Slides

advertisement
Politecnico di Torino
Dipartimento di Automatica ed Informatica
TORSEC Group
Performance of Xen’s
Secured Virtual Networks
Emanuele Cesena
Paolo Carlo Pomi
Gianluca Ramunno
Davide Vernizzi
<cesena@mat.uniroma3.it>
<paolo.pomi@polito.it>
<ramunno@polito.it>
<davide.vernizzi@polito.it>
Outline





Introduction
Experiments
Model
Security mechanism
Conclusion
Introduction
Motivations

Server consolidation
 Planning

Model of virtual network
 Emulation
 Comparison
Virtualization

“Technique for dividing the resources of a computer
into multiple execution environments called
virtual machines (VMs)” (A. Singh)

Full virtualization
 Complete emulation of the underlying hardware
 Unmodified operating system in the VM

Paravirtualization
 VM needs a modified OS
 Best performance, close to native
Virtualization: XEN

XEN is a free Virtual Machines Monitor (hypervisor)
 x86, Intel Itanium, PowerPC platforms
 Paravirtualization, full virtualization (hw support)
 Very low overhead when paravirtualized: average
3-5%

Virtual machines
 Domain-0: privileged VM
 Direct access to hardware
 Direct interface to the hypervisor
 Guest domains
Virtual Network in XEN

Network interfaces
 Front-end within VM: eth0
 Back-end in Domain-0: virtual interface (vif)
 Connection between netfront and netback
provided by the hypervisor
Guest 1
eth0
Domain 0
vif1.0
vif2.0
XEN hypervisor
Guest 2
eth0
Virtual Network in XEN

Virtual Network
 Domain-0 manages all the netbacks
 Bridge as “L2-switch”
Domain 0
physical
world
peth0
switch
br0
eth0
Dom-0
Guest 1
vif0.0
vif1.0
Guest 2
XEN hypervisor
vif2.0
Virtual Network in XEN

Example: Guest 1 sends a packet to Guest 2
 packet created within Guest 1 stack
 copied from FE to BE via page flipping
 forwarded through the bridge
 copied from BE to FE, then received by Guest 2
Guest 1
Domain 0
Guest 2
br0
eth0

vif1.0
we call this a virtual link
vif2.0
eth0
Experiments
Experiments


HP Compaq dc7700
 Intel Core2 Duo 2.13 GHz
 RAM: 2GB
 XEN 3.0.4
 Linux kernel 2.6.20
10 Virtual Machines (guests)
 RAM: 128 MB
 Linux kernel 2.6.20
 minimal Debian installation
 IPerf to test network bandwidth
Experiments: Virtual Network

Simple topology
 All VMs connected to the same bridge
Client
Guest 1
Server
Guest 1
Client
Guest 2
Server
Guest 2
Client
Guest 3
Server
Guest 3
bridge
Client
Guest 4
Server
Guest 4
Client
Guest 5
Server
Guest 5
Experiments: Virtual Network

Simple topology
 All VMs connected to the same bridge

Up to 16 virtual links
 IPerf TCP channels
 Example with 7 links
Client
Guest 1
Server
Guest 1
Client
Guest 2
Server
Guest 2
Client
Guest 3
Server
Guest 3
bridge
Client
Guest 4
Server
Guest 4
Client
Guest 5
Server
Guest 5
Experiments: tests




SMP disabled
SMP enabled
Static domain scheduling
10 iterations for each experiment
 1 minute per link
 Samples every 5 sec
 Average value
Experiments: Results

NoSMP vs. SMP
Experiments: Results

Dynamic scheduling vs Static scheduling
Model
Model: assumptions



Simple resource model
 Single type of resource
 Resources completely separated in system and
network
Network described by the number of virtual links
Bandwidth equally distributed among links
Model



M: maximal total bandwidth
M – K: minimal total bandwidth
F(n): total bandwidth
Bandwidth
F
Total
resources
M
Network
resources
System resources
n links
K
Model

Model curve vs. experimental data: error less than 2%
Security mechanisms
Security mechanisms


Adding security brings
 More workload
 More networking
We focused on increase of number of links (eg.
firewalls)
Security mechanisms


Number of links increases by a factor s
 Depending on topology
 Depending on the security mechanism
The model allows prediction on the loss of bandwidth
Model application 1/2



Scenario: server consolidation
 Computation power available
The virtual network must supply the physical interface
If the virtual network is well-designed, the virtual
network supports the transaction
Model application 2/2


What happens if we introduce a firewall?
Applying the model we can esteem the resulting
bandwidth
Conclusions
Future works



Improve the model
 Relax assumptions
 Forecast parameters without experiments
Validate the model
 Other architecture
 Other security solutions
Improve Xen
 D2D communication
 Optimization
Conclusions


We developed a simple (but still effective) model
 Explain how virtual network works in Xen
 Foresee performance of the virtual network
 Planning
 Impact of security solutions
We show the limits of current Xen’s implementation
and suggested improvements
Thank you
Any question?
Download