MODULE VII. Emerging Technologies
|
|
- Andra Kelly
- 5 years ago
- Views:
Transcription
1 MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright All rights reserve.
2 Topics Software Define Networking The Internet Of Things Other trens in networking Computer Networks an Internets -- Moule 7 2 Spring, 2014 Copyright All rights reserve.
3 Software Define Networking (SDN)
4 What Is Software Define Networking? One of the hottest topics in networking Accoring to marketing SDN is A way to eliminate all human error A technology that improves overall routing An approach that eliminates 66% to 80% of operational costs In reality SDN is A technology that gives programmers more control over network equipment An approach with the potential to make some improvements in network configuration an management Computer Networks an Internets -- Moule 7 4 Spring, 2014 Copyright All rights reserve.
5 Motivation For SDN Switch from element management to network management Move from proprietary to open stanars Automate an unify network-wie configuration Change from per-layer to cross-layer control Accommoate virtualization use in ata centers Computer Networks an Internets -- Moule 7 5 Spring, 2014 Copyright All rights reserve.
6 Backgroun An Definitions Terminology aopte from network equipment engineers Data plane Refers to packet processing mechanisms Typical functions inclue packet classification an packet forwaring Operates at wire spee Control plane Refers to management Typical functions inclue interacting with network manager an moifying forwaring tables Operates slowly an only when changes are neee Computer Networks an Internets -- Moule 7 6 Spring, 2014 Copyright All rights reserve.
7 Conceptual Organization Of Network Devices ata plane passes management packets up to control plane control plane (software) control plane loas new configuration into the harware packets arrive ata plane (harware) packets leave Data plane may use ASIC harware for spee Control plane inclues a TCP/IP stack Computer Networks an Internets -- Moule 7 7 Spring, 2014 Copyright All rights reserve.
8 Control Plane Interface Moules CLI WEB SNMP... common interface (internal) packets arrive ata plane (harware) packets leave Managers can choose among comman line interface, web interface, an SNMP Computer Networks an Internets -- Moule 7 8 Spring, 2014 Copyright All rights reserve.
9 The SDN Approach: An External Controller External Controller CLI WEB SNMP sn common interface (internal) PC running Linux packets arrive ata plane (harware) packets leave Computer Networks an Internets -- Moule 7 9 Spring, 2014 Copyright All rights reserve.
10 In Practice Controller 1 Controller 2 Controller 3 Controller 4 Controller 5 controller to element controller to controller Domain 1 Domain 2 Domain 3 Domain 4 Domain 5 Each controller can operate multiple evices Controllers coorinate to provie consistent configuration Computer Networks an Internets -- Moule 7 10 Spring, 2014 Copyright All rights reserve.
11 SDN Communication Two conceptually separate types Controller to network element Controller to controller Protocols use can iffer Computer Networks an Internets -- Moule 7 11 Spring, 2014 Copyright All rights reserve.
12 OpenFlow Specification for controller-to-element communication Devise at Stanfor Now a e facto inustry stanar for SDN Defines Secure communication (over SSL) Message format Items to be manage Completely unlike SNMP Computer Networks an Internets -- Moule 7 12 Spring, 2014 Copyright All rights reserve.
13 OpenFlow Moel Uses flow table abstraction Data plane is assume to have a sequence of flow tables Each flow table specifies how to parse packets an hanle them OpenFlow allows manager to set values in each flow table Important note: flow table moel closely matches classification harware foun in Ethernet switches Computer Networks an Internets -- Moule 7 13 Spring, 2014 Copyright All rights reserve.
14 Classification Alternative to packet emultiplexing Examines heaers from multiple layers at the same time Uses an array of pairs Where (pattern, action) Pattern is a pattern that is matche against packets Action specifies steps to be taken if the match succees Computer Networks an Internets -- Moule 7 14 Spring, 2014 Copyright All rights reserve.
15 Classification Harware classification engine packet to be matche pattern 1 action 1 pattern 2 action 2 pattern 3 action 3.. pattern N (efault that matches any packet) action N Harware checks all patterns in parallel Result is extremely high spee classification Computer Networks an Internets -- Moule 7 15 Spring, 2014 Copyright All rights reserve.
16 TCAM Acronym for Ternary Content Aressable Memory Harware technology use for high-spee classification Pattern is ternary because value for each bit can be 0, 1, or on t care TCAM matches all patterns at once, an performs the action on the first matching table entry Computer Networks an Internets -- Moule 7 16 Spring, 2014 Copyright All rights reserve.
17 Example Of IPv4 Classification The challenge A frame arrives What is the minimum number of steps neee to etermine whether the frame carries an IPv4 atagram estine for a web server? The answer Check whether the frame type fiel specifies IPv4 (0x0800) Check whether the IP protocol fiel specifies TCP (6) Check whether the TCP estination port specifies a web server (80) Computer Networks an Internets -- Moule 7 17 Spring, 2014 Copyright All rights reserve.
18 IPv6 Classification Simplest case (only a base heaer) Frame type fiel specifies IPv6 (0x86DD) Next Heaer fiel specifies TCP (6) TCP estination port specifies a web server (80) Aitional patterns neee for extension heaers Example: base heaer plus a route heaer Frame type fiel specifies IPv6 (0x86DD) Next Heaer fiel specifies Route Heaer (43) Next Heaer fiel specifies TCP (6) TCP estination port specifies a web server (80) Computer Networks an Internets -- Moule 7 18 Spring, 2014 Copyright All rights reserve.
19 Example Items In An OpenFlow Pattern Fiel Meaning Layer 2 fiels Ingress Port Switch port over which the packet arrive Metaata 64-bit fiel of metaata use in the pipeline Ether src 48-bit Ethernet source aress Ether st 48-bit Ethernet estination aress Ether Type 16-bit Ethernet type fiel VLAN i 12-bit VLAN tag in the packet VLAN priority 3-bit VLAN priority number ARP opcoe 8-bit ARP opcoe Layer 3 fiels MPLS label 20-bit MPLS label MPLS class 3-bit MPLS traffic class IPv4 src 32-bit IPv4 source aress IPv4 st 32-bit IPv4 estination aress IPv6 src 128-bit IPv6 source aress IPv6 st 128-bit IPv6 estination aress IPv4 Proto 8-bit IPv4 protocol fiel IPv6 Next Heaer 8-bit IPv6 next heaer fiel TOS 8-bit IPv4 or IPv6 Type of Service bits Computer Networks an Internets -- Moule 7 19 Spring, 2014 Copyright All rights reserve.
20 Example Items In An OpenFlow Pattern (continue) Fiel Meaning Layer 4 fiels TCP/UDP/SCTP src TCP/UDP/SCTP st ICMP type ICMP coe 16-bit TCP/UDP/SCTP source port 16-bit TCP/UDP/SCTP estination port 8-bit ICMP type fiel 8-bit ICMP coe fiel Computer Networks an Internets -- Moule 7 20 Spring, 2014 Copyright All rights reserve.
21 Examples Of SDN Functionality En-to-en layer 2 paths Forwaring base on source as well as estination All traffic from a specific MAC aress sent along a specific path Segregation of traffic base on application type Multipath forwaring base on hash of 4-tuple Transport of nonstanar layer 3 protocols Computer Networks an Internets -- Moule 7 21 Spring, 2014 Copyright All rights reserve.
22 Questions?
23 The Internet Of Things
24 Internet Of Things Awkwar term use for embee systems on the Internet Generally not operate by humans Can access one another or clou services Examples Scientific sensor systems Home automation systems Smart gri Retail systems Computer Networks an Internets -- Moule 7 24 Spring, 2014 Copyright All rights reserve.
25 Technology Characteristics Low power Energy harvesting (e.g., oor latch) Multi-year battery life Wireless communication Necessary in many situations Enables mobility Computer Networks an Internets -- Moule 7 25 Spring, 2014 Copyright All rights reserve.
26 Wireless Mesh Network Useful when iniviual noes have very low power (limite range) Allows a set of noes to communicate even if some noes cannot communicate irectly Each noe agrees to forwar packets on behalf of neighbors Computer Networks an Internets -- Moule 7 26 Spring, 2014 Copyright All rights reserve.
27 Example Wireless Mesh Technology ZigBee IP Create by ZigBee Alliance Uses IEEE wireless raios Intene for smart gri ZigBee protocol stack Goal is to run IPv6, TCP, an HTTP Inclues many other protocols Computer Networks an Internets -- Moule 7 27 Spring, 2014 Copyright All rights reserve.
28 Wireless Characteristics Goal is low power, an result is Extremely low ata rate Extremely small MTU Limite istance Property Value Networking paraigm Packet switching Maximum ata rate 250 Kbps Payloa size (MTU) 102 octets Maximum istance 10 meters Computer Networks an Internets -- Moule 7 28 Spring, 2014 Copyright All rights reserve.
29 ZigBee IP Mesh Routing One or more borer routers Connect to global Internet Are more powerful than other noes Set of ZigBee IP routers (ZIP routers) Attach to appliances Form a mesh Forwar traffic to borer router Computer Networks an Internets -- Moule 7 29 Spring, 2014 Copyright All rights reserve.
30 Choosing A Path ZIP router must choose a path to a borer router Cannot simply choose noe with the strongest transmission signal Internet B 1 B 2 N Aitional protocol use to fin which noe receives strongest signal (MLE) Computer Networks an Internets -- Moule 7 30 Spring, 2014 Copyright All rights reserve.
31 Running IPv6 Over A ZigBee Network IPv6 can only run over networks that offer an MTU of 1280 or higher, but has an MTU of 102 Solution Aitional protocol name 6LoWPAN Shim layer between IP an evice river Computer Networks an Internets -- Moule 7 31 Spring, 2014 Copyright All rights reserve.
32 6LoWPAN Operation Sening sie Divies atagram into series of blocks Transmits each block in a packet Receiving sie Joins blocks into a atagram Delivers entire atagram to IPv6 Notes Division into block oes not use IP fragmentation Unlike fragmentation, ivision an regrouping is performe at each hop Computer Networks an Internets -- Moule 7 32 Spring, 2014 Copyright All rights reserve.
33 ZigBee IP Mesh Routing ZIP noes forwar packets towar the borer router Borer router Can sen outgoing packets to the Internet Forwars other packets across the mesh If two ZIP noes communicate Packet goes to borer router first Borer router forwars to estination Computer Networks an Internets -- Moule 7 33 Spring, 2014 Copyright All rights reserve.
34 Borer Router Operation To forwar across the mesh the borer router Learns the topology of the mesh Computes a path through the mesh to each ZIP noe Uses IPv6 source routing IPv6 source routing Requires IP-in-IP tunneling (heaer moification prohibite) Places an extension heaer on outer atagram with series of hops Each ZIP noe only nees to know its neighbors Computer Networks an Internets -- Moule 7 34 Spring, 2014 Copyright All rights reserve.
35 Computing Source Routes All noes run Routing Protocol for lossy an Low power networks (RPL) Each noe reports its parent to the borer router RPL coe on borer router creates a Destination Oriente Directe Acyclic Graph (DODAG) DODAG is use to compute source routes Computer Networks an Internets -- Moule 7 35 Spring, 2014 Copyright All rights reserve.
36 Example DODAG Borer router Arcs in DODAG point to parent (path towar borer router) Source route to noe X is reverse of the path from X to borer router Computer Networks an Internets -- Moule 7 36 Spring, 2014 Copyright All rights reserve.
37 Does ZigBee IP Make Sense? Choosing IPv6 instea of IPv4 means Much larger atagram heaers The use of 6LoWPAN to ivie a atagram into MTUsize pieces Sening more ata over a slow network The nee for RPL routing protocols Larger memories (an lower battery life) Using TCP an HTTP over IPv6 means Using DNS to resolve names Unnecessary overhea Unnecessary memory footprint Computer Networks an Internets -- Moule 7 37 Spring, 2014 Copyright All rights reserve.
38 But Wait, There s More! Smart gri applications must be secure, so ZigBee IP inclues security protocols, incluing TLS IPv6 Neighbor Discovery oesn t work in a mesh network, so ZigBee IP inclues a moification known as 6LoWPAN- ND IEEE allows short (16-bit) MAC aresses, so ZigBee IP inclues a mechanism that allows a borer router to prevent aress collisions Computer Networks an Internets -- Moule 7 38 Spring, 2014 Copyright All rights reserve.
39 Major Items In The ZigBee Protocol Stack Application Protocols TLS PANA mdns an DNS-SD MLE TCP an UDP IPv6, ICMPv6, an 6LoWPAN-ND RPL 6LoWPAN aaptation IEEE Resulting stack is large Design is more general-purpose than necessary Technology may be a triumph of politics an economics Computer Networks an Internets -- Moule 7 39 Spring, 2014 Copyright All rights reserve.
40 Questions?
41 Other Trens In Networking
42 A Few Key Technologies Content Caching Peer-To-Peer Communication Universal Representation (XML) Wireless networks that support mobility Higher-spee access technologies (1 Gbps) Clou computing an clou ata centers Computer Networks an Internets -- Moule 7 42 Spring, 2014 Copyright All rights reserve.
43 Web Loa Balancers physical severs site running a web server share atabase Internet connection.. loa balancer Loa balancer istributes HTTP requests across servers Path from servers back to client may be higher spee Computer Networks an Internets -- Moule 7 43 Spring, 2014 Copyright All rights reserve.
44 Overlay Networking C C B D B D A Internet E A E I F I F H G H G (a) (b) (a) Physical connection of computers to the Internet (b) Logical network impose by overlay routing Computer Networks an Internets -- Moule 7 44 Spring, 2014 Copyright All rights reserve.
45 Other Trens Switch to igital telephony an igital vieo Increase use of social networking an social meia Distribute ata centers an migration Computer Networks an Internets -- Moule 7 45 Spring, 2014 Copyright All rights reserve.
Message Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationMODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services
MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright
More informationTopics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.
Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer
More informationNetwork Address Translation (NAT)
Network Aress Translation (NAT) NAT Motivation IPv4 was running out of aresses ISPs only want to limit a customer to one IP aress at any time, but customers want multiple evices to be online Engineers
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationProtocol Configuration
Configuration Protocol Configuration Many items must be set before protocols can be use IP aress of each network interface Aress mask for each network Initial values in the forwaring table Process is known
More informationLesson 9 OpenFlow. Objectives :
1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationLesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP
More informationOverview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions.
Overview Operating Systems I Management Provie Services processes files Manage Devices processor memory isk Simple Management One process in memory, using it all each program nees I/O rivers until 96 I/O
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationMODULE II. Network Programming And Applications
MODULE II Network Programming An Applications Computer Networks an Internets -- Moule 2 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Internet services an communication paraigms Client-server
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationOPENFLOW & SOFTWARE DEFINED NETWORKING. Greg Ferro EtherealMind.com and PacketPushers.net
OPENFLOW & SOFTWARE DEFINED NETWORKING Greg Ferro EtherealMind.com and PacketPushers.net 1 HUH? OPENFLOW. What is OpenFlow? From the bottom up. With big words. How OpenFlow does stuff. Then WHY we want
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationApplication Protocol Examples
Application Protocol Examples Web browsing Email File transfer Remote login an remote esktop Domain Name System (name lookup) Computer Networks an Internets -- Moule 2 50 Spring, 2014 Copyright 2014. All
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationConfiguring Firewall Filters (J-Web Procedure)
Configuring Firewall Filters (J-Web Procedure) You configure firewall filters on EX Series switches to control traffic that enters ports on the switch or enters and exits VLANs on the network and Layer
More informationImplementing IP in IP Tunnel
This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this
More informationOpenFlow Ronald van der Pol
OpenFlow Ronald van der Pol Outline! Goal of this project! Why OpenFlow?! Basics of OpenFlow! Short Demo OpenFlow Overview! Initiative of Stanford University! Run network research experiments
More informationCSE 461 Midterm Winter 2018
CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More informationMulticast Routing : Computer Networking. Example Applications. Overview
Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast
More informationIoT Roadmap in the IETF. Ines Robles
IoT Roadmap in the IETF Ines Robles 2016 Agenda IETF and IoT Definitions IETF IoT WGs Internet Area: 6lo, 6tisch, lpwan, lwig Routing Area: ROLL Application and Real Time Area: core Security Area: ace
More informationProposed Node and Network Models for M2M Internet
2009-2012 NTT CORPORATION. All Rights Reserved. Proposed Node and Network Models for M2M Internet Yuminobu Igarashi NTT Information Sharing Platform Laboratories 2012 NTT Information Sharing Platform Laboratories
More informationZigBee IP update IETF 87 Berlin. Robert Cragie
ZigBee IP update IETF 87 Berlin Robert Cragie robert.cragie@gridmerge.com Introduction ZigBee IP is a super specification for an IPv6 stack Umbrella specification for a set of IETF RFCs Aimed at 802.15.4
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/
More informationMobile Communications
Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current
More informationIPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )
Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationData Communications and Networks Spring Syllabus and Reading Assignments
Data Communications and Networks Spring 2018 Syllabus and Assignments Revision Date: January 24, 2018 Course : This course teaches the design and implementation techniques essential for engineering robust
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationLabel Switching. The idea. Add a small label (sometimes called a tag ) on the front of a packet and route the packet based on the label. cs670.
Label Switching The idea Add a small label (sometimes called a tag ) on the front of a packet and route the packet based on the label label How it works IP IP payload When the packet reaches a router,
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationOverview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links
Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 5 OSI Network Layer
Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation
More informationOverview of the Cisco OpenFlow Agent
About OpenFlow, page 1 Information About Cisco OpenFlow Agent, page 2 About OpenFlow OpenFlow is an open standardized interface that allows a software-defined networking (SDN) controller to manage the
More informationYou Can Do That. Unit 16. Motivation. Computer Organization. Computer Organization Design of a Simple Processor. Now that you have some understanding
.. ou Can Do That Unit Computer Organization Design of a imple Clou & Distribute Computing (CyberPhysical, bases, Mining,etc.) Applications (AI, Robotics, Graphics, Mobile) ystems & Networking (Embee ystems,
More informationJuniper Netscreen Security Device. How to Enable IPv6 Page-51
Juniper Netscreen Security Device Page-51 Netscreen Firewall - Interfaces Below is a screen shot for a Netscreen Firewall interface. All interfaces have an IPv6 address except ethernet0/0. We will step
More informationCisco Nexus Data Broker for Network Traffic Monitoring and Visibility
Guide Cisco Nexus Data Broker for Network Traffic Monitoring and Visibility Solution Implementation Guide 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationSDN Workshop. Contact: WSDN01_v0.1
SDN Workshop Contact: training@apnic.net WSDN01_v0.1 Issue Date: [Date] Revision: [xx] OpenFlow SDN Workshop WSDN01_v0.1 Issue Date: [Date] Revision: [xx] SDN architectural framework Application Plane
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationUC Santa Cruz UC Santa Cruz Previously Published Works
UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author
More informationLesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationVirtual Link Layer : Fundamentals of Computer Networks Bill Nace
Virtual Link Layer 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia 3 Lectures left HW #2
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationSet of IP routers. Set of IP routers. Set of IP routers. Set of IP routers
Smart Sensor Application Sensor Framework Source End IP Address Set of IP routers IoT Application Layer TCP/IP Appl. Protocols Transport Layer TCP/IP IoT Comm. Framework Application Framework IoT Comm.
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationImplementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN
This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationOutlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21
IPv6 over WPAN Soohong Daniel Park soohong.park@samsung.com Mobile Convergence Laboratory, Digital Media R&D Center, SAMSUNG Electronics. Contents Outlook on IEEE 802.15.4 ZigBee Implications IP Requirements
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More information6LoWPAN (IPv6 based Low Power WPAN)
6LoWPAN (IPv6 based Low Power WPAN) Kyung Hee University Nov. 19. 2007 Choong Seon Hong, cshong@khu.ac.kr Outline 2 Overview of 6LoWPAN Transmission of IPv6 Packets over IEEE 802.15.4 WPAN Networks 6LoWPAN
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAggregate Interfaces and LACP
The following topics explain aggregate interface configuration and how LACP functions on managed devices: About Aggregate Interfaces, on page 1 LAG Configuration, on page 2 Link Aggregation Control Protocol
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationContents. Configuring EVI 1
Contents Configuring EVI 1 Overview 1 Layer 2 connectivity extension issues 1 Network topologies 2 Terminology 3 Working mechanism 4 Placement of Layer 3 gateways 6 ARP flood suppression 7 Selective flood
More informationVirtual Link Layer : Fundamentals of Computer Networks Bill Nace
Virtual Link Layer 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia 3 Lectures left HW #2
More informationScribe Notes -- October 31st, 2017
Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationConfiguring IPv4. Finding Feature Information. This chapter contains the following sections:
This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationSoftware-Defined Networking (Continued)
Software-Defined Networking (Continued) CS640, 2015-04-23 Announcements Assign #5 released due Thursday, May 7 at 11pm Outline Recap SDN Stack Layer 2 Learning Switch Control Application Design Considerations
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationConfiguring Cache Services Using the Web Cache Communication Protocol
Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationGuide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6
Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationConfiguring OpenFlow 1
Contents Configuring OpenFlow 1 Overview 1 OpenFlow switch 1 OpenFlow port 1 OpenFlow instance 2 OpenFlow flow table 3 Group table 5 Meter table 5 OpenFlow channel 6 Protocols and standards 7 Configuration
More information