performance of xen’s secured virtual networks

29
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena <[email protected]> Paolo Carlo Pomi <[email protected]> Gianluca Ramunno <[email protected]> Davide Vernizzi <[email protected]>

Upload: devin

Post on 12-Jan-2016

30 views

Category:

Documents


2 download

DESCRIPTION

Performance of Xen’s Secured Virtual Networks. Emanuele Cesena Paolo Carlo Pomi Gianluca Ramunno Davide Vernizzi . Outline. Introduction - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Performance of Xen’s Secured Virtual Networks

Politecnico di Torino

Dipartimento di Automatica ed Informatica

TORSEC Group

Performance of Xen’s Secured Virtual Networks

Emanuele Cesena <[email protected]>Paolo Carlo Pomi <[email protected]>Gianluca Ramunno <[email protected]>Davide Vernizzi <[email protected]>

Page 2: Performance of Xen’s Secured Virtual Networks

Outline Introduction Experiments Model Security mechanism Conclusion

Page 3: Performance of Xen’s Secured Virtual Networks

Introduction

Page 4: Performance of Xen’s Secured Virtual Networks

Motivations Server consolidation

Planning

Model of virtual network Emulation Comparison

Page 5: Performance of Xen’s Secured Virtual Networks

Virtualization “Technique for dividing the resources of a computer

into multiple execution environments called virtual machines (VMs)” (A. Singh)

Full virtualization Complete emulation of the underlying hardware Unmodified operating system in the VM

Paravirtualization VM needs a modified OS Best performance, close to native

Page 6: Performance of Xen’s Secured Virtual Networks

Virtualization: XEN XEN is a free Virtual Machines Monitor (hypervisor)

x86, Intel Itanium, PowerPC platforms Paravirtualization, full virtualization (hw support) Very low overhead when paravirtualized: average

3-5%

Virtual machines Domain-0: privileged VM

Direct access to hardware Direct interface to the hypervisor

Guest domains

Page 7: Performance of Xen’s Secured Virtual Networks

Virtual Network in XEN Network interfaces

Front-end within VM: eth0 Back-end in Domain-0: virtual interface (vif) Connection between netfront and netback

provided by the hypervisor

XEN hypervisor

Domain 0

vif1.0 vif2.0

Guest 1

eth0

Guest 2

eth0

Page 8: Performance of Xen’s Secured Virtual Networks

Virtual Network in XEN Virtual Network

Domain-0 manages all the netbacks Bridge as “L2-switch”

XEN hypervisor

Domain 0

vif0.0 vif1.0 vif2.0

peth0

eth0

br0

Dom-0 Guest 1 Guest 2

physicalworld

switch

Page 9: Performance of Xen’s Secured Virtual Networks

Virtual Network in XEN Example: Guest 1 sends a packet to Guest 2

packet created within Guest 1 stack copied from FE to BE via page flipping forwarded through the bridge copied from BE to FE, then received by Guest 2

we call this a virtual link

Domain 0

vif1.0 vif2.0

br0

Guest 1

eth0

Guest 2

eth0

Page 10: Performance of Xen’s Secured Virtual Networks

Experiments

Page 11: Performance of Xen’s Secured Virtual Networks

Experiments HP Compaq dc7700

Intel Core2 Duo 2.13 GHz RAM: 2GB XEN 3.0.4 Linux kernel 2.6.20

10 Virtual Machines (guests) RAM: 128 MB Linux kernel 2.6.20 minimal Debian installation IPerf to test network bandwidth

Page 12: Performance of Xen’s Secured Virtual Networks

Experiments: Virtual Network Simple topology

All VMs connected to the same bridge

ClientGuest 1

bridge

ClientGuest 2

ClientGuest 3

ClientGuest 4

ClientGuest 5

ServerGuest 1

ServerGuest 2

ServerGuest 3

ServerGuest 4

ServerGuest 5

Page 13: Performance of Xen’s Secured Virtual Networks

Experiments: Virtual Network Simple topology

All VMs connected to the same bridge

Up to 16 virtual links IPerf TCP channels Example with 7 links

ClientGuest 1

bridge

ClientGuest 2

ClientGuest 3

ClientGuest 4

ClientGuest 5

ServerGuest 1

ServerGuest 2

ServerGuest 3

ServerGuest 4

ServerGuest 5

Page 14: Performance of Xen’s Secured Virtual Networks

Experiments: tests SMP disabled SMP enabled Static domain scheduling

10 iterations for each experiment 1 minute per link Samples every 5 sec Average value

Page 15: Performance of Xen’s Secured Virtual Networks

Experiments: Results NoSMP vs. SMP

Page 16: Performance of Xen’s Secured Virtual Networks

Experiments: Results Dynamic scheduling vs Static scheduling

Page 17: Performance of Xen’s Secured Virtual Networks

Model

Page 18: Performance of Xen’s Secured Virtual Networks

Model: assumptions Simple resource model

Single type of resource Resources completely separated in system and

network Network described by the number of virtual links Bandwidth equally distributed among links

Page 19: Performance of Xen’s Secured Virtual Networks

Model M: maximal total bandwidth M – K: minimal total bandwidth (n): total bandwidth

Bandwidth

Network resources

System resources

M

KTotal

resources

n links

Page 20: Performance of Xen’s Secured Virtual Networks

Model Model curve vs. experimental data: error less than

2%

Page 21: Performance of Xen’s Secured Virtual Networks

Security mechanisms

Page 22: Performance of Xen’s Secured Virtual Networks

Security mechanisms Adding security brings

More workload More networking

We focused on increase of number of links (eg. firewalls)

Page 23: Performance of Xen’s Secured Virtual Networks

Security mechanisms Number of links increases by a factor s

Depending on topology Depending on the security mechanism

The model allows prediction on the loss of bandwidth

Page 24: Performance of Xen’s Secured Virtual Networks

Model application 1/2 Scenario: server consolidation

Computation power available The virtual network must supply the physical interface If the virtual network is well-designed, the virtual

network supports the transaction

Page 25: Performance of Xen’s Secured Virtual Networks

Model application 2/2 What happens if we introduce a firewall? Applying the model we can esteem the resulting

bandwidth

Page 26: Performance of Xen’s Secured Virtual Networks

Conclusions

Page 27: Performance of Xen’s Secured Virtual Networks

Future works Improve the model

Relax assumptions Forecast parameters without experiments

Validate the model Other architecture Other security solutions

Improve Xen D2D communication Optimization

Page 28: Performance of Xen’s Secured Virtual Networks

Conclusions We developed a simple (but still effective) model

Explain how virtual network works in Xen Foresee performance of the virtual network

Planning Impact of security solutions

We show the limits of current Xen’s implementation and suggested improvements

Page 29: Performance of Xen’s Secured Virtual Networks

Thank you

Any question?