vendor.
  2. proprietary nature of middlebox functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of the “Flow Correlation” technique for determining the corresponding source flow?

A
  1. No modification to middleboxes is required
17
Q

What are the disadvantages of the “Flow Correlation” technique for determining the corresponding source flow?

A
  1. Does not support complex packet modifications
  2. Flow correlation is not 100% accurate

*for each (ingress, egress) pair of flows need to compute a similarity score - sounds heavy. idk.