Skip to main content
Log in

Joint virtual middlebox and application placement with bandwidth guarantees in multi-tenant datacenter

  • Regular Paper
  • Published:
CCF Transactions on Networking

Abstract

Hardware middleboxes are widely used in datacenter to provide network functions such as firewalls, intrusion detection system, load balancers, etc. Unfortunately, the hardware middleboxes are unable to offer customized functions for individual tenant. To this end, the software middleboxes have been introduced in datacenter which provide flexible network functions for customers. The arrival traffic of one tenant is first distributed to the pre-allocated software middleboxes chain and then delivered to the application servers of the tenant. With regard to the complicated communication of intra-middleboxs, middleboxes-to-applications and intra-applications traffics, we propose vMAP, a joint middlebox and application placement algorithm to effectively use the limited bandwidth inside datacenter. vMAP leverages the communication model of tenant’s requirement for both middlebox and application and provides an effective virtual machines (VMs) placement algorithm to minimize the bandwidth consumption inside datacenters. vMAP further addresses the middlebox scaling problem by reserving few free VMs resource based on a probability model of the variable workload. Extensive simulations on current large-scale datacenter network topologies verify that vMAP can accept more tenant requests than prior placement algorithm (e.g., Stratos (Gember et al. in Stratos: Virtual middleboxes as first-class entities, University of Wisconsin-Madison, Madison, 2012) ) while saving \(\sim\)10% core-level bandwidth.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. Assume the total free VM slots in the left sub-tree is \(N_{slot}\), then the number of \(MB_k\) needed to be placed in the left can be calculated by \(m_k=\left\lfloor \frac{M_k}{\sum \nolimits _{i=1}^{n}M_i+N}\cdot N_{slot}\right\rfloor\). The number of APPs needed to be placed in the left is computed as \(n_{app}=\left\lfloor \frac{N}{\sum \nolimits _{i=1}^{n}M_i+N}\cdot N_{slot}\right\rfloor\). Correspondingly, the numbers of \(MB_k\) and APP placed in the right are given as \(M_k-m_k\) and \(N-n_{app}\) respectively.

  2. Equation 7 is a sufficient but not necessary condition for bandwidth saving through exchanging, and we can also have bandwidth saving even the VMs are placed randomly initially by exchanging using Eq. 7.

  3. More details about the probability model and VM multiplexing can be found in our prior work Zhang et al. (2016).

References

  • Al-Fares, M., Loukissas, A., Vahdat, A.: A scalable, commodity data center network architecture. ACM SIGCOMM Comput. Commun. Rev. ACM 38, 63–74 (2008)

    Article  Google Scholar 

  • Anwer, B., Benson, T., Feamster, N., Levin, D., Rexford, J.: A slick control plane for network middleboxes. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, ACM, pp 147–148 (2013)

  • Ballani, H., Costa, P., Karagiannis, T., Rowstron, A.: Towards predictable datacenter networks. ACM SIGCOMM Comput. Commun. Rev. ACM. 41, 242–253 (2011)

    Article  Google Scholar 

  • Ballani, H., Jang, K., Karagiannis, T., Kim, C., Gunawardena, D., O’Shea, G.: Chatty tenants and the cloud network sharing problem. In: Proceedings of the USENIX NSDI, USENIX Association, pp 171–184 (2013)

  • Benzekki, K., El Fergougui, A., Elbelrhiti Elalaoui, A.: Software-defined networking (SDN): a survey. In: Security and Communication Networks, Wiley Online Library. Vol. 9, pp. 5803–5833 (2016)

    Article  Google Scholar 

  • CloudNFV (2015). In: http://www.cloudnfv.com/

  • Cohen, R., Lewin-Eytan, L., Naor, J.S., Raz, D.: Near optimal placement of virtual network functions. In: Proceedings of the IEEE INFOCOM, pp 1346–1354 (2015)

  • Dobrescu, M., Argyraki, K., Ratnasamy, S.: Toward predictable performance in software packet-processing platforms. In: Proceedings of the USENIX NSDI, USENIX Association, pp 11–11 (2012)

  • Duffield, N.G., Goyal, P., Greenberg, A., Mishra, P., Ramakrishnan, K.K., van der Merive, J.E.: A flexible model for resource management in virtual private networks. ACM SIGCOMM Comput. Commun. Rev. ACM. 29, 95–108 (1999)

    Article  Google Scholar 

  • Gember, A., Akella, A., Anand, A., Benson, T., Grandl, R.: Stratos: Virtual middleboxes as first-class entities. Tech Rep TR1771, University of Wisconsin-Madison, 2012 (2012)

  • Gember, A., Robert, G., Junaid, K., Akella, A.: Design and implementation of a framework for software-defined middlebox networking. In: Proceedings of the ACM SIGCOMM, ACM, pp 467–468 (2013)

    Article  Google Scholar 

  • Gember, A., Viswanathan, R., Prakash, C., Grandl, R., Khalid, J., Das, S., Akella, A.: OpenNF: Enabling innovation in network function control. ACM SIGCOMM Comput. Commun. Rev. ACM 44, 163–174 (2014)

    Article  Google Scholar 

  • Ghaznavi, M., Shahriar, N., Kamali, S., Ahmed, R., Boutaba, R.: Distributed service function chaining. IEEE J. Sel. Areas Commun. 35(11), 2479–2489 (2017)

    Article  Google Scholar 

  • Herrera, J.G., Botero, J.F.: Resource allocation in NFV: a comprehensive survey. IEEE Trans. Netw. Serv. Manag. 13, 518–532 (2016)

    Article  Google Scholar 

  • Huawei (2015) NFV Open Lab. In: http://pr.huawei.com/en/news

  • ISG web portal (2013) Network Functions Virtualisation. In: http://portal.etsi.org/portal/server.pt/community/NFV/367

  • Kuo, T.W., Liou, B.H., Lin, K.C.J., Tsai, M.J.: Deploying chains of virtual network functions: On the relation between link and server usage. IEEE/ACM Trans. Netw. 26(4), 1562–1576 (2018)

    Article  Google Scholar 

  • Lee, J., Turner, Y., Lee, M., Popa, L., Banerjee, S., Kang, J.M., Sharma, P.: Application-driven bandwidth guarantees in datacenters. In: Proceedings of the ACM SIGCOMM, ACM, pp 467–478 (2014)

    Article  Google Scholar 

  • Martins, J., Ahmed, M., Raiciu, C., Olteanu, V., Honda, M., Bifulco, R., Huici, F.: Clickos and the art of network function virtualization. In: Proceedings of the USENIX NSDI, USENIX Association, pp 459–473 (2014)

  • Mehraghdam, S., Keller, M., Karl, H.: Specifying and placing chains of virtual network functions. In: IEEE International Conference on Cloud Networking, pp 7–13 (2014)

  • Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18, 236–262 (2016)

    Article  Google Scholar 

  • Patel, P., Bansal, D., Yuan, L., Murthy, A., Greenberg, A., Maltz, D.A., Kern, R., Kumar, H., Zikos, M., Wu, H., et al.: Ananta: Cloud scale load balancing. ACM SIGCOMM Comput. Commun. Rev. ACM. 43, 207–218 (2013)

    Article  Google Scholar 

  • Popa, L., Kumar, G., Chowdhury, M., Krishnamurthy, A., Ratnasamy, S., Stoica, I.: Faircloud: Sharing the network in cloud computing. In: Proceedings of the ACM SIGCOMM, ACM, pp 187–198 (2012)

    Article  Google Scholar 

  • Popa, L., Yalagandula, P., Banerjee, S., Mogul, J.C., Turner, Y., Santos, J.R.: Elasticswitch: Practical work-conserving bandwidth guarantees for cloud computing. ACM SIGCOMM Comput. Commun. Rev. ACM. 43, 351–362 (2013)

    Article  Google Scholar 

  • Qazi, Z.A., Tu, C.C., Chiang, L., Miao, R., Sekar, V., Yu, M.: Simple-fying middlebox policy enforcement using SDN. ACM SIGCOMM Comput. Commun. Rev. ACM. 43, 27–38 (2013)

    Article  Google Scholar 

  • Rajagopalan, S., Williams, D., Jamjoom, H., Warfield, A.: Split/merge: System support for elastic execution in virtual middleboxes. In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), USENIX, Lombard, IL, pp 227–240 (2013)

  • Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K., Shi, G.: Design and implementation of a consolidated middlebox architecture. In: Proceedings of the USENIX NSDI, USENIX Association, pp 24–24 (2012)

  • Sun, C., Bi, J., Zheng, Z., Yu, H., Hu, H.: NFP: Enabling Network Function Parallelism in NFV. In: Proceedings of the ACM SIGCOMM, pp 43–56 (2017)

  • Williamson, A.: Has amazon EC2 become over subscribed. (2010) http://alanblog-citycom/has amazon ec2 become over subscribedhtm

  • Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), USENIX Association, Renton, WA, pp 299–312 (2018)

  • Yi, B., Wang, X., Li, K., Das, S.K., Huang, M.: A comprehensive survey of network function virtualization. Comput. Netw. 133, 212–262 (2018)

    Article  Google Scholar 

  • Yu, R., Xue, G., Kilari, V.T., Zhang, X.: Network function virtualization in the multi-tenant cloud. IEEE Netw. 29, 42–47 (2015)

    Google Scholar 

  • Zhang, S., Qian, Z., Luo, Z., Wu, J., Lu, S.: Burstiness-aware resource reservation for server consolidation in computing clouds. IEEE Trans. Parallel Distrib. Syst. 27, 964–977 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Key R&D Program of China under Grant No. 2017YFB1001801, the Key Technology Research and Development Program of Jiangsu under Grant No. BE2018116, Ministry of Education & China Mobile Research Foundation under Grant No. MCM20170307, NSFC (61872175), Natural Science Foundation of Jiangsu Province (BK20181252), and the Collaborative Innovation Center of Novel Software Technology and Industrialization.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoliang Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Zhang, X., Wang, X. et al. Joint virtual middlebox and application placement with bandwidth guarantees in multi-tenant datacenter. CCF Trans. Netw. 2, 172–187 (2019). https://doi.org/10.1007/s42045-019-00026-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42045-019-00026-6

Keywords

Navigation