Policy-Compliant Path Diversity and Bisection Bandwidth
|
|
- Timothy Rogers
- 5 years ago
- Views:
Transcription
1 Policy-Compliant Path Diversity and Bisection Bandwidth Rowan Klöti1, Vasileios Kotronis1, Bernhard Ager1, Xenofontas Dimitropoulos2,1 1 ETH Zurich, Switzerland 2 University of Crete / FORTH, Greece 1
2 Assume that you are a network domain admin èhow resilient is my AS-level connection to a remote AS? The other guy èwhat limits the path diversity between me and the remote AS? My multi-homing degree? The Internet topology at large? Poor connectivity on the local/remote upstream ISPs side? Me *Picture from: / 2
3 Consider an example network topology 3
4 We can perform a min-cut between S and D 4
5 We can calculate the maximum S-D flow 5
6 We can calculate the edge-disjoint S-D paths 6
7 Basic mechanism: min-cuts Generalized problem: max-flow / min-cut Basic theorem was proven back in 1956 J Menger s theorem Ł path diversity = min-cut, for unitary edge capacities Well-known algorithms available Ł Well, then everything is already solved, right? 7
8 Networks are governed by policies Motivation Security considerations Routing optimization techniques Financial agreements, SLAs, p2p Peak Example 1: the valley-free AS-level Internet Peers, providers, customers: p2p, p2c, c2p links Example 2: (negative) waypoint routing Force traffic into waypoints Avoid certain nodes/links along the way 8
9 Challenge: policies restrict path selection Ł Assume trivial regex policy: ( )* ( )+ ( )* 9
10 Challenge: policies restrict path selection Ł Only two edge-disjoint paths are now valid (min-cut=2) 10
11 Our contribution: estimating policy-compliant min-cuts General methodology Assumption: network policies as regular expressions Graph transformation algorithm Transformed graph contains only policy-compliant paths Min-cut values should not be distorted by the transform Min-cut calculations Complex on original graph (no straightforward method) Simple on transformed graph No modification required on classic graph algorithms 11
12 How we represent graphs and policies Network graph: Network policy: Valley-free example: Ł Graph = AS-level Internet Ł Policy = c2p*p2p?p2c* 12
13 Core of transformation: tensor product ŁIntuition: move between G nodes and NFA states concurrently ŁShould yield valid, policy-compliant paths 13
14 Does this process preserve the min-cut? Ł Intuition: the min-cut paths between any 2 node sets in G should traverse at most the same number of edges as in G 14
15 Idea: properly add aggregation states 15
16 Are all cases fully aggregatable? Aggregatable NFA cases Non-aggregatable NFA cases One-to-One One-to-Many Not a complete bipartite graph! Many-to-One Many-to-Many Min-cut is inflated by a factor of 2 Maximal biclique finding problem 16
17 Remember our initial motivation èhow resilient is my AS-level connection to a remote AS? The other guy èwhat limits the path diversity between me and the remote AS? My multi-homing degree? The Internet topology at large? Poor connectivity on the local/remote upstream ISPs side? + POLICIES! Me *Picture from: / 17
18 Example I: Policies and AS-level path diversity p2p Peak p2p p2p Plateau Classic Valley-Free (VF) vs Multi-Peering Links (MPL) Graph based on CAIDA s AS relationship dataset (+/- open p2p links from PeeringDB) 18
19 Example II: Effect of depeering events Simulated depeering between two tier-ones Examined the effect on their exclusive customer cones Valley-free Multi-p2p links significant loss of path diversity negligible loss Policy relaxation seems to be beneficial Inter-domain policy scenario Loss in mean path diversity after depeering(%) Valley-free Open Links 7.02 Multiple Peering Links Open Links
20 Summary and Contributions Estimating policy-compliant min-cuts on network graphs Network policies as regular expressions Graph transformation algorithm Exact values or approximations depending on NFA form Min-cut calculations Complex on original graph Simple on transformed graph No modification required on classic graph algorithms Large variety of use cases out there AS-level path diversity under diverse policy models MPTCP, multipath routing, flow routing applications 20
21 Questions? POLICY- COMPLIANT MIN-CUTS AS-level Internet 21
22 BACKUP 22
23 Assume that you are a datacenter operator How resilient is my switched topology to link failures? What is the bisection bandwidth of my datacenter? Picture from: 23
24 Min-cuts are the answer to many more questions What is the max feasible bandwidth for a MPTCP transfer between two of my server clusters? What is the bisection bandwidth of my datacenter? How resilient is my switched topology to link failures? How much edge capacity should be depleted for a successful DDoS link-flooding attack against my network? What limits the AS-level path diversity between my domain and another remote domain? My multi-homing degree? The Internet topology at large? Poor connectivity on the local/remote upstream providers side? 24
25 Complexity of the graph transform process In space: Ł V = O ( V ( Q + Δ ) Ł E = O ( Δ ( V + E ) In time: Ł t = O ( V Q + Δ ( V + E + Q )) + t dec In practice, the total running time is dominated by the mincut calculation on the transformed graph 25
26 Related Work Tensor products Soule et al. use tensor products in a different context (bandwidth allocation policies) Network resilience Research on resilient networks Network are not simply geographical maps Policy-compliance framework is very important Min-cuts with policies Connectivity discovered by RV protocols by Sobrinho et al., valley-free s-t paths/cuts Ł Our main contribution: graph transformation without changing classic algorithms (can also be extended for finding the shortest valid paths), generic method 26
27 Inter-domain Routing Policy NFAs 27
28 NFA vs DFA (With Steps MPL scenario) 28
Shortcuts through Colocation Facilities
Shortcuts through Colocation Facilities Vasileios Kotronis1, George Nomikos1, Lefteris Manassakis1, Dimitris Mavrommatis1 and Xenofontas Dimitropoulos1,2 1 Foundation for Research and Technology - Hellas
More informationRouting Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. ECE Department and CyLab, Carnegie Mellon University
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures Min Suk Kang Virgil D. Gligor ECE Department and CyLab, Carnegie Mellon University Nov 4, 2014 2 Route Diversity is Critical to
More informationDistributed Route Aggregation (DRAGON)
Distributed Route Aggregation on the GlObal Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 4 ACM CoNEXT 2014, Sydney 1 Instituto de Telecomunicações, 1 IST Universidade
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationOn low-latency-capable topologies, and their impact on the design of intra-domain routing
On low-latency-capable topologies, and their impact on the design of intra-domain routing Nikola Gvozdiev, Stefano Vissicchio, Brad Karp, Mark Handley University College London (UCL) We want low latency!
More informationMultipath Transport, Resource Pooling, and implications for Routing
Multipath Transport, Resource Pooling, and implications for Routing Mark Handley, UCL and XORP, Inc Also: Damon Wischik, UCL Marcelo Bagnulo Braun, UC3M The members of Trilogy project: www.trilogy-project.org
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationS Network service provisioning
S-38.3192 Network service provisioning Initial details for S-38.3192, Jan. 18th, 2007 Mika Ilvesmäki Networking laboratory Course contents Course consists of Lectures (14), given two at a time in S3 on
More informationData Services. Reliable, high-speed data connectivity
Data Services Reliable, high-speed data connectivity Discover businessgrade, high-speed data connectivity Our family of data services includes (with Fibre To The Cabinet and Converged Voice and Data),
More informationFOUNDATIONS OF INTENT- BASED NETWORKING
FOUNDATIONS OF INTENT- BASED NETWORKING Loris D Antoni Aditya Akella Aaron Gember Jacobson Network Policies Enterprise Network Cloud Network Enterprise Network 2 3 Tenant Network Policies Enterprise Network
More informationVerified Secure Routing
Verified Secure Routing David Basin ETH Zurich EPFL, Summer Research Institute June 2017 Team Members Verification Team Information Security David Basin Tobias Klenze Ralf Sasse Christoph Sprenger Thilo
More informationData Services. Reliable, high-speed data connectivity
Data Services Reliable, high-speed data connectivity Discover businessgrade, high-speed data connectivity Our family of data services includes Broadband (with Fibre To The Cabinet and Converged Voice and
More informationCABaRet: Leveraging Recommendation Systems for Mobile Edge Caching
CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching Savvas Kastanakis Pavlos Sermpezis Vasileios Kotronis Xenofontas Dimitropoulos FORTH & University of Crete Greece Mobile edge caching
More informationAssignment 5. 2 Assignment: Emulate a Data Center and Manage it via a Cloud Network Controller
University of Crete Computer Science Department Lecturer: Prof. Dr. X. Dimitropoulos TAs: Dimitrios Gkounis, George Nomikos Manos Lakiotakis, George Vardakis HY436 - Software Defined Networks Tasks of
More informationMinimum Cost Edge Disjoint Paths
Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during
More informationDissemination of Paths in Path-Aware Networks
Dissemination of Paths in Path-Aware Networks Christos Pappas Network Security Group, ETH Zurich IETF, November 16, 2017 PANRG Motivation How does path-awareness extend to the edge? 2 PANRG Motivation
More informationPoP Level Mapping And Peering Deals
PoP Level Mapping And Peering Deals Mapping Internet Methodology Data Collection IP Classification to PoP PoP Geolocation PoP locations on Peering estimations Outline Internet Service Providers ISPs are
More informationLecture 13: Traffic Engineering
Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting
More informationLow-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks
Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks Panagiotis Pantazopoulos Ioannis Stavrakakis Department of Informatics and Telecommunications, Advanced Networking
More informationOFA Developer Workshop 2013
OFA Developer Workshop 2013 Shared Memory Communications over RDMA (-R) Jerry Stevens IBM sjerry@us.ibm.com Trademarks, copyrights and disclaimers IBM, the IBM logo, and ibm.com are trademarks or registered
More informationInterdomain Routing and Connectivity
Interdomain Routing and Connectivity Brighten Godfrey CS 538 February 28 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Routing Choosing paths along which messages will travel from source
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationAnatomy of a Large European IXP
Anatomy of a Large European IXP Nikos Chatzis Nadi Sarrar TU Berlin/T-Labs Anja Feldmann TU Berlin/T-Labs Bernhard Ager ETH Zürich Steve Uhlig Queen Mary University of London Walter Willinger AT&T Labs
More informationThe UCSD Network Telescope
The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed
More informationGraphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are
More informationSmall-World Datacenters
2 nd ACM Symposium on Cloud Computing Oct 27, 2011 Small-World Datacenters Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo Motivation Conventional networks
More informationESE535: Electronic Design Automation. Today. LUT Mapping. Simplifying Structure. Preclass: Cover in 4-LUT? Preclass: Cover in 4-LUT?
ESE55: Electronic Design Automation Day 7: February, 0 Clustering (LUT Mapping, Delay) Today How do we map to LUTs What happens when IO dominates Delay dominates Lessons for non-luts for delay-oriented
More informationCS137: Electronic Design Automation
CS137: Electronic Design Automation Day 4: January 16, 2002 Clustering (LUT Mapping, Delay) Today How do we map to LUTs? What happens when delay dominates? Lessons for non-luts for delay-oriented partitioning
More informationInnovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience
Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience Rich Bolstridge Chief Strategist, Financial Services Akamai Technologies Agenda Who uses Akamai in Financial
More informationSURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017
SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org WIE 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationA Framework for Fine-Grained Inter-Domain Routing Diversity Via SDN
A Framework for Fine-Grained Inter-Domain Routing Diversity Via SDN Yangyang Wang, Jun Bi, Keyao Zhang Institute for Network Sciences and Cyberspace, Tsinghua University Department of Computer Science,
More informationPricing in the Presence of Peering
Pricing in the Presence of Peering Euiwoong Lee David Buchfuhrer Lachlan Andrew Ao Tang Steven Low Engineering & Applied Science Caltech Outline Inter-domain routing on Internet Pricing to maximize revenue
More informationCuts and Disjoint Paths in the Valley-Free Path Model
Cuts and Disjoint Paths in the Valley-Free Path Model Thomas Erlebach Alexander Hall Alessandro Panconesi Danica Vukadinović October 30, 2005 Abstract In the valley-free path model, a path in a given directed
More informationICONA Inter Cluster ONOS Network Application. CREATE-NET, CNIT/University of Rome Tor Vergata, Consortium GARR
ICONA Inter Cluster ONOS Network Application CREATE-NET, CNIT/University of Rome Tor Vergata, Consortium GARR The evolution of the Network Control Plane Standard networks: Control and Forwarding Planes
More informationEvaluating path diversity in the Internet: from an AS-level to a PoP-level granularity
Evaluating path diversity in the Internet: from an AS-level to a PoP-level granularity Evaluation de la diversité de chemins sur Internet: d une granularité au niveau des AS à une vision au niveau des
More informationDeploying MPLS & DiffServ
Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention
More informationInformation About Topology
CHAPTER 3 Revised: December 24, 2010, Introduction This chapter describes the possible deployment topologies of the SCE 2000. The Cisco SCE solution offers a number of basic topology options that permit
More informationValue Added Services (VAS) Traffic Forwarding
CHAPTER 12 Revised: June 27, 2011, Introduction This chapter provides an overview of VAS traffic forwarding, explaining what is it and how it works. It also explains the various procedures for configuring
More informationNetworked systems and their users
Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of
More informationSteven M. Bellovin AT&T Labs Research Florham Park, NJ 07932
Steven M. Bellovin! " $#"##%& '( ) * 973-360-8656 AT&T Labs Research Florham Park, NJ 07932 Steven M. Bellovin June 13, 2003 1 What is? Bad guys play games with routing protocols. Traffic is diverted.
More informationJellyfish. networking data centers randomly. Brighten Godfrey UIUC Cisco Systems, September 12, [Photo: Kevin Raskoff]
Jellyfish networking data centers randomly Brighten Godfrey UIUC Cisco Systems, September 12, 2013 [Photo: Kevin Raskoff] Ask me about... Low latency networked systems Data plane verification (Veriflow)
More informationToward an Atlas of the Physical Internet
Toward an Atlas of the Physical Internet Winter 2014 Paul Barford Computer Sciences University of Wisconsin!! Motivation pb@cs.wisc.edu 1 Objectives of our work Create and maintain a comprehensive catalog
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org CoNEXT 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationResilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer
Mathias Fischer Resilient Networks. Resilient Network Design - Intro Prepared along: Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan
More informationImage Segmentation. Shengnan Wang
Image Segmentation Shengnan Wang shengnan@cs.wisc.edu Contents I. Introduction to Segmentation II. Mean Shift Theory 1. What is Mean Shift? 2. Density Estimation Methods 3. Deriving the Mean Shift 4. Mean
More informationArvind Krishnamurthy Fall 2003
Overlay Networks Arvind Krishnamurthy Fall 003 Internet Routing Internet routing is inefficient: Does not always pick the lowest latency paths Does not always pick paths with low drop rates Experimental
More informationvsan Mixed Workloads First Published On: Last Updated On:
First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity
More informationPeer to Peer Infrastructure : QoS enabled traffic prioritization. Mary Barnes Bill McCormick
Peer to Peer Infrastructure : QoS enabled traffic prioritization Mary Barnes (mary.barnes@nortel.com) Bill McCormick (billmcc@nortel.com) p2pi - QoS 1/24/09 1 Overview!! Discuss the mechanisms and implications
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing
More informationCSE 461 Midterm Winter 2018
CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at
More informationDynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,
More informationUnderstanding the Evolving Internet
Understanding the Evolving Internet Ram Durairajan Assistant Professor, Computer and Information Science Co-director, Oregon Networking Research Group University of Oregon 0 Internet is a complex system
More informationBGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables
More informationHybrid Cloud for Business Communications
Hybrid Cloud for Business Communications THE ESSENTIAL GUIDE So you re considering hybrid cloud for your business communications. You re not alone! In fact, more and more businesses are turning to cloud
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationGeorge Nomikos
George Nomikos gnomikos@ics.forth.gr To appear in IMC, Boston, 2018 V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, V. Giotsas *Jane Coffin and Christian
More informationNetworks
Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,
More informationDetecting Peering Infrastructure Outages
Detecting Peering Infrastructure Outages ENOG14, Minsk Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger, Emile Aben # TU Berlin CAIDA DE-CIX MIT Akamai # RIPE NCC
More informationNetwork Security - ISA 656 Routing Security
What is? Network Security - ISA 656 Angelos Stavrou What is Routing Security? History of Routing Security Why So Little Work? How is it Different? Bad guys play games with routing protocols. Traffic is
More informationEvolving Enterprise Networks with SPB-M
Evolving Enterprise Networks with SPB-M Evolving Enterprise Networks with SPB-M 2017, October 11 Executive Summary Enterprise network managers are being forced to do more with less. Their networks are
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationSpectral Graph Multisection Through Orthogonality. Huanyang Zheng and Jie Wu CIS Department, Temple University
Spectral Graph Multisection Through Orthogonality Huanyang Zheng and Jie Wu CIS Department, Temple University Outline Motivation Preliminary Algorithm Evaluation Future work Motivation Traditional graph
More informationConference Traffic Shaping at UBC Internet Border. University of British Columbia. Network Management Centre
Conference 2017 Traffic Shaping at UBC Internet Border University of British Columbia Network Management Centre High Level of UBC Network Overview Internet UBC teaching & research network for Faculty of
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationRouting Bottlenecks in the Internet: Causes, Exploits, and Countermeasures
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures ABSTRACT Min Suk Kang ECE and CyLab Carnegie Mellon University Pittsburgh, PA USA minsukkang@cmu.edu How pervasive is the vulnerability
More informationTop 30 AWS VPC Interview Questions and Answers Pdf
Top 30 AWS VPC Interview Questions and Answers Pdf Top 30 AWS VPC Interview Questions and Answers Pdf AWS Certified Solutions Architect Begins the 30 Top Funding IT Certifications. Surely, AWS Architect
More informationLecture 7: Data Center Networks
Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Agenda We study how to route over the Internet 1. Context The Internet, a network of networks Relationships between ASes 2.
More informationRouting Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan
Routing Support for Wide Area Network Mobility Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan 1 Outline Introduction Inter-AS Mobility Support Intra-AS Mobility
More informationLecture 3: Graphs and flows
Chapter 3 Lecture 3: Graphs and flows Graphs: a useful combinatorial structure. Definitions: graph, directed and undirected graph, edge as ordered pair, path, cycle, connected graph, strongly connected
More informationEstablishing Virtual Private Network Bandwidth Requirement at the University of Wisconsin Foundation
Establishing Virtual Private Network Bandwidth Requirement at the University of Wisconsin Foundation by Joe Madden In conjunction with ECE 39 Introduction to Artificial Neural Networks and Fuzzy Systems
More informationGIAN Course on Distributed Network Algorithms. Network Topologies and Interconnects
GIAN Course on Distributed Network Algorithms Network Topologies and Interconnects Stefan Schmid @ T-Labs, 2011 The Many Faces and Flavors of Network Topologies Gnutella P2P. Social Networks. Internet.
More informationGraphs and Network Flows IE411. Lecture 13. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 13 Dr. Ted Ralphs IE411 Lecture 13 1 References for Today s Lecture IE411 Lecture 13 2 References for Today s Lecture Required reading Sections 21.1 21.2 References
More informationPower-Aware Routing in Mobile Ad Hoc Networks
Power-Aware Routing in Mobile Ad Hoc Networks Introduction 5 power aware metrics for shortest-cost routing will be presented Compared to the traditional shortest-hop routing, shortest-cost routing Reduces
More informationSycamore Networks Implementation of the ITU-T G.ASON Control Plane
Technical Brief Sycamore Networks Implementation of the ITU-T G.SON Control Plane bstract This document provides a detailed overview of the control plane behavior of Sycamore Networks SN 16000 Intelligent
More informationSimply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin
IBM Research - Zurich Simply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin 2009 IBM Corporation Motivation and Outline Need to understand and correctly handle dominant aspects within the
More informationApproximately Uniform Random Sampling in Sensor Networks
Approximately Uniform Random Sampling in Sensor Networks Boulat A. Bash, John W. Byers and Jeffrey Considine Motivation Data aggregation Approximations to COUNT, SUM, AVG, MEDIAN Existing work does not
More informationBGP and inter-as economic relationships
BGP and inter-as economic relationships E. Gregori 1, A. Improta 2,1, L. Lenzini 2, L. Rossi 1, L. Sani 3 1 Institute of Informatics and Telematics, Italian National Research Council Pisa, Italy 2 Information
More informationPricing Intra-Datacenter Networks with
Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee Jian Guo 1, Fangming Liu 1, Tao Wang 1, and John C.S. Lui 2 1 Cloud Datacenter & Green Computing/Communications Research Group
More informationNetwork Security - ISA 656 Routing Security
Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games
More informationAtlas Technology White Paper
Atlas Technology White Paper 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationTopic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:
Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering
More informationOutline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006
EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering
More informationSCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich
SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich March 2019 Internet: The network of networks The Internet is a network of Autonomous Systems (ASes). Each AS is itself a
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical
More informationUtilizing Datacenter Networks: Centralized or Distributed Solutions?
Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such
More informationGlobal DDoS Measurements. Jose Nazario, Ph.D. NSF CyberTrust Workshop
Global DDoS Measurements Jose Nazario, Ph.D. jose@arbor.net NSF CyberTrust Workshop Quick Outline, Conclusions o Measurements - We re screwed o Observations - We know who o The wrong approach: point solutions
More informationPeering Commercials and Contracts
Peering Commercials and Contracts Presentation to AfPIF Peering Coordinators Day, Dar Es Salaam 2011 Mike Blanche 1 Peering Commercials Its All About The Money! 2 Agenda Peering Commercials The Business
More informationYour projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100
You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your
More informationMaximizing Restorable Throughput in MPLS Networks
Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center 1 Motivation IP networks are required to service real-time applications
More informationLecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end
More informationCoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks
CoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks Soo Bum Lee *, Min Suk Kang, Virgil D. Gligor CyLab, Carnegie Mellon University * Qualcomm Dec. 12, 2013 Large Scale Link-Flooding
More informationA FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING. Kaustubh Gadkari, Dan Massey and Christos Papadopoulos
A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING Kaustubh Gadkari, Dan Massey and Christos Papadopoulos Problem: RIB/FIB Growth Global RIB directly affects FIB size FIB growth is a big concern:
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationA NetFlow/IPFIX implementation with OpenFlow
A NetFlow/IPFIX implementation with OpenFlow José Suárez-Varela jsuarezv@ac.upc.edu Pere Barlet-Ros pbarlet@ac.upc.edu Valentín Carela-Español vcarela@talaia.io Talaia is Catalan for Watchtower The Watchtower
More informationDatacenter Wide- area Enterprise
Datacenter Wide- area Enterprise Client LOAD- BALANCER Can t choose path : ( Servers Outline and goals A new architecture for distributed load-balancing joint (server, path) selection Demonstrate a nation-wide
More informationJ. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering
Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn
More informationThe Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation. May 5, 2014
The Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation May 5, 2014 The Structure of the Early Internet: Hierarchical In order to connect with other ISPs,
More informationTo Change Traffic Engineering, Change the Traffic Matrix
To Change Traffic Engineering, Change the Traffic Matrix Paper 155 ABSTRACT Traditional traffic engineering adapts the routing of traffic within the network to maximize performance. We propose a new approach
More information