Loaded: Server Load Balancing for IPv6

Size: px
Start display at page:

Download "Loaded: Server Load Balancing for IPv6"

Transcription

1 Loaded: Server Load Balancing for IPv6 Sven Friedrich, Sebastian Krahmer, Lars Schneidenbach, Bettina Schnor Institute of Computer Science University Potsdam Potsdam, Germany fsfried, krahmer, lschneid, Abstract With the next generation Internet protocol IPv6 at the horizon, it is time to think about how applications can migrate to IPv6. Web traffic is currently one of the most important applications in the Internet. The increasing popularity of dynamically generated content on the World Wide Web, has created the need for fast web servers. Server clustering together with server load balancing has emerged as a promising technique to build scalable web servers. The paper gives a short overview over the new features of IPv6 and different server load balancing technologies. Further, we present and evaluate Loaded, an user-space server load balancer for IPv4 and IPv6 based on Linux. 1. Introduction Clusters are a widespread platform for high-performance and high-availability computing. In the most cases, socalled Beowulf Clusters [3] are used which consist of offthe-shelf Personal Computer (PC) technology running the Linux operating system. Linux is supporting IPv6 since version 2.5 (also back-ported to 2.4 and 2.2 Kernels). For high-performance clusters, there have been several message passing libraries developed which support parallel applications. The most prominent is the Message Passing Interface (MPI) which is a standard specification for message-passing libraries [14]. In [15] it was shown how MPICH, an MPI implementation from the Argonne National Lab and the Mississippi State University [10, 13] was ported to IPv6. Due to the good design of MPICH this work was more or the less straightforward. In this paper we present an effort to use IPv6 within highavailability clusters. In order to reliably serve dynamically generated content to an increasing number of clients, web servers have to be highly available and scalable. Server clustering in conjunction with server load balancing is a promising technique to build high availability clusters. IPv6 will be required by future web servers. And therefore, server load balancers need to support IPv6, too. The paper is organized as follows. Section 2 gives an introduction to common server load balancing technologies. Section 3 and 4 outline important features of IPv6 and the netfilter interface of Linux. Further sections present details of Loaded our server load balancing software and present evaluation results. The paper concludes with discussion and future work. 2. Server Load Balancing Technologies Server load balancing is a mechanism to make a service scalable, fast, and more reliable. Clients contact a service via a Virtual IP (VIP) address. This VIP belongs to a front end server that forwards the requests to the back-end servers by using load balancing strategies. There are often dozens or even hundreds of servers operating behind a single VIP. Figure 1 shows a server load balancer (SLB), sometimes in the literature also called dispatcher, with two network connections, a so-called two-armed load balancer [5]. The SLB performs network address translation (NAT) from one network to another. This enables for example the back-end servers to have only private IPs. The tasks of a server load balancer are: ffl load balancing: distributing incoming packets onto the back-end servers, ffl health checking: monitoring the back-end servers and taking a crashed server out of the distribution. While the back-end provides reliability through replicated services, the SLB is still a single point of failure. Therefore, the SLB is also often replicated itself and an active-standby or active-active scenario is used [5]. There exist several different load balancing systems, commercial and non-commercial [16]. A prominent example is the Linux Virtual Server (LVS) [1, 17]. LVS extends the TCP/IP stack of the Linux kernel to support three IP load

2 Server 1 Internet VIP Server Dispatcher Server Figure 1. Server Load Balancing Example. balancing techniques, LVS/NAT, LVS/TUN, and LVS/DR. LVS supports four scheduling algorithms: 1. Round-Robin of connection requests. 2. Weighted Round-Robin performs like Round-Robin, but can treat servers with different processing capacity. 3. Least-Connection scheduling directs network connections to the server with the least number of active connections. 4. Weighted Least-Connection Scheduling performs Least-Connection scheduling, but can treat servers with different processing capacity. Bryhni and al. have analyzed different load balancing algorithms in a homogeneous system where all servers have the same processing capacity [6]. They compare four scheduling algorithms, Round-Robin, Least-Connection, and two more complex strategies. Their results show that, while Round-Robin is a very simple strategy, it has the best performance. 3. IPv6 Features In this section we give a short overview over the new IPv6 features. More information can be found in the literature [8, 11, 7]. The main motivation of the new specification of the Internet protocol is the address space limitations. The global Internet has experienced many years of sustained exponential growth, doubling in size every nine months or faster. In 1999, on the average, a new host appeared on the Internet every two seconds [7]. However, the 32-bit address space of IPv4 is limited and, even more, unfair divided between different organizations. While network address translation technology seems to be a solution for some topologies like managing multiple LANs of one corporation, it cannot handle the needs of new evolving Internet areas like for example China. The most important changes specified with IPv6 are: 1. Larger Addresses. The 128 Bits Addresses are the most noticeable change. The address space is greater than 3:4x10 38 which results in over addresses per square meter of the earth s surface [7]. 2. New Datagram Format. Opposite to IPv4 the new protocol has a so-called Base Header of fixed length, namely a 40 Bytes Base Header. This Base Header may follow so-called Extension Headers for special purposes. Whether an Extension Header follows or not is specified in the NEXT-HEADER field of the Base Header. Possible, already specified extension headers are for example headers with routing, fragmentation, authentication, and encryption information. 3. Extension Capability. The concept of base and extension headers is a powerful instrument to adapt the protocol to future needs. In case, IPv6 needs to support a new feature, the only task is to specify a new extension header for this. 4. Security. The protocols of IPsec [7] for secure Internet communication are mandatory. 5. End-to-End Fragmentation. IPv6 uses end-to-end fragmentation to avoid assembling and re-assembling overhead in routers. The sending host can either use the guaranteed minimum MTU of 1280 bytes or perform a Path MTU Discovery to determine the minimum MTU along the path to the destination host. The new addressing scheme is one of the main new features of IPv6. Along with this comes a new class of addresses, the so-called Anycast-addresswhich is defined similar to a Multicast-address, but only one machine out of a group must receive the message. This address class is obviously useful for server load balancing. But our investigation showed that currently this address is neither used for load balancing nor does a server load balancer exist for IPv6 at all.

3 4. The Linux Netfilter Interface Since the kernel 2.4 Linux implements the easy-tohandle netfilter interface for packet filtering [4]. Packets may be accepted, discarded, forwarded or rewritten in case of NAT. There are three chains per default: input, forwarding and output chain. Netfilter knows different targets which tell what to do with a packet which matches a rule, for example DROP, ACCEPT or QUEUE. In case of the target QUEUE, the packet is queued for further user-space processing. Hence, the packet may be modified by a user program and then forwarded back to the kernel. For using the QUEUE target, the libipq library is needed. 5. Loaded Since LVS is implemented within the communication part of the kernel, a port of LVS to IPv6 is not straightforward. Instead, Loaded uses the netfilter interface to implement server load balancing in the user-space. The benefit of a user-space solution is that it is easy to port to different protocols. Up to now we support IPv4 and IPv6, currently we are working on InfiniBand [9, 12]. The drawback compared with a kernel solution like LVS is the additional overhead for context switches between kernel and user mode Features The main features of Loaded are: ffl network address translation, ffl server load balancing, and ffl health checking. Loaded is an easy-to-handle server load balancer software that is developed for two-armed environments (see Figure 1). Running in a two-armed setup, loaded can handle a private back-end hidden from the public network for security issues. In this environment, Loaded on the frontend server acts as router/gateway software for the back-end and uses NAT to route traffic. Two scheduling algorithms are supported at the moment: Round Robin and Weighted Round Robin (see Section 2). These algorithms can be easily extended or modified. A neighbor discovery mechanism is implemented to ensure the availability of the services on back-end machines Architecture Loaded is implemented in C++ and runs as a user-space service [2]. It consists of three components - the packet packet handling libipq kernel / netfilter scheduler neighbor discovery Figure 2. Architecture of Loaded. packet to handle interaction handling, a scheduler, and a neighbor discovery - shown in Figure 2. Incoming traffic that hits the virtual IP address of the load balancer is delivered to Loaded by the netfilter-kernel component via the QUEUE-target. The packet handling component is responsible for changing IP packet header information (source, destination), recalculating the TCP checksum, and in case of IPv4 the IP checksum. An appropriate back-end server is chosen by the scheduler using the configured algorithm. The chosen IP address is taken by the packet handling to perform the network address translation. Then the packet is given back to the kernel and forwarded to the back-end. For outgoing traffic the packet handling replaces the source address of the back-end server with the virtual IP of the load balancer. The load balancer has to distinguish between incoming and outgoing traffic. This decision is made by looking at the destination IP address. If it is the virtual IP of the load balancer then it belongs to incoming traffic. Multiple back-end servers provide a robust environment. If a server fails, others can take over its load. Loaded has a build in neighbor discovery to remove failed servers from the schedulers list and put new installed servers into the list of known back-end servers. Running in an extra thread the neighbor discovery periodically broadcasts a ping into the back-end network. For all replying machines the availability of the balanced service(s) is checked. The neighbor discovery mechanism also provides scalability by automatic detection of new added back-end servers. Several services require a persistent connection. In this case Round Robin scheduled requests would break the connection. When the first packet from an unknown client is received then a back-end server is chosen and the tuple (client IP, back-end server IP) is stored. All following IP packets from the same source (client IP address) will be forwarded to this server. Coupling client IP addresses to a back-end server has a drawback in conjunction with the use of network address

4 12 10 LVS loaded IP version 4 comparison: LVS - loaded bandwidth [MB/s] datasize [Byte] Figure 3. Comparison for IPv4. translation in the Internet, since a NAT-router turns a lot of client IP addresses into one. This results in a kind of dedicated back-end server for a large number of clients. The reason for this is that a persistent TCP connection is invisible at IP-level and therefore the load balancer can not decide to delete the saved tuple Challenges Due to the use of iptables and the netfilter interface, it was similarly complex to implement Loaded with IPv6 and IPv4 support. The main work to do was the handling of IPv6 headers and addresses. A minor difference is that there is no need to calculate a header checksum for IPv6 packets. 6. Performance Since a real world scenario with thousands of clients is hard to setup, SLBs are often evaluated in simulation studies (see for example [6]). The focus of our performance tests was to investigate the overhead added by the user-space approach of Loaded. This can only be done in real measurements. The testbed consists of one front-end server and two back-end servers, all Pentium III 800 Mhz machines, connected via a Fast Ethernet switch. One machine was used to initiate client requests. The evaluation of Loaded is done by measuring the achievable bandwidth. Therefore, the front end was first configured only as a router, and then as a SLB with Loaded. In case of IPv4 we also compare it against LVS. Measuring the bandwidth is done with a simple TCP pingpong benchmark that sends and receives messages of a given size. First, we compare the achievable bandwidth of Loaded and LVS in a IPv4 network (see Figure 3). The bandwidth of LVS was the same as the routing bandwidth, therefore the routing measurement is not presented. Figure 3 shows that Loaded performs nearly as good as LVS. In case of Loaded, for each packet a mode switch from kernel to user mode and back is necessary. This results for example in a bandwidth reduction of 24 % for small packets of 127 Bytes, and 5.5 % for 4 KBytes packets. For small messages the latency is increased by about 30 μs. Since a user application has no access to kernel memory, the packet has to be copied, leading to a slightly increasing latency for larger packets (up to 60 μs for 64 KByte packets). The IPv6 and IPv4 results are similar due to the same reasons. Figure 4 shows the performance differences between the front-end machine running as a router and as a server load balancer in an IPv6 network. The figures imply that neither LVS nor Loaded are the performance bottleneck. The only bandwidth limitation was the network capacity. 7. Conclusion and Future Work We have presented Loaded, an user-space server load balancer for IPv4 and IPv6 networks. The performance figures show that the performance loss due to additional user/kernel mode switches is acceptable. On the other hand, the decision to implement an user-space solution leads to higher portability and flexibility.

5 12 10 routing only loaded balancing IP version 6 comparision: routing - loaded bandwidth [MB/s] datasize [Byte] Figure 4. Comparison for IPv6. Measurements have to be repeated using high-speed interconnects like GigabitEthernet to evaluate the overhead under higher load. Currently, we are evaluating two different approaches for server load balancing in InfiniBand networks. The first approach uses Loaded and IP-over-InfiniBand. The other uses Loaded to inject IP-Packets into native InfiniBand networks. References [1] Linux virtual server homepage. [2] Loaded information and source code. [3] D.J.Becker,T.Sterling,D.Savarese,J.E.Dorband,U.A. Ranawake, and C. V. Packer. Beowulf: A parallel workstation for scientific computation. In Proceedings of the International Conference on Parallel Processing (ICPP), pages 11 14, [4] C. Bienvenuti. O Reilly, [5] T. Bourke. Server Load Balancing. O Reilly, [6] H. Bryhni, E. Klovning, and O. Kure. A comparison of load balancing techniques for scalable web servers. IEEE Network, 14(4):58 64, [7] D. Comer. Internetworking with TCP/IP - Principles, Protocols, and Architectures. Prentice Hall, fourth edition, [8] S. Deering and R. Hinden. Internet protocol, version 6 (ipv6) specification. IETF RFC 2460, [9] S. Friedrich, L. Schneidenbach, and B. Schnor. SLIBNet: Server Load Balancing for InfiniBand Networks. Technical Report TR , University Potsdam, [10] W. Gropp, E. Lusk, N. Doss, and A. Skjellum. A High- Performance, Portable Implementation of the MPI Message Passing Interface Standard. Parallel Computing, 22(6): , [11] R. Hinden and S. Deering. Internet protocol version 6 (ipv6) addressing architecture. IETF RFC 3513, Apr [12] InfiniBand Trade Association. Infiniband architecture specification volumes 1 and 2 release [13] MPICH Home Page. mpi/mpich/. [14] MPI: A Message Passing Interface Standard, June Message Passing Interface Forum. [15] L. Schneidenbach and B. Schnor. Migration of MPI Applications to IPv6 Networks. In Proceedings of the PDCN 2005, pages , Innsbruck, A, Feb [16] T. Schroeder, S. Goddard, and B. Tamamurthy. Scalable web server clustering technologies. IEEE Network, 14(3):38 45, [17] W. Zhang. Linux virtual server for scalable network services. In Ottawa Linux Symposium, 2000.

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Multicast can be implemented here

Multicast can be implemented here MPI Collective Operations over IP Multicast? Hsiang Ann Chen, Yvette O. Carrasco, and Amy W. Apon Computer Science and Computer Engineering University of Arkansas Fayetteville, Arkansas, U.S.A fhachen,yochoa,aapong@comp.uark.edu

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

An Industry view of IPv6 Advantages

An Industry view of IPv6 Advantages An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming

More information

Group Management Schemes for Implementing MPI Collective Communication over IP Multicast

Group Management Schemes for Implementing MPI Collective Communication over IP Multicast Group Management Schemes for Implementing MPI Collective Communication over IP Multicast Xin Yuan Scott Daniels Ahmad Faraj Amit Karwande Department of Computer Science, Florida State University, Tallahassee,

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

Asst. Prof. Chaiporn Jaikaeo, Ph.D.

Asst. Prof. Chaiporn Jaikaeo, Ph.D. IP Version 6 Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from the notes by Lami

More information

Contents. Configuring GRE 1

Contents. Configuring GRE 1 Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE security mechanisms 2 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4

More information

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

LSMAC and LSNAT: Two Approaches for Cluster-based Scalable Web Servers

LSMAC and LSNAT: Two Approaches for Cluster-based Scalable Web Servers 1 LSMAC and LSNAT: Two Approaches for Cluster-based Scalable Web Servers Xuehong Gan a,1, Trevor Schroeder b, Steve Goddard b, and Byrav Ramamurthy b a Microsoft Corporation b Department of Computer Science

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Performance Evaluation of NEMO Basic Support Implementations

Performance Evaluation of NEMO Basic Support Implementations Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Contents. Configuring GRE 1

Contents. Configuring GRE 1 Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4 tunnel 4 Configuration guidelines

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

CS 520: Network Architecture I Winter Lecture 11: NAT and IPv6

CS 520: Network Architecture I Winter Lecture 11: NAT and IPv6 CS 520: Network Architecture I Winter 2007 Lecture 11: NAT and IPv6 The previous lecture discussed how subnetting and supernetting (CIDR) can be used to make better use of global IP addresses. This lecture

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.

More information

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments. This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

ECE 435 Network Engineering Lecture 14

ECE 435 Network Engineering Lecture 14 ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of

More information

IPv6. (Internet Protocol version 6)

IPv6. (Internet Protocol version 6) IPv6 Réseaux 1 IPv6 (Internet Protocol version 6) 2 IPv6 IP version 6 is the new version of the Internet Protocol (IP) The standardization process started in the 90s The main elements of IPv4 are still

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Lecture 10: Internetworking"

Lecture 10: Internetworking Lecture 10: Internetworking" CSE 123: Computer Networks Alex C. Snoeren HW 2 due NOW! Lecture 10 Overview" Spanning Tree Internet Protocol Service model Packet format 2 Spanning Tree Algorithm" Each bridge

More information

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010

Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010 Introduction ti to IPv6 (Part A) Athanassios Liakopoulos (aliako@grnet.gr) Slovenian IPv6 Training, Ljubljana, May 2010 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

IPv6 : Internet Protocol Version 6

IPv6 : Internet Protocol Version 6 IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s) History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

NAT Router Performance Evaluation

NAT Router Performance Evaluation University of Aizu, Graduation Thesis. Mar, 22 17173 1 NAT Performance Evaluation HAYASHI yu-ichi 17173 Supervised by Atsushi Kara Abstract This thesis describes a quantitative analysis of NAT routers

More information

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut Computer Security Spring 2008 Firewalls Aggelos Kiayias University of Connecticut Idea: Monitor inbound/ outbound traffic at a communication point Firewall firewall Internet LAN A firewall can run on any

More information

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

CS 520: Network Architecture I Winter Lecture 11: IP Address Conservation

CS 520: Network Architecture I Winter Lecture 11: IP Address Conservation CS 520: Network Architecture I Winter 2006 Lecture 11: IP Address Conservation This lecture provides discussion of several approaches that are used to make better use of the IP address space. Subnetting

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Outline. Introduction. The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping

Outline. Introduction. The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping Outline Introduction The Internet of Things Applications of 6LoWPAN The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping Link-Layer Commissioning

More information

Introduction to IPv6. Unit -2. Prepared By:- NITIN PANDYA Assistant Professor, SVBIT.

Introduction to IPv6. Unit -2. Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. Introduction to IPv6 Unit -2 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. IP Network Addressing INTERNET world s largest public data network, doubling in size every nine months IPv4, defines

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication John Markus Bjørndalen, Otto J. Anshus, Brian Vinter, Tore Larsen Department of Computer Science University

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

PART IV. Internetworking Using TCP/IP

PART IV. Internetworking Using TCP/IP PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches

More information

Computer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014.

Computer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014. Course Reference Model Computer Networks 7 lication Provides functions needed by users Zhang, Xinyu Fall 2014 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem. Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Document ID: 107615 Contents Introduction Before You Begin Conventions Prerequisites Components Used Understanding BGP Processes

More information

EE 122 Fall 2010 Discussion Section III 5 October 2010

EE 122 Fall 2010 Discussion Section III 5 October 2010 EE 122 Fall 2010 Discussion Section III 5 October 2010 http://www.cs.berkeley.edu/~alspaugh/ee122/fa10/ Question 1: IP Header This is the IPv4 header structure we will need for the problems Kisco Inc.

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga The Network Layer Antonio Carzaniga Faculty of Informatics University of Lugano April 22, 2010 Basic network-layer architecture of a datagram network Outline Introduction to forwarding Introduction to

More information

Intra-MIC MPI Communication using MVAPICH2: Early Experience

Intra-MIC MPI Communication using MVAPICH2: Early Experience Intra-MIC MPI Communication using MVAPICH: Early Experience Sreeram Potluri, Karen Tomko, Devendar Bureddy, and Dhabaleswar K. Panda Department of Computer Science and Engineering Ohio State University

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information