Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

EdgeVPN: : Self-organizing layer-2 virtual edge networks

Published: 01 March 2023 Publication History

Abstract

The advent of virtualization and cloud computing has fundamentally changed how distributed applications and services are deployed and managed. With the proliferation of IoT and mobile devices, virtualized systems akin to those offered by cloud providers are increasingly needed geographically near the network’s edge to perform processing tasks in proximity to the data sources and sinks. Latency-sensitive, bandwidth-intensive applications can be decomposed into workflows that leverage resources at the edge — a model referred to as fog computing. Not only is performance important, but a trustworthy network is fundamental to guaranteeing privacy and integrity at the network layer. This paper describes Bounded Flood, a novel technique that enables virtual private Ethernet networks that span edge and cloud resources — including those constrained by NAT and firewall middleboxes. Bounded Flood builds upon a scalable structured peer-to-peer overlay, and is novel in how it integrates overlay tunnels with SDN software switches to create a virtual network with dynamic membership — supporting unmodified Ethernet/IP stacks to facilitate the deployment of edge applications. Bounded Flood has been implemented as the core of the EdgeVPN open-source virtual private network software system for edge computing. Experiments with the software demonstrate its functionality and scalability — one of which includes Kubernetes with Flannel across Raspberry Pi 4 edge devices behind different NATs.

Highlights

Peer-to-peer overlay self-organizes Ethernet virtual private network
Native edge-to-edge traversal of Network Address Translators (NATs)
Bounded flood software-defined networking enables scalable broadcasting
Virtual network supports unmodified Kubernetes Flannel edge/cloud middleware

References

[1]
Gershenfeld N., Krikorian R., Cohen D., The internet of things, Sci Am. 291 (4) (2004) 76–81,.
[2]
E.A. Lee, Cyber Physical Systems: Design Challenges, in: 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), 2008, pp. 363–369, https://doi.org/10.1109/ISORC.2008.25.
[3]
Ashton K., That ‘internet of things’ thing, RFID J. 22 (7) (2009) 97–114.
[4]
Satyanarayanan M., Pervasive computing: vision and challenges, IEEE Pers. Commun. 8 (4) (2001) 10–17,.
[5]
B. Zhang, N. Mor, J. Kolb, D.S. Chan, N. Goyal, K. Lutz, E. Allman, J. Wawrzynek, E. Lee, J. Kubiatowicz, The Cloud is Not Enough: Saving Iot from the Cloud, in: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing, HotCloud ’15, 2015, p. 21.
[6]
Yousefpour A., Fung C., Nguyen T., Kadiyala K., Jalali F., Niakanlahiji A., Kong J., Jue J.P., All one needs to know about fog computing and related edge computing paradigms: A complete survey, J. Syst. Archit. 98 (2019) 289–330,.
[7]
Internet society - state of IPv6 deployment 2018, 2022, https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018, Accessed May 4, 2022.
[8]
Google IPv6 statistics, 2022, https://www.google.com/intl/en/ipv6/statistics.html, Accessed May 4, 2022.
[9]
M.A. Tamiru, G. Pierre, J. Tordsson, E. Elmroth, mck8s: An orchestration platform for geo-distributed multi-cluster environments, in: ICCCN 2021 - 30th International Conference on Computer Communications and Networks, Athens, Greece, 2021, pp. 1–12, URL.
[10]
F. Palmieri, VPN scalability over high performance backbones evaluating MPLS VPN against traditional approaches, in: Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003, pp. 975–981 vol.2, https://doi.org/10.1109/ISCC.2003.1214243.
[11]
Shi W., Cao J., Zhang Q., Li Y., Xu L., Edge computing: Vision and challenges, IEEE Internet Things J. 3 (5) (2016) 637–646,.
[12]
McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., Rexford J., Shenker S., Turner J., Openflow: Enabling innovation in campus networks, SIGCOMM Comput. Commun. Rev. 38 (2) (2008) 69–74,.
[13]
Feamster N., Rexford J., Zegura E., The road to SDN: An intellectual history of programmable networks, SIGCOMM Comput. Commun. Rev. 44 (2) (2014) 87–98,.
[14]
Enterprise container platform, 2022, https://www.docker.com, Accessed May 4, 2022.
[15]
Burns B., Grant B., Oppenheimer D., Brewer E., Wilkes J., Borg, omega, and kubernetes: Lessons learned from three container-management systems over a decade, ACM Queue 14 (1) (2016) 70–93,.
[16]
Flannel, 2022, https://github.com/flannel-io/flannel, Accessed May 4, 2022.
[17]
Project calico, 2022, https://www.tigera.io/project-calico/, Accessed May 4, 2022.
[18]
[19]
Subratie K., Aditya S., Daneshmand V., Ichikawa K., Figueiredo R., On the design and implementation of IP-over-P2P overlay virtual private networks, IEICE Trans. Commun. E103-B (1) (2020).
[20]
EdgeVPN.io: Open-source VPN for edge computing, 2022, https://edgevpn.io, Accessed May 4, 2022.
[21]
Spurgeon C.E., Ethernet: The Definitive Guide, O’Reilly Media, Inc, 2000.
[22]
Spurgeon C.E., Zimmerman J., Ethernet Switches: An Introduction to Network Design with Switches, O’Reilly Media, Inc, 2013.
[23]
IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges, IEEE Std 8021D-2004 Revis. IEEE Std 8021D-1998, 2004.
[24]
Niranjan Mysore R., Pamboris A., Farrington N., Huang N., Miri P., Radhakrishnan S., Subramanya V., Vahdat A., Portland: A scalable fault-tolerant layer 2 data center network fabric, in: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM ’09, Association for Computing Machinery, New York, NY, USA, 2009, pp. 39–50,.
[25]
Ryu SDN framework, 2022, https://ryu-sdn.org/, Accessed May 4, 2022.
[26]
Z. Yang, Y. Cui, B. Li, Y. Liu, Y. Xu, Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities, in: 2019 28th International Conference on Computer Communication and Networks (ICCCN), 2019, pp. 1–9, https://doi.org/10.1109/ICCCN.2019.8847124.
[27]
Han B., Gopalakrishnan V., Ji L., Lee S., Network function virtualization: Challenges and opportunities for innovations, IEEE Commun. Mag. 53 (2) (2015) 90–97,.
[28]
Andersen D., Balakrishnan H., Kaashoek F., Morris R., Resilient overlay networks, SIGOPS Oper. Syst. Rev. 35 (5) (2001) 131–145,.
[29]
Stoica I., Morris R., Liben-Nowell D., Karger D., Kaashoek M., Dabek F., Balakrishnan H., Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Trans. Netw. 11 (1) (2003) 17–32,.
[30]
Eriksson H., MBONE: The multicast backbone, Commun. ACM 37 (8) (1994) 54–60,.
[31]
Zhao B.Y., an Huang L., Stribling J., Rhea S.C., Joseph A.D.J., Kubiatowicz J.D., Tapestry: A resilient global-scale overlay for service deployment, IEEE J. Sel. Areas Commun. 22 (1) (2004) 41–53.
[32]
Rowstron A., Druschel P., Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, in: Guerraoui R. (Ed.), Middleware 2001, Springer Berlin Heidelberg, 2001, pp. 329–350.
[33]
G.S. Manku, M. Bawa, P. Raghavan, Symphony: Distributed Hashing in a Small World, in: Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems, 2003.
[34]
Maymounkov P., Mazières D., Kademlia: A peer-to-peer information system based on the XOR metric, in: Peer-To-Peer Systems, Springer Berlin Heidelberg, 2002, pp. 53–65.
[35]
Jiang X., Xu D., VIOLIN: Virtual internetworking on overlay infrastructure, in: Cao J., Yang L.T., Guo M., Lau F. (Eds.), Parallel and Distributed Processing and Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 937–946.
[36]
Sundararaj A.I., Gupta A., Dinda P.A., Dynamic Topology Adaptation of Virtual Networks of Virtual Machines, Association for Computing Machinery, New York, NY, USA, 2004, pp. 1–8,.
[37]
Joseph D., Kannan J., Kubota A., Stoica I., Wehrle K., OCALA: An architecture for supporting legacy applications over overlays, in: 3rd Symposium on Networked Systems Design & Implementation (NSDI 06), USENIX Association, San Jose, CA, 2006.
[38]
Maassen J., Bal H.E., Smartsockets: Solving the connectivity problems in grid computing, in: Proceedings of the 16th International Symposium on High Performance Distributed Computing, HPDC ’07, Association for Computing Machinery, New York, NY, USA, 2007, pp. 1–10,.
[39]
[40]
Network and security virtualization software platform - NSX, 2022, https://www.vmware.com/products/nsx.html, Accessed May 4, 2022.
[41]
MidoNet - virtualized networking for public and private clouds, 2022, https://github.com/midonet/midonet, Accessed May 4, 2022.
[42]
Mahalingam M., et al., Virtual extensible local area network (VXLAN): A framework for overlaying virtualized layer 2 networks over layer 3 networks, 2014, https://www.rfc-editor.org/info/rfc7348, Accessed May 4, 2022.
[43]
Cohen R., Barabash K., Rochwerger B., Schour L., Crisan D., Birke R., Minkenberg C., Gusat M., Recio R., Jain V., An intent-based approach for network virtualization, Proceedings of the IFIP/IEEE Int. Symp. on Integrated Network Management, 2013, pp. 42–50.
[44]
Dalton M., Schultz D., Adriaens J., Arefin A., Gupta A., Fahs B., Rubinstein D., Zermeno E.C., Rubow E., Docauer J.A., Alpert J., Ai J., Olson J., DeCabooter K., de Kruijf M., Hua N., Lewis N., Kasinadhuni N., Crepaldi R., Krishnan S., Venkata S., Richter Y., Naik U., Vahdat A., Andromeda: Performance, isolation, and velocity at scale in cloud network virtualization, in: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), USENIX Association, Renton, WA, 2018, pp. 373–387.
[45]
Zerotier protocol design whitepaper, 2022, https://docs.zerotier.com/zerotier/manual/, Accessed Aug 26, 2022.
[46]
SoftEther VPN project, 2022, https://www.softether.org/, Accessed Aug 26, 2022.
[47]
The universal messaging standard, 2022, https://xmpp.org, Accessed May 4, 2022.
[48]
J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs), in: Internet Engineering Task Force (IETF), RFC 3489, 2003.
[49]
R. Mahy, P. Matthews, R. J., Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN), in: Internet Engineering Task Force (IETF), RFC 5766, 2010.
[50]
Kleinberg J., The small-world phenomenon: An algorithmic perspective, in: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, STOC ’00, Association for Computing Machinery, New York, NY, USA, 2000, pp. 163–170,.
[51]
Rosenberg J., Interactive connectivity establishment (ICE): A protocol for network address translator (NAT) traversal for offer/answer protocols, 2010, https://www.rfc-editor.org/rfc/rfc5245.txt, Accessed May 4, 2022.
[52]
Real-time communication for the web, 2022, https://webrtc.org, Accessed May 4, 2022.
[53]
Duplyakin D., Ricci R., Maricq A., Wong G., Duerig J., Eide E., Stoller L., Hibler M., Johnson D., Webb K., Akella A., Wang K., Ricart G., Landweber L., Elliott C., Zink M., Cecchet E., Kar S., Mishra P., The Design and Operation of Cloudlab, in: USENIX ATC ’19, USENIX Association, USA, 2019, pp. 1–14.
[54]
Keahey K., Riteau P., Stanzione D., Cockerill T., Mambretti J., Rad P., Ruth P., Chameleon: A scalable production testbed for computer science research, Contemporary High Performance Computing, 2019, pp. 123–148,.

Cited By

View all
  • (2024)Warrens: Decentralized Connectionless Tunnels for Edge Container NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2024.341770321:4(4282-4296)Online publication date: 20-Jun-2024
  • (2024)A software-defined connectivity service for multi-cluster cloud native applicationsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110479248:COnline publication date: 1-Jun-2024

Index Terms

  1. EdgeVPN: Self-organizing layer-2 virtual edge networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Future Generation Computer Systems
          Future Generation Computer Systems  Volume 140, Issue C
          Mar 2023
          466 pages

          Publisher

          Elsevier Science Publishers B. V.

          Netherlands

          Publication History

          Published: 01 March 2023

          Author Tags

          1. 68M10
          2. 68M14

          Author Tags

          1. Edge computing
          2. Fog computing
          3. Virtualization
          4. Overlay networks
          5. Peer-to-peer
          6. Software-defined networks

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 17 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Warrens: Decentralized Connectionless Tunnels for Edge Container NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2024.341770321:4(4282-4296)Online publication date: 20-Jun-2024
          • (2024)A software-defined connectivity service for multi-cluster cloud native applicationsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110479248:COnline publication date: 1-Jun-2024

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media