The Road to SDN: An Intellectual History of Programmable Networks Network Virtualization and Data Center Networks SDN - Introduction

Size: px
Start display at page:

Download "The Road to SDN: An Intellectual History of Programmable Networks Network Virtualization and Data Center Networks SDN - Introduction"

Transcription

1 The Road to SDN: An Intellectual History of Programmable Networks Network Virtualization and Data Center Networks SDN - Introduction Qin Yin Fall Semester Data, Control, and Planes Data, Control, and Planes Time-scale Tasks Location Data Control Packet (nsec) Forwarding, buffering, filtering, scheduling Line-card hardware Event (10 msec to sec) Routing, signaling (circuit setup) Router software Human (min to hours) Analysis, configuration Humans or scripts 3 4 Data vs. Control Plane Data plane: packets Streaming algorithms that act on packets Handling individual packets as they arrive Matching on some bits, taking a simple action at behest of control and management plane Wide range of functionality Forwarding, access control, traffic monitoring, buffering, marking, Shaping and scheduling, etc. Control plane: events Distributed routing algorithms Compute paths through the network Disseminate the addresses of end hosts Track changes in network topology Reserve resources along a path Routing vs. Forwarding Routing: control plane Computing paths the packets will follow Routers talking amongst themselves Individual router creating a forwarding table Forwarding: data plane Directing a data packet to an outgoing link Individual router using a forwarding table 5 6

2 Data and Control Planes Adding Plane data plane Line card Processor control plane Line card Making the network run well Traffic reaches the right destination Traffic flows over short, uncongested paths Unwanted traffic is discarded Failure recovery happens quickly Routers don t run out of resources Line card Line card Switching Fabric Line card Line card A control loop with the network Measure (sense): topology, traffic, performance, Control (actuate): configure control and data planes 7 8 Software Defined Networks In the SDN architecture, The control and data planes are decoupled Network intelligence and state are logically centralized The underlying network infrastructure is abstracted from the applications Open Networking Foundation white paper A Clean Slate 4D Approach to Network Control and Albert Greenberg, Gisli Hjalmtysson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey Xie, Hong Yan, Jibin Zhan, Hui Zhang SIGCOMM Comput. Commun. Rev A Conventional View of a Network A Conventional View of a Network A C E H A C E H F I F I B D J B D J G Configuration File Physical topology is a graph of nodes and links Run Dijkstra to find route to each node EIRGP Access Control Table NAT Table Tunnel Table BGP OSPF Forwarding Table

3 A Conventional View of a Network E A H C A Study of Operational Production Networks How complicated/simple are real control planes? What is the structure of the distributed system? B D EIRGP Access Control Table NAT Table Tunnel Table F Configuration File BGP J OSPF Forwarding Table I Use reverse-engineering methodology There are few or no documents The ones that exist are out-of-date Anonymized configuration files for 31 active networks (>8,000 configuration files) 6 Tier-1 and Tier-2 Internet backbone networks 25 enterprise networks Sizes between 10 and 1,200 routers 4 enterprise networks significantly larger than the backbone networks 14 Configuration State for One Network Limitation of Today s Control & Complex System of Systems Lines in config file Router ID (sorted by file size) Systems are designed as components to be used in larger systems in different contexts, for different purposes, interacting with different components Example: OSPF and BGP are complex systems in its own right, they are components in a routing system of a network, interacting with each other and packet filters Complex configuration to enable flexibility Lack of intellectual framework to understand global behavior 16 Complexity IP Control Plane function overloading Reachability Policy control Resiliency and survivability Traffic Engineering, load balancing VPN Ethernet control plane overloading Spanning Tree, RSP, MSTP, vlan, Control & management complexity works against robustness, dependability, security Limitation of Today s Control & Difficult to Implement Interesting Policies Data Center Infrastructure Servers Network designers want simple things, but achieving them is incredibly hard 18

4 Limitation of Today s Control & Difficult to Implement Interesting Policies Limitation of Today s Control & Difficult to Implement Interesting Policies Difficult for designers to express desired behaviors Difficult for designers to express desired behaviors Limitation of Today s Control & Difficult to Implement Interesting Policies Difficult for designers to express desired behaviors Limitation of Today s Control & Hard to Coordinate Multiple Low Level Mechanisms To Achieve Network-wide Goals Lack of higher level specification of network wide goals Load balancing objectives vs. per link OSFP weight Reachability matrix vs. per interface access control list Difficult to dynamically coordinate multiple mechanisms Forwarding, access control, NAT, tunnel management Limitation of Today s Control & Lack of Robust Communication Channel Circular dependencies between management plane, control plane, data plane & control traffic travels along the paths that they intend to maintain Operational networks usually require a separate control/management network Summary Limitations of Today s Control & Planes High complexity Difficult to implement non-trivial control policies Difficult to dynamically coordinate control logics Lack of robust control communication channel Root cause: Wrong partition of functionalities in control/management plane, which leads to lack of flexibility and high complexity 23 24

5 4D: A Clean-slate Design Propose a clean-slate repartitioning of functionality, rather than exploring incremental extensions Completely separate decision logic (network issues) from underlying protocols (distributed systems issues) Three Principles for Network Control & Network-level Objectives: Express goals explicitly Security policies, QoS, egress point selection Do not bury goals in box-specific configuration Reachability matrix Traffic engineering rules Logic Three Principles for Network Control & Network-wide Views: Design network to provide timely, accurate info Topology, traffic, resource limitations Give logic the inputs it needs Three Principles for Network Control & Direct Control: Allow logic to directly set forwarding state FIB entries, packet filters, queuing parameters Logic computes desired network state, let it implement it Reachability matrix Traffic engineering rules Reachability matrix Traffic engineering rules Write state Logic Logic Read state info Good Abstractions Reduce Complexity Plane Control Plane Data Plane Configs FIBs, ACLs FIBs, ACLs Decision Plane Dissemination Data Plane A Clean-Slate Approach: The 4D Architecture Decision Plane Dissemination Plane Generate table entries Routing Table Access Control Table NAT Table Tunnel Table Install table entries All decision making logic lifted out of control plane Routers no longer makes decisions on routing Dissemination plane provides robust communication to/from data plane switches Discovery Plane Data Plane Modeled as a set of tables 29

6 Overview of the 4D Architecture Decision Network-level objectives Overview of the 4D Architecture Decision Network-level objectives Network-wide views Dissemination Direct control Network-wide views Dissemination Direct control Discovery Discovery Data Data Decision Plane: All control and management logic implemented on centralized servers making all decisions Decision Elements use views to compute data plane state that meets objectives, then directly writes this state to routers Dissemination Plane: Provides a robust communication channel to each router and robustness is the only goal! May run over same links as user data, but logically separate and independently controlled Overview of the 4D Architecture Decision Network-level objectives Overview of the 4D Architecture Decision Network-level objectives Network-wide views Dissemination Direct control Network-wide views Dissemination Direct control Discovery Discovery Data Data Discovery Plane: Each router discovers its own resources and its local environment E.g. Topology and traffic monitoring Data Plane: Packet handling in spatially distributed routers/switches Can deploy with today s technology D Separates Distributed Computing Issues from Networking Issues Distributed computing issues: protocols and network architecture Overhead Resiliency Scalability Networking issues: decision logic Traffic engineering and service provisioning Egress point selection Tunnel management Reachability control (VPNs) Precomputation of backup paths Example: 4D Approach to Reachability Control Path Computation Traffic Matrix Topology Load info Reachability matrix FIBs, ACLs Decision Plane Discovery/Dissemination Plane Data Plane Reachability matrix directly expresses intended goal Path computation can jointly balance load and obey reachability constraints Packet filters installed only where needed, and changed when routing changes 35 36

7 Example: 4D Enables Simpler and Better Traffic Engineering Using the 4D Architecture D D Evaluated using Emulab ( Example network with 49 switches and 5 DEs OSPF normally calculates a single path to each destination D OSPF allows load-balancing only for equal-cost paths to avoid loops Using ECMP (Equal-cost multipath routing ) requires careful engineering of link weights Decision Plane with networkwide view can do more sophisticated optimization Linux PCs used as routers ( MHz) Tested on 9 enterprise network topologies ( routers each) A prototype of the 4D Architecture 4D Architecture permits many designs Prototype is a single, simple design point Decision plane Contains logic to simultaneously compute routes and enforce reachability matrix Multiple Decision Elements per network, using simple election protocol to pick master Dissemination plane Uses source routes to direct control messages Extremely simple, but can route around failed data links Does it work? Yes. 4D designed so performance can be predicted Recovers from single link failure in < 120 ms < 1 s response considered excellent Faster forwarding reconvergence possible Survives failure of master Decision Element New DE takes control within 170 ms No disruption unless second fault occurs Gracefully handles complete network partitions Less than 170 ms of outage At no point did two DEs attempt to master the same switch One Size Fits All? State-of-Art Different set of protocols for different data planes STP for Ethernet OSPF/BGP for IP Same protocols (logic) for different environments Data center, campus, ISP Hard to customize, hard to extend 4D Common dissemination (protocol) IPv4, IPv6, Ethernet Customizable decision plane (algorithm) Data center, enterprise, access, metro, backbone Reachability, traffic engineering, robustness, etc. Control Plane: The Key Leverage Point Great Potential: control plane determines the behavior of the network Reaction to events, reachability, services Great Opportunities A radical clean-slate control plane can be deployed Agnostic to packet format: IPv4/v6, ethernet No changes to end-system software Control plane is the nexus of network evolution Changing the control plane logic can smooth transitions in network technologies and architectures 41 42

8 Goal Ethane: Taking Control of the Enterprise Martìn Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, Scott Shenker SIGCOMM Comput. Commun. Rev Design network where connectivity is governed by high-level, global policy Nick can talk to Martin using IM marketing can use http via web proxy Administrator can access everything Traffic from secret access point cannot share infrastructure with traffic from open access point Three Fundamental Principles How could we change the enterprise network architecture to make it more manageable? The network should be governed by policies declared over high-level names. Policy should determine the path that packets follow. The network should enforce a strong binding between a packet and its origin. Today s Namespace Lots of names in network namespace today Hosts Users Services Protocols Names are generally bound to network realities (e.g. DNS names are bound to IP addresses) Often are multiple bindings that map a name to the entity it represents (DNS -> IP -> MAC -> Physical Machine) Problem With Bindings Today Need Secure Bindings Host Name Goal: map hostname to physical host Bindings are authenticated IP MAC Physical Interface Host MAC But!!! What if attacker can interpose between any of the bindings? (e.g. change IP/MAC binding) What if bindings change dynamically? (e.g. DHCP lease is up) Or physical network changes? Cached bindings are appropriately invalidated Address reallocation Topology change Permissions changes/revocation Physical Interface Host 47 48

9 Policy Language Declare connectivity constraints over Users/groups Hosts/Nodes Access points Protocols Services Connectivity constraints are Permit/deny Require middlebox interposition Isolation Etc. Ethane Flow-based network Central Domain Controller (DC) Implements secure bindings Authenticates users, hosts, services, Contains global security policy Checks every new flow against security policy Decides the route for each flow Access is granted to a flow Can enforce permit/deny Can enforce middle-box interposition constraints Can enforce isolation constraints Design Overview Central domain controller Contains the global network policy and topology view. Performs route computation for permitted flows, and decides whether each flow is allowed and how it is routed. Ethane switches Consists of simple flow tables and a secure channel to Controller Simply forwards packets under the direction of the controller Names and policy language All users, hosts, switches, protocols etc. have names, that are used when writing rules for the controller. Five Basic Activities in an Ethane Network Registration: All switches, hosts, and users register with the controller. Bootstrapping: Switches maintain secure channels with controller. Minimum spanning tree (MST) rooted at controller. Authentication: A host joining the network is redirected by switch to the controller for authentication (by MAC) when it does DHCP. Controller records bindings host->ip, IP->MAC, MAC- >switch port. User is authenticated (e.g. password) via browser. Controller records binding user->host Five Basic Activities in an Ethane Network Bootstrapping Flow setup: A initiates connection to B. Switch1 has no matching entry in flow table -> forwards to controller. If controller accepts, computes path and updates all switches along path. Forwarding: Controller sends packet back to switch1, which forwards it and adds new entry in table to allow subsequent packets from this flow without asking the controller. When the network starts, the Switches must connect to and authenticate with the Controller On startup, the network creates a minimum spanning tree with the Controller advertising itself as the root. Each Switch has been configured with the Controller s credentials If a Switch finds a shorter path to the Controller, it attempts two way authentication with it before advertising that path as a valid route

10 Establishing Topology Example Deployment Switches generate neighbor lists during MST algorithm Send encrypted neighbor-list to DC DC aggregates to full topology Note: no switch knows full topology Ethane Switch A wired Ethane Switch is like a simplified Ethernet switch. Does not need to learn addresses, support VLANs, check for source-address spoofing, or keep flow-level statistics, maintain forwarding tables, run routing protocols such as OSPF, ISIS, and RIP. The flow table can be several orders-of-magnitude smaller than the forwarding table in an equivalent Ethernet switch Flow Table and Flow Entries Contain a Header (to match packets against), an Action (to tell the switch what to do with the packet), and Per-Flow Data. Local Switch Manager Monitor link status Establish and maintain the secure channel to the Controller Two ways a Switch can talk to the Controller. Within the same broadcast domain Using our modified Minimum Spanning Tree Secure channel stretching through these intermediate Switches all the way to the Controller. Not within the same broadcast domain IP tunnel DC Fault Tolerance and Scalability Cold standby: secondary controllers participate in same global MST. After primary controller goes down, will take over when MST converges. Simple, but slow recovery: hosts/users have to re-authenticate. Warm standby: a separate MST for each secondary controller. Controllers monitor one another s liveness. Bindings are replicated across controllers. Complex, but faster recovery. Multiple active controllers: Switches need to authenticate with only one controller. Spread flow decision queries across multiple controllers. Complex consistency issues etc. Multicast and broadcast traffic In theory: Switch: keeps for each flow a bitmap of ports to forward. Controller: from computed broad/multicast tree, assigns appropriate bits during path setup. Broadcast are mostly discovery protocols, e.g. ARP, which the controller can reply without creating a new flow or broadcasting. In practice: ARP causes a significant load on the controller. Might setup a dedicated ARP server, and controller directs ARP traffic there. But what about other disc protocols? Tradeoff: controller implements common protocols, and broadcasts unknown ones with rate-limit. Doesn t scale well, but expecting discovery protocols to go away if Ethane is used widely

11 Network Policy Network policy is a set of rules: [<condition(s)>]:action; Conditions: conjunction of predicates. Actions: allow, deny, waypoints, and outbound-only. Rules are independent. Rule lookups have to be fast. Can t simply compile because of huge namespace of users, hosts, etc. So use compilation plus just-intime creation of search functions. Deployment 11 wired and 8 wireless Switches Wireless access points using WRTSL54GS. 4-port gigabit switches using FPGA. 4-port gigabit switches using desktop PCs. ~300 hosts, several hundred users Create a network policy that matches existing firewall configurations, NATs, router ACLs etc. The whole network is managed by single PC-based controller. Hosts connected to an Ethane switch port does not require user authentication Primary performance questions Evaluation: controller scalability How many Controllers are needed for a network of a given size? How big does the flow table need to be in the Switch? A 22,000-host network observed max 9,000 flow requests per second, suggesting that a single controller can handle 20,000 hosts with flow request setup time under 1.5ms Effect of controller failures Cold-standby failure recovery Effect of link failures Failures were simulated by physically unplugging a link The path reconverges in under 40ms, but a packet could be delayed up to a second while the Controller handles the flurry of requests

12 Ethane Higher-level policies Defined on principals, not network identifiers Language for specifying policies Policy should dictate the paths Controller should select paths based on policy Fine-grain control Controller handles first packet of a flow Data plane maintains per-flow state Practical Challenges Scalability Decision elements responsible for many routers Response time Delays between decision elements and routers Reliability Surviving failures of decision elements and routers Consistency Ensuring multiple decision elements behave consistently Security Network vulnerable to attacks on decision elements Interoperability Legacy routers and neighboring domains The Genesis of NOX NOX - A Network Operating System for OpenFlow Simple, Open Data-Plane API Prioritized list of rules Pattern: match packet header bits Actions: drop, forward, modify, send to controller Priority: disambiguate overlapping patterns Counters: #bytes and #packets 1. src=1.2.*.*, dest=3.4.5.* drop 2. src = *.*.*.*, dest=3.4.*.* forward(2) 3. src= , dest=*.*.*.* send to controller The History of Network Virtualization Reference A clean slate 4D approach to network control and management. Albert Greenberg, Gisli Hjalmtysson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey Xie, Hong Yan, Jibin Zhan, and Hui Zhang SIGCOMM Comput. Commun. Rev. 35, 5 (October 2005), Ethane: taking control of the enterprise. Martin Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, and Scott Shenker In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '07). ACM, New York, NY, USA, (Optional)The Past, Present, and Future of Software Defined Networking. Nick Feamster, Jennifer Rexford, and Ellen Zegura

Ethane: taking control of the enterprise

Ethane: taking control of the enterprise Ethane: taking control of the enterprise Martin Casado et al Giang Nguyen Motivation Enterprise networks are large, and complex, and management is distributed. Requires substantial manual configuration.

More information

Easier Management Strategy for Small and Large Enterprise Networks with Enhanced Security

Easier Management Strategy for Small and Large Enterprise Networks with Enhanced Security Vol. 3, Issue. 3, May - June 2013 pp-1577-1581 ISSN: 2249-6645 Easier Management Strategy for Small and Large Enterprise Networks with Enhanced Security Sreelakshmi Ganesh 1, Binu A 2 Post Graduate Student,

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable

More information

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013 CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

Information About Routing

Information About Routing 19 CHAPTER This chapter describes underlying concepts of how routing behaves within the adaptive security appliance, and the routing protocols that are supported. The chapter includes the following sections:,

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer ICMP (5.6), Network Management(5.7) & SDN (5.1, 5.5, 4.4) Prof. Lina Battestilli Fall 2017 Outline 5.6 ICMP: The Internet Control Message

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Routing Overview. Information About Routing CHAPTER

Routing Overview. Information About Routing CHAPTER 21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About

More information

Routing Overview. Path Determination

Routing Overview. Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco ASA, and the routing protocols that are supported. Routing is the act of moving information across a network from a source

More information

Software Defined Networking

Software Defined Networking Software Defined Networking 1 2 Software Defined Networking Middlebox Switch Controller Switch Switch Server Server Server Server Standardization: switches support a vendor-agnostic, open API Off-device

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

CS 4226: Internet Architecture

CS 4226: Internet Architecture Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Scalable Enterprise Networks with Inexpensive Switches

Scalable Enterprise Networks with Inexpensive Switches Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises

More information

WiNG 5.x How-To Guide

WiNG 5.x How-To Guide WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Some Musings on OpenFlow and SDN for Enterprise Networks. David Meyer Open Networking Summit October 18-19, 2011

Some Musings on OpenFlow and SDN for Enterprise Networks. David Meyer Open Networking Summit October 18-19, 2011 Some Musings on OpenFlow and SDN for Enterprise Networks David Meyer Open Networking Summit October 18-19, 2011 Agenda Problem Space A Few Use Cases Reflections on the Promise of OF/SDN A Few Challenges

More information

Transparent or Routed Firewall Mode

Transparent or Routed Firewall Mode This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple

More information

Configuring IPv6 First-Hop Security

Configuring IPv6 First-Hop Security This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,

More information

Sofware Defined Networking Architecture and Openflow Network Topologies

Sofware Defined Networking Architecture and Openflow Network Topologies Sofware Defined Networking Architecture and Openflow Network Topologies Fahad Kameez, M.Tech.(VLSI and ES) Department of Electronics and Communication Rashtreeya Vidyalaya College of Engineering Bengaluru,

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Building Efficient and Reliable Software-Defined Networks. Naga Katta

Building Efficient and Reliable Software-Defined Networks. Naga Katta FPO Talk Building Efficient and Reliable Software-Defined Networks Naga Katta Jennifer Rexford (Advisor) Readers: Mike Freedman, David Walker Examiners: Nick Feamster, Aarti Gupta 1 Traditional Networking

More information

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Full paper available at http://www.cs.princeton.edu/~chkim Changhoon Kim, Matthew Caesar, and Jennifer Rexford Outline of Today

More information

A Protection Architecture for Enterprise Networks

A Protection Architecture for Enterprise Networks A Protection Architecture for Enterprise Networks Martin Casado Tal Garfinkel Aditya Akella Michael Freedman (NYU) Dan Boneh Nick McKeown Scott Shenker (Stanford) (Stanford) (CMU/Stanford) (Stanford) (Stanford)

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

OPENFLOW & SOFTWARE DEFINED NETWORKING. Greg Ferro EtherealMind.com and PacketPushers.net

OPENFLOW & SOFTWARE DEFINED NETWORKING. Greg Ferro EtherealMind.com and PacketPushers.net OPENFLOW & SOFTWARE DEFINED NETWORKING Greg Ferro EtherealMind.com and PacketPushers.net 1 HUH? OPENFLOW. What is OpenFlow? From the bottom up. With big words. How OpenFlow does stuff. Then WHY we want

More information

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

Transparent or Routed Firewall Mode

Transparent or Routed Firewall Mode This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple

More information

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks.

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks. MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES Software Defined Networks and Courtesy of: AT&T Tech Talks http://web.uettaxila.edu.pk/cms/2017/spr2017/temcitms/ MODULE OVERVIEW Motivation behind Software

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

Exam Questions

Exam Questions Exam Questions 642-997 DCUFI Implementing Cisco Data Center Unified Fabric (DCUFI) v5.0 https://www.2passeasy.com/dumps/642-997/ 1.Which SCSI terminology is used to describe source and destination nodes?

More information

Cisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ]

Cisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] s@lm@n Cisco Exam 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] Topic break down Topic No. of Questions Topic 1: Mix Questions 26 Topic 2: Troubleshooting

More information

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

itexamdump 최고이자최신인 IT 인증시험덤프   일년무료업데이트서비스제공 itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : EW0-300 Title : Extreme Networks Specialist... Vendors : Extreme Networks Version : DEMO Get Latest & Valid EW0-300 Exam's Question

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Performing Path Traces

Performing Path Traces About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network

More information

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation March 24, 2016 NEC Corporation Contents Preface 3 OpenFlow and ProgrammableFlow 5 Seven Functions and Techniques in ProgrammableFlow 6 Conclusion 19 2 NEC Corporation 2016 Preface SDN (Software-Defined

More information

Advanced Topics in Routing

Advanced Topics in Routing Advanced Topics in Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Wireless Client Isolation. Overview. Bridge Mode Client Isolation. Configuration

Wireless Client Isolation. Overview. Bridge Mode Client Isolation. Configuration Wireless Client Isolation Overview Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another. This feature is useful for guest and BYOD SSIDs adding

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Traditional network management methods have typically

Traditional network management methods have typically Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Massimiliano Sbaraglia

Massimiliano Sbaraglia Massimiliano Sbaraglia Printer Layer 2 access connections to End-Point Layer 2 connections trunk or layer 3 p2p to pair distribution switch PC CSA PVST+ or MST (Spanning Tree Protocol) VLANs LapTop VoIP

More information

User Handbook. Switch Series. Default Login Details. Version 1.0 Edition

User Handbook. Switch Series. Default Login Details. Version 1.0 Edition User Handbook Switch Series Zyxel GS1920 / GS2210 / XGS2210 / GS3700 / XGS3700 / XGS4600 / XS1920 / XS3700 Default Login Details LAN IP Address https://192.168.1.1 User Name admin Password 1234 Version

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Traditional Ethernet Challenges Plug-and-play Allow all ROOT D D D D Nondeterministic Reactive failover Difficult

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster & Mike Freedman Lecture 3 Overview Cerf & Kahn discussion The evolution of packet forwarding

More information

Network Layer: The Control Plane

Network Layer: The Control Plane Network Layer: The Control Plane 7 th Edition, Global Edition Jim Kurose, Keith Ross Pearson April 06 5- Software defined networking (SDN) Internet network layer: historically has been implemented via

More information

The Case for Separating Routing from Routers

The Case for Separating Routing from Routers The Case for Separating Routing from Routers Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford, Aman Shaikh, Kobus van der Merwe AT&T Labs

More information

Access Rules. Controlling Network Access

Access Rules. Controlling Network Access This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Bringing SDN to the Internet, one exchange point at the time

Bringing SDN to the Internet, one exchange point at the time Bringing SDN to the Internet, one exchange point at the time Joint work with: Arpit Gupta, Muhammad Shahbaz, Sean P. Donovan, Russ Clark, Brandon Schlinker, E. Katz-Bassett, Nick Feamster, Jennifer Rexford

More information

SOFTWARE DEFINED NETWORKS. Jonathan Chu Muhammad Salman Malik

SOFTWARE DEFINED NETWORKS. Jonathan Chu Muhammad Salman Malik SOFTWARE DEFINED NETWORKS Jonathan Chu Muhammad Salman Malik Credits Material Derived from: Rob Sherwood, Saurav Das, Yiannis Yiakoumis AT&T Tech Talks October 2010 (available at:www.openflow.org/wk/images/1/17/openflow_in_spnetworks.ppt)

More information

WCCPv2 and WCCP Enhancements

WCCPv2 and WCCP Enhancements WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Advanced Computer Networks. Network Virtualization

Advanced Computer Networks. Network Virtualization Advanced Computer Networks 263 3501 00 Network Virtualization Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Portland VL2 Today Network

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER CHAPTER 1 This chapter introduces the basic concepts for Layer 3 unicast routing protocols in Cisco NX-OS. This chapter includes the following sections: Information About Layer 3 Unicast Routing, page

More information

User Guide TL-R470T+/TL-R480T REV9.0.2

User Guide TL-R470T+/TL-R480T REV9.0.2 User Guide TL-R470T+/TL-R480T+ 1910012468 REV9.0.2 September 2018 CONTENTS About This Guide Intended Readers... 1 Conventions... 1 More Information... 1 Accessing the Router Overview... 3 Web Interface

More information

Debugging the Data Plane with Anteater

Debugging the Data Plane with Anteater Debugging the Data Plane with Anteater Haohui Mai, Ahmed Khurshid Rachit Agarwal, Matthew Caesar P. Brighten Godfrey, Samuel T. King University of Illinois at Urbana-Champaign Network debugging is challenging

More information

Slicing a Network. Software-Defined Network (SDN) FlowVisor. Advanced! Computer Networks. Centralized Network Control (NC)

Slicing a Network. Software-Defined Network (SDN) FlowVisor. Advanced! Computer Networks. Centralized Network Control (NC) Slicing a Network Advanced! Computer Networks Sherwood, R., et al., Can the Production Network Be the Testbed? Proc. of the 9 th USENIX Symposium on OSDI, 2010 Reference: [C+07] Cascado et al., Ethane:

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs

NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs Abstract Networks are becoming virtualized. While there has been significant focus on virtualization in core and data center networks, network

More information

So#ware Defined Networking

So#ware Defined Networking The Internet: A Remarkable Story 2! Tremendous success From research experiment to global infrastructure So#ware Defined Networking Brilliance of under- specifying Network: best- effort packet delivery

More information

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013 CS 5114 Network Programming Languages Data Plane http://www.flickr.com/photos/rofi/2097239111/ Nate Foster Cornell University Spring 2013 Based on lecture notes by Jennifer Rexford and Michael Freedman

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Software Defined Networks

Software Defined Networks Software Defined Networks A quick overview Based primarily on the presentations of Prof. Scott Shenker of UC Berkeley The Future of Networking, and the Past of Protocols Please watch the YouTube video

More information

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets? Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Could IXPs Use OpenFlow To Scale? Ivan Pepelnjak Chief Technology Advisor NIL Data Communications

Could IXPs Use OpenFlow To Scale? Ivan Pepelnjak Chief Technology Advisor NIL Data Communications Could IXPs Use OpenFlow To Scale? Ivan Pepelnjak (ip@ipspace.net) Chief Technology Advisor NIL Data Communications Disclaimer The presentation describes potential future solution that could be implemented

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003

Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003 Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003 Agenda ACI Introduction and Multi-Fabric Use Cases ACI Multi-Fabric Design Options ACI Stretched Fabric Overview

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection Finding Feature Information, page 1 Restrictions for Dynamic ARP Inspection, page 1 Understanding Dynamic ARP Inspection, page 3 Default Dynamic ARP Inspection Configuration, page 6 Relative Priority of

More information

Demand-Based Control Planes for Switching Fabrics

Demand-Based Control Planes for Switching Fabrics Demand-Based Control Planes for Switching Fabrics Modern switching fabrics use virtual network overlays to support mobility, segmentation, and programmability at very large scale. Overlays are a key enabler

More information

Configuring Wireless Multicast

Configuring Wireless Multicast Finding Feature Information, on page 1 Prerequisites for, on page 1 Restrictions for, on page 1 Information About Wireless Multicast, on page 2 How to Configure Wireless Multicast, on page 6 Monitoring

More information

1270 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 4, AUGUST 2009

1270 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 4, AUGUST 2009 1270 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 4, AUGUST 2009 Rethinking Enterprise Network Control Martín Casado, Student Member, IEEE, Michael J. Freedman, Member, IEEE, Justin Pettit, Jianying

More information