Loaded: Server Load Balancing for IPv6
|
|
- Patrick Hart
- 6 years ago
- Views:
Transcription
1 Loaded: Server Load Balancing for IPv6 Sven Friedrich, Sebastian Krahmer, Lars Schneidenbach, Bettina Schnor Institute of Computer Science University Potsdam Potsdam, Germany fsfried, krahmer, lschneid, Abstract With the next generation Internet protocol IPv6 at the horizon, it is time to think about how applications can migrate to IPv6. Web traffic is currently one of the most important applications in the Internet. The increasing popularity of dynamically generated content on the World Wide Web, has created the need for fast web servers. Server clustering together with server load balancing has emerged as a promising technique to build scalable web servers. The paper gives a short overview over the new features of IPv6 and different server load balancing technologies. Further, we present and evaluate Loaded, an user-space server load balancer for IPv4 and IPv6 based on Linux. 1. Introduction Clusters are a widespread platform for high-performance and high-availability computing. In the most cases, socalled Beowulf Clusters [3] are used which consist of offthe-shelf Personal Computer (PC) technology running the Linux operating system. Linux is supporting IPv6 since version 2.5 (also back-ported to 2.4 and 2.2 Kernels). For high-performance clusters, there have been several message passing libraries developed which support parallel applications. The most prominent is the Message Passing Interface (MPI) which is a standard specification for message-passing libraries [14]. In [15] it was shown how MPICH, an MPI implementation from the Argonne National Lab and the Mississippi State University [10, 13] was ported to IPv6. Due to the good design of MPICH this work was more or the less straightforward. In this paper we present an effort to use IPv6 within highavailability clusters. In order to reliably serve dynamically generated content to an increasing number of clients, web servers have to be highly available and scalable. Server clustering in conjunction with server load balancing is a promising technique to build high availability clusters. IPv6 will be required by future web servers. And therefore, server load balancers need to support IPv6, too. The paper is organized as follows. Section 2 gives an introduction to common server load balancing technologies. Section 3 and 4 outline important features of IPv6 and the netfilter interface of Linux. Further sections present details of Loaded our server load balancing software and present evaluation results. The paper concludes with discussion and future work. 2. Server Load Balancing Technologies Server load balancing is a mechanism to make a service scalable, fast, and more reliable. Clients contact a service via a Virtual IP (VIP) address. This VIP belongs to a front end server that forwards the requests to the back-end servers by using load balancing strategies. There are often dozens or even hundreds of servers operating behind a single VIP. Figure 1 shows a server load balancer (SLB), sometimes in the literature also called dispatcher, with two network connections, a so-called two-armed load balancer [5]. The SLB performs network address translation (NAT) from one network to another. This enables for example the back-end servers to have only private IPs. The tasks of a server load balancer are: ffl load balancing: distributing incoming packets onto the back-end servers, ffl health checking: monitoring the back-end servers and taking a crashed server out of the distribution. While the back-end provides reliability through replicated services, the SLB is still a single point of failure. Therefore, the SLB is also often replicated itself and an active-standby or active-active scenario is used [5]. There exist several different load balancing systems, commercial and non-commercial [16]. A prominent example is the Linux Virtual Server (LVS) [1, 17]. LVS extends the TCP/IP stack of the Linux kernel to support three IP load
2 Server 1 Internet VIP Server Dispatcher Server Figure 1. Server Load Balancing Example. balancing techniques, LVS/NAT, LVS/TUN, and LVS/DR. LVS supports four scheduling algorithms: 1. Round-Robin of connection requests. 2. Weighted Round-Robin performs like Round-Robin, but can treat servers with different processing capacity. 3. Least-Connection scheduling directs network connections to the server with the least number of active connections. 4. Weighted Least-Connection Scheduling performs Least-Connection scheduling, but can treat servers with different processing capacity. Bryhni and al. have analyzed different load balancing algorithms in a homogeneous system where all servers have the same processing capacity [6]. They compare four scheduling algorithms, Round-Robin, Least-Connection, and two more complex strategies. Their results show that, while Round-Robin is a very simple strategy, it has the best performance. 3. IPv6 Features In this section we give a short overview over the new IPv6 features. More information can be found in the literature [8, 11, 7]. The main motivation of the new specification of the Internet protocol is the address space limitations. The global Internet has experienced many years of sustained exponential growth, doubling in size every nine months or faster. In 1999, on the average, a new host appeared on the Internet every two seconds [7]. However, the 32-bit address space of IPv4 is limited and, even more, unfair divided between different organizations. While network address translation technology seems to be a solution for some topologies like managing multiple LANs of one corporation, it cannot handle the needs of new evolving Internet areas like for example China. The most important changes specified with IPv6 are: 1. Larger Addresses. The 128 Bits Addresses are the most noticeable change. The address space is greater than 3:4x10 38 which results in over addresses per square meter of the earth s surface [7]. 2. New Datagram Format. Opposite to IPv4 the new protocol has a so-called Base Header of fixed length, namely a 40 Bytes Base Header. This Base Header may follow so-called Extension Headers for special purposes. Whether an Extension Header follows or not is specified in the NEXT-HEADER field of the Base Header. Possible, already specified extension headers are for example headers with routing, fragmentation, authentication, and encryption information. 3. Extension Capability. The concept of base and extension headers is a powerful instrument to adapt the protocol to future needs. In case, IPv6 needs to support a new feature, the only task is to specify a new extension header for this. 4. Security. The protocols of IPsec [7] for secure Internet communication are mandatory. 5. End-to-End Fragmentation. IPv6 uses end-to-end fragmentation to avoid assembling and re-assembling overhead in routers. The sending host can either use the guaranteed minimum MTU of 1280 bytes or perform a Path MTU Discovery to determine the minimum MTU along the path to the destination host. The new addressing scheme is one of the main new features of IPv6. Along with this comes a new class of addresses, the so-called Anycast-addresswhich is defined similar to a Multicast-address, but only one machine out of a group must receive the message. This address class is obviously useful for server load balancing. But our investigation showed that currently this address is neither used for load balancing nor does a server load balancer exist for IPv6 at all.
3 4. The Linux Netfilter Interface Since the kernel 2.4 Linux implements the easy-tohandle netfilter interface for packet filtering [4]. Packets may be accepted, discarded, forwarded or rewritten in case of NAT. There are three chains per default: input, forwarding and output chain. Netfilter knows different targets which tell what to do with a packet which matches a rule, for example DROP, ACCEPT or QUEUE. In case of the target QUEUE, the packet is queued for further user-space processing. Hence, the packet may be modified by a user program and then forwarded back to the kernel. For using the QUEUE target, the libipq library is needed. 5. Loaded Since LVS is implemented within the communication part of the kernel, a port of LVS to IPv6 is not straightforward. Instead, Loaded uses the netfilter interface to implement server load balancing in the user-space. The benefit of a user-space solution is that it is easy to port to different protocols. Up to now we support IPv4 and IPv6, currently we are working on InfiniBand [9, 12]. The drawback compared with a kernel solution like LVS is the additional overhead for context switches between kernel and user mode Features The main features of Loaded are: ffl network address translation, ffl server load balancing, and ffl health checking. Loaded is an easy-to-handle server load balancer software that is developed for two-armed environments (see Figure 1). Running in a two-armed setup, loaded can handle a private back-end hidden from the public network for security issues. In this environment, Loaded on the frontend server acts as router/gateway software for the back-end and uses NAT to route traffic. Two scheduling algorithms are supported at the moment: Round Robin and Weighted Round Robin (see Section 2). These algorithms can be easily extended or modified. A neighbor discovery mechanism is implemented to ensure the availability of the services on back-end machines Architecture Loaded is implemented in C++ and runs as a user-space service [2]. It consists of three components - the packet packet handling libipq kernel / netfilter scheduler neighbor discovery Figure 2. Architecture of Loaded. packet to handle interaction handling, a scheduler, and a neighbor discovery - shown in Figure 2. Incoming traffic that hits the virtual IP address of the load balancer is delivered to Loaded by the netfilter-kernel component via the QUEUE-target. The packet handling component is responsible for changing IP packet header information (source, destination), recalculating the TCP checksum, and in case of IPv4 the IP checksum. An appropriate back-end server is chosen by the scheduler using the configured algorithm. The chosen IP address is taken by the packet handling to perform the network address translation. Then the packet is given back to the kernel and forwarded to the back-end. For outgoing traffic the packet handling replaces the source address of the back-end server with the virtual IP of the load balancer. The load balancer has to distinguish between incoming and outgoing traffic. This decision is made by looking at the destination IP address. If it is the virtual IP of the load balancer then it belongs to incoming traffic. Multiple back-end servers provide a robust environment. If a server fails, others can take over its load. Loaded has a build in neighbor discovery to remove failed servers from the schedulers list and put new installed servers into the list of known back-end servers. Running in an extra thread the neighbor discovery periodically broadcasts a ping into the back-end network. For all replying machines the availability of the balanced service(s) is checked. The neighbor discovery mechanism also provides scalability by automatic detection of new added back-end servers. Several services require a persistent connection. In this case Round Robin scheduled requests would break the connection. When the first packet from an unknown client is received then a back-end server is chosen and the tuple (client IP, back-end server IP) is stored. All following IP packets from the same source (client IP address) will be forwarded to this server. Coupling client IP addresses to a back-end server has a drawback in conjunction with the use of network address
4 12 10 LVS loaded IP version 4 comparison: LVS - loaded bandwidth [MB/s] datasize [Byte] Figure 3. Comparison for IPv4. translation in the Internet, since a NAT-router turns a lot of client IP addresses into one. This results in a kind of dedicated back-end server for a large number of clients. The reason for this is that a persistent TCP connection is invisible at IP-level and therefore the load balancer can not decide to delete the saved tuple Challenges Due to the use of iptables and the netfilter interface, it was similarly complex to implement Loaded with IPv6 and IPv4 support. The main work to do was the handling of IPv6 headers and addresses. A minor difference is that there is no need to calculate a header checksum for IPv6 packets. 6. Performance Since a real world scenario with thousands of clients is hard to setup, SLBs are often evaluated in simulation studies (see for example [6]). The focus of our performance tests was to investigate the overhead added by the user-space approach of Loaded. This can only be done in real measurements. The testbed consists of one front-end server and two back-end servers, all Pentium III 800 Mhz machines, connected via a Fast Ethernet switch. One machine was used to initiate client requests. The evaluation of Loaded is done by measuring the achievable bandwidth. Therefore, the front end was first configured only as a router, and then as a SLB with Loaded. In case of IPv4 we also compare it against LVS. Measuring the bandwidth is done with a simple TCP pingpong benchmark that sends and receives messages of a given size. First, we compare the achievable bandwidth of Loaded and LVS in a IPv4 network (see Figure 3). The bandwidth of LVS was the same as the routing bandwidth, therefore the routing measurement is not presented. Figure 3 shows that Loaded performs nearly as good as LVS. In case of Loaded, for each packet a mode switch from kernel to user mode and back is necessary. This results for example in a bandwidth reduction of 24 % for small packets of 127 Bytes, and 5.5 % for 4 KBytes packets. For small messages the latency is increased by about 30 μs. Since a user application has no access to kernel memory, the packet has to be copied, leading to a slightly increasing latency for larger packets (up to 60 μs for 64 KByte packets). The IPv6 and IPv4 results are similar due to the same reasons. Figure 4 shows the performance differences between the front-end machine running as a router and as a server load balancer in an IPv6 network. The figures imply that neither LVS nor Loaded are the performance bottleneck. The only bandwidth limitation was the network capacity. 7. Conclusion and Future Work We have presented Loaded, an user-space server load balancer for IPv4 and IPv6 networks. The performance figures show that the performance loss due to additional user/kernel mode switches is acceptable. On the other hand, the decision to implement an user-space solution leads to higher portability and flexibility.
5 12 10 routing only loaded balancing IP version 6 comparision: routing - loaded bandwidth [MB/s] datasize [Byte] Figure 4. Comparison for IPv6. Measurements have to be repeated using high-speed interconnects like GigabitEthernet to evaluate the overhead under higher load. Currently, we are evaluating two different approaches for server load balancing in InfiniBand networks. The first approach uses Loaded and IP-over-InfiniBand. The other uses Loaded to inject IP-Packets into native InfiniBand networks. References [1] Linux virtual server homepage. [2] Loaded information and source code. [3] D.J.Becker,T.Sterling,D.Savarese,J.E.Dorband,U.A. Ranawake, and C. V. Packer. Beowulf: A parallel workstation for scientific computation. In Proceedings of the International Conference on Parallel Processing (ICPP), pages 11 14, [4] C. Bienvenuti. O Reilly, [5] T. Bourke. Server Load Balancing. O Reilly, [6] H. Bryhni, E. Klovning, and O. Kure. A comparison of load balancing techniques for scalable web servers. IEEE Network, 14(4):58 64, [7] D. Comer. Internetworking with TCP/IP - Principles, Protocols, and Architectures. Prentice Hall, fourth edition, [8] S. Deering and R. Hinden. Internet protocol, version 6 (ipv6) specification. IETF RFC 2460, [9] S. Friedrich, L. Schneidenbach, and B. Schnor. SLIBNet: Server Load Balancing for InfiniBand Networks. Technical Report TR , University Potsdam, [10] W. Gropp, E. Lusk, N. Doss, and A. Skjellum. A High- Performance, Portable Implementation of the MPI Message Passing Interface Standard. Parallel Computing, 22(6): , [11] R. Hinden and S. Deering. Internet protocol version 6 (ipv6) addressing architecture. IETF RFC 3513, Apr [12] InfiniBand Trade Association. Infiniband architecture specification volumes 1 and 2 release [13] MPICH Home Page. mpi/mpich/. [14] MPI: A Message Passing Interface Standard, June Message Passing Interface Forum. [15] L. Schneidenbach and B. Schnor. Migration of MPI Applications to IPv6 Networks. In Proceedings of the PDCN 2005, pages , Innsbruck, A, Feb [16] T. Schroeder, S. Goddard, and B. Tamamurthy. Scalable web server clustering technologies. IEEE Network, 14(3):38 45, [17] W. Zhang. Linux virtual server for scalable network services. In Ottawa Linux Symposium, 2000.
ETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT
More informationUnit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationMulticast can be implemented here
MPI Collective Operations over IP Multicast? Hsiang Ann Chen, Yvette O. Carrasco, and Amy W. Apon Computer Science and Computer Engineering University of Arkansas Fayetteville, Arkansas, U.S.A fhachen,yochoa,aapong@comp.uark.edu
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationCN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.
More informationChapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup
Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.
More informationAn Industry view of IPv6 Advantages
An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming
More informationGroup Management Schemes for Implementing MPI Collective Communication over IP Multicast
Group Management Schemes for Implementing MPI Collective Communication over IP Multicast Xin Yuan Scott Daniels Ahmad Faraj Amit Karwande Department of Computer Science, Florida State University, Tallahassee,
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationDistributed Scheduling for the Sombrero Single Address Space Distributed Operating System
Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationC13b: Routing Problem and Algorithms
CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationAsst. Prof. Chaiporn Jaikaeo, Ph.D.
IP Version 6 Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from the notes by Lami
More informationContents. Configuring GRE 1
Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE security mechanisms 2 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4
More informationCS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3
CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment
More informationCommunication Systems DHCP
Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal
More informationLSMAC and LSNAT: Two Approaches for Cluster-based Scalable Web Servers
1 LSMAC and LSNAT: Two Approaches for Cluster-based Scalable Web Servers Xuehong Gan a,1, Trevor Schroeder b, Steve Goddard b, and Byrav Ramamurthy b a Microsoft Corporation b Department of Computer Science
More informationIPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol
IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI
More informationTo make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at
To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a
More informationLecture 11: Networks & Networking
Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationPerformance Evaluation of NEMO Basic Support Implementations
Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationContents. Configuring GRE 1
Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4 tunnel 4 Configuration guidelines
More informationPerformance Comparison of Internet Protocol v4 with Internet Protocol v6
Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationCS 520: Network Architecture I Winter Lecture 11: NAT and IPv6
CS 520: Network Architecture I Winter 2007 Lecture 11: NAT and IPv6 The previous lecture discussed how subnetting and supernetting (CIDR) can be used to make better use of global IP addresses. This lecture
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationCC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite
CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.
More informationHigher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.
This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationConfiguring IP Services
CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create
More informationThe Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.
The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,
More informationECE 435 Network Engineering Lecture 14
ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of
More informationIPv6. (Internet Protocol version 6)
IPv6 Réseaux 1 IPv6 (Internet Protocol version 6) 2 IPv6 IP version 6 is the new version of the Internet Protocol (IP) The standardization process started in the 90s The main elements of IPv4 are still
More informationB. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice
IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationLecture 10: Internetworking"
Lecture 10: Internetworking" CSE 123: Computer Networks Alex C. Snoeren HW 2 due NOW! Lecture 10 Overview" Spanning Tree Internet Protocol Service model Packet format 2 Spanning Tree Algorithm" Each bridge
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationIPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land
IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit
More informationAthanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010
Introduction ti to IPv6 (Part A) Athanassios Liakopoulos (aliako@grnet.gr) Slovenian IPv6 Training, Ljubljana, May 2010 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationIPv6 : Internet Protocol Version 6
IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationHistory. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)
History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationLecture (03) Internet Protocol tcp/ip> OSI>
Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing
More informationNAT Router Performance Evaluation
University of Aizu, Graduation Thesis. Mar, 22 17173 1 NAT Performance Evaluation HAYASHI yu-ichi 17173 Supervised by Atsushi Kara Abstract This thesis describes a quantitative analysis of NAT routers
More informationComputer Security Spring Firewalls. Aggelos Kiayias University of Connecticut
Computer Security Spring 2008 Firewalls Aggelos Kiayias University of Connecticut Idea: Monitor inbound/ outbound traffic at a communication point Firewall firewall Internet LAN A firewall can run on any
More informationMIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE
MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationMulticast and Quality of Service. Internet Technologies and Applications
Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationCS 520: Network Architecture I Winter Lecture 11: IP Address Conservation
CS 520: Network Architecture I Winter 2006 Lecture 11: IP Address Conservation This lecture provides discussion of several approaches that are used to make better use of the IP address space. Subnetting
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationComputer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage
More informationOutline. Introduction. The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping
Outline Introduction The Internet of Things Applications of 6LoWPAN The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping Link-Layer Commissioning
More informationIntroduction to IPv6. Unit -2. Prepared By:- NITIN PANDYA Assistant Professor, SVBIT.
Introduction to IPv6 Unit -2 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. IP Network Addressing INTERNET world s largest public data network, doubling in size every nine months IPv4, defines
More informationIPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast
IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.
More informationThe latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication
The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication John Markus Bjørndalen, Otto J. Anshus, Brian Vinter, Tore Larsen Department of Computer Science University
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More information4. Basic IP Support Protocols
4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationThis Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network
This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationExercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)
Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches
More informationComputer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014.
Course Reference Model Computer Networks 7 lication Provides functions needed by users Zhang, Xinyu Fall 2014 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationTutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.
Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for
More informationTCP/IP Protocol Suite
TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol
More informationTroubleshooting High CPU Caused by the BGP Scanner or BGP Router Process
Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Document ID: 107615 Contents Introduction Before You Begin Conventions Prerequisites Components Used Understanding BGP Processes
More informationEE 122 Fall 2010 Discussion Section III 5 October 2010
EE 122 Fall 2010 Discussion Section III 5 October 2010 http://www.cs.berkeley.edu/~alspaugh/ee122/fa10/ Question 1: IP Header This is the IPv4 header structure we will need for the problems Kisco Inc.
More informationTHE INTERNET PROTOCOL INTERFACES
THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks
More informationThe Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga
The Network Layer Antonio Carzaniga Faculty of Informatics University of Lugano April 22, 2010 Basic network-layer architecture of a datagram network Outline Introduction to forwarding Introduction to
More informationIntra-MIC MPI Communication using MVAPICH2: Early Experience
Intra-MIC MPI Communication using MVAPICH: Early Experience Sreeram Potluri, Karen Tomko, Devendar Bureddy, and Dhabaleswar K. Panda Department of Computer Science and Engineering Ohio State University
More informationChapter 6. The Network Layer
Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented
More information