Control Models at Interconnection Points

Size: px
Start display at page:

Download "Control Models at Interconnection Points"

Transcription

1 Control Models at Interconnection Points Freek Dijkstra*, Bas van Oudenaarde*, Bert Andree, Leon Gommans, Jeroen van der Ham, Karst Koymans, Cees de Laat Advanced Internet Research group, Universiteit van Amsterdam, Kruislaan 403, 1098 SJ Amsterdam, The Netherlands * Corresponding Authors {fdijkstr, oudenaar}@science.uva.nl 13 June 2005 Submitted for IEEE Communications Magazine, Feature topic Optical Control Planes for Grid Networks: Opportunities, Challenges and the Vision. Keywords: Interconnection Point, Lamda Exchange, Open Optical Exchange, Internet Exchange, Peering facility, Control model. Abstract New types of exchange points, like Optical Exchanges and GMPLS exchanges have been described in the last few years. Optical and lambda exchanges are now deployed. However, these interconnection points are not defined in systematic way in the literature. We classify interconnection points, mainly by discriminating on the properties of the control s. Three control models are defined: the autonomous, federated and distributed control model. In addition we define in which cases the adjectives open and automated can be applied to the control models. This article aims to reach community consensus about a common terminology. 1 Introduction The main function of interconnection points is to facilitate traffic flows between peers. However, an exchange may also offer more advanced network services [1], like the conversion of data between different formats (interworking) and layers (elevator services). Likewise, an exchange may also offer a wide variety of services on the control 1. These functions may include automated provisioning of network elements, authorizing a request based on a policy, providing information on existing connections, checking the availability of certain resources, perhaps also a broker service or an index server listing the available resources. Communities like GLIF [2] aim to standardize the services both on the transport and on the control. This article aims to provide a common vocabulary for this discussion, highlights problems and suggest how to solve them. We focus on the operational aspects of exchanges, not on business models. In this section we introduce a concise definition of terms like domain, administrative- and operational control, as well as open and automated. 1.1 Peering Traffic between separate networks is often exchanged at geographically clustered locations, called Interconnection Points or Peering Points [3, 4]. For the regular Internet, the Internet Service Providers (ISPs), can interconnect using either transit or peering [5]. Peering, in most literature, is limited to providing connectivity to each other s networks and to the customers of the other network, but not to other destinations. In this article however, we do not distinguish between peering and transit. In our terminology peers are network owners who connect to an interconnection point and peering is the concept of exchanging traffic between peers, regardless of the economic model. 1 In this article, we do not distinguish between the control and the higher-level service. 1

2 Internet Exchange Optical Exchange OSI Layer Transports traffic at layer 2, peers connect with layer 3 devices Transports traffic at layer 1 or layer 2, peers connect at that same layer. Traffic type IP traffic only Any packet data or any data at a specific framing or bit rate End-points AS-to-AS network Host to host connections (connections are part of a larger circuit) Technology Often packet switched, sometimes label-switched (with virtual circuits like MPLS and ATM) Circuit or virtual-circuit switched (e.g. using SONET or VLANs) Services Only data transport Data transport, as well as other services, like the conversion of data between different formats and layers Dynamics Stateless, or state changes only when peering relations change State changes for each data transport Table 1: Typical differences between Internet Exchanges and current Optical Exchanges. This table will change over time, as new technologies become available and are implemented. 1.2 Types of Interconnection Points The most trivial interconnection point is a colocation that provides no other functionality than rack space and power. This already gives the peers at the co-location the ability to initiate bilateral peerings with other peers at the same facility. However, we are interested in exchanges, which are interconnection points with one or more networks in place, dedicated for the exchange of traffic between peers Classification Based on the functions, rather than the technical implementation, we currently observe four types of interconnection points: Internet Exchanges, Mobile Roaming Exchanges, Optical Exchanges, and Points of Presence. An Internet Exchange serves as an interconnection point to exchange packet data between individual peers. The peers have one or a few physical connections to a central infrastructure. The network can be Ethernet LAN-, ATM-, or MPLSbased. The first variant is stateless, while the other two are stateful and require that the individual peers set up a path between them. Such a path is a channel in the physical connection. Internet Exchanges (IX) are also known as Internet Exchange Points (IXP) or Network Access Points (NAP). Mobile Roaming Exchanges (MRX), such as GPRS Roaming Exchanges (GRX) [6] and UMTS exchanges, exchange packet data for respectively 2.5th and 3rd (3G) generation mobile telephony. In telecommunications, however, the term exchange is different from our usage and refers to a transit provider rather than an interconnection point. An exchange point between mobile roaming exchanges is technically no different then a packet-based 2 Internet exchange. Optical Exchanges 3 are interconnection points where multiple parties exchange traffic. Current optical exchanges 4 are transport exchanges which use switched circuits (and become a part of a larger dynamic circuit) to transport large quantities of data between end-points. Optical Exchanges (OX) [1] are also known as Lambda Exchanges or Grid Exchange Points (GXP), since they focus on switching circuits on optical networks for use in Grid-based applications. GMPLS Internet Exchanges (GMPLS- IX) as defined by Tomic and Jukan [7] share the concept of circuit-switched interconnection points, but have not been implemented yet. Unlike exchanges, a Point of Presence (POP) is an interconnection point where the peers are unequal. Access networks connect with an upstream 2 GPRS and UMTS are packet based. The older CSD system is circuit switched. 3 Optical does not imply that the exchange itself is purely photonic. 4 For example NetherLight, StarLight, ManLan experimental switch, T-Lex, HK Light, UKLight and NorthernLight. 2

3 network provider at a POP. In this case, the peers are unequal since the upstream provider accepts transit traffic from the customer (for a fee), but the reverse is not true Optical and Internet Exchange There is no clear boundary between the different interconnection points since each interconnection point may take multiple roles. For example, customers at a POP may also directly peer with each other, a function typically seen at exchanges. Circuit switching is typically associated with optical exchanges, but not a technical necessity: ATMand MPLS-based Internet exchanges are also circuit switched and it might be possible to create a non-circuit switched optical exchange using Optical Burst Switching (OBS) [8]. Table 1 highlights the typical differences between Internet exchanges and current optical exchanges. We strongly believe that these differences will disappear as time progresses. First of all, there is a tendency for current optical exchanges to provide network services and one of the future services might be multiparty peering like in a LAN-based Internet exchange. Secondly, Internet exchanges also tend to offer more services which are now regarded as optical exchange functions, like private circuits between two peers 5. Third, there is a tendency that Internet exchanges and optical exchanges are built in the same cities 6, which indicates a possible economic advantage of combining exchanges on the same physical location. We use the term Transport Exchange to refer to current-day optical exchanges. 1.3 Ownership Owner, Administrator, Operator and Users We distinguish between legal owner, economic owner, administrator, operator and user(s) for each network element 7. The legal owner of a network element is the entity that purchased the device and the economic owner is the entity that acquired the usage rights from the legal owner. Furthermore, each network element has an administrator, who manages the configuration and determines its policy. This is the entity that carries the responsibility 5 For example, the Amsterdam Internet Exchange AMS-IX already provides Private Interconnects and Closed User Groups. 6 For example, Chicago and Amsterdam. 7 Network element is a generic term to include network devices, links, interfaces and hosts. for the behavior of a device and has the final responsibility in case of hazards and abuse. In addition, each network element can also have a separate operator, the person, organization, or software component that configures and operates the device on behalf of the administrator. The administrator determines the policy for a network element; the operator enforces this policy. Finally, the users may use or invoke an element, if their request is in compliance with the active policy. We assume that each network element has exactly one legal owner, one economic owner, one administrator and one operator, but may have multiple users over time (though typically only one at a specific time) Domains We define a domain as a set of network elements 8. An administrative domain is a set of network elements with the same administrator. An operational domain is a set of network elements with the same operator. A network is an operational domain within an interconnection point that is able to exchange traffic between at least three different peers. Core networks are of special interest throughout this article and we use the term to refer to a network and its operator Examples Often the legal owner, economic owner, administrator and operator of a network element are the same. But this is not always the case. An organization may sign a contract with a transoceanic carrier to lease a fiber for a year. In this case, the carrier is the legal owner, while the other organization is the economic owner. If an organization decides to outsource the maintenance of their network, the administrator and operator of each network element in this network are different entities. In the next subsection we explain the concept of open control, where the exchange is both the economic owner as well as the operator of a specific interface, while the peer is the administrator of this interface. 8 Including non-disjoint sets. Note that a domain does not necessarily have to be an AS-domain. 3

4 Control Transport Figure 1: Example of a closed control model (on the left) and an open control model (on the right), with the same physical network. In this picture, each circle represents an administrative domain, both on the transport and the control. On the transport, the administrative domains are interconnected with links. On the control, the administrative domains communicate with each other in order to jointly achieve a network configuration. 1.4 Open Exchanges The word open in open exchanges may refer to at least four different meanings. We recommend that it is only used for open control, as described in For other meanings, we recommend to use alternative wording, as described in to Open Control Model In a closed interconnection point, the operator ultimately decides on the policy for each interface in the network. In an open interconnection point, on the other hand, the delegates administrative control of each external interface to the peer that connects to that interface. So peers of an open exchange have the ability to configure their interface in the network and thus can decide who connects to their network. The operational control of an interface is always carried out by the operator of the device (typically the owner). In the closed model, the administrator and operator of the interface are the same, while in the open model, they are different since the decision-making is delegated to the peers. Figure 1 shows an example of a closed and an open control model of the same network Business Model We use the word public or neutral to refer to an interconnection point with an open business model. An open business model requires that an interconnection point must have a published, clear policy for new peers to join, and has a reasonable and nondiscriminatory (RAND) policy 9 towards its peers. In our view, all exchanges should be public. A non-public interconnection point is called private or non-neutral Service Exposure The term service exposure or transparent can be used to refer to the ability by peers to look in the inner workings of the exchange Automated Exchange An exchange is called automated if peers are able to set up circuits between each other and invoke other services from the exchange without manual intervention at the. 2 Control Models In this section, we define three different control models for interconnection points: the autonomous, federated and distributed control model. The autonomous control model is the simplest model. The federated and the distributed control model respectivly extend the autonomous- and the federated control. 9 This seems to imply equal access rights to all peers. However, a distinction may be made based on the service level, as long as the service level is achievable by all peers on nondiscriminatory conditions. E.g., if they pay a certain fee. 4

5 These models make a clear distinction between administrative and operational control of the network elements. We consider a few operational domains on the transport, each operated by a specific operator. For each model, we explain how the administrative domains can control network elements and in particular how peers can administratively control network elements in the network. It is only possible to control network elements in another operation domain if the operators work together by sending messages to each other. It should be noted that we do not assume that these messages are automated. 2.1 Autonomous Control Model In the autonomous control model, there is exactly one network, which is administratively and operationally controlled by a single organization. Peers can connect their network to the interconnection point, but there is no interaction between the peers, or between the peers and the network on the control. Figure 2 shows an example of the autonomous control model. Typically the administrator of a network determines one or a limited number of policies. Peers can either accept this policy and connect to the facility or decide to take their business elsewhere. Such pre-established policies are defined in contracts (Service Level Agreements) and may include connection details, such as wavelength, power-level and framing format. Control Transport C A Figure 2: Example of the autonomous control model. The transport shows five distinct operational domains:, A, B, C and D, each operated by a controller on the control. On the transport, each box represents an operational domain, interconnected by links. On the control, each square represents a separate controller. A LAN-based Internet exchange is an example of the autonomous control model. While peers can not configure any services in the network with the autonomous control model, the may still offer static services on the transport, which do not require configuration. D B The autonomous control model is always closed. 2.2 Federated Control Model In the federated control model, the interconnection point has exactly one network. The network is owned by an independent entity (often a federation formed by all members of the exchange). The facility offers services to each peer, including the ability to interconnect with other peers. The inner workings of the network may be unknown to the peers (making it a black box), but peers can still check information about the state of some resources. For example, a peer can still inquire about the availability of a certain resource or get the status of a circuit it established earlier. Control Transport C A Figure 3: Example of the federated control model. The transport is the same as in figure 2, but the control is different: here the controller of each peer exchanges messages with the controller of the network. Figure 3 shows an example of the federated control model. When a peer wants to use a certain service, it invokes the operator of the network, which may delegate parts of the request to other parties. For example, if peer D sends a request to set up a circuit from B to D, the operator checks if the requested resources in the itself are available and contacts the administrator of the resources involved. In the case of open control, it asks peer B if this request must be honored. If that is true, the operator then creates the requested circuit. Let s assume that in this example the circuit from B to D needs a WAN PHY to LAN PHY conversion service, only available at C. Then the operator gains access to that service from C on behalf of the original requester. By doing so, it delegates part of the original request to C. The peers can independently decide what resources or services they share in the interconnection point with the other peering partners. If the peers offer non-trivial services, like the aforementioned conversion service, the operator can offer a sharing index service. For each request, this central index D B 5

6 can be queried to see if it the required resources are available and who owns them. Section 4 discusses how AAA (Authentication, Authorization and Accounting) services can be used to provide automated admission control by resource operators. 2.3 Distributed Control Model In the distributed control model there can be multiple federations, each controlling a different network. Every party can bring in its own equipment, e.g. fibers, and most important: its own services (and control software). Each peer is responsible for exposing its own services to the rest of the community, possibly without revealing the inner details. A broker may combine multiple services and expose this combination as a single service. The idea is each peer still operationally controls its own network elements, but interacts with other operators, or partially delegates its administrative control, forming collaborations. Each peer can partner in multiple collaborations. It is possible to regard one instance of the distributed control model as multiple interconnected instances of the federated control model. However, the distributed control model highlights the intelligence that is required to make all parts work together. This intelligence is not always necessary in the federated model. Control Transport A* B C* D* Figure 4: Example of the distributed control model, which does not show a distinction between networks and other networks. In the other models, the network is special since it is the only network that connect to other networks (of the peers). However, in the distributed control model this special property is not there, making the network a regular network, just like the networks of the peers. So the distinction between network and other networks is redundant and is not shown figure 4. The result is a mesh network with interconnected control s, which happen to reside at the same interconnection point. The figure does not show how peers can dedicate part of their network resources to form a dedicated network. For example, C may expose some network elements to the other peers, which can be used by A or D to interconnect, either to C, or between each other through the network of C. Also, B and D may decide to put some network resources in a pool, forming another, joint, network. Typically, a network formed by multiple peers is exposed as one single network by a broker, which then delegates incoming requests to the individual operators of the peers. 3 Control Plane Services In our view, an exchange does not only exist of the transport network itself, but also of the services it is offering at the control. In this section we discuss how an operator, typically a peer, interacts with other operators and in particular with the operator of the network. In the autonomous control model, there is no interaction between the different operators, so this section does not apply to that model. 3.1 Automated Exchanges The interaction between operators does not have to be automated. It is possible that the messages between the operators require manual intervention. However, the strength of the federated and the distributed control model lies in the fact that peers can provision the state of the exchange in real time; this requires automated control. 3.2 Service Oriented Architecture If the available services are not known in advance, for example because the number of services is large, it is desirable to use a common way for service discovery and invocation. This requires that each network exposes its control as software service(s) to the connected peers. This can be done using index services for discovery and a common way of interfacing for invocation. Web services are an example of a common interface. If the advertisements of the services are described in self-contained service-contracts, with an independent control of these services, this results in a Service Oriented Architecture (SOA) [9]. In such an architecture, the services are pluggable. This means that each peer, independent of the other peers, can easily add, change, or drop services to or from the interconnection point. 6

7 3.3 Broker Services Multiple resources may be involved in handling a certain request. For the federated control model, the peers often only interact with the operator of the, but not directly with other peers. This makes it relatively simple for the peers: they have a single point of contact, which executes their requests. In this model, most of the intelligence lies at the operator of the network. The distributed control model is far more complex because each peer can communicate with all other operators. Brokers handle part of the complexity by taking multiple services and combining them into one higher-level service. Broker services can be run by the, peers, or third parties. 4 Policy Controlled Access To protect scarce resources, a set of rules to control access to the network resources must be in place 10. Such a set of rules is called a policy [10]. We only discuss the policies needed to operate the exchange, and not the policies between individual peers, e.g. Service Level Agreements or BGP peering policies. 4.1 Policy Evaluation A policy is enforced by the operator, but the decision involves the administrator, which decides on the business policy for its network elements. If the operator and administrator are different entities, they will have to interact with each other. The operator can either contact the administrator and ask it to take the actual decision, or the administrator can push its policy to the operator, and let the operator do the evaluation. We concern ourselves primarily with the administrative policy as determined by the administrator, but the operator may also apply a device policy. For example, a device policy may prevent a requester from accidentally connecting a high power laser to a low power receiver. 4.2 Open Control Open control makes peers responsible for the setting of their interfaces on the exchange. It allows them to provision the exchange to their needs. Open control is orthogonal to automated exchange, and equally important. Policies can be used to enforce 10 For example, to prevent malicious users from performing a Denial of Service attack by requesting all resources and not releasing the gained exclusive usage of the resources. the administrative control of the peers, which is required for open control. 4.3 Generic AAA Framework The Generic Authorization Authentication and Accounting (AAA) framework [11] can be used for policy evaluation. This framework automates the decision making (authorization) process by applying formalized policies. From the perspective of an interconnection point, the service request comes from a peer, although it actually originated from a remote user. A hierarchy of AAA servers makes resource authorizations as described by Gommans et al. [12]. In this framework, a request is sent to the AAA server of the network, which dispatches the authorization decision(s) to AAA server(s) of the resource owner(s). This interaction with the AAA service is called the agent sequence [13]. peer D operator AAA server 1 10 peer B AAA server PDP functions peer C AAA server 8 9 cross connect 5 6 PEP functions peer C service Figure 5: Sequence diagram for broker authorization sequence example. The vertical lines each represent a certain element, and the arrows represent the interactions. The time is mapped on the y-axis, starting with the first interaction at the top and the last at the bottom. The parties in this scenario are the same as in figure 3. Figure 5 takes the example scenario of section 2.2, and shows the interaction between AAA servers in the agent sequence. The AAA servers are Policy Decision Points (PDP); the network elements are Policy Enforcement Points (PEP). In this example peer D requests a connection between peer B and peer D, through the network, which involves a service at peer C. The message includes proper credentials or authentication attributes to identify the peer by the AAA server. The AAA server of the network fetches a driving policy to determine which steps are required, and which administrators must be invoked. This example shows an open control exchange, which means that each administrator needs an AAA 7

8 Internet Exchange Mobile Exchange Optical Exchange Point of Presence Autonomous control model X X X Federated control model X X X X Distributed control model X Table 2: Applicable models for each type of interconnection point. server dealing with the resource authorization next to its own local operator 11. Alternatively, each administrator can push its policies into the AAA server for evaluation. When the AAA server has gotten all answers back, it makes up the final outcome of the decision. For closed control, the AAA server makes decisions autonomously. In that case, the sequences 2 and 3 in figure 5 are missing. If the requests is authorized, the AAA server acts as enforcer and invokes the services at the control. The result is then sent back to the requester. 4.4 Complexity of AAA In the Distributed control model, the authorization process is distributed, since there are multiple autonomous decision points. Just like the service discovery, this makes the authorization process as a whole rather complex. However, each individual authorization decision by the AAA server is of the same nature and same complexity as the one in the federated control model. 5 Conclusion In this article, we introduced multiple models for exchanges. We hope to offer communities, such as GLIF, a workable set of models for their environment. In table 2, we give our view of viable mappings of the current interconnection points to the models described. Most Internet or mobile exchanges use the autonomous or the federated control model. If the Internet or mobile exchange is stateless, the autonomous control model seems logical, since no request needs to be sent to the network operator by design. If the Internet or mobile exchange is stateful, it can be either of these two models. A point of presence typically uses the autonomous control model, because the configuration is mostly static, and peers do not have direct control 11 Local operators, which takes care of intradomain operational control, are not shown in figure 5. over the inner working of the facility. However, if peers of a POP do have administrative control, the federated control model is used. If optical exchanges offer multiple services, standardized service discovery and service invocation are required. Both the federated and distributed control models offer this feature in a scalable way using pluggable services (a Service Oriented Architecture). The distributed model adds more complexity, because there is no longer a single entity that acts as a broker. This makes the distributed control model harder to deploy. Therefore, the federated control model is preferred for optical exchanges. We see a major role for the transport exchange in the future, since peers and their users demand more flexibility to set up circuits with known Quality of Service (QoS). Large data transport on long distances is most efficient over the lowest possible layers, and interconnection points are needed to offer features for the data transport down in the protocol stack. Technologies change over time, just as the requests from the users. This makes us believe that the current optical (transport) exchanges and Internet exchanges converge into optical exchanges that support all the required services. Open control is a mind shift compared to most current exchanges. With closed control, peers sometimes have the ability to change the state of one or more network elements in a network, but their requests are evaluated against the policy set by the exchange. With open control on the other hand, the peers decide on the policy and they evaluate requests that the exchange forwards to them. Automation of exchanges is a necessity for this paradigm change to happen. We also recognize a trend to let end users control the network resources as they want 12. If humans evaluate policies, and connections are made in a matter of days, rather then seconds, end-users probably do not see the advantage over using the regular Internet. Even if peers are in control, they do not experience it that way unless their requests 12 For example DRAC (Dynamic Resource Allocation Controller) from Nortel networks, and UCLP promoted by CA- NARIE are control mechanisms driven by users. 8

9 are promptly answered by an automated ensemble. Naturally, authorization is important to prevent DoS attacks, and monitoring is important for peers and end-users to check if failures occur. This is part of our future research direction. Acknowledgment The research work was funded by the GigaPort Next Generation project lead by the Dutch National Research Network (SURFnet). The authors wish to thank John Vollbrecht from Merit, Henk Steenman and Job Witteman of the AMS-IX, and members of the GLIF community for their discussions and proof-reading. References [1] Freek Dijkstra, Cees de Laat, Optical Exchanges, GRIDNETS conference proceedings, October 2004 [2] Global Lambda Integrated Facility, [3] Bilal Chinoy and Timothy Salo, Internet Exchanges: Policy-Driven Evolution", Harvard Workshop On Co-Ordination Of The Internet, J.F. Kennedy School Of Government, September 1996 an Optical Internet, Journal of High-Speed networks, pp , 1999 [9] Alan Brown, Simon Johnston, Kevin Kelly, "Using service-oriented architecture and component-based development to build Web service applications", IBM (Rational Software), June 2003 [10] Andrea Westerinen, et al., Terminology for Policy-Based Management, RFC 3198, November 2001 [11] Bas van Oudenaarde, Leon Gommans, Cees de Laat, Freek Dijkstra, Arie Taal, References Reference to Generic AAA implementation, Internet Draft draft-irtf-aaaarch-prototype-02, Work In Progress, September 2004 [12] Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal, Authorization of a QoS path based on generic AAA, Future Generation Computer Systems 19 (2003), pp , August 2003 [13] John Vollbrecht, Pat Calhoun, Stephen Farrell, Leon Gommans, George Gross, Betty de Bruijn, Cees de Laat, Matt Holdrege, David Spence, AAA Authorization Framework, RFC 2904, August 2000 [4] Geoff Huston, Interconnection, Peering, and Settlements, Proceedings of Inet 99, June 1999 [5] William Norton, Internet Service Providers and Peering, Proceedings of NANOG 19, May 2001 [6] K.J. Blyth, A.R.J. Cook, Designing a GPRS roaming exchange service, Second International Conference on 3G Mobile Communications Technologies, March 2001 [7] Slobodanka Tomic, Admela Jukan, GMPLS- Based Exchange Points: Architecture and Functionalilty, Chapter 8 in Emerging Optical Network Technologies Architectures, Protocols and Performance, Edited by Krishna Sivalingam and Suresh Subramaniam, Springer, ISBN: X, October 2004 [8] Chunming Qiao, Myungsik Yoo, Optical Burst Switching (OBS) A New Paradigm for 9

Citation for published version (APA): Dijkstra, F. (2009). Framework for path finding in multi-layer transport networks

Citation for published version (APA): Dijkstra, F. (2009). Framework for path finding in multi-layer transport networks UvA-DARE (Digital Academic Repository) Framework for path finding in multi-layer transport networks Dijkstra, F Link to publication Citation for published version (APA): Dijkstra, F (2009) Framework for

More information

What makes an exchange open?

What makes an exchange open? What makes an exchange open? Cees de Laat Freek Dijkstra Leon Gommans Bas van Oudenaarde University of Amsterdam www.glif.is # u s e r s A. Lightweight users, browsing, mailing, home use Need full Internet

More information

Token-based authorization of Connection Oriented Network resources.

Token-based authorization of Connection Oriented Network resources. Token-based authorization of Connection Oriented Network resources. Leon Gommans, Franco Travostino, John Vollbrecht, Cees de Laat, Robert Meijer. Abstract. Authentication, Authorization and Accounting

More information

The Lambda Grid GNEW-PANEL-2. SURFnet. University of Amsterdam SARA NIKHEF NCF. All rights reserved UvA

The Lambda Grid GNEW-PANEL-2. SURFnet. University of Amsterdam SARA NIKHEF NCF. All rights reserved UvA All rights reserved UvA The Lambda Grid λ GNEW-PANEL-2 www.science.uva.nl/~delaat www.science.uva.nl/~deλaat Cees de Laat λaat SURFnet EU University of Amsterdam SARA NIKHEF NCF eevn: : European VLBI Network

More information

Multilayer Network Modelling

Multilayer Network Modelling Lessons Learned in Multilayer Network Modelling Freek Dijkstra Universiteit van Amsterdam with help of: Bert Andree, Paola Grosso, Jeroen van der Ham, Karst Koymans, Cees de Laat Lessons we learned while

More information

MIX: Advantages. Milan Internet Exchange

MIX: Advantages. Milan Internet Exchange Peering @ MIX: Advantages Milan Internet Exchange INTRODUCTION This document explains the advantages of peering at MIX. The intended audience is network operator peering coordinators that have been referred

More information

University of Amsterdam

University of Amsterdam The road to optical networking www.science.uva.nl/~delaat www.science.uva.nl/research/air Cees de Laat University of Amsterdam SURFnet λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ λ Know the user #

More information

Optical Exchanges. Freek Dijkstra and Cees de Laat I. INTRODUCTION

Optical Exchanges. Freek Dijkstra and Cees de Laat I. INTRODUCTION Abstract Peering of network traffic is often concentrated at Internet Exchange Points. Current Internet Exchanges offer services at layer 2 and layer 3. There is a growing need for transport services where

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

Technical Requirements Policy for IX.br - V1.0

Technical Requirements Policy for IX.br - V1.0 - V1.0 An Internet Exchange Point (IXP or IX) is a network solution typically consisting of switches and routers operating at the layer 2 level of the ISO/OSI reference model, which offers a range of services

More information

SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, mars 2004

SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, mars 2004 SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, 30-31 mars 2004 Presentation contents SURFnet and GigaPort: The environment

More information

StarPlane an Application Controlled Photonic Network

StarPlane an Application Controlled Photonic Network Expanding the Knowledge Economy: Issues, Applications, Case Studies Paul Cunningham and Miriam Cunningham (Eds) IOS Press, 2007 Amsterdam ISBN 978 1 58603 801-4 StarPlane an Application Controlled Photonic

More information

What is an Internet exchange Point (IXP)?

What is an Internet exchange Point (IXP)? What is an IXP? What is an Internet exchange Point (IXP)? The Internet is an interconnection of networks Each controlled by separate entities Generally called Internet Service Providers (ISPs) Grouped

More information

MANTICORE II: Integrated logical IP network, a step beyond point to point links

MANTICORE II: Integrated logical IP network, a step beyond point to point links MANTICORE II: Integrated logical IP network, a step beyond point to point links Victor Reijs, HEAnet NGN Workshop, TERENA, Amsterdam November 6th, 2007 victor.reijs@heanet.ie Virtualisation of network

More information

NCIT*net 2 General Information

NCIT*net 2 General Information NCIT*net 2 General Information NCIT*net 2 An Introduction A component of NCCT research team activities is the development of a next generation network to promote the interaction of architecture, technologies,

More information

Executive Report. Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection

Executive Report. Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection Executive Report Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection A better use of time and money is to use large Web-scale carrier-neutral data centers containing the

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications CHAPTER 1 Tenth Edition by William Stallings Data Communications, Data Networks, and the Internet Data and Computer Communications, Tenth Edition by William Stallings,

More information

Lightpath support in LANs. Ronald van der Pol

Lightpath support in LANs. Ronald van der Pol Lightpath support in LANs Ronald van der Pol rvdp@sara.nl overview hybrid networks lightpaths inter domain lightpath setup lightpath support at the edges hybrid networks support for packet switched (routed

More information

(0 of 12) High Performance λnetworking for Grid Applications. Cees de Laat

(0 of 12) High Performance λnetworking for Grid Applications.   Cees de Laat High Performance λnetworking for Grid Applications www.science.uva.nl/~delaat Cees de Laat (0 of 12) λeu High Performance Networking for Grid Applications www.science.uva.nl/~delaat www.science.uva.nl/~deλaat

More information

Core Networks Evolution

Core Networks Evolution Core Networks Evolution Prof. Daniel Kofman daniel.kofman@enst.fr Telecom Paris - ENST Content Any Service, Any Time, Everywhere, Everyone Towards the triple play and beyond Main trends in Core Networks

More information

Next Generation Networking and The HOPI Testbed

Next Generation Networking and The HOPI Testbed Next Generation Networking and The HOPI Testbed Rick Summerhill Director, Network Research, Architecture, and Technologies, Internet2 CANS 2005 Shenzhen, China 2 November 2005 Agenda Current Abilene Network

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Saving costs through maximising peering relationships

Saving costs through maximising peering relationships Saving costs through maximising peering relationships RIPE NCC Regional Meeting Moscow June 16 th 2004 Vanessa Evans - LINX Serge Radovcic - Euro-IX 1 Introduction Purpose of the presentation Discuss our

More information

ISPs, Backbones and Peering

ISPs, Backbones and Peering ISPs, Backbones and Peering 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010

More information

Integration of Network Services Interface version 2 with the JUNOS Space SDK

Integration of Network Services Interface version 2 with the JUNOS Space SDK Integration of Network Services Interface version 2 with the JUNOS Space SDK Radosław Krzywania, Michał Balcerkiewicz, Bartosz Belter Poznan Supercomputing and Networking Center, ul. Z. Noskowskiego 12/14,

More information

Internet Interconnection An Internet Society Public Policy Briefing

Internet Interconnection An Internet Society Public Policy Briefing Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with

More information

A host selection model for a distributed bandwidth broker

A host selection model for a distributed bandwidth broker A host selection model for a distributed bandwidth broker Christos Bouras Dimitris Primpas Research Academic Computer Technology Institute, Ν.Κazantzaki Str., Patras University 26500 Rion, Patras, Greece

More information

One-hop access to over 2000 peering networks. Reach every corner of the world & all the major clouds. Opencloud IXroom. Only at EvoSwitch.

One-hop access to over 2000 peering networks. Reach every corner of the world & all the major clouds. Opencloud IXroom. Only at EvoSwitch. One-hop access to over 2000 peering networks. Reach every corner of the world & all the major clouds. Opencloud IXroom. Only at EvoSwitch. OPENCLOUD IXROOM TM One of the main reasons customers come to

More information

The Value of Peering. ISP Workshops. Last updated 25 September 2013

The Value of Peering. ISP Workshops. Last updated 25 September 2013 The Value of Peering ISP Workshops Last updated 25 September 2013 1 The Internet p Internet is made up of ISPs of all shapes and sizes n Some have local coverage (access providers) n Others can provide

More information

Presentation of the LHCONE Architecture document

Presentation of the LHCONE Architecture document Presentation of the LHCONE Architecture document Marco Marletta, GARR LHCONE Meeting Paris, Tuesday 5th April 2011 Agenda Background Design Definitions Architecture Services Policy Next steps 2 Background

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

The Value of Peering. ISP/IXP Workshops. Last updated 23 rd March 2015

The Value of Peering. ISP/IXP Workshops. Last updated 23 rd March 2015 The Value of Peering ISP/IXP Workshops Last updated 23 rd March 2015 1 The Internet p Internet is made up of ISPs of all shapes and sizes n Some have local coverage (access providers) n Others can provide

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

NETWORK DESCRIPTION LANGUAGE SEMANTIC WEB FOR HYBRID NETWORKS

NETWORK DESCRIPTION LANGUAGE SEMANTIC WEB FOR HYBRID NETWORKS NETWORK DESCRIPTION LANGUAGE SEMANTIC WEB FOR HYBRID NETWORKS Paola Grosso, Freek Dijkstra, Jeroen van der Ham, Cees de Laat SNE group University of Amsterdam Kruislaan 403, 1098SJ Amsterdam Communicating

More information

Introduction to ITU-T Recommendation G.805

Introduction to ITU-T Recommendation G.805 Universiteit van Amsterdam System and Network Engineering Introduction to ITU-T Recommendation G.805 Freek Dijkstra, Bert Andree, Karst Koymans, and Jeroen van der Ham December 2007 Abstract This technical

More information

Sycamore Networks Implementation of the ITU-T G.ASON Control Plane

Sycamore Networks Implementation of the ITU-T G.ASON Control Plane Technical Brief Sycamore Networks Implementation of the ITU-T G.SON Control Plane bstract This document provides a detailed overview of the control plane behavior of Sycamore Networks SN 16000 Intelligent

More information

Network Service Description

Network Service Description Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015 .. MPLS Multi Protocol Label Switching (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 4.3, 2015/03/09 13:07:57) Thursday, March 12, 2015 Karst Koymans (UvA) MPLS

More information

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,

More information

Using RDF to Describe Networks

Using RDF to Describe Networks Using RDF to Describe Networks Jeroen J. van der Ham a, Freek Dijkstra a Franco Travostino b Hubertus M.A. Andree a Cees T.A.M. de Laat a a Advanced Internet Research Group, Universiteit van Amsterdam,

More information

Data Center Revolution Impact on Ethernet and MPLS

Data Center Revolution Impact on Ethernet and MPLS USB Data Center Revolution Impact on Ethernet and MPLS Umesh Kukreja Hans-Jürgen Schmidtke Kim Jones FutureNet, April 2008 1 Nokia Siemens Networks Copyright Nokia Siemens Networks, 2007. All rights reserved.

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Virtual Routing and Forwarding for Lightpaths Implementations at SARA

Virtual Routing and Forwarding for Lightpaths Implementations at SARA Virtual Routing and Forwarding for Lightpaths Implementations at SARA 10 May 2011 Sander Boele, Pieter de Boer, Igor Idziejczak, Bas Kreukniet, Ronald van der Pol, Freek Dijkstra SARA Computing and Networking

More information

3.4 NON-DOMESTIC SERVICES (L )(C.2.1.9)

3.4 NON-DOMESTIC SERVICES (L )(C.2.1.9) 3.4 NON-DOMESTIC SERVICES (L.34.1.3.4)(C.2.1.9) Qwest uses a combination of owned assets and strategic international partners to deliver non-domestic services ensuring that providers with local knowledge

More information

The Learning Network of Minnesota Blueprint for Higher Education

The Learning Network of Minnesota Blueprint for Higher Education The Learning Network of Minnesota Blueprint for Higher Education Introduction From its beginning in 1993 as an effort to provide network connectivity for public post-secondary institutions, the Learning

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

The New Internet2 Network

The New Internet2 Network The New Internet2 Network Director Network Research, Architecture, and Technologies Internet2 GLIF Meeting 11 September 2006 Tokyo, Japan Agenda Basic Ideas Design Ideas Topology Optical nodes Control

More information

Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada

Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada Supporting Hybrid Services at an International Exchange Facility: The Experience of Pacific Wave Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada About Pacific Wave A joint project between

More information

DWDM RAM. A Platform for Data Intensive Services Enabled by Next Generation Dynamic Optical Networks

DWDM RAM. A Platform for Data Intensive Services Enabled by Next Generation Dynamic Optical Networks DWDM RAM Data@LIGHTspeed A Platform for Data Intensive Services Enabled by Next Generation Dynamic Optical Networks D. B. Hoang, T. Lavian, S. Figueira, J. Mambretti, I. Monga, S. Naiksatam, H. Cohen,

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Next Generation Broadband Networks

Next Generation Broadband Networks Next Generation Broadband Networks John Harper Vice President, IOS Routing Apricot 2005 1 Next Generation Broadband Networks The broadband opportunity, in Asia and worldwide Cisco R&D for the broadband

More information

Introduction to The Internet

Introduction to The Internet Introduction to The Internet ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok Last updated 5 th May 2015 1 Introduction to the Internet p Topologies and Definitions p IP Addressing p

More information

Introduction to The Internet

Introduction to The Internet Introduction to The Internet ITU/APNIC/MOIC IPv6 Workshop 19 th 21 st June 2017 Thimphu These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

MPLS VPN Challenge. Ron Jubainville Director Sprint International Products. Copyright Sprint All rights reserved.

MPLS VPN Challenge. Ron Jubainville Director Sprint International Products. Copyright Sprint All rights reserved. MPLS VPN Challenge Ron Jubainville Director Sprint International Products Copyright Sprint 2004. All rights reserved. November 1 st, 2004 MPLS VPN Challenge Agenda WAN Evolution to MPLS Key Challenge Key

More information

Distributed AAA: Proposals for Ad Hoc Networks

Distributed AAA: Proposals for Ad Hoc Networks Distributed AAA: Proposals for Ad Hoc Networks Pradip Lamsal Department of Computer Science University of Helsinki, Finland pradip.lamsal@helsinki.fi ABSTRACT AAA frameworks such as diameter protocol allows

More information

Interconnection and Roaming

Interconnection and Roaming Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections

More information

SURFnet network developments 10th E-VLBI workshop 15 Nov Wouter Huisman SURFnet

SURFnet network developments 10th E-VLBI workshop 15 Nov Wouter Huisman SURFnet SURFnet network developments 10th E-VLBI workshop 15 Nov 2011 Wouter Huisman SURFnet Engine for Innovation Mission To improve higher education and research by promoting, developing and operating a trusted,

More information

End-To-End Signaling and Routing for Optical IP Networks

End-To-End Signaling and Routing for Optical IP Networks End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Interconnection and Roaming. Interconnection Business interfaces in Internet

Interconnection and Roaming. Interconnection Business interfaces in Internet Interconnection and Roaming S-38.041 Networking Business Slide 1 Interconnection Business interfaces in Internet Access ISP Transit ISP 9 4 Peering point/bilateral agreements (Network Access Point, NAP)

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Innovation and the Internet

Innovation and the Internet Innovation and the Internet 29 April 2005 Christopher Buja, Deputy Director Academic Research & Technology Initiatives, Cisco cbuja@cisco.com 2004, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

National R&E Networks: Engines for innovation in research

National R&E Networks: Engines for innovation in research National R&E Networks: Engines for innovation in research Erik-Jan Bos EGI Technical Forum 2010 Amsterdam, The Netherlands September 15, 2010 Erik-Jan Bos - Chief Technology Officer at Dutch NREN SURFnet

More information

The Next Generation Signaling Transfer Point

The Next Generation Signaling Transfer Point The Next Generation Signaling Transfer Point Overview As the Global network is undergoing immense changes and the Next-Generation IP networks become a reality, it signals an evolution towards using Internet

More information

T0-T1-T2 networking. Vancouver, 31 August 2009 LHCOPN T0-T1-T2 Working Group

T0-T1-T2 networking. Vancouver, 31 August 2009 LHCOPN T0-T1-T2 Working Group T0-T1-T2 networking Vancouver, 31 August 2009 LHCOPN T0-T1-T2 Working Group 1 Requirements from the experiments 2 T0-T1 traffic 1. For all the experiments, the most important thing is to save a second

More information

The Possible Hong Kong Open Exchange Point. Che-Hoo CHENG 04 Aug 2016

The Possible Hong Kong Open Exchange Point. Che-Hoo CHENG 04 Aug 2016 The Possible Hong Kong Open Exchange Point Che-Hoo CHENG 04 Aug 2016 Developing a Blueprint for Global R&E Network Architecture http://gna-re.net The Global Network Architecture program (GNA) is an international

More information

Experiences with IEEE 802.1ah (Provider Backbone Bridges)

Experiences with IEEE 802.1ah (Provider Backbone Bridges) Experiences with IEEE 802.1ah (Provider Backbone Bridges) Ronald van der Pol rvdp@sara.nl SARA Overview About NetherLight Short Introduction to Carrier Ethernet Why Carrier Ethernet? Frame Formats Advantages

More information

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining

More information

In the world of networks, control techniques

In the world of networks, control techniques NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

IP Interconnection. Calvin S. Monson Vice President. Antigua September 2007

IP Interconnection. Calvin S. Monson Vice President. Antigua September 2007 IP Interconnection Calvin S. Monson Vice President Antigua 10-13 September 2007 ICT Regulation Toolkit Sponsored by ITU and World Bank s infodev Link to ICT Regulation Toolkit: http://www.ictregulationtoolkit.org

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

MPLS/Tag Switching. Background. Chapter Goals CHAPTER

MPLS/Tag Switching. Background. Chapter Goals CHAPTER 28 CHAPTER Chapter Goals Understand the advantages of MPLS. Learn the components of an MPLS system. Compare and contrast MPLS and hop-by-hop routing. Describe the two methods of label distribution. Explain

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

DOE Award number: Name of recipient: Project Title: Principal investigator: Date of Report: Period covered by the report:

DOE Award number: Name of recipient: Project Title: Principal investigator: Date of Report: Period covered by the report: Progress Report DOE Award number: DE-SC0004909 Name of recipient: University of Massachusetts, Dartmouth Project Title: Coordinated Multi-layer Multi-domain Optical Network (COMMON) for Large- Scale Science

More information

The ARPANET početak...

The ARPANET početak... dr Nenad Krajnović Elektrotehnički fakultet u Beogradu E-mail: krajko@etf.bg.ac.rs The ARPANET početak... Growth of the ARPANET (a) December 1969. (b) July 1970. (c)march 1971. (d) April 1972. (e) September

More information

Oracle Cloud. Using Oracle Network Cloud Service - FastConnect Standard Edition E

Oracle Cloud. Using Oracle Network Cloud Service - FastConnect Standard Edition E Oracle Cloud Using Oracle Network Cloud Service - FastConnect Standard Edition E74464-05 April 2017 Oracle Cloud Using Oracle Network Cloud Service - FastConnect Standard Edition, E74464-05 Copyright 2016,

More information

Simulation of All Optical Networks

Simulation of All Optical Networks Simulation of All Optical Networks Raul Valls Aranda Communication Department Polytechnic University of Valencia (UPV) C/ Camino de Vera s/n Valencia, Spain Pablo A. Beneit Mayordomo Communication Department

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Thank you Director of Ceremonies,

Thank you Director of Ceremonies, Thank you Director of Ceremonies, Heads of International Organizations Permanent Secretaries Chairpersons of various Boards of Directors Heads of Parastatal Organizations and the Private Sector Heads of

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 4 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information advertisement 8 Inter-AS VPN

More information

Appropriate Layer-2 Interconnection Between IXPs

Appropriate Layer-2 Interconnection Between IXPs Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports

More information

Community Connection Service for escience. Ronald van der Pol, SURFnet TNC May 2014

Community Connection Service for escience. Ronald van der Pol, SURFnet TNC May 2014 Community Connection Service for escience Ronald van der Pol, SURFnet TNC 2014 20 May 2014 Project Overview! GN3plus Open Call Project (CoCo)! October 2013 March 2015 (18 months)! Partners: SURFnet (NL)

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Connectivity FastConnect Level 200. Jamal Arif November 2018

Connectivity FastConnect Level 200. Jamal Arif November 2018 Connectivity FastConnect Level 200 Jamal Arif November 2018 Copyright Copyright 2018, Oracle 2018, and/or Oracle its and/or affiliates. its affiliates. All rights reserved. All rights reserved. 1 Safe

More information

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN:

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN: Internet Research Task Force (IRTF) T. Li, Ed. Request for Comments: 6227 Cisco Systems, Inc. Category: Informational May 2011 ISSN: 2070-1721 Abstract Design Goals for Scalable Internet Routing It is

More information

Category: Informational

Category: Informational Network Working Group Request for Comments: 2905 Category: Informational J. Vollbrecht Interlink Networks, Inc. P. Calhoun Sun Microsystems, Inc. S. Farrell Baltimore Technologies L. Gommans Enterasys

More information

IMS signalling for multiparty services based on network level multicast

IMS signalling for multiparty services based on network level multicast IMS signalling for multiparty services based on network level multicast Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra UniversityCarlosIIIofMadrid Av.Universidad,30 E-28911, Madrid,

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information