Professional Documents
Culture Documents
YUMA Tools is an open source suite of tools designed to To validate the Hephaestus’ architecture, a test scenario
work with NETCONF protocol. It consists of a NETCONF was created based on the experiment described in [25]. After
client (yangcli), a NETCONF server (netconfd), an Open- a couple of the necessary adjustments to the proposed
SSH server and utility to compare YANG modules. architecture, as shown in Figure 6, we used two physical
In the Hephaestus’ architecture, the YUMA role is servers Host1 and Host2, each hosting two virtual machines.
creating the OVS’s access interface using NETCONF. The Additionally, each server executes a OpenStack computation
OVS’ configuration process, normally executed via CLI or module, known as Nova. In a third physical server run: the
JSON-RPC, is now performed using a standard interface. OpenStack controller, the OVS and YUMA.
The operations available in OVS, used to create virtual
networks, were exported to an interface based on XML-RPC,
accessible via NETCONF. The idea was to have a well-
defined interface, robust, secure, based on open standards.
V. HEFESTO’S EVALUATION
Within the Hephaestus’ architecture some details attract
attention from the implementation standpoint. The first one
is why OpenStack was chosen as a virtual machine
management environment. This choice was motivated by the
distributed nature of OpenStack and its flexibility in working
with different hypervisors, leaving Hephaestus vendor
independent. Figure 6 – Base Scenario
Another important point is the approach used to build the
virtual networks. Like VNEXT, Hephaestus uses VLANs,
associating tags to different virtual networks, isolating them
Once modeled virtual network topology, Hephaestus is [3] N.M. Mosharaf Kabir Chowdhury, Raouf Boutaba, “A Survey
responsible for the creation of its elements by performing the of Network Virtualization”, University of Waterloo Technical
Report CS-2008-25, Oct. 2008.
following steps:
[4] N. M. Mosharaf Kabir Chowdhury and R. Boutaba, “Network
1. Initializes virtual machines calling the OpenStack virtualization: state of the art and research challenges,” IEEE
Rest API. Communications, vol. 47, no. 7, pp. 20–26, July 2009.
2. Loads in OVS and the virtual machines (if [5] T. Choi, K. Nodir, T. Lee, D. Kim, and J. Lee, "Autonomic
necessary), via NETCONF, YANG management management framework for cloud-based virtual networks",
modules, ;in Proc. APNOMS, 2011, pp.1-7.
3. Then, run NETCONF calls to OVS, creating tags [6] LeMay, M.; Kim-Khoa Nguyen; St. Arnaud, B.; Cheriet, M.;,
(VLAN) used by the two virtual networks. "Toward a Zero-Carbon Network: Converging Cloud
After creation of virtual networks, instances VM1 and Computing and Network Virtualization," Internet Computing,
IEEE , vol.16, no.6, pp.51-59, Nov.-Dec. 2012.
VM3 can communicate completely independently of VM2
[7] Schönwälder, J.; Björklund, M.; Shafer, P.; , "Network
and VM4. The separation of network traffic and the visibility configuration management using NETCONF and YANG,"
of the data was confirmed by performing tests with the tools Communications Magazine, IEEE , vol.48, no.9, pp.166-173,
ping and tcpdump. Sept. 2010.
This scenario brings attention to an important point when [8] R. Enns, “NETCONF Configuration Protocol,” Juniper
it comes to traffic isolation, availability and fault tolerance: Networks, RFC 4741, Dec. 2006.
during the test process, when OVS was disconnected, both [9] IETF: The Internet Engineering Task Force,
networks became inoperable. In contrast, when OVS was http://www.ietf.org/
restarted, networks returned to work properly. Thus we [10] E. Nataf and O. Festor, "jYang : A YANG parser in java",
considered the possibility of using more instances of OVS, Computing Research Repository, August 2009 2009.
preferably one for each virtual network is thus assured of [11] H. Xu, D. Xiao, Data Modeling for NETCONF-Based
Network Management: XML Schema or YANG, Proceeding
complete isolation networks. After this adjustment, by of 11th International Conference on Communication
repeating the test chains were shown to be sufficiently robust Technologies, Washington DC: IEEE Press, 561-564, 2008.
without the event of failure of one interfering with the [12] Amazon Elastic Compute Cloud (Amazon EC2),
operation of the other. http://aws.amazon.com/ec2/
[13] OpenStack, http://openstack.org.
VII. CONCLUSION [14] Open vSwitch, http://openvswitch.org.
This paper presents Hephaestus, a tool designed to help [15] J. Pettit et al., Virtual Switching in an Era of Advanced
in the creation of virtual networks in cloud computing Edges, 2nd Workshop on Data Center -- Converged and
environments. Among the many specific features Virtual Ethernet Switching (DC-CAVES), Sept. 2010.
Hephaestus, we highlight the possibility of working on [16] Xen, http://xen.org/
scenarios involving multiple InPs, and also the creation of [17] XenServer/XCP, http://xen.org/
these networks using transactions, based on interfaces [18] KVM, http://www.linux-kvm.org/page/Main_Page
compatible with the NETCONF protocol. Moreover, [19] OVF, http://dmtf.org/standards/ovf
Hephaestus offers the possibility of working with various [20] VMware vSphere,
hypervisors, unlike other solutions mentioned above. http://www.vmware.com/products/vsphere/mid-size-and-
enterprise-business/overview.html
A proof of concept was done, which helped to validate
the architecture, strongly contributing to its improvement and [21] Hyper-V, http://www.microsoft.com/en-us/server-
cloud/windows-server/hyper-v.aspx
maturity. Using more instances of OVS, Hephaestus gave the
[22] YANG - A Data Modeling Language for the Network
robustness and complete isolation expected in cloud Configuration Protocol (NETCONF),
computing environments. https://tools.ietf.org/html/rfc6020.
As future work, we believe in the possibility of using [23] YUMA, http://www.yumaworks.com/yuma/
OpenFlow to define flows between networks, thus increasing [24] Pisa, P.S.; Couto, R.S.; Carvalho, H.E.T.; Neto, D.J.S.;
the number of virtual networks that can be created. This will Fernandes, N.C.; Campista, M.E.M.; Costa, L.H.M.K.;
ensure significant improvements in the technique used for Duarte, O.C.M.B.; Pujolle, G.; , "VNEXT: Virtual network
isolation of virtual networks. management for Xen-based Testbeds," Network of the Future
(NOF), 2011 International Conference on the , vol., no.,
Moreover, YANG modules based on MIB HOST- pp.41-45, 28-30 Nov. 2011.
RESOURCES-V2-MIB [28] can be incorporated into virtual [25] Hui-Min Tseng; Hui-Lan Lee; Jen-Wei Hu; Te-Lung Liu; Jee-
instances and OVS, thus giving greater control over the Gong Chang; Wei-Cheng Huang; , "Network Virtualization
allocation of computing resources. This opens doors for with Cloud Virtual Switch," Parallel and Distributed Systems
deploying mechanisms for performance monitoring and SLA (ICPADS), 2011 IEEE 17th International Conference on ,
(Service Level Agreement). vol., no., pp.998-1003, 7-9 Dec. 2011.
[26] OpenNebula, http://opennebula.org/
REFERENCES [27] OpenFlow, http://www.openflow.org/
[1] George N. Rouskas, "Tutorial on Network Virtiualization". [28] HOST-RESOURCES-V2-MIB,
Presented at OFC/NFOEC 2012, March 7, 2012, Los Angeles, http://www.oidview.com/mibs/0/HOST-RESOURCES-V2-
CA. MIB.html
[2] SNMP – RFC 2576, http://tools.ietf.org/html/rfc3584