SlideShare a Scribd company logo
MEETUP – JAN 20TH 2014

Juniper Restricted Confidential - Do not distribute externally
PROBLEM DEFINITION
2

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
LOST DECADE OF NETWORKING
2001

2011

… cool new logos
3

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
THE RAGE OF 2011-2013

Solution looking for a problem …..
…. and it did find a few interesting ones
4

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
WHAT ARE THE REAL PROBLEMS…
CONFIGURED,
MANAGED

Whatever happened to Web2.0?
5

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
WHAT ARE THE REAL PROBLEMS…
SCALE-UP
SYSTEMS

Cloud? Scale-out? ….
6

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
WHAT ARE THE REAL PROBLEMS…
HARDWARE
SERVICES

Virtualization? Orchestration?
7

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
WHAT ARE THE REAL PROBLEMS…
LOW VISIBILITY

Big Data? Analytics? ….
8

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
NETWORKING PROBLEMS IN A NUTSHELL
CONFIGURED,
MANAGED

POOR MANAGE-ABILITY

SCALE-UP
SYSTEMS

INFLEXIBLE SYSTEMS
HARDWARE
SERVICES

HARDWARE CENTRIC

LOW VISIBILITY

9

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
CUSTOMER PROBLEMS
10

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
DATA-CENTER NETWORKING
Admin

Config
Centralized Management & Control, Policy provisioning

LOAD BALANCER

LOAD BALANCER

MARKETING

HR

FINANCE

FIREWALL

FIREWALL

VIRTUALIZED

VLANS

VLANS

FINANCE

Physical
Servers

HR

Local Hard MARKETING
Drives

Network Virtualization and Centralized Services Management
11

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
SERVICE PROVIDER NETWORK
PCRF

Scalable Virtual
Service on x86

MOBILE EDGE

Services – Firefly, Web
App Secure, Ddos
Secure, vSA

FW – IPS – PDF – DDoS
SP DATACENTER

SGSN / MME

CACHING

Mobile Edge
GGSN /
P-GW
BROADBAND EDGE

Business
Edge

BUSINESS EDGE

Service Load
Balancing

DPI

L3VPN-ENABLED
SLB
SP CORE/BACKBONE

Service Load
Core /
Balancing
Backbone

Private
networks

FW

Broadband
Edge

BRAS/VPN Edge
SBC

Scalable Virtual
Service on x86

Dynamic Service Provisioning,
Scaling; Service Chaining

Media

Gateway
FW – IPS – PDF – DDoS

NFV: Virtualized Network Services with Centralized Management & Orchestration
12

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
NETWORK VIRTUALIZATION
TECHNIQUES
13

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
LEGACY DC - L2/VLAN BASED APPROACH
L3

L3

L2/L3

L2/L3

L2/L3

L2/L3

Multi-Chassis LAG
TRUNK
L2 Switch

L2 Switch ToR

L2

L2

L2

L2

L2

L2

L2

L2

VMs
Servers
14

Copyright © 2013 Juniper Networks, Inc.

L2 Switch

L2 Switch ToR

Juniper Restricted Confidential - Do not distribute externally.

L2

L2

L2

L2
LEGACY DC - LIMITED VLAN SPAN
L3

L3
Routing & Filtering
between VLANs

Routing & Filtering
between VLANs

FW

No VLANs Across L3

L2/L3

L2/L3

L2/L3

FW

L2/L3

LB

LB

Multi-Chassis LAG
TRUNK
L2 Switch

L2 Switch ToR

L2

L2

L2

L2

L2

L2

L2

L2

VLAN Span Limit
15

Copyright © 2013 Juniper Networks, Inc.

L2 Switch

L2 Switch ToR

Juniper Restricted Confidential - Do not distribute externally.

L2

L2

L2

L2
LEGACY DC - NO MULTI-TENANCY
L3

FW

L2/L3

L2/L3

L3

L2/L3

Single Routing Table
(No support for overlapping
multi-tenant space)

LB

FW

L2/L3

LB

Multi-Chassis LAG
TRUNK
L2 Switch

L2 Switch ToR

L2

L2

L2

L2

L2

L2

L2

L2

VMs
VLAN Span Limit
16

Copyright © 2013 Juniper Networks, Inc.

L2 Switch

L2 Switch ToR

Juniper Restricted Confidential - Do not distribute externally.

L2

L2

L2

L2
LEGACY DC - MULTI-TENANCY WITH VRF
Tenant Specific
HW Appliance
Services

L3-MPLS

L3-MPLS

FW
LB

FW
LB

MPLS – Enabled links

FW
LB

FW
LB

L2/L3 -MPLS L2/L3 -MPLS
FW
LB

L2/L3 -MPLS L2/L3 -MPLS

VRF for multi-tenant isolation

Tenant-VRF

FW
LB

Tenant-VRF

Multi-Chassis LAG
TRUNK
L2 Switch

L2 SwitchToR

L2

L2

L2

L2

L2

L2

L2

L2

VLAN Span Limit
17

Copyright © 2013 Juniper Networks, Inc.

L2 Switch

L2 Switch
ToR

Juniper Restricted Confidential - Do not distribute externally.

L2

L2

L2

L2
CLOUD DC – ECMP CLOS NETWORK
L3

L3

L3
External Network

L3

L3

L3 ToR

L2-SW

18

L3

L3 ToR

L2-SW

L2-SW

L2-SW

L2-SW

Copyright © 2013 Juniper Networks, Inc.

Servers

VXLAN

L2-SW

L2-SW

L3

L3 ToR

L3 ToR

L2-SW

L2-SW

Juniper Restricted Confidential - Do not distribute externally.

L2-SW

L2-SW

L2-SW
CLOUD DC - TYPICAL L2 OVERLAY
L3

L3

Hypervisor Switch performs L2 forwarding

L3

Separate VM does L3 Routing and NAT

External Network
External Network

L3

L3

L3 ToR

L3

L3 ToR

VXLAN

L3

L3 ToR

L3 ToR

VXLAN

L2-SW

VXLAN

L2-SW

L2-SW

L2-SW

L2-SW

L2-SW

L2-SW

L2-SW

L2-SW

Servers
19

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.

L2-SW

L2-SW

L2-SW
CLOUD DC - CONTRAIL L2/L3 OVERLAY
= multi-tenant VRF
L3

L3

L3

Hypervisor vRouter handles L2/L3

External Network

Hypervisor vRouter performs NAT

L3

L3

L3 ToR

vRouter

L2/L3

L3 ToR

vRouter

L2/L3

Servers
20

L3

vRouter

L2/L3

vRouter

L2/L3

vRouter

L2/L3

Service Insertion

Copyright © 2013 Juniper Networks, Inc.

L3

L3 ToR

L3 ToR

vRouter

L2/L3

vRouter

L2/L3

vRouter

L2/L3

vRouter

L2/L3

Service Insertion

Juniper Restricted Confidential - Do not distribute externally.

vRouter

L2/L3

vRouter

L2/L3

vRouter

L2/L3
CONTRAIL NETWORK VIRTUALIZATION
21

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
ROLE OF CONTRAIL IN CLOUD ENVIRONMENT
Orchestrator

Compute APIs

Network APIs

Storage APIs

JunosV Contrail

Virtual Machine

vRouter
Physical Switches

Server
Service Nodes
Gateway Router

vSRX, F5 …
Internet
22

VPN

Copyright © 2013 Juniper Networks, Inc.

DCI WAN

Juniper Restricted Confidential - Do not distribute externally.
CONTRAIL NETWORKING STACK

Customer OSS/BSS

Openstack

Cloudstack

REST APIs (Configuration, Operational, and Analytics)

Analytics
Engine

Analytics
Engine

Analytics
Engine

Configuration
Nodes

Control
Plane

Compute
Node
(Virtual Router)

23

Copyright © 2013 Juniper Networks, Inc.

Control
Plane

Gateway
Node
(MX, EX/QFX, ...)

Control
Plane

Service
Nodes
(SRX, F5, ...)

Juniper Restricted Confidential - Do not distribute externally.
CONTRAIL NETWORKING FEATURES

NAT, Routing,
Switching

Load
Balancing

Security
Services

3rd Party
Network Srvc

Physical or
Software GW

24

IPAM, Virtual
DNS

Rich
Analytics

Service
Chaining

High
Availability

API Services

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
PHYSICAL DATACENTER TOPOLOGY VIEW
Network

Gateway
Router

Gateway
Router

No VM IP information in
the Underlay Network

BGP

Spine Switch

Spine Switch

Spine Switch

L3 ECMP

OSPF/BGP

L3
Leaf Switch Leaf Switch
Hypervisor
Hypervisor
Hypervisor

Hypervisor
Hypervisor
Hypervisor

Control Node

Control Node

Hypervisor
Hypervisor
Hypervisor
Hypervisor

Config Node
(Openstack)
(Cloudstack)

Config Node
(Openstack)
(Cloudstack)

Analytics Node

Analytics Node

WebUI Node

WebUI Node

Compute & Storage Rack
25

Leaf Switch Leaf Switch

Hypervisor
Hypervisor
Hypervisor
Hypervisor

L2, L3

Leaf Switch Leaf Switch

Compute & Storage Rack

Copyright © 2013 Juniper Networks, Inc.

Leaf Switch Leaf Switch

Optional Redundancy
Orchestration & Services Racks

Juniper Restricted Confidential - Do not distribute externally.
SOLUTION OVERVIEW
Customer
L3VPN
Dashboard

Public Internet
(ISP-1)

Public Internet
(ISP-2)

Console

V
R
F

Service
Appliance

Management, Configuration,
Orchestration, Analytics

V
R
F

PE Router
(Juniper MX,
Cisco ASR9K)
with L3VPN/
VRF Support

V
R
F

vRouter
Agent

Contrail Virtual
Network Controller

CM CP

CM CP

Service
Appliance

Contrail SW
Gateway

Service Appliance with
L3VPN/VRF Support
(Juniper SRX, etc)

CM CP

vRouter
Agent

AS CP

Contrail SW Gateway- L2 Service
Appliances (F5 Load Balancer,etc)

Gateway Service
Applications & Services (AS)
Configuration Management (CM)
Control Plane (CP)
Host Agent
VRouter(Data Plane)

26

26

vRouter
Agent

VM

VM

VM

vRouter

vRouter
Agent

vRouter
Agent

VM

VM

Bare Metal Linux/Windows

Juniper Restricted Confidential - Do not distribute externally.

C O N F I D E N T I AL

–

D O

N O T

VIRTUAL NETWORK A

VIRTUAL NETWORK B

VM

Virtualized Servers (Hypervisor)

Copyright © 2013 Juniper Networks, Inc.

vRouter

D I S T R I B U T E

VIRTUAL NETWORK C
SOLUTION OVERVIEW – CONTROL & MGMT PLANE
Customer
L3VPN
Dashboard

Public Internet
(ISP-1)

Public Internet
(ISP-2)

Console

V
R
F

Service
Appliance

Management, Configuration,
Orchestration, Analytics

V
R
F

PE Router
(Juniper MX,
Cisco ASR9K)
with L3VPN/
VRF Support

V
R
F

vRouter
Agent

Contrail Virtual
Network Controller

CM CP

Contrail SW
Gateway

Service Appliance with
L3VPN/VRF Support
(Juniper SRX, etc)

BGP/Control, Netconf/Mgmt

CM CP

CM CP

Service
Appliance

AS CP

vRouter
Agent

XMPP (Control, Mgmt)

Contrail SW Gateway- L2 Service
Appliances (F5 Load Balancer,etc)

Gateway Service
Applications & Services (AS)

VIRTUAL NETWORK A

Configuration Management (CM)
Control Plane (CP)
Host Agent

vRouter
Agent

VM

VM

VM

vRouter

vRouter
Agent

vRouter
Agent

VM

VM

vRouter

VIRTUAL NETWORK B

VM

Virtualized Servers (Hypervisor)

Bare Metal Linux/Windows

VRouter(Data Plane)

27

27

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.

C O N F I D E N T I AL

–

D O

N O T

D I S T R I B U T E

VIRTUAL NETWORK C
SOLUTION OVERVIEW – DATA PLANE
Customer
L3VPN
Dashboard

Public Internet
(ISP-1)

Public Internet
(ISP-2)

Console

V
R
F

Service
Appliance

Management, Configuration,
Orchestration, Analytics

V
R
F

PE Router
(Juniper MX,
Cisco ASR9K)
with L3VPN/
VRF Support

V
R
F

vRouter
Agent

Contrail Virtual
Network Controller

CM CP

CM CP

Service
Appliance

Contrail SW
Gateway

Service Appliance with
L3VPN/VRF Support
(Juniper SRX, etc)

Dynamically Insert Services
(Physical & Virtual)

CM CP

Route Across/within VNs (L3VPN)
Bridge within VNs (EVPN)

AS CP

vRouter
Agent
Contrail SW Gateway- L2 Service
Appliances (F5 Load Balancer,etc)

Gateway Service
VIRTUAL NETWORK A

Applications & Services (AS)
Configuration Management (CM)
Control Plane (CP)
Host Agent

vRouter
Agent

VM

VM

VM

vRouter

vRouter
Agent

vRouter
Agent

VM

VM

vRouter

VIRTUAL NETWORK B

VM

Virtualized Servers (Hypervisor)

Bare Metal Linux/Windows

VRouter(Data Plane)

28

28

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.

C O N F I D E N T I AL

–

D O

N O T

D I S T R I B U T E

VIRTUAL NETWORK C
DEMO OVERVIEW
29

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.
DEMO – PHYSICAL TOPOLOGY
LAB NETWORK

MX-80

MX-80
OSPF

EX-4500

EX-4500

EX-4500

OSPF

L3
Leaf Switch

L2, L3

Leaf Switch
Hypervisor
Hypervisor
Hypervisor

Compute & Storage Rack
30

Hypervisor
Hypervisor

Compute & Storage Rack

Copyright © 2013 Juniper Networks, Inc.

Leaf Switch

Leaf Switch

Control Node
Config Node
Openstack Srvcs

Control Node
Analytics Node
Openstack Srvcs

Orchestration & Services Racks

Juniper Restricted Confidential - Do not distribute externally.
DEMO – LOGICAL TOPOLOGY
LAB NETWORK

Dashboard

Console

V
R
F

Management, Configuration,
Orchestration, Analytics

V
R
F

V
R
F

V
R
F

CM

CP

AP

V
R
F

MX-80

MX-80
Controller Nodes

V
R
F

MPLSoGRE,
VXLAN
BGP

CP

XMPP
MPLSoUDP, VXLAN

vRouter
Agent

VM

vRouter
Agent

VM

VM

VM

vRouter
Agent

VM

VM

vRouter
Agent

VM

Compute Nodes

31

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.

VM

vRouter
Agent

VM

VM
OPEN CONTRAIL

Contrail is available as Open Source
www.opencontrail.org. Commercial support available from Juniper.

Same features and scaling as commercial version
Uses proven stable standards. Production-Ready

Permissive license
Apache 2.0 (Controller), GPL (vRouter)

Integrated into open source virtualization stacks
OpenStack, CloudStack (beta)

32

Copyright © 2013 Juniper Networks, Inc.

Juniper Restricted Confidential - Do not distribute externally.

More Related Content

PPSX
Juniper Contrail VNS A BASIC introduction
PDF
[OpenStack 스터디] OpenStack With Contrail
PPTX
SDN Controller
PPTX
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
PDF
Banv meetup-contrail
PPTX
OpenStack MeetUp - OpenContrail Presentation
PDF
Contrail Enabler for agile cloud services
PPSX
Service Chaining - Cloud Network Services at Scale
Juniper Contrail VNS A BASIC introduction
[OpenStack 스터디] OpenStack With Contrail
SDN Controller
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
Banv meetup-contrail
OpenStack MeetUp - OpenContrail Presentation
Contrail Enabler for agile cloud services
Service Chaining - Cloud Network Services at Scale

What's hot (20)

PDF
Cloud Network Virtualization with Juniper Contrail
PPTX
Secure Multi Tenant Cloud with OpenContrail
PDF
PLNOG 13: Nicolai van der Smagt: SDN
PPSX
Contrail Deep-dive - Cloud Network Services at Scale
PPTX
Cloudstack conference open_contrail v4
PDF
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
PPTX
The Juniper SDN Landscape
PPTX
Contrail Basics
PDF
ONIC Japan 2016 - Contrail アップデート
PPTX
OpenContrail Silicon Valley Meetup Aug 25 2015
PDF
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
PDF
Accelerating SDN Applications with Open Source Network Overlays
PDF
Deployment of Juniper Contrail in AVG Technologies
PDF
MidoNet 101
PDF
Kubernetes OpenContrail Meetup
PPTX
Reference design for v mware nsx
PDF
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof Konkowski
PDF
NFV в сетях операторов связи
PDF
Cisco at v mworld 2015 theater presentation brfarnha
PDF
Стратегия Juniper в контексте Web 2.0
Cloud Network Virtualization with Juniper Contrail
Secure Multi Tenant Cloud with OpenContrail
PLNOG 13: Nicolai van der Smagt: SDN
Contrail Deep-dive - Cloud Network Services at Scale
Cloudstack conference open_contrail v4
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
The Juniper SDN Landscape
Contrail Basics
ONIC Japan 2016 - Contrail アップデート
OpenContrail Silicon Valley Meetup Aug 25 2015
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
Accelerating SDN Applications with Open Source Network Overlays
Deployment of Juniper Contrail in AVG Technologies
MidoNet 101
Kubernetes OpenContrail Meetup
Reference design for v mware nsx
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof Konkowski
NFV в сетях операторов связи
Cisco at v mworld 2015 theater presentation brfarnha
Стратегия Juniper в контексте Web 2.0
Ad

Viewers also liked (20)

PDF
epic-apm-toward-a-better-apm-model-for-the-application-economy
PDF
Open contraildays2014
PDF
Using OpenStack Swift for Extreme Data Durability
PPTX
Neutron DVR
PDF
Performance Lessons learned in vRouter - Stephen Hemminger
PDF
Brocade SDN Controller -Sample Code for Brocade vRouter-
PDF
Using Agilio SmartNICs for OpenStack Networking Acceleration
PDF
OpenStack networking (Neutron)
PPTX
OpenContrail deployment experience
PPTX
Open contrailのご紹介
PDF
Orchestrating and managing VNFss on openstack - demo- [Cloudify + openstack ...
PDF
2016 interop sdi_showcase_contrail
PDF
Open contrailmeetup 20161207
PPTX
Microservice Memoirs
PDF
OpenContrail Cloudwatt Feedback
PPTX
OpenStack & OpenContrail in Production
PDF
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
PDF
OpenStack Neutron Tutorial
PDF
Brocade Software Networking (SDN NFV Day ITB 2016)
PDF
[2016 11월 세미나] Kakao 프라이빗 클라우드와 컨테이너 기반 서비스 런칭기
epic-apm-toward-a-better-apm-model-for-the-application-economy
Open contraildays2014
Using OpenStack Swift for Extreme Data Durability
Neutron DVR
Performance Lessons learned in vRouter - Stephen Hemminger
Brocade SDN Controller -Sample Code for Brocade vRouter-
Using Agilio SmartNICs for OpenStack Networking Acceleration
OpenStack networking (Neutron)
OpenContrail deployment experience
Open contrailのご紹介
Orchestrating and managing VNFss on openstack - demo- [Cloudify + openstack ...
2016 interop sdi_showcase_contrail
Open contrailmeetup 20161207
Microservice Memoirs
OpenContrail Cloudwatt Feedback
OpenStack & OpenContrail in Production
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
OpenStack Neutron Tutorial
Brocade Software Networking (SDN NFV Day ITB 2016)
[2016 11월 세미나] Kakao 프라이빗 클라우드와 컨테이너 기반 서비스 런칭기
Ad

Similar to Open contrail slides for BANV meetup (20)

PPTX
Ключевые тенденции отрасли в последнее время
PDF
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
PDF
Using OpenContrail with Kubernetes
PPTX
cloud-enabled-branch-tdm-presentation.pptx
PPTX
Juniper srx-branch-mid-range firewall.pptx
PPTX
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
PDF
Junos Enterprise Routing A Practical Guide To Junos Routing And Certification...
PDF
Simplify and secure your path to the multicloud future
PDF
Routing to SDN Era
PDF
Opencontrail network virtualization
PDF
Draft Juniper Experience First Networking | Slideshare
PDF
Juniper Company Profile
PDF
Juniper Networks company profile
PPTX
A Networking View for the DevOps Crew: SDN
PDF
Do routing the_ip
PPTX
Juniper
PPTX
Puppet Enterprise for the Network
PDF
Net1674 final emea
PPTX
Keynote Address - SDN A path to programmable, elastic and optimized networks
PDF
ir_presentation-q2-2020-august-final-deck-jnpr.pdf
Ключевые тенденции отрасли в последнее время
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
Using OpenContrail with Kubernetes
cloud-enabled-branch-tdm-presentation.pptx
Juniper srx-branch-mid-range firewall.pptx
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
Junos Enterprise Routing A Practical Guide To Junos Routing And Certification...
Simplify and secure your path to the multicloud future
Routing to SDN Era
Opencontrail network virtualization
Draft Juniper Experience First Networking | Slideshare
Juniper Company Profile
Juniper Networks company profile
A Networking View for the DevOps Crew: SDN
Do routing the_ip
Juniper
Puppet Enterprise for the Network
Net1674 final emea
Keynote Address - SDN A path to programmable, elastic and optimized networks
ir_presentation-q2-2020-august-final-deck-jnpr.pdf

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
project resource management chapter-09.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
project resource management chapter-09.pdf
Programs and apps: productivity, graphics, security and other tools
WOOl fibre morphology and structure.pdf for textiles
cloud_computing_Infrastucture_as_cloud_p
Building Integrated photovoltaic BIPV_UPV.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hindi spoken digit analysis for native and non-native speakers
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Heart disease approach using modified random forest and particle swarm optimi...
Assigned Numbers - 2025 - Bluetooth® Document
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

Open contrail slides for BANV meetup

  • 1. MEETUP – JAN 20TH 2014 Juniper Restricted Confidential - Do not distribute externally
  • 2. PROBLEM DEFINITION 2 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 3. LOST DECADE OF NETWORKING 2001 2011 … cool new logos 3 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 4. THE RAGE OF 2011-2013 Solution looking for a problem ….. …. and it did find a few interesting ones 4 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 5. WHAT ARE THE REAL PROBLEMS… CONFIGURED, MANAGED Whatever happened to Web2.0? 5 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 6. WHAT ARE THE REAL PROBLEMS… SCALE-UP SYSTEMS Cloud? Scale-out? …. 6 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 7. WHAT ARE THE REAL PROBLEMS… HARDWARE SERVICES Virtualization? Orchestration? 7 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 8. WHAT ARE THE REAL PROBLEMS… LOW VISIBILITY Big Data? Analytics? …. 8 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 9. NETWORKING PROBLEMS IN A NUTSHELL CONFIGURED, MANAGED POOR MANAGE-ABILITY SCALE-UP SYSTEMS INFLEXIBLE SYSTEMS HARDWARE SERVICES HARDWARE CENTRIC LOW VISIBILITY 9 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 10. CUSTOMER PROBLEMS 10 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 11. DATA-CENTER NETWORKING Admin Config Centralized Management & Control, Policy provisioning LOAD BALANCER LOAD BALANCER MARKETING HR FINANCE FIREWALL FIREWALL VIRTUALIZED VLANS VLANS FINANCE Physical Servers HR Local Hard MARKETING Drives Network Virtualization and Centralized Services Management 11 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 12. SERVICE PROVIDER NETWORK PCRF Scalable Virtual Service on x86 MOBILE EDGE Services – Firefly, Web App Secure, Ddos Secure, vSA FW – IPS – PDF – DDoS SP DATACENTER SGSN / MME CACHING Mobile Edge GGSN / P-GW BROADBAND EDGE Business Edge BUSINESS EDGE Service Load Balancing DPI L3VPN-ENABLED SLB SP CORE/BACKBONE Service Load Core / Balancing Backbone Private networks FW Broadband Edge BRAS/VPN Edge SBC Scalable Virtual Service on x86 Dynamic Service Provisioning, Scaling; Service Chaining Media Gateway FW – IPS – PDF – DDoS NFV: Virtualized Network Services with Centralized Management & Orchestration 12 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 13. NETWORK VIRTUALIZATION TECHNIQUES 13 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 14. LEGACY DC - L2/VLAN BASED APPROACH L3 L3 L2/L3 L2/L3 L2/L3 L2/L3 Multi-Chassis LAG TRUNK L2 Switch L2 Switch ToR L2 L2 L2 L2 L2 L2 L2 L2 VMs Servers 14 Copyright © 2013 Juniper Networks, Inc. L2 Switch L2 Switch ToR Juniper Restricted Confidential - Do not distribute externally. L2 L2 L2 L2
  • 15. LEGACY DC - LIMITED VLAN SPAN L3 L3 Routing & Filtering between VLANs Routing & Filtering between VLANs FW No VLANs Across L3 L2/L3 L2/L3 L2/L3 FW L2/L3 LB LB Multi-Chassis LAG TRUNK L2 Switch L2 Switch ToR L2 L2 L2 L2 L2 L2 L2 L2 VLAN Span Limit 15 Copyright © 2013 Juniper Networks, Inc. L2 Switch L2 Switch ToR Juniper Restricted Confidential - Do not distribute externally. L2 L2 L2 L2
  • 16. LEGACY DC - NO MULTI-TENANCY L3 FW L2/L3 L2/L3 L3 L2/L3 Single Routing Table (No support for overlapping multi-tenant space) LB FW L2/L3 LB Multi-Chassis LAG TRUNK L2 Switch L2 Switch ToR L2 L2 L2 L2 L2 L2 L2 L2 VMs VLAN Span Limit 16 Copyright © 2013 Juniper Networks, Inc. L2 Switch L2 Switch ToR Juniper Restricted Confidential - Do not distribute externally. L2 L2 L2 L2
  • 17. LEGACY DC - MULTI-TENANCY WITH VRF Tenant Specific HW Appliance Services L3-MPLS L3-MPLS FW LB FW LB MPLS – Enabled links FW LB FW LB L2/L3 -MPLS L2/L3 -MPLS FW LB L2/L3 -MPLS L2/L3 -MPLS VRF for multi-tenant isolation Tenant-VRF FW LB Tenant-VRF Multi-Chassis LAG TRUNK L2 Switch L2 SwitchToR L2 L2 L2 L2 L2 L2 L2 L2 VLAN Span Limit 17 Copyright © 2013 Juniper Networks, Inc. L2 Switch L2 Switch ToR Juniper Restricted Confidential - Do not distribute externally. L2 L2 L2 L2
  • 18. CLOUD DC – ECMP CLOS NETWORK L3 L3 L3 External Network L3 L3 L3 ToR L2-SW 18 L3 L3 ToR L2-SW L2-SW L2-SW L2-SW Copyright © 2013 Juniper Networks, Inc. Servers VXLAN L2-SW L2-SW L3 L3 ToR L3 ToR L2-SW L2-SW Juniper Restricted Confidential - Do not distribute externally. L2-SW L2-SW L2-SW
  • 19. CLOUD DC - TYPICAL L2 OVERLAY L3 L3 Hypervisor Switch performs L2 forwarding L3 Separate VM does L3 Routing and NAT External Network External Network L3 L3 L3 ToR L3 L3 ToR VXLAN L3 L3 ToR L3 ToR VXLAN L2-SW VXLAN L2-SW L2-SW L2-SW L2-SW L2-SW L2-SW L2-SW L2-SW Servers 19 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally. L2-SW L2-SW L2-SW
  • 20. CLOUD DC - CONTRAIL L2/L3 OVERLAY = multi-tenant VRF L3 L3 L3 Hypervisor vRouter handles L2/L3 External Network Hypervisor vRouter performs NAT L3 L3 L3 ToR vRouter L2/L3 L3 ToR vRouter L2/L3 Servers 20 L3 vRouter L2/L3 vRouter L2/L3 vRouter L2/L3 Service Insertion Copyright © 2013 Juniper Networks, Inc. L3 L3 ToR L3 ToR vRouter L2/L3 vRouter L2/L3 vRouter L2/L3 vRouter L2/L3 Service Insertion Juniper Restricted Confidential - Do not distribute externally. vRouter L2/L3 vRouter L2/L3 vRouter L2/L3
  • 21. CONTRAIL NETWORK VIRTUALIZATION 21 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 22. ROLE OF CONTRAIL IN CLOUD ENVIRONMENT Orchestrator Compute APIs Network APIs Storage APIs JunosV Contrail Virtual Machine vRouter Physical Switches Server Service Nodes Gateway Router vSRX, F5 … Internet 22 VPN Copyright © 2013 Juniper Networks, Inc. DCI WAN Juniper Restricted Confidential - Do not distribute externally.
  • 23. CONTRAIL NETWORKING STACK Customer OSS/BSS Openstack Cloudstack REST APIs (Configuration, Operational, and Analytics) Analytics Engine Analytics Engine Analytics Engine Configuration Nodes Control Plane Compute Node (Virtual Router) 23 Copyright © 2013 Juniper Networks, Inc. Control Plane Gateway Node (MX, EX/QFX, ...) Control Plane Service Nodes (SRX, F5, ...) Juniper Restricted Confidential - Do not distribute externally.
  • 24. CONTRAIL NETWORKING FEATURES NAT, Routing, Switching Load Balancing Security Services 3rd Party Network Srvc Physical or Software GW 24 IPAM, Virtual DNS Rich Analytics Service Chaining High Availability API Services Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 25. PHYSICAL DATACENTER TOPOLOGY VIEW Network Gateway Router Gateway Router No VM IP information in the Underlay Network BGP Spine Switch Spine Switch Spine Switch L3 ECMP OSPF/BGP L3 Leaf Switch Leaf Switch Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor Control Node Control Node Hypervisor Hypervisor Hypervisor Hypervisor Config Node (Openstack) (Cloudstack) Config Node (Openstack) (Cloudstack) Analytics Node Analytics Node WebUI Node WebUI Node Compute & Storage Rack 25 Leaf Switch Leaf Switch Hypervisor Hypervisor Hypervisor Hypervisor L2, L3 Leaf Switch Leaf Switch Compute & Storage Rack Copyright © 2013 Juniper Networks, Inc. Leaf Switch Leaf Switch Optional Redundancy Orchestration & Services Racks Juniper Restricted Confidential - Do not distribute externally.
  • 26. SOLUTION OVERVIEW Customer L3VPN Dashboard Public Internet (ISP-1) Public Internet (ISP-2) Console V R F Service Appliance Management, Configuration, Orchestration, Analytics V R F PE Router (Juniper MX, Cisco ASR9K) with L3VPN/ VRF Support V R F vRouter Agent Contrail Virtual Network Controller CM CP CM CP Service Appliance Contrail SW Gateway Service Appliance with L3VPN/VRF Support (Juniper SRX, etc) CM CP vRouter Agent AS CP Contrail SW Gateway- L2 Service Appliances (F5 Load Balancer,etc) Gateway Service Applications & Services (AS) Configuration Management (CM) Control Plane (CP) Host Agent VRouter(Data Plane) 26 26 vRouter Agent VM VM VM vRouter vRouter Agent vRouter Agent VM VM Bare Metal Linux/Windows Juniper Restricted Confidential - Do not distribute externally. C O N F I D E N T I AL – D O N O T VIRTUAL NETWORK A VIRTUAL NETWORK B VM Virtualized Servers (Hypervisor) Copyright © 2013 Juniper Networks, Inc. vRouter D I S T R I B U T E VIRTUAL NETWORK C
  • 27. SOLUTION OVERVIEW – CONTROL & MGMT PLANE Customer L3VPN Dashboard Public Internet (ISP-1) Public Internet (ISP-2) Console V R F Service Appliance Management, Configuration, Orchestration, Analytics V R F PE Router (Juniper MX, Cisco ASR9K) with L3VPN/ VRF Support V R F vRouter Agent Contrail Virtual Network Controller CM CP Contrail SW Gateway Service Appliance with L3VPN/VRF Support (Juniper SRX, etc) BGP/Control, Netconf/Mgmt CM CP CM CP Service Appliance AS CP vRouter Agent XMPP (Control, Mgmt) Contrail SW Gateway- L2 Service Appliances (F5 Load Balancer,etc) Gateway Service Applications & Services (AS) VIRTUAL NETWORK A Configuration Management (CM) Control Plane (CP) Host Agent vRouter Agent VM VM VM vRouter vRouter Agent vRouter Agent VM VM vRouter VIRTUAL NETWORK B VM Virtualized Servers (Hypervisor) Bare Metal Linux/Windows VRouter(Data Plane) 27 27 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally. C O N F I D E N T I AL – D O N O T D I S T R I B U T E VIRTUAL NETWORK C
  • 28. SOLUTION OVERVIEW – DATA PLANE Customer L3VPN Dashboard Public Internet (ISP-1) Public Internet (ISP-2) Console V R F Service Appliance Management, Configuration, Orchestration, Analytics V R F PE Router (Juniper MX, Cisco ASR9K) with L3VPN/ VRF Support V R F vRouter Agent Contrail Virtual Network Controller CM CP CM CP Service Appliance Contrail SW Gateway Service Appliance with L3VPN/VRF Support (Juniper SRX, etc) Dynamically Insert Services (Physical & Virtual) CM CP Route Across/within VNs (L3VPN) Bridge within VNs (EVPN) AS CP vRouter Agent Contrail SW Gateway- L2 Service Appliances (F5 Load Balancer,etc) Gateway Service VIRTUAL NETWORK A Applications & Services (AS) Configuration Management (CM) Control Plane (CP) Host Agent vRouter Agent VM VM VM vRouter vRouter Agent vRouter Agent VM VM vRouter VIRTUAL NETWORK B VM Virtualized Servers (Hypervisor) Bare Metal Linux/Windows VRouter(Data Plane) 28 28 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally. C O N F I D E N T I AL – D O N O T D I S T R I B U T E VIRTUAL NETWORK C
  • 29. DEMO OVERVIEW 29 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.
  • 30. DEMO – PHYSICAL TOPOLOGY LAB NETWORK MX-80 MX-80 OSPF EX-4500 EX-4500 EX-4500 OSPF L3 Leaf Switch L2, L3 Leaf Switch Hypervisor Hypervisor Hypervisor Compute & Storage Rack 30 Hypervisor Hypervisor Compute & Storage Rack Copyright © 2013 Juniper Networks, Inc. Leaf Switch Leaf Switch Control Node Config Node Openstack Srvcs Control Node Analytics Node Openstack Srvcs Orchestration & Services Racks Juniper Restricted Confidential - Do not distribute externally.
  • 31. DEMO – LOGICAL TOPOLOGY LAB NETWORK Dashboard Console V R F Management, Configuration, Orchestration, Analytics V R F V R F V R F CM CP AP V R F MX-80 MX-80 Controller Nodes V R F MPLSoGRE, VXLAN BGP CP XMPP MPLSoUDP, VXLAN vRouter Agent VM vRouter Agent VM VM VM vRouter Agent VM VM vRouter Agent VM Compute Nodes 31 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally. VM vRouter Agent VM VM
  • 32. OPEN CONTRAIL Contrail is available as Open Source www.opencontrail.org. Commercial support available from Juniper. Same features and scaling as commercial version Uses proven stable standards. Production-Ready Permissive license Apache 2.0 (Controller), GPL (vRouter) Integrated into open source virtualization stacks OpenStack, CloudStack (beta) 32 Copyright © 2013 Juniper Networks, Inc. Juniper Restricted Confidential - Do not distribute externally.

Editor's Notes

  • #6: Networking has barely evolved beyond CLI for managing systems. It seems like the innovations like Web 2.0 and System Simplifications never really made it to Network Management Systems of today.
  • #7: Answer to every problem has been to build a bigger networking system..
  • #8: Everything equates to a box – I can imagine Checkpoint Firewall and F5 Load Balancer as a box, but even Infoblox delivers a box for IPAM and DNS. It’s a symptom of our industry and not an issue of the technology. Its easier to sell a System.
  • #12: Physical Devices like Load Balancers, Firewalls, etcLimitations of VLANs and Policy Enforcement on the Physical Switching and Routing Infrastructure
  • #15: Managing L2 Networks is painful – for example, Multi-chassis LAG in order to avoid STP related link utilization issues CLOS network is nearly impossible to build and manage with traditional L2 approach
  • #16: VLANs cannot span L3 boundaries or need to pull L2 all the way to Core network
  • #17: With traditional VLAN based approach, there is a challenge with Overlapping Address space for tenants/applications
  • #18: Enabling VRFs require expensive Hardware in the Spine and/or Core layer
  • #19: CLOS Networks are becoming very common for full cross-section bandwidth across the entire clusterNo Layer-2 in the Underlay Netowrk
  • #27: Enterprise can avail compute and storage capacity on-demand from SP-IaaS and Virtual Private Cloud providers. Virtual Networks can be seamlessly orchestrated to enable secured segmentation of resources.SP L3VPN customers can extend their private enterprise network into IaaS networks seamlessly. Service Chaining can be instrumented to insert services like FW, Load-balancing, IPS or DDoS mitigation etc. in a horizontally scalable way.Fast provisioning and end to end automation can make business agile with lower response time.
  • #28: Enterprise can avail compute and storage capacity on-demand from SP-IaaS and Virtual Private Cloud providers. Virtual Networks can be seamlessly orchestrated to enable secured segmentation of resources.SP L3VPN customers can extend their private enterprise network into IaaS networks seamlessly. Service Chaining can be instrumented to insert services like FW, Load-balancing, IPS or DDoS mitigation etc. in a horizontally scalable way.Fast provisioning and end to end automation can make business agile with lower response time.
  • #29: Enterprise can avail compute and storage capacity on-demand from SP-IaaS and Virtual Private Cloud providers. Virtual Networks can be seamlessly orchestrated to enable secured segmentation of resources.SP L3VPN customers can extend their private enterprise network into IaaS networks seamlessly. Service Chaining can be instrumented to insert services like FW, Load-balancing, IPS or DDoS mitigation etc. in a horizontally scalable way.Fast provisioning and end to end automation can make business agile with lower response time.