Corso di Reti di Calcolatori II

Size: px
Start display at page:

Download "Corso di Reti di Calcolatori II"

Transcription

1 Corso di Reti di Calcolatori II Distributed network testbeds and network emulation systems Prof. Roberto Canonico a.a. 2007/2008 The evaluation spectrum 2 numerical models simulation emulation prototype operational system Live testing 1

2 Evaluation environments 3 Simulation + high level of control + repeatable experiments - difficult to accurately capture all aspects of the network traffic models may be incorrect interaction of protocols accuracy of protocol implementation Live Testing + very accurate model of the network + no conversion of simulated applications needed - low level of control more difficult to create reproducible results - difficult to introduce new protocol behaviour - often just a wire Emulation systems PlanetLab 2

3 What is PlanetLab 5 Planetary-scale distributed testbed for broad-coverage network services Planetlab is intended to support seamless migration of an application from an early prototype, through multiple design iterations, to a popular service that continues to evolve. PlanetLab currently consists of 832 nodes at 410 sites (Nov. 29, 2007) PlanetLab Architecture 6 Node-level Several virtual machines on each node, each running a different service Resources distributed fairly Services are isolated from each other Network-level Node managers, agents, brokers, and service managers provide interface and maintain PlanetLab 3

4 Services Run in Slices 7 PlanetLab Nodes Services Run in Slices 8 PlanetLab Nodes Virtual Machines Service / Slice A Instance of Slice A in node N is called a sliver 4

5 Services Run in Slices 9 PlanetLab Nodes Virtual Machines Service / Slice A Service / Slice B Services Run in Slices 10 PlanetLab Nodes Virtual Machines Service / Slice A Service / Slice B Service / Slice C 5

6 Slices 11 Slices 12 6

7 User Opt-in 13 Client NAT Server Per-Node View 14 Node Mgr Local Admin VM 1 VM 2 VM n Virtual Machine Monitor (VMM) 7

8 Global View 15 PLC PlanetLab Architecture 16 PlanetLab Central Princeton, NJ Site A Internet Site B Site C 8

9 PlanetLab Central 17 Database server Primary information store Sites, nodes, users, events, configuration API server Database frontend Authentication, programmatic interface Web server API frontend User GUI, administrative interface Boot server Secure software distribution Optional servers PlanetFlow, Mail, Support, Spam/AV, Monitor, DNS, Build, CVS, QA Outside the scope of the architecture Node Architecture Goals 18 Provide a virtual machine for each service running on a node Isolate virtual machines Allow maximal control over virtual machines Fair allocation of resources Network, CPU, memory, disk achieved through virtualization 9

10 One Extreme of virtualization: Software Runtime 19 e.g., Java Virtual Machine High level API Depend on OS to provide protection and resource allocation Not flexible Other Extreme of virtualization: Complete Virtual Machine 20 e.g., VMware Low level API (hardware) Maximum flexibility Excellent protection High CPU/Memory overhead Cannot share common resources among virtual machines OS, common filesystem 10

11 PlanetLab Virtualization: VServers 21 Kernel patch to mainstream OS (Linux) Gives appearance of separate kernel for each virtual machine Root privileges restricted to activities that do not affect other vservers Some modification: resource control (e.g., File handles, port numbers) and protection facilities added PlanetLab Network Architecture 22 Node manager (one per node) Create slices for service managers When service managers provide valid tickets Allocate resources for vservers Resource Monitor (one per node) Track node s available resources Tell agents about available resources 11

12 PlanetLab Network Architecture 23 Agents (centralized) Track nodes free resources Advertise resources to resource brokers Issue tickets to resource brokers Tickets may be redeemed with node managers to obtain the resource PlanetLab Network Architecture 24 Resource Broker (per service) Obtain tickets from agents on behalf of service managers Service Managers (per service) Obtain tickets from broker Redeem tickets with node managers to acquire resources If resources can be acquired, start service 12

13 PlanetLab Virtual Machines: VServers 25 Extend the idea of chroot(2) New vserver created by system call Descendent processes inherit vserver Unique filesystem, SYSV IPC, UID/GID space Limited root privilege Can t control host node Irreversible Scalability 26 Reduce disk footprint using copy-on-write Immutable flag provides file-level CoW Vservers share 508MB basic filesystem Each additional vserver takes 29MB Increase limits on kernel resources (e.g., file descriptors) Is the kernel designed to handle this? (inefficient data structures?) 13

14 Protected Raw Sockets 27 Services may need low-level network access Cannot allow them access to other services packets Provide protected raw sockets TCP/UDP bound to local port Incoming packets delivered only to service with corresponding port registered Outgoing packets scanned to prevent spoofing ICMP also supported 16-bit identifier placed in ICMP header Resource Limits 28 Node-wide cap on outgoing network bandwidth Protect the world from PlanetLab services Isolation between vservers: two approaches Fairness: each of N vservers gets 1/N of the resources during contention Guarantees: each slice reserves certain amount of resources (e.g., 1Mbps bandwidth, 10Mcps CPU) Left-over resources distributed fairly 14

15 Linux and CPU Resource Management 29 The scheduler in Linux provides fairness by process, not by vserver Vserver with many processes hogs CPU No current way for scheduler to provide guaranteed slices of CPU time Network emulation 15

16 What is Emulation? 31 Network emulation aims to combine the best properties of both simulation and live testing Ability to introduce the simulator into a live net Application: Allows testing real-world implementations Allows testing simulated protocols Requirements: Scheduler support Packet capture and generation capabilities Scheduler 32 A simulator operates in virtual time using eventdriven simulation Real-time scheduler Does not advance the virtual clock to next event Dispatches event at real-time 16

17 Existing Work in TCP/IP Network Emulation 33 Kernel based emulators NIST Net Linux based kernel module Supports input from applications or packet traces Dummynet Free BSD based NS2 emulator BSD based Entrapid Supports virtual kernels (currently Free BSD) Trends in Network emulation 34 To emulate large scale networks, several cluster-based emulation systems have been developed Univ. of Utah Univ. of Stuttgart Open Network Univ. of Virginia Tech. UCLA Univ. of Napoli Cluster nodes are used to emulate the behaviour of network devices and end-systems To increase scalability, physical resources are multiplexed, so to create several logical instances E.g. a single cluster node may emulate three different routers Two problems arise: node multiplexing link multiplexing These problems may be solved by means of virtualization techniques 17

18 Hardware virtualization techniques 35 The main purpose of virtualization techniques is to hide the physical characteristics of computing resources Virtualization can be applied to: single physical resources complete computing systems (Platform Virtualization) (At least) two approaches to virtualization: Full Virtualization implements in software a full virtual replica of the emulated system s hardware Full Virtualization can run an unmodified OS, at a cost of a reduced performance Paravirtualization implements a software interface that is similar but not identical to the underlying hardware Paravirtualization is more scalable but requires OS to be modified Node and link multiplexing 36 Node multiplexing is the problem of emulating more than a network node on the same physical cluster node Hardware virtualization techniques may be adopted (VMWare, Xen, Jails, VServer, OpenVZ, ) Link multiplexing is the problem of emulating multiple point-to-point connections on top of one or more shared Ethernet LANs Switched VLANS Emulate multiple point-to-point connections on top of one or more shared Ethernet LANs Virtualization techniques As long as they are able to create multiple instances of the kernel TCP/IP stack 18

19 Link multiplexing 37 Ns2 as a Network Emulator 19

20 Emulation Objects 39 Interface between ns and network traffic Network Objects Access to live network via BPF and raw sockets Tap Objects Conversion between ns and network packet formats Capture: BPF network to ns ns ns to network Inject: Raw socket Modes of Operation 40 Packet conversion leads to two modes of operation Opaque Mode Network packet fields are not interpreted Protocol Mode Network packet is interpreted TTL values reflect hop count in simulator Network packet fields are generated Ping responder, TCP application 20

21 Opaque Mode 41 Network packet is passed unmodified through simulator Extern Source Destination Size Ns packet contains a pointer to the network packet Source Destination Size Data ns Read packets Write packets Network Packet Network Protocol Mode 42 Network packet fields are generated by the simulator Source Destination Size The ns packet header is mapped onto the network packet header and visa versa. Source Destination Size Data Network Packet Host A ns TCP Agent TCP Application Host B Send/receive packets from application Network Send/receive packets from ns 21

22 Applications 43 Opaque Mode Cross-traffic interaction leading to drop, delay and reordering of packets End to End application testing Protocol Mode Protocol and conformance testing Evaluate effect of DDoS attacks Wireless networks Example: Setup 44 Goal: Make a ns TCP agent interact with a TCP server A B port 8000 nse TCP server Disable IP forwarding sysctl w net.inet.ip.forwarding=0 Assign and 6000 to TCP agent Switch Add route to dummy IP address route add Disable IP redirects sysctl w net.inet.ip.redirect=0 22

23 Example Script 45 set ns [new Simulator] $ns use-scheduler RealTime set entry_node [$ns node] set tcp_node [$ns node] $ns duplex-link $entry_node \ $tcp_node 10Mb 1ms DropTail set tcp [new Agent/TCP/FullTcp] $ns attach-agent $tcp_node $tcp Activate ns and Change to real-time scheduler Create topology Create TCP Agent TCP Agent TCPTap BPF tcp_node entry_node TCPTap RawSocket Example Script 46 set bpf [new Network/Pcap/Live] set dev [$bpf open readonly eth0] $bpf filter "src and src port 8000 \ and dst and dst port 6000 set capture_tap [new Agent/TCPTap] $capture_tap network $bpf $ns attach-agent $entry_node $capture_tap $ns simplex-connect $capture_tap $tcp set rawsocket [new Network/IP] $rawsocket open writeonly set inject_tap [new Agent/TCPTap] $inject_tap advertised-window 512 $inject_tap extipaddr " $inject_tap extport 8000 $inject_tap network $rawsocket $ns attach-agent $entry_node $inject_tap $ns simplex-connect $tcp $inject_tap 23

24 Example Script 47 $ns at 0.01 "$tcp advance 1" $ns at 20.0 exit 0" $ns run start nse A TCP Agent B TCP Server (8000) BPF Raw Socket Switch Further Information on ns2 as emulator 48 Scripts ~ns/emulate Opaque Mode: em.tcl Protocol Mode thrutcp.tcl pingdemo.tcl tcpemu.tcl Kevin Fall, Network Emulation in the Vint/NS Simulator, ISCC July

25 Emulab A Laboratory Is Not Enough 50 testbeds give you lots of resources but offer little help in using those resources package / distribute / configure / instrument / init / execute / monitor / stop / collect / analyze / archive / revise / repeat Emulab goal is to provide support for automatic setup of several concurrent experiments on a cluster infrastructure Emulab has been created at Univ. of Utah (US) 25

26 Emulab: two emulation goals Accurate: Provide artifact-free environment 2. Universal: Run arbitrary workload: any OS, any code on routers, any program, for any user Therefore, Emulab s default resource allocation policy is conservative: Allocate full real node and link: no multiplexing Assume maximum possible traffic Emulab: experiment 52 Acts as central operational entity Represents Network configuration, including nodes and links Node state, including OS images Database entries, including event lists Lasts minutes to days, to weeks, to forever! 26

27 Experiment Life Cycle 53 Specification Parsing Global resource allocation Node self-configuration Experiment control Preemption and swapping Classic Experiments 54 topology + SW (by reference) + events expt. DB 27

28 Experiment Life Cycle 55 Global Node Experiment Specification Resource Self-Configuration Parsing Swap Out InControl Allocation $ns duplex-link $A $B 1.5Mbps 20ms A B DB A BA B ns Specification 56 ns: de-facto standard in network simulation, built on Tcl Important features: Graceful transition for ns users Power of general-purpose programming language Other means of specification: Java GUI Standard topology generators 28

29 assign: Mapping Local Cluster Resources 57 Maps virtual resources to local nodes and VLANs General combinatorial optimization approach to NP-complete problem Based on simulated annealing Minimizes inter-switch links & number of switches & other constraints All experiments mapped in less than 3 secs [100 nodes] Riferimenti

An Integrated Experimental

An Integrated Experimental An Integrated Experimental Environment for Distributed Systems and Networks B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, A. Joglekar University of Utah www.netbed.org

More information

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation

More information

Network Emulation in the NS Simulator. Kishore Ramachandran

Network Emulation in the NS Simulator. Kishore Ramachandran Network Emulation in the NS Simulator. Kishore Ramachandran Emulation the why and the how. Motivation (Why?) Simulations make simplifying assumptions. Results not always basis for real-world deployment.

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

Proceedings of the First Symposium on Networked Systems Design and Implementation

Proceedings of the First Symposium on Networked Systems Design and Implementation USENIX Association Proceedings of the First Symposium on Networked Systems Design and Implementation San Francisco, CA, USA March 29 31, 2004 2004 by The USENIX Association All Rights Reserved For more

More information

An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed

An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed Suhas Mathur suhas@winlab.rutgers.edu Communication Networks II Spring 2005 Talk Outline Introduction: The future internet

More information

An Experimentation Workbench for Replayable Networking Research

An Experimentation Workbench for Replayable Networking Research An Experimentation Workbench for Replayable Networking Research Eric Eide,, Leigh Stoller, and Jay Lepreau University of Utah, School of Computing NSDI 2007 / April 12, 2007 Repeated Research A scientific

More information

An Experimentation Workbench for Replayable Networking Research

An Experimentation Workbench for Replayable Networking Research An Experimentation Workbench for Replayable Networking Research Eric Eide, Leigh Stoller, and Jay Lepreau Repeated Research A scientific community advances when its experiments are repeated University

More information

for Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC

for Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC Virtualization for Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC Why virtualization? Virtualization means many things! Multi-programming any UNIX is virtualizing resources to allow

More information

Cloud and Datacenter Networking

Cloud and Datacenter Networking Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Types of Virtualization. Types of virtualization

Types of Virtualization. Types of virtualization Types of Virtualization Emulation VM emulates/simulates complete hardware Unmodified guest OS for a different PC can be run Bochs, VirtualPC for Mac, QEMU Full/native Virtualization VM simulates enough

More information

Operating Systems 4/27/2015

Operating Systems 4/27/2015 Virtualization inside the OS Operating Systems 24. Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view

More information

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project

More information

Emerging Testbeds for NwGN through Virtualization Technologies. Akihiro NAKAO University of Tokyo NICT

Emerging Testbeds for NwGN through Virtualization Technologies. Akihiro NAKAO University of Tokyo NICT Emerging Testbeds for NwGN through Virtualization Technologies Akihiro NAKAO University of Tokyo NICT Testbeds through Net Virtualization Various ideas under development GENI 5 Clusters PlanetLab Today

More information

A New Methodology for Easily Constructing Extensible and High-Fidelity TCP/IP Network Simulators

A New Methodology for Easily Constructing Extensible and High-Fidelity TCP/IP Network Simulators A New Methodology for Easily Constructing Extensible and High-Fidelity TCP/IP Network Simulators S.Y. Wang shieyuan@csie.nctu.edu.tw Department of Computer Science and Info. Engr. National Chiao Tung University

More information

Onelab An Introduction to Virtualization on PlanetLab. Baris Metin

Onelab An Introduction to Virtualization on PlanetLab. Baris Metin Onelab An Introduction to Virtualization on PlanetLab Baris Metin tmetin@sophia.inria.fr Overview Onelab: Quick Introduction. What are we up to? Virtualization on PlanetLab : Requirements and Solutions

More information

EE 660: Computer Architecture Cloud Architecture: Virtualization

EE 660: Computer Architecture Cloud Architecture: Virtualization EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar

More information

Module 1: Virtualization. Types of Interfaces

Module 1: Virtualization. Types of Interfaces Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform

More information

Network Virtualization and Data Center Networks Network Testbeds

Network Virtualization and Data Center Networks Network Testbeds Network Virtualization and Data Center Networks 263-3825-00 Network Testbeds Qin Yin Fall Semester 2013 Material uses slides from Timothy Roscoe, Larry Peterson, Jay Lapreau, and GENI.net 1 Outline PlanetLab

More information

Virtualization, Xen and Denali

Virtualization, Xen and Denali Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two

More information

The design and implementation of the NCTUns network simulation engine

The design and implementation of the NCTUns network simulation engine Simulation Modelling Practice and Theory 15 (2007) 57 81 www.elsevier.com/locate/simpat The design and implementation of the NCTUns network simulation engine S.Y. Wang *, C.L. Chou, C.C. Lin Department

More information

ELEC5616 COMPUTER & NETWORK SECURITY

ELEC5616 COMPUTER & NETWORK SECURITY ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses

More information

(a) Which of these two conditions (high or low) is considered more serious? Justify your answer.

(a) Which of these two conditions (high or low) is considered more serious? Justify your answer. CS140 Winter 2006 Final Exam Solutions (1) In class we talked about the link count in the inode of the Unix file system being incorrect after a crash. The reference count can either be either too high

More information

Xen and the Art of Virtualization. CSE-291 (Cloud Computing) Fall 2016

Xen and the Art of Virtualization. CSE-291 (Cloud Computing) Fall 2016 Xen and the Art of Virtualization CSE-291 (Cloud Computing) Fall 2016 Why Virtualization? Share resources among many uses Allow heterogeneity in environments Allow differences in host and guest Provide

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison

Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example

More information

Utilizing Linux Kernel Components in K42 K42 Team modified October 2001

Utilizing Linux Kernel Components in K42 K42 Team modified October 2001 K42 Team modified October 2001 This paper discusses how K42 uses Linux-kernel components to support a wide range of hardware, a full-featured TCP/IP stack and Linux file-systems. An examination of the

More information

Lecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems

Lecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems Lecture 7 Xen and the Art of Virtualization Paul Braham, Boris Dragovic, Keir Fraser et al. Advanced Operating Systems 16 November, 2011 SOA/OS Lecture 7, Xen 1/38 Contents Virtualization Xen Memory CPU

More information

Nested Virtualization and Server Consolidation

Nested Virtualization and Server Consolidation Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 03 (version February 11, 2008) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

CSCD433/533 Advanced Networks Winter 2017 Lecture 13. Raw vs. Cooked Sockets

CSCD433/533 Advanced Networks Winter 2017 Lecture 13. Raw vs. Cooked Sockets CSCD433/533 Advanced Networks Winter 2017 Lecture 13 Raw vs. Cooked Sockets Introduction Better Understand the Protocol Stack Use Raw Sockets So far, sockets in Java either TCP or UDP based In fact, Java

More information

24-vm.txt Mon Nov 21 22:13: Notes on Virtual Machines , Fall 2011 Carnegie Mellon University Randal E. Bryant.

24-vm.txt Mon Nov 21 22:13: Notes on Virtual Machines , Fall 2011 Carnegie Mellon University Randal E. Bryant. 24-vm.txt Mon Nov 21 22:13:36 2011 1 Notes on Virtual Machines 15-440, Fall 2011 Carnegie Mellon University Randal E. Bryant References: Tannenbaum, 3.2 Barham, et al., "Xen and the art of virtualization,"

More information

A new methodology for easily constructing extensible and high-fidelity TCP/IP network simulators q

A new methodology for easily constructing extensible and high-fidelity TCP/IP network simulators q Computer Networks 40 (2002) 257 278 www.elsevier.com/locate/comnet A new methodology for easily constructing extensible and high-fidelity TCP/IP network simulators q S.Y. Wang a, *, H.T. Kung b a Department

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems OS Structures and System Calls Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Outline Protection mechanisms

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti. Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP

More information

Network stack virtualization for FreeBSD 7.0. Marko Zec

Network stack virtualization for FreeBSD 7.0. Marko Zec Network stack virtualization for FreeBSD 7.0 Marko Zec zec@fer.hr University of Zagreb Network stack virtualization for FreeBSD 7.0 slide 1 of 18 Talk outline Network stack virtualization what, why, and

More information

Virtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization

Virtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

Virtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized

Virtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

RELIABILITY AND STATE MACHINES IN AN ADVANCED NETWORK TESTBED ABSTRACT... CONTENTS

RELIABILITY AND STATE MACHINES IN AN ADVANCED NETWORK TESTBED ABSTRACT... CONTENTS RELIABILITY AND STATE MACHINES IN AN ADVANCED NETWORK TESTBED by Mac G. Newbold Printed 1/2/2004 A thesis submitted to the faculty of The University of Utah in partial fulfillment of the requirements for

More information

IMPLEMENTING SOLARIS CONTAINERS TO INCREASE PERFORMANCE AND SCALABILITY OF FINANCIAL MANAGEMENT SOFTWARE Genti Daci, Polytechnic University of Tirana

IMPLEMENTING SOLARIS CONTAINERS TO INCREASE PERFORMANCE AND SCALABILITY OF FINANCIAL MANAGEMENT SOFTWARE Genti Daci, Polytechnic University of Tirana IMPLEMENTING SOLARIS CONTAINERS TO INCREASE PERFORMANCE AND SCALABILITY OF FINANCIAL MANAGEMENT SOFTWARE Genti Daci, Polytechnic University of Tirana ABSTRACT This paper examines Virtualization Technologies

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 15 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Abstract. Testing Parameters. Introduction. Hardware Platform. Native System

Abstract. Testing Parameters. Introduction. Hardware Platform. Native System Abstract In this paper, we address the latency issue in RT- XEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Introduction. CS3026 Operating Systems Lecture 01

Introduction. CS3026 Operating Systems Lecture 01 Introduction CS3026 Operating Systems Lecture 01 One or more CPUs Device controllers (I/O modules) Memory Bus Operating system? Computer System What is an Operating System An Operating System is a program

More information

Lecture 5: February 3

Lecture 5: February 3 CMPSCI 677 Operating Systems Spring 2014 Lecture 5: February 3 Lecturer: Prashant Shenoy Scribe: Aditya Sundarrajan 5.1 Virtualization Virtualization is a technique that extends or replaces an existing

More information

Packet Sniffing and Spoofing

Packet Sniffing and Spoofing Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du Packet Sniffing and Spoofing Chester Rebeiro IIT Madras Shared Networks Every network packet reaches every

More information

Virtualization. Pradipta De

Virtualization. Pradipta De Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

Virtual Machine Monitors!

Virtual Machine Monitors! ISA 673 Operating Systems Security Virtual Machine Monitors! Angelos Stavrou, George Mason University! Virtual Machine Monitors 2! Virtual Machine Monitors (VMMs) are everywhere! Industry commitment! Software:

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang Extensible Network Security Services on Software Programmable Router OS David Yau, Prem Gopalan, Seung Chul Han, Feng Liang System Software and Architecture Lab Department of Computer Sciences Purdue University

More information

Dynamic Virtual Cluster reconfiguration for efficient IaaS provisioning

Dynamic Virtual Cluster reconfiguration for efficient IaaS provisioning Dynamic Virtual Cluster reconfiguration for efficient IaaS provisioning Vittorio Manetti, Pasquale Di Gennaro, Roberto Bifulco, Roberto Canonico, and Giorgio Ventre University of Napoli Federico II, Italy

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 8 Denial of Service First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Denial of Service denial of service (DoS) an action

More information

CSCI 8530 Advanced Operating Systems. Part 19 Virtualization

CSCI 8530 Advanced Operating Systems. Part 19 Virtualization CSCI 8530 Advanced Operating Systems Part 19 Virtualization Virtualization This is a very old idea It appears in many different forms A variety of commercial products exist The idea has become hot again

More information

The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014)

The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation

More information

Port-Space Isolation for Multiplexing a Single IP Address through Open vswitch

Port-Space Isolation for Multiplexing a Single IP Address through Open vswitch Port-Space Isolation for Multiplexing a Single IP Address through Open vswitch Ping Du 1, Maoke Chen 1, and Akihiro Nakao 2 1 National Institute of Information and Communications Technology (NICT), Japan

More information

references Virtualization services Topics Virtualization

references Virtualization services Topics Virtualization references Virtualization services Virtual machines Intel Virtualization technology IEEE xplorer, May 2005 Comparison of software and hardware techniques for x86 virtualization ASPLOS 2006 Memory resource

More information

CSCE 410/611: Virtualization

CSCE 410/611: Virtualization CSCE 410/611: Virtualization Definitions, Terminology Why Virtual Machines? Mechanics of Virtualization Virtualization of Resources (Memory) Some slides made available Courtesy of Gernot Heiser, UNSW.

More information

Virtualization of Wireless LAN Infrastructures

Virtualization of Wireless LAN Infrastructures The 6 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 15-17 September 2011, Prague, Czech Republic Virtualization of Wireless

More information

1 Virtualization Recap

1 Virtualization Recap 1 Virtualization Recap 2 Recap 1 What is the user part of an ISA? What is the system part of an ISA? What functionality do they provide? 3 Recap 2 Application Programs Libraries Operating System Arrows?

More information

Networking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu

Networking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu Networking in Virtual Infrastructure and Future Internet NCHC Jen-Wei Hu Overview Virtualization Networking in Virtualization Future Internet 2 Hardware virtualization Hardware virtualization techniques

More information

Zero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks

Zero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks Zero to Microservices in 5 minutes using Docker Containers Mathew Lodge (@mathewlodge) Weaveworks (@weaveworks) https://www.weave.works/ 2 Going faster with software delivery is now a business issue Software

More information

Implementation and Analysis of Large Receive Offload in a Virtualized System

Implementation and Analysis of Large Receive Offload in a Virtualized System Implementation and Analysis of Large Receive Offload in a Virtualized System Takayuki Hatori and Hitoshi Oi The University of Aizu, Aizu Wakamatsu, JAPAN {s1110173,hitoshi}@u-aizu.ac.jp Abstract System

More information

Linux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition

Linux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization

More information

OS Containers. Michal Sekletár November 06, 2016

OS Containers. Michal Sekletár November 06, 2016 OS Containers Michal Sekletár msekleta@redhat.com November 06, 2016 whoami Senior Software Engineer @ Red Hat systemd and udev maintainer Free/Open Source Software contributor Michal Sekletár msekleta@redhat.com

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

FairVPN, overlay topology construction tool to maximize TCP fairness. A framework for packet droppers mitigation in OLSR Wireless Community Networks

FairVPN, overlay topology construction tool to maximize TCP fairness. A framework for packet droppers mitigation in OLSR Wireless Community Networks FairVPN, overlay topology construction tool to maximize TCP fairness A framework for packet droppers mitigation in OLSR Wireless Community Networks Giornata di incontro con i borsisti GARR, Roma, 23.02.2011

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a

More information

Virtualization Overview NSRC

Virtualization Overview NSRC Virtualization Overview NSRC Terminology Virtualization: dividing available resources into smaller independent units Emulation: using software to simulate hardware which you do not have The two often come

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines

IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines ICCRG 87. IETF Berlin July 31, 2013 Thomas Werthmann Mirja Kühlewind

More information

NET311 Computer Network Management Tools, Systems and Engineering

NET311 Computer Network Management Tools, Systems and Engineering NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Mininet: Squeezing a 1000 node OpenFlow Network onto a Laptop. Bob Lantz, November 19, 2009

Mininet: Squeezing a 1000 node OpenFlow Network onto a Laptop. Bob Lantz, November 19, 2009 Mininet: Squeezing a 1000 node OpenFlow Network onto a Laptop Bob Lantz, rlantz@cs.stanford.edu November 19, 2009 How To Do Network Research - I'm trying to figure this out! - Use OpenFlow, do cool stuff!

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Multiprocessor Scheduling. Multiprocessor Scheduling

Multiprocessor Scheduling. Multiprocessor Scheduling Multiprocessor Scheduling Will consider only shared memory multiprocessor or multi-core CPU Salient features: One or more caches: cache affinity is important Semaphores/locks typically implemented as spin-locks:

More information

Measuring Application's network behaviour

Measuring Application's network behaviour EuroNGI PhD measurement workshop - 1 Measuring Application's network behaviour EuroNGI PhD measurement workshop University of Linz,, Austria May, 12th 2006 Sven Hessler http://dps.uibk.ac.at/~sven Institute

More information

Cognitive radio technology and GENI project

Cognitive radio technology and GENI project Cognitive radio technology and GENI project Ivan Seskar Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: seskar (at) winlab (dot) rutgers (dot) edu ORBIT Cognitive Capable Platforms

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration

More information

COMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy

COMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:

More information

Scamper. Matthew Luckie

Scamper.  Matthew Luckie Scamper http://www.wand.net.nz/scamper/ Matthew Luckie mjl@wand.net.nz Introduction It is coming up towards the end of a year s contract between the University of Waikato and WIDE that funded the development

More information

IMUNES Based Distributed Network Emulator

IMUNES Based Distributed Network Emulator IMUNES Based Distributed Network Emulator Z. Puljiz and M. Mikuc Faculty of Electrical Engineering and Computing/Department of Telecommunications, Zagreb, Croatia zrinka.puljiz@fer.hr miljenko.mikuc@fer.hr

More information

OS Virtualization. Linux Containers (LXC)

OS Virtualization. Linux Containers (LXC) OS Virtualization Emulate OS-level interface with native interface Lightweight virtual machines No hypervisor, OS provides necessary support Referred to as containers Solaris containers, BSD jails, Linux

More information

Xen and the Art of Virtualization

Xen and the Art of Virtualization Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield Presented by Thomas DuBuisson Outline Motivation

More information

Virtualization and memory hierarchy

Virtualization and memory hierarchy Virtualization and memory hierarchy Computer Architecture J. Daniel García Sánchez (coordinator) David Expósito Singh Francisco Javier García Blas ARCOS Group Computer Science and Engineering Department

More information

CHAPTER 16 - VIRTUAL MACHINES

CHAPTER 16 - VIRTUAL MACHINES CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show

More information

Cloud Computing Virtualization

Cloud Computing Virtualization Cloud Computing Virtualization Anil Madhavapeddy anil@recoil.org Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. x86 support for virtualization. Full and

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Software Engineering at VMware Dan Scales May 2008

Software Engineering at VMware Dan Scales May 2008 Software Engineering at VMware Dan Scales May 2008 Eng_BC_Mod 1.Product Overview v091806 The Challenge Suppose that you have a very popular software platform: that includes hardware-level and OS code that

More information

VALE: a switched ethernet for virtual machines

VALE: a switched ethernet for virtual machines L < > T H local VALE VALE -- Page 1/23 VALE: a switched ethernet for virtual machines Luigi Rizzo, Giuseppe Lettieri Università di Pisa http://info.iet.unipi.it/~luigi/vale/ Motivation Make sw packet processing

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information