Serval: An End- Host Stack for Service- Centric Networking

Size: px
Start display at page:

Download "Serval: An End- Host Stack for Service- Centric Networking"

Transcription

1 serval- arch.org Serval: An End- Host Stack for Service- Centric Networking Erik Nordström David Shue, Prem Gopalan, Rob Kiefer, Mat Arye, Steven Ko, Jen Rexford, Mike Freedman Princeton University

2 The Internet of the 1970s Killer Apps: telnet, Sp IMP 2 SRI IMP 4 Utah IMP 3 UCSB IMP 1 UCLA Network designed for accessing hosts

3 The Internet of the 2000s Datacenter Datacenter Users agnosyc of actual service locayon and host

4 What does Service Access Involve? 1. Locate a nearby service datacenter Map service name to locayon 2. Connect to service Establish data flow to instance Load balance between pool of replicas 3. Maintain connecyvity to service Migrate between interfaces and networks

5 Today s (Overloaded) AbstracYons Service is IP + port Exposes locayon Specifies app. protocol One service per IP Flow is five tuple Binds flow to interface and locayon Cannot migrate between interfaces or networks TCP/IP connect (IP + port) demux (IP + port) ApplicaYon Transport Network

6 Service Access Today Enterprise Network Transit Provider Datacenter 4G Cellular Provider Datacenter

7 Finding a Service LocaYon Enterprise Network Transit Provider DNS 4G Cellular Provider Load- Balanced Web Service DNS binds service to locayon at client (early binding) Caching and ignoring TTL exacerbates the problem Slow failover when instance or load balancer fail

8 ConnecYng to Service Enterprise Network Transit Provider 4G Cellular Provider Load- Balanced Web Service Datacenter LB maps single IP to mulyple servers Must do this for every packet on path - > fate sharing Increases complexity and cost

9 Maintaining ConnecYvity to Service Enterprise Network Transit Provider VM MigraYon 4G Cellular Provider Datacenter Migrate VMs to balance load in the cloud Requires flat addressing or tunneling within datacenter

10 Maintaining ConnecYvity to Service 4G MulY- Homing Enterprise Network Cellular Provider Transit Provider Physical Mobility Datacenter Datacenter Flows break when switching networks or interfaces

11 ContribuYons Naming abstracyons Services, flows Clean role separayon in the network stack SoSware architecture for services (Serval) Service- level control/data plane split Service- level events

12 Naming AbstracYons

13 Today s (Overloaded) AbstracYons TCP/IP connect (IP + port) demux (IP + port) forward (IP) ApplicaYon Transport Network

14 Serval AbstracYons Serval cleans the slate (But not completely) Serval Network layer unmodified! Service Access Layer (SAL) Connects to services Maintains connecyvity forward (IP) ApplicaYon Transport Service Access Network

15 Serval AbstracYons Service = ServiceID Group of processes with idenycal funcyonality Flow = FlowID Invariant demux key Host- local, ephemeral LocaYon = IP address LocaYon, interface Can change dynamically Serval connect (serviceid) demux ( serviceid ) flowid forward (IP) ApplicaYon Transport Service Access Network

16 A Clean Role SeparaYon in the Stack What you access (serviceid), over which flows (flowids), and at which service instance (IP address) ApplicaYon Transport Service Access Network TCP/IP connect (IP + port) demux (IP + port) forward (IP) Serval connect (serviceid) demux ( serviceid flowid ) forward (IP)

17 Service Names (ServiceIDs) Provider prefix Provider- specific Self- ceryfying ServiceIDs allocated in blocks Prefix ensures global uniqueness Prefix- based aggregayon and LPM A ServiceID late binds to service instance ServiceID in first packet of connecyon Service- level rouyng and forwarding

18 A Service- Aware Network Stack connect(sock, serviceid) bind(sock, serviceid) listen(sock) Network stack must resolve service to instance for client Network stack must adver/se service for server

19 SoSware Architecture

20 Serval End- host Architecture ApplicaYon Service Controller Service Control API FlowID Socket ServiceID Ac;on Sock/Addr Flow Table Service Table Dest Address Next Hop IP Forwarding Table

21 Data Plane: The Service Table ServiceID Ac;on Rule State Prefix A FORWARD Send to addr A1 Prefix B FORWARD Send to [A2, A3, A4] Prefix C DEMUX Send to listening sock s Prefix D Prefix E DELAY DROP Queue and noyfy service controller default FORWARD Send to A5

22 Data Plane: The Service Table ServiceID Ac;on Rule State Prefix A FORWARD Send to addr A1 Prefix B FORWARD Send to [A2, A3, A4] Prefix C DEMUX Send to listening sock s Prefix D Prefix E DELAY DROP Queue and noyfy service controller default FORWARD Send to A5

23 Data Plane: The Service Table ServiceID Ac;on Rule State Prefix A FORWARD Send to addr A1 Prefix B FORWARD Send to [A2, A3, A4] Prefix C DEMUX Send to listening sock s Prefix D Prefix E DELAY DROP Queue and noyfy service controller default FORWARD Send to A5

24 Data Plane: The Service Table ServiceID Ac;on Rule State Prefix A FORWARD Send to addr A1 Prefix B FORWARD Send to [A2, A3, A4] Prefix C DEMUX Send to listening sock s Prefix D Prefix E DELAY DROP Queue and noyfy service controller default FORWARD Send to A5

25 Data Plane: The Service Table ServiceID Ac;on Rule State Prefix A FORWARD Send to addr A1 Prefix B FORWARD Send to [A2, A3, A4] Prefix C DEMUX Send to listening sock s Prefix D Prefix E DELAY DROP Queue and noyfy service controller default FORWARD Send to A5

26 Service Access with Serval Service Router X a Internet c d X Datacenter e

27 Adding a Service Instance ApplicaYon S bind(x) listen() Service Controller Register Service X FlowID Socket ServiceID Ac;on Sock/Addr X DMX s Add DEMUX rule

28 Removing a Service Instance ApplicaYon S close() Service Controller Unregister Service X FlowID Socket ServiceID Ac;on Sock/Addr X DMX s Remove DEMUX rule

29 Control Plane: The Service Controller Service address a Service Controller Service Controller DNS

30 Control Plane: The Service Controller Service Controller Service address d FlowID Socket ServiceID Ac;on Sock/Addr X FWD d Add FORWARD rule

31 Service Access with Serval X bind(x) a X/24 c Internet X d,e X/24@c Service Router c d X bind(x) Datacenter e

32 ConnecYng to Service X ApplicaYon Service Controller S socket() FlowID Socket 2 s Allocates local flowid ServiceID Ac;on Sock/Addr X FWD c a

33 ConnecYng to Service X ApplicaYon S connect(x) FlowID Socket 2 s ServiceID Ac;on Sock/Addr X FWD c a a c 2 - X SYN To c

34 Load Balancing in Service Router FlowID Socket ServiceID Ac;on Sock/Addr X FWD d,e From a c a c 2 - X SYN f To e a e 2 - X SYN

35 Service Instance Providing Service X ApplicaYon S FlowID Socket ServiceID Ac;on Sock/Addr X DMX s From a e a e 2 - X SYN

36 Service Instance Providing Service X ApplicaYon S c S accept() FlowID Socket 3 s c ServiceID Ac;on Sock/Addr X DMX s To a e e a 3 2 SYN- ACK

37 Service Access with Serval a c X SYN X d,e a e X Service Router SYN X a e a Internet SYN- ACK c d X e a data Datacenter e

38 Ad hoc Service Discovery Accessing service X connect(x) b a SYN- ACK X b a * X SYN a c a SYN- ACK ServiceID Ac;on Rule State default FORWARD broadcast X c

39 What does Service Access Involve? 1. LocaYng a nearby service datacenter Map service name to locayon 2. ConnecYng to service Establish data flow to instance Load balance between pool of replicas 3. Maintaining connecyvity to service Migrate between interfaces and networks

40 MigraYon of Flows f C1 a1 a3 f S1 s C a2 a4 s S Host C Host S Migrate flow a1 - > a2 RSYN RSYN- ACK ACK

41 MulYpath with MulYple Subflows f C1 a1 a3 f S1 s C f C2 Host C a2 a4 f S2 Host S s S Add flow a2 <- > a4 SYN SYN- ACK ACK

42 Prototype End- host network stack (28,000 LOC) Linux kernel module BSD sockets with AF_SERVAL protocol family AF_INET sockets can be accessed simultaneously Legacy middleboxes / NATs handled via encap. Translator for incremental deployment Unmodified apps and end- hosts Serval apps with unmodified services

43 Incremental Deployment App TCP/IP Translator Serval

44 Incremental Deployment Translator App TCP/IP Serval Translator TCP/IP

45 Use of MigraYon on Clients WiFi Cellular Saves > 900 MB cellular data per month Single Serval TCP connecyon that never breaks

46 Uses of MigraYon on Servers Throughput (Mbps) Load balancing across NICs Both flows use eth Time (s) Flow 1 moved to eth1 Flow 1 Flow 2

47 Uses of MigraYon on Servers Throughput (Mbps) MigraYng VMs across subnets Flow 1 VM changes subnet, acquiring new address Time (s) VM migrates flow to new address

48 CompeYYve Performance TCP Throughput Mean (Mbit/s) TCP/IP Serval Translator Service Table Throughput Mbit/s Kpkt/s IP forwarding Serval

49 ApplicaYons are Easy to Port Applica;on Codebase Changes Iperf 5, TFTP 3, wget 87, Elinks browser 115, Firefox browser 4,615, Mongoose webserver 8, Memcached server 8, Memcached client 12,

50 SDN to the Edges! SDN about network- wide visibility and control Today s SDN (OpenFlow) primarily focuses on layer- 2 / layer- 3 abstracyons Serval extends SDN model to the network edge New programming abstracyons for services, flows, hosts, and interfaces Service- level control/data plane split Joint service and network control

51 Summary of ContribuYons New naming abstracyons Clean role separayon in the stack Makes it easier to build and manage services SoSware architecture for services Flexible service resoluyon and discovery Maintains robust connecyvity Joint service and network management

52 serval- Papers, demos, source code (GPL) online

53 Related Work Locator/idenYfier separayon HIP, i3, HAIR, DOA, LISP, LNA Data- oriented networking DONA, CCNx Support for mobility and migrayon TCP Migrate, Mobile IP, ROAM MulYpath and muly- homing MPTCP, SCTP, Shim6

Serval: An End-Host Stack for Service-Centric Networking

Serval: An End-Host Stack for Service-Centric Networking Draft as of June 17, 2011. Subject to Change. Serval: An End-Host Stack for Service-Centric Networking Erik Nordström, David Shue, Prem Gopalan, Matvey Arye, Steven Ko, Jennifer Rexford, Michael J. Freedman

More information

Building a service centric network with SCAFFOLD

Building a service centric network with SCAFFOLD Building a service centric network with SCAFFOLD * Michael J. Freedman Princeton University with Prem Gopalan, Steven Ko, Jen Rexford, and David Shue * Service Centric Architecture For Flexible Object

More information

Service-Centric Networking with SCAFFOLD

Service-Centric Networking with SCAFFOLD Princeton University, Department of Computer Science Technical Report TR-885-10, September 2010 Service-Centric Networking with SCAFFOLD Michael J. Freedman, Matvey Arye, Prem Gopalan, Steven Y. Ko, Erik

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Cognizant Networks: A Model for Session- based Communications and Adaptive Networking

Cognizant Networks: A Model for Session- based Communications and Adaptive Networking Cognizant Networks: A Model for Session- based Communications and Adaptive Networking Jayabharat Boddu Juniper Networks Eric Brown Office of IT, VT Wuchun Feng CS Dept., VT 08/21/2015 Mark Gardner Office of

More information

Programmable Software Switches. Lecture 11, Computer Networks (198:552)

Programmable Software Switches. Lecture 11, Computer Networks (198:552) Programmable Software Switches Lecture 11, Computer Networks (198:552) Software-Defined Network (SDN) Centralized control plane Data plane Data plane Data plane Data plane Why software switching? Early

More information

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting:

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting: Redings 15-744: Computer Networking L-14 Future Internet Architecture Required: Servl pper Extr reding on Mobility First Relevnt erlier meeting: CCN -> Nmed Dt Network 2 Outline The Next Internet: More

More information

Building Efficient and Reliable Software-Defined Networks. Naga Katta

Building Efficient and Reliable Software-Defined Networks. Naga Katta FPO Talk Building Efficient and Reliable Software-Defined Networks Naga Katta Jennifer Rexford (Advisor) Readers: Mike Freedman, David Walker Examiners: Nick Feamster, Aarti Gupta 1 Traditional Networking

More information

OpenADN: A Case for Open Application Delivery Networking

OpenADN: A Case for Open Application Delivery Networking OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Lecture 11: Middleboxes and NAT (Duct tape for IPv4)

Lecture 11: Middleboxes and NAT (Duct tape for IPv4) CSCI-351 Data communication and Networks Lecture 11: Middleboxes and NAT (Duct tape for IPv4) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and David Choffnes's class Middleboxes

More information

ABSTRACTIONS OF THE DATA PLANE

ABSTRACTIONS OF THE DATA PLANE ABSTRACTIONS OF THE DATA PLANE DIMACS Working Group on Abstractions for Network Services, Architecture, and Implementation Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA joint work

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

On Host Identity Protocol

On Host Identity Protocol On Host Identity Protocol Miika Komu Data Communications Software Group Dep. of Computer Science and Engineering School of Science Aalto University 17.10.2011 Table of Contents Introduction

More information

HAIR: Hierarchical Architecture for Internet Routing

HAIR: Hierarchical Architecture for Internet Routing HAIR: Hierarchical Architecture for Internet Routing Re-Architecting the Internet ReArch 09 Wolfgang Mühlbauer ETH Zürich / TU Berlin wolfgang.muehlbauer@tik.ee.ethz.ch Anja Feldmann Luca Cittadini Randy

More information

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,

More information

Making Multipath TCP friendlier to Load Balancers and Anycast

Making Multipath TCP friendlier to Load Balancers and Anycast Making Multipath TCP friendlier to Load Balancers and Anycast Fabien Duchêne Olivier Bonaventure Université Catholique de Louvain ICNP 2017

More information

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology Host Identity Protocol Miika Komu Helsinki Institute for Information Technology 16.11.2009 Table of Contents Introduction Naming and Layering Control Plane Data Plane Introduction Motivation

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Improving Multipath TCP. PhD Thesis - Christoph Paasch

Improving Multipath TCP. PhD Thesis - Christoph Paasch Improving Multipath TCP PhD Thesis - Christoph Paasch The Internet is like a map... highly connected Communicating over the Internet A 1 A A 2 A 3 A 4 A 5 Multipath communication A 1 A 2 A 3 A 4 A 5 A

More information

Mobile Applications on

Mobile Applications on 7 Mobile Applications on Global Clouds Using OpenFlow and Sof t ware- D efined Ne t workin g SUBHARTHI PAUL, RAJ JAIN, JAY IYER, AND DAVE ORAN Contents Introduction 134 Private Data Center 134 Service

More information

CSEP 561 Connections. David Wetherall

CSEP 561 Connections. David Wetherall CSEP 561 Connections David Wetherall djw@cs.washington.edu Connections Focus How do we (reliably) connect processes? This is the transport layer Topics Naming processes Connection setup / teardown Sliding

More information

IsoStack Highly Efficient Network Processing on Dedicated Cores

IsoStack Highly Efficient Network Processing on Dedicated Cores IsoStack Highly Efficient Network Processing on Dedicated Cores Leah Shalev Eran Borovik, Julian Satran, Muli Ben-Yehuda Outline Motivation IsoStack architecture Prototype TCP/IP over 10GE on a single

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

IPv6 tutorial. RedIRIS Miguel Angel Sotos

IPv6 tutorial. RedIRIS Miguel Angel Sotos IPv6 tutorial RedIRIS Miguel Angel Sotos miguel.sotos@rediris.es Agenda History Why IPv6 IPv6 addresses Autoconfiguration DNS Transition mechanisms Security in IPv6 IPv6 in Windows and Linux IPv6 now 2

More information

Arrakis: The Operating System is the Control Plane

Arrakis: The Operating System is the Control Plane Arrakis: The Operating System is the Control Plane Simon Peter, Jialin Li, Irene Zhang, Dan Ports, Doug Woos, Arvind Krishnamurthy, Tom Anderson University of Washington Timothy Roscoe ETH Zurich Building

More information

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ

More information

Agenda. Forwarding (after a little more addressing) Follow-up from last time. Dealing with Address Scarcity. Sharing a Block of Addresses

Agenda. Forwarding (after a little more addressing) Follow-up from last time. Dealing with Address Scarcity. Sharing a Block of Addresses Agenda Forwarding (after a little more addressing) EE22 Fall 20 Scott Shenker http://inst.eecs.berkeley.edu/~ee22/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues

More information

MPTCP: Design and Deployment. Day 11

MPTCP: Design and Deployment. Day 11 MPTCP: Design and Deployment Day 11 Use of Multipath TCP in ios 7 Multipath TCP in ios 7 Primary TCP connection over WiFi Backup TCP connection over cellular data Enables fail-over Improves performance

More information

CSEP 561 Connections. David Wetherall

CSEP 561 Connections. David Wetherall CSEP 561 Connections David Wetherall djw@cs.washington.edu Connections Focus How do we (reliably) connect processes? This is the transport layer Topics Naming processes TCP / UDP Connection setup / teardown

More information

The case for ubiquitous transport level encryption. Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford.

The case for ubiquitous transport level encryption. Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford. The case for ubiquitous transport level encryption Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford. What would it take to encrypt all the traffic on the Internet,

More information

Speeding up Linux TCP/IP with a Fast Packet I/O Framework

Speeding up Linux TCP/IP with a Fast Packet I/O Framework Speeding up Linux TCP/IP with a Fast Packet I/O Framework Michio Honda Advanced Technology Group, NetApp michio@netapp.com With acknowledge to Kenichi Yasukata, Douglas Santry and Lars Eggert 1 Motivation

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Application Delivery Using SDN

Application Delivery Using SDN Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound

More information

Distributed mobility management

Distributed mobility management Distributed mobility management for Future Internet H. Anthony Chan Huawei Technologies h.a.chan@ieee.org Internet Core network: converge (cellular and Internet no more IPv4 blocks available) Access networks:

More information

Host Identity Protocol

Host Identity Protocol Presentation outline Host Identity Protocol Slides by: Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology http://www.hip4inter.net 2 What is HIP? Motivation HIP

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

Exploring Alternative Routes Using Multipath TCP

Exploring Alternative Routes Using Multipath TCP Exploring Alternative Routes Using Multipath TCP 1/51 Exploring Alternative Routes Using Multipath TCP Stephen Brennan Case Western Reserve University June 5, 2017 Exploring Alternative Routes Using Multipath

More information

CSE 461 Connections. David Wetherall

CSE 461 Connections. David Wetherall CSE 461 Connections David Wetherall djw@cs.washington.edu Connections Focus How do we (reliably) connect processes? This is the transport layer Topics Naming processes TCP / UDP Connection setup / teardown

More information

Randall Stewart, Cisco Systems Phill Conrad, University of Delaware

Randall Stewart, Cisco Systems Phill Conrad, University of Delaware SCTP: An Overview Randall Stewart, Cisco Systems Phill Conrad, University of Delaware 1 Our Objectives Be able to explain what SCTP is, and what its major features are when and why you might use it (instead

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Containers Do Not Need Network Stacks

Containers Do Not Need Network Stacks s Do Not Need Network Stacks Ryo Nakamura iijlab seminar 2018/10/16 Based on Ryo Nakamura, Yuji Sekiya, and Hajime Tazaki. 2018. Grafting Sockets for Fast Networking. In ANCS 18: Symposium on Architectures

More information

libvnf: building VNFs made easy

libvnf: building VNFs made easy libvnf: building VNFs made easy Priyanka Naik, Akash Kanase, Trishal Patel, Mythili Vutukuru Dept. of Computer Science and Engineering Indian Institute of Technology, Bombay SoCC 18 11 th October, 2018

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

LISP Mobile-Node. draft-meyer-lisp-mn-05.txt. Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems

LISP Mobile-Node. draft-meyer-lisp-mn-05.txt. Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems LISP Mobile-Node draft-meyer-lisp-mn-05.txt Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems EID: dino@cisco.com RLOC: IRTF MobOpts Quebec City July 28 2011 What if... A mobile device

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

ILNP: a whirlwind tour

ILNP: a whirlwind tour ILNP: a whirlwind tour Saleem Bhatti, University of St Andrews, UK 2010-10-03 NANOG50. Copyright 2010 Saleem Bhatti. 1 Outline 1. What? Basic information about ILNP. 2. Why? The rationale for ILNP. 3.

More information

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve

More information

Networking is IPC : A Guiding Principle to a Better Internet

Networking is IPC : A Guiding Principle to a Better Internet Networking is IPC : A Guiding Principle to a Better Internet Internet 1.0 is broken Internet 2.0 is a repeat with more b/w How about Internet 3.0? Ibrahim Matta Computer Science Boston University Joint

More information

Design and Implementation of Service Migration

Design and Implementation of Service Migration Design and Implementation of Service Migration ( 服務遷徙之設計與實現 ) Chin-Shiuh Shieh ( 謝欽旭 ) Department of Electronic Engineering National Kaohsiung University of Science and Technology, Taiwan 2018/04/13 C.-S.

More information

Infrastructure to Application Information Exposure and Communications (i2aex) -- DC Case

Infrastructure to Application Information Exposure and Communications (i2aex) -- DC Case Infrastructure to Application Information Exposure and Communications (i2aex) -- DC Case IETF i2aex BoF Dra/ version: v0.6 Mar. 26, 2012 Based on Input from Many People Kamil Bajda- Pawlikowski Florin

More information

MPTCP Application Considerations. draft-scharf-mptcp-api-00.txt. Michael Scharf Alan Ford

MPTCP Application Considerations. draft-scharf-mptcp-api-00.txt. Michael Scharf Alan Ford MPTCP Application Considerations draft-scharf-mptcp-api-00.txt Michael Scharf Alan Ford November 9, 2009 Scope From MPTCP Charter: e. An extended

More information

CSE/EE 461 Lecture 14. Connections. Last Time. This Time. We began on the Transport layer. Focus How do we send information reliably?

CSE/EE 461 Lecture 14. Connections. Last Time. This Time. We began on the Transport layer. Focus How do we send information reliably? CSE/EE 461 Lecture 14 Connections Last Time We began on the Transport layer Focus How do we send information reliably? Topics ARQ and sliding windows Application Presentation Session Transport Network

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

Putting it all together

Putting it all together Putting it all together What happens when a user shows up to a new network and wants to access a web site? (These are new slides. Please stop and ask questions if anything is unclear!) Scenario Scenario

More information

IPv6: Are we really ready to turn off IPv4?

IPv6: Are we really ready to turn off IPv4? IPv6: Are we really ready to turn off IPv4? In-situ transition In-situ transition Phase 1 Early Deployment IPv4 Internet Edge Dual-Stack Networks IPv6 networks interconnect by IPv6-over-IPv4 tunnels In-situ

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

CSC 4900 Computer Networks: Link Layer (3)

CSC 4900 Computer Networks: Link Layer (3) CSC 4900 Computer Networks: Link Layer (3) Professor Henry Carter Fall 2017 Link Layer 6.1 Introduction and services 6.2 Error detection and correction 6.3 Multiple access protocols 6.4 LANs addressing,

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN

More information

Preparing CMS for an IP Version 6 World

Preparing CMS for an IP Version 6 World Preparing CMS for an IP Version 6 World David Boyes HillGang Feb 23, 2006 2006 Sine Nomine Associates Agenda Quick Overview of IPv6 Why IPv6 Matters Current State of IPv6 Support in z/vm Current State

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

Why do we really want an ID/locator split anyway?

Why do we really want an ID/locator split anyway? Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

From Feast to Famine Managing mobile network resources across environments and preferences

From Feast to Famine Managing mobile network resources across environments and preferences From Feast to Famine Managing mobile network resources across environments and preferences Rob Kiefer Erik Nordström Michael Freedman Princeton University Network Usage Makes Demands on Limited Resources

More information

IPv6 Adaptation of EtherNet/IP

IPv6 Adaptation of EtherNet/IP IPv6 Adaptation of EtherNet/IP Evolution not Revolution www.odva.org Technical Track IPv4 Address Pool Depleted IANA issued last 5 blocks to the 5 RIRs on 3 February 0 5 April 0, AP runs out 4 Sept 0,

More information

Evolving the Internet Architecture Through Naming

Evolving the Internet Architecture Through Naming Evolving the Internet Architecture Through Naming Ran Atkinson, Cheltenham, USA Saleem Bhatti, University of St Andrews, UK Steve Hailes, University College London, UK 1 What s in a name? Juliet: "What's

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

Windows Server System Center Azure Pack

Windows Server System Center Azure Pack Windows Server System Center Azure Pack Tenant Deployment Multi-Tier LOB Application Tenant Deployment Multi-Tier LOB Application Inbox feature for integrated management of IP addresses, domain

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

HY436: Network Virtualization

HY436: Network Virtualization HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs

More information

ADX Software Updates and the Application Resource Broker (ARB) Introduction

ADX Software Updates and the Application Resource Broker (ARB) Introduction ADX Software Updates and the Application Resource Broker (ARB) Introduction Objectives Upon completion of this module, you will be able to: Discuss ADX licensing Describe the Application Resource Broker

More information

Increasing network resilience through edge diversity in NEBULA

Increasing network resilience through edge diversity in NEBULA Increasing network resilience through edge diversity in NEBULA Matvey Arye a Robert Kiefer a Kyle Super b Erik Nordström a Michael J. Freedman a Eric Keller c Tom Rondeau b Jonathan M. Smith b a Computer

More information

TRex Realistic Traffic Generator

TRex Realistic Traffic Generator DEVNET-1120 TRex Realistic Traffic Generator Hanoch Haim, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco

More information

Developing Stateful Middleboxes with the mos API KYOUNGSOO PARK & YOUNGGYOUN MOON

Developing Stateful Middleboxes with the mos API KYOUNGSOO PARK & YOUNGGYOUN MOON Developing Stateful Middleboxes with the mos API KYOUNGSOO PARK & YOUNGGYOUN MOON ASIM JAMSHED, DONGHWI KIM, & DONGSU HAN SCHOOL OF ELECTRICAL ENGINEERING, KAIST Network Middlebox Networking devices that

More information

IPv6. Internet Technologies and Applications

IPv6. Internet Technologies and Applications IPv6 Internet Technologies and Applications Contents Summary of IPv6 core features Auto-configuration IPv4-IPv6 transition techniques IPv6 networks today ITS 413 - IPv6 2 Motivation Current version of

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Memory Management Strategies for Data Serving with RDMA

Memory Management Strategies for Data Serving with RDMA Memory Management Strategies for Data Serving with RDMA Dennis Dalessandro and Pete Wyckoff (presenting) Ohio Supercomputer Center {dennis,pw}@osc.edu HotI'07 23 August 2007 Motivation Increasing demands

More information

MultiPath TCP : Linux Kernel Implementation

MultiPath TCP : Linux Kernel Implementation MultiPath : Linux Kernel Implementation Presenter: Christoph Paasch IP Networking Lab Université catholique de Louvain February 3, 2012 http://mptcp.info.ucl.ac.be Presenter: Christoph Paasch - IP Networking

More information

NAT Support for Multiple Pools Using Route Maps

NAT Support for Multiple Pools Using Route Maps NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host

More information

Path Awareness and Selection in the Socket Intents prototype. Theresa Enghardt TU Berlin

Path Awareness and Selection in the Socket Intents prototype. Theresa Enghardt TU Berlin Path Awareness and Selection in the Socket Intents prototype Theresa Enghardt TU Berlin theresa@inet.tu-berlin.de Scenario: Multiple paths Multiple paths via different access networks Laptop can use WiFi

More information

Design and development of the reactive BGP peering in softwaredefined routing exchanges

Design and development of the reactive BGP peering in softwaredefined routing exchanges Design and development of the reactive BGP peering in softwaredefined routing exchanges LECTURER: HAO-PING LIU ADVISOR: CHU-SING YANG (Email: alen6516@gmail.com) 1 Introduction Traditional network devices

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote

More information

Host Identity Protocol, PLA, and PSIRP

Host Identity Protocol, PLA, and PSIRP Contents Host Identity Protocol, PLA, and PSIRP Prof. Sasu Tarkoma 23.02.2009 Introduction Current state Host Identity Protocol (HIP) Packet Level Authentication (PLA) Overlays (i3 and Hi3) Clean-slate

More information

Implementing IP Addressing Services

Implementing IP Addressing Services Implementing IP Addressing Services Accessing the WAN Chapter 7 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Configure DHCP in an enterprise branch network Configure

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information