Last time(s)?! Network models! Connection provisioning! Part2: Lecture 03! Network Virtualization and SDNs! 25/04/14

Size: px
Start display at page:

Download "Last time(s)?! Network models! Connection provisioning! Part2: Lecture 03! Network Virtualization and SDNs! 25/04/14"

Transcription

1 Last time(s)? Part2: Lecture 03 Network Virtualization and SDNs Optical nets Spectrum Multiplexing NSA/NSI Lightpaths NDL: network topology description Connection provisioning Network models What do optical networks do? Provide communication paths between locations How do they do it? By managing: Connection provisioning and connection recovery Where do you put the intelligence? Application Presentation Session Transport Network Data Link Physical OSI model Management plane Control plane Routing plane Data plane 1

2 Management plane Control planes Management plane The systems, interfaces, and protocols used to manage the network and its services. Management plane Control plane Routing plane Data plane Control plane Routing plane Data plane The logic and hardware required for the physical transfer of data in the network. This intelligence is typically realized in the form of various communication protocols. Such protocols can be broadly classified into signaling, discovery protocols and routing. Data plane Management plane Control plane Control planes Routing plane Data plane The logic and hardware required for the physical transfer of data in the network. 2

3 Layers An optical network consists of layers and partitions. Layers Layering: G.805 A control plane will be concerned with the operation at a specific layer. In the context of optical networks we are focusing on switching of OXCs (SONET/SDH) and PXCs (wavelengths). Path Line Section Photonic Line Section Photonic Section Photonic Section Photonic Line Section Photonic Path Line Section Photonic An ITU-T recommendation that describes the layering concepts, independent from the underlying technology. G.805: transport networks functional models Partitions link connection subnetwork connection link connection link connection tandem connection network connection A network can be partitioned (recursively) in smaller parts: Topological partitions Control domains link connection trail network connection Client layer Adaptation is equivalent to Termination Client layer Adaptation Termination Control planes can operate: Intradomain, within the same control domain; Interdomain, to build an unified end-to-end control architecture across control domains. Server layer Server layer 3

4 Partitioning: information exchange How do you transfer information between control domains? Control plane interfaces The User-Network Interface (UNI) This is the control interface between a node in the client network and a node in the optical network. The Interior Network- Network Interface (I-NNI) This is the control interface between two subnetworks (or nodes) within the same control domain. The Exterior Network- Network (E-NNI) This is the control interface between two nodes in different control domains. Control plane abstraction Control functionality can be distinct from the transport functionality, I.e is not implemented in the devices. Control plane functions Neighbor discovery "a function whereby a network element automatically determines the details of its connectivity to all its data plane neighbors. Neighbor discovery applies to both the UNI and the NNI. Routing "Consists of two aspects: automatic topology and resource discovery. Signaling "the syntax and the semantics of communication between control agents in establishing and maintaining connections. Local resource management "The representation and accounting of locally available resources controlled by a control agent. 4

5 25/04/14 Networks work DCN DCN - the Data Communication Network - is the infrastructure used for messaging between control plane agents in the network. It is also used to provide connectivity between control plane agents. Packet switched networks Circuit-switched networks Communication is packet oriented, most often based on IP (v4 or v6). It can be: in-fiber - if the network is associated with the optical data plane out-of-fiber - if the network is based on a separate network technology (I.e. a separate IP network) Ossification of the Internet Many aspects of networking are set in stone. Network virtualization New protocols are difficult to implement. Most changes are incremental updates. There is no service tailored to application needs. Research community started in 2005 to think about it: 1. T. Anderson, L. Peterson, S. Shenker, J. Turner, Overcoming the Internet impasse through virtualization, Computer 38 (4) (2005) J. Turner, D. Taylor, Diversifying the internet, in: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 05), vol. 2,

6 Network virtualization Virtualization in the network A virtual network (VN) is a collection of virtual nodes and virtual links. Essentially, a virtual network is a subset of the underlying physical network resources. A network environment supporting virtualization allows the coexistence of multiple virtual networks on the same physical substrate. Decoupling the services provided by a network from the physical infrastructure Virtual network is a container of network services, provisioned by software Faithful reproduction of services provided by a physical network Analogy to a VM complete reproduction of physical machine (CPU, memory, I/O, etc.) Slide courtesy of : Why? Sharing the network Different controllers for different users/traffic Isolation (bandwidth, table space, flow space) Abstracting the topology One big virtual switch Many virtual switches to one physical switch Arbitrary network topologies While presenting a familiar abstraction A network Slide courtesy of : Slide courtesy of : 6

7 Network sharing Why sharing the network? User groups Virtualized Network Backbone Virtualized data center/services Multiple administrative groups Different departments on a campus Multiple customers Tenants in a shared data center Researchers on a shared infrastructure Experiments vs. operational network Support research without breaking real services Expanding a network s footprint Lease components in another carrier s network Multiple services or applications in one domain Challanges The network security issues for a shared infrastructure: 1. Access control Legitimate users need to authenticated and authorized to access the portion of the network/resources they have been assigned; 2. Path isolation Mapping of users and resources has to be done effectively to avoid interference 3. Services The right services have to available to the right users Why Abstract the Topology? Partial deployment Tunnel through components you don t control Simplicity Hide inessential details, churn, migration, Privacy Hide internal details of the network Scalability Present a smaller topology and fewer events Experimentation Try topologies that don t really exist 7

8 Benefits Types of VNE Rapid innovation: network services now delivered at software Speeds New forms of network control: API to NV controller allows creation and management of virtual networks under software control Snapshot, rollback etc. Vendor choice: decoupled networking services from underlying hardware Simplified programming: expose abstractions that make sense to programmers Simplified operations: network state managed like a VM provision centrally in SW, snapshot, rollback, etc. Four main types of VNEs: - VLANs Virtual Local Area Networks - VPNs Virtual Private Networks - Overlay Networks - Active Networks and Programmable Networks VLANs " " They create a single broadcast domain that groups hosts with a common interest. Pros: Configured via software they are easy to manage Provide isolation and are cost effective Q VLAN frame format type preamble dest. address source address data (payload) type 2-byte Tag Protocol Identifier (value: 81-00) CRC preamble dest. source address address data (payload) CRC Recomputed CRC frame 802.1Q frame Tag Control Information (12 bit VLAN ID field, 3 bit priority field like IP TOS) 8

9 VPNs Basic VPN component Customer edges (CEs) are connected to one or more provider edges (PEs). A service provider (SP) manages and provisions the VPN: PPVPN - Provider Provisioned VPN. Know more: RFC 4026 March 2005 VPNs can operate at different layers: Layer1 VPNs Layer2 VPNs Layer3 VPNs Higher level VPNs Provider Provisioned VPNs terminology Overlay networks Overlay Network An overlay network is a virtual network that creates a virtual topology on top of the physical topology of another network. Nodes in an overlay network are connected through virtual links which correspond to paths in the underlying network. Overlays are typically implemented in the application layer. Nodes are connected by logical/virtual links Logical Network Layer implemented on top of the physical network Uses different addresses for routing messages 9

10 Architecture Unstructured p2p Structured p2p Digression into p2p nets No structure for the overlay network. Specific topology that is easy search through DHTs and p2p DHT identifiers Distributed Hash Table is distributed over the nodes in the P2P network in order to locate content. The DHT stores the location (IP address of peer in charge) of the content across the network. No need for an indexer or central server. Notable DHTs: Chord Pastry Tapestry Kademlia In Chord there is an m -bit identifier. Related to an identifier circle. Given m: Assign integer identifier to each peer in range [0,2 m-1 ] Require each key to be an integer in same range 0 To get integer key, hash original key e.g., key = hash( Led Zeppelin IV ) 3 m=

11 Assigning keys to peers Query Assign integer to each peer Convert each key to an integer Put (key,value) pair in the peer that is closest to the key Given key k the key will be stored at successor(k) O(N) messages on average to resolve query, when there are N peers 1111 I am Who s responsible for key 1110? Closest is the immediate successor of the key (equal or follows). First node clockwise from k. e.g.,m=4; peers: 1,3,4,5,8,10,12,14; key = 13, then successor peer = 14 key = 15, then successor peer = 1 Chord uses SHA-1 hash codes instead of integers Queries for content are passed around the circle Query with shortcuts Content delivery networks (Akamai) 1 Who s responsible for key 1110? each peer keeps track of IP addresses of predecessor, successor, short cuts. reduced from 6 to 2 messages. 11

12 Pause VXLAN Virtual Extensible LAN. VTEPs High scalability: From 4096 VLAN ID (12 bits) to 16Millions VNID (VXLAN Network Identifier). Better utilization of network paths relying on L3 routing. VXLAN is a Layer 2 overlay scheme over a Layer 3 network. It uses VXLAN tunnel endpoint (VTEP) devices to map tenants' end devices to VXLAN segments and to perform VXLAN encapsulation and de-encapsulation. Interesting that this is supported by software switches too (Open vswitch) 12

13 VXLAN packet format It uses MAC Address-in-User Datagram Protocol (MAC-in-UDP). Network Virtualization History GENI Dedicated overlays for incremental deployment Mbone (multicast) and 6bone (IPv6) Overlays for improving the network Resilient Overlay Networks (RON) Shared experimental testbeds PlanetLab, Emulab, Orbit, Virtualizing the network infrastructure Overcoming Internet impasse through virtualization Later testbeds like GENI, VINI, Three main components: GENI racks: virtualized computation and storage resources. Software-defined networks (SDNs): virtualized, programmable network resources. WiMAX: virtualized cellular wireless communication (at selected campuses). 13

14 ExoGENI Test Time Programmable networks 14

15 Programmable networks A. T. Campbell, H. G. De Meer, M. E. Kounavis, K. Miki, J. B. Vicente, and D. Villela, A survey of programmable networks, SIGCOMM Comput. Commun. Rev., vol. 29, no. 2, p. 7, Apr Programmability and virtualization Are programmable networks VNEs? Maybe not directly, but programmability can ensure the coexistence of multiple networks. The key is to separate the control plane from the data plane: Control plane à control software Data planeà the network hardware Active networks (I) Allows packets flowing through the network to modify the network behaviour. Software Defined Networking A short intro based on the course of prof. Jennifer Rexford cos597e/syllabus.html 60 15

16 25/04/14 SDN and Network Virtualization SDN and network virtualization Network virtualization = SDN Predates SDN Doesn t require SDN Easier to virtualize an SDN switch Run separate controller per virtual network Partition the space of all flows Leverage open interface to the hardware Software Defined Networks control plane: distributed algorithms data plane: packet processing 63 Software Defined Networks decouple control and data planes 64 16

17 Software Defined Networks decouple control and data planes by providing open standard API Simple, Open Data-Plane API" Prioritized list of rules Pattern: match packet header bits Actions: drop, forward, modify, send to controller Priority: disambiguate overlapping patterns Counters: #bytes and #packets src=1.2.*.*, dest=3.4.5.* à drop 2. src = *.*.*.*, dest=3.4.*.* à forward(2) 3. src= , dest=*.*.*.* à send to controller (Logically) Centralized Controller Controller Platform Protocols è Applications Controller Application Controller Platform

18 Seamless Mobility Server Load Balancing" See host sending traffic at new location Modify rules to reroute the traffic Pre-install load-balancing policy Split traffic based on source IP src=0*, dst= src=1*, dst= Example SDN Applications A Major Trend in Networking Seamless mobility and migration Server load balancing Dynamic access control Using multiple wireless access points Energy-efficient networking Adaptive traffic monitoring Denial-of-Service attack detection Network virtualization See Entire backbone runs on SDN Bought for $1.2 x 10 9 (mostly cash) 18

19 Literature Home reading Towards a diversified internet by Turner et al. A survey of network virtualization by Chowdhuri et al. For the test on May 09 read: MPLS: the magic begind the myth Chapter 27 Network and Information Infrastructure Virtualization Chapter 5 Modern Optical Control Planes 19

Part2: Lecture 02! Network Virtualization!

Part2: Lecture 02! Network Virtualization! Part2: Lecture 02 Network Virtualization Last time? Physical layer Encoding and signaling Fibers Multimode Single mode Multiplexing Time division multiplexing (SONET/SDH) Wavelength division multiplexing

More information

Lecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

CS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization

CS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization CS-580K/480K Advanced Topics in Cloud Computing Network Virtualization 1 Network Diagram of A Company 2 University Network Topology https://www.researchgate.net/figure/234782590_fig1_fig-5-see-university-network-infrastructure

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Lecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

HY436: Network Virtualization

HY436: Network Virtualization HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs

More information

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information

CS 4226: Internet Architecture

CS 4226: Internet Architecture Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

NETWORK VIRTUALIZATION: PRESENT AND FUTURE

NETWORK VIRTUALIZATION: PRESENT AND FUTURE 1 NETWORK VIRTUALIZATION: PRESENT AND FUTURE Wednesday, May 21, 2008 Mosharaf Chowdhury Member, envy Project What is Network Virtualization? 2 Network virtualization is a networking environment that allows

More information

Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner. 원종호 (INC lab) Sep 25, 2006

Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner. 원종호 (INC lab) Sep 25, 2006 Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner 원종호 (INC lab) Sep 25, 2006 Outline Introduction Three requirements Virtualization

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks.

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks. MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES Software Defined Networks and Courtesy of: AT&T Tech Talks http://web.uettaxila.edu.pk/cms/2017/spr2017/temcitms/ MODULE OVERVIEW Motivation behind Software

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Implementing VXLAN in DataCenter

Implementing VXLAN in DataCenter Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

E : Internet Routing

E : Internet Routing E6998-02: Internet Routing Lecture 18 Overlay Networks John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-18 are available.

More information

Programmable BitPipe. Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs

Programmable BitPipe. Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs Programmable BitPipe Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs 25.10.2012 How do you program a switch / router today? Vendor N SDK and API Vendor 3 Vendor 2 SDK

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

CS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs

CS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs : Computer Networks Lecture 8: Apr 21, 2004 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

White Paper. Huawei Campus Switches VXLAN Technology. White Paper

White Paper. Huawei Campus Switches VXLAN Technology. White Paper White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3

More information

Internet 3.0: The Next Generation Internet

Internet 3.0: The Next Generation Internet Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

SD-Access Wireless: why would you care?

SD-Access Wireless: why would you care? SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,

More information

Centralization of Network using Openflow Protocol

Centralization of Network using Openflow Protocol Indian Journal of Science and Technology, Vol 8(S2), 165 170, January 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS2/61217 Centralization of Network using Openflow

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Optical Ethernet Architecture Evolution The Logical Provider Edge. Mark I Williams August 28 th, 2003

Optical Ethernet Architecture Evolution The Logical Provider Edge. Mark I Williams August 28 th, 2003 Optical Ethernet Architecture Evolution The Logical rovider Edge Mark I Williams August 28 th, 2003 1 Agenda OE Introduction and Drivers VLS The technology behind the Service Decoupled VLS roviding Scalable

More information

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity

More information

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture 1 Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture Author: Mikael Forsten TeliaSonera Sonera Carrier Networks Supervisor: Docent Timo O. Korhonen Instructor: M.Sc Jari

More information

Computer Networks CS 552

Computer Networks CS 552 Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Link Layer, Multiple access 2. IP addressing, CIDR, NAT 3. IP/L3 routing, OSPF (link state), RIP(DV), Issues 4. L2 routing

More information

Configuration and Management of Networks. Pedro Amaral

Configuration and Management of Networks. Pedro Amaral Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast

More information

The Design Space of Network Mobility

The Design Space of Network Mobility The Design Space of Network Mobility Key ideas Network Mobility Seamless Mobility Overview of implementations and challenges Geomorphic model New abstraction for the network stack Helps us discuss, understand

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering

More information

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments. This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Thinking Architecturally (80 Minutes Inside Scott s Head)

Thinking Architecturally (80 Minutes Inside Scott s Head) Thinking Architecturally (80 Minutes Inside Scott s Head) EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Lesson 9 OpenFlow. Objectives :

Lesson 9 OpenFlow. Objectives : 1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.

More information

Software Defined Networks and OpenFlow

Software Defined Networks and OpenFlow Tecnologie e Protocolli per Internet 1 Prof. Stefano Salsano e-mail: stefano.salsano@uniroma2.it AA2012/13 Blocco 5 v1 1 Software Defined Networks and OpenFlow 2 Acknowledgements Next slides are taken

More information

Extreme Networks How to Build Scalable and Resilient Fabric Networks

Extreme Networks How to Build Scalable and Resilient Fabric Networks Extreme Networks How to Build Scalable and Resilient Fabric Networks Mikael Holmberg Distinguished Systems Engineer Fabrics MLAG IETF TRILL Cisco FabricPath Extreme (Brocade) VCS Juniper QFabric IEEE Fabric

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing This paper was accepted for publication in the IEEE Cloud Computing. The copyright was transferred to IEEE. The final version of the paper will be made available on IEEE Xplore via http://dx.doi.org/10.1109/mcc.2017.28

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

Lesson 10 Virtualization & Data Centric Network

Lesson 10 Virtualization & Data Centric Network Lesson 10 Virtualization & Data Centric Network n Objectives : Network function, system and link virtualization are new techniques for flexible and cost effective network. And SDN (Software Difined Network)

More information

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network

More information

Developing Standards for Metro Ethernet Networks

Developing Standards for Metro Ethernet Networks Developing Standards for Metro Ethernet s Stephen Haddock shaddock@extremenetworks.com Chief Technology Officer Agenda Metro Ethernet s Metro Ethernet Forum Services Model and Definitions Traffic Management

More information

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand

More information

Building NetOpen Networking Services over OpenFlow-based Programmable Networks

Building NetOpen Networking Services over OpenFlow-based Programmable Networks Building NetOpen Networking Services over -based Programmable Networks Namgon Kim and JongWon Kim Networked Media Lab., School of Information and Communications, Gwangju Institute of Science and Technology

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

VXLAN VTEP Gateway with Pica8 and VMware NSX

VXLAN VTEP Gateway with Pica8 and VMware NSX with Pica8 This paper outlines how Pica8 s OS (PicOS) running on a White Box SDN switch is used as a VXLAN Layer 2 Tunnel End Point (VTEP) to interconnect physical and virtual networks by leveraging VMware

More information

Huawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 06 Date 2016-07-28 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

So#ware Defined Networking

So#ware Defined Networking The Internet: A Remarkable Story 2! Tremendous success From research experiment to global infrastructure So#ware Defined Networking Brilliance of under- specifying Network: best- effort packet delivery

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

Technical Specification MEF 1. Ethernet Services Model, Phase November 2003

Technical Specification MEF 1. Ethernet Services Model, Phase November 2003 Technical Specification Ethernet Services Model, Phase 1 10 November 2003 Disclaimer The information in this publication is freely available for reproduction and use by any recipient and is believed to

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

TRILL Transparent Transport over MPLS

TRILL Transparent Transport over MPLS TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing

More information

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services By Scott Kotrla How VPLS Compares to Existing VPN Technologies Multipoint Bridged Ethernet is a service offering that attempts to recreate

More information

Page 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"

Page 1. Goals for Today What Is A Protocol? CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument Goals for Today" CS162 Operating Systems and Systems Programming Lecture 10 Protocols, Layering and e2e Argument" What is a protocol?! Layering! End-to-end arguments!! October 3, 2011! Anthony D. Joseph

More information

Computer Networks. Andrew S. Tanenbaum

Computer Networks. Andrew S. Tanenbaum Computer Networks Third Edition Andrew S. Tanenbaum 1 ; l Vrije Universiteit Amsterdam, The Netherlands For book and bookstore information Prentice Hall PTR Upper Saddle River, New Jersey 07458 CONTENTS

More information

SERVICE DESCRIPTION ETHERNET /v4.6

SERVICE DESCRIPTION ETHERNET /v4.6 SERVICE DESCRIPTION ETHERNET 01.12.2018/v4.6 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 2.1 Definitions... 4 2.2 Abbreviations... 5 3 SERVICE CHARACTERISTICS 5 3.1 Connection and handover... 6

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

NETWORK OVERLAYS: AN INTRODUCTION

NETWORK OVERLAYS: AN INTRODUCTION NETWORK OVERLAYS: AN INTRODUCTION Network overlays dramatically increase the number of virtual subnets that can be created on a physical network, which in turn supports multitenancy and virtualization

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

BESS work on control planes for DC overlay networks A short overview

BESS work on control planes for DC overlay networks A short overview BESS work on control planes for DC overlay networks A short overview Jorge Rabadan IETF99, July 2017 Prague 1 Agenda EVPN in a nutshell BESS work on EVPN for NVO3 networks EVPN in the industry today Future

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information