Network Myths and Mysteries. Radia Perlman Intel Labs
|
|
- Everett Davis
- 6 years ago
- Views:
Transcription
1 Network Myths and Mysteries Radia Perlman Intel Labs 1
2 All opinions expressed herein Are mine alone 2
3 All opinions expressed herein Are mine alone hough I m sure independently shared by lots of other people 3
4 Network Protocols A lot of what we all know is false! 4
5 How networking tends to be taught Memorize these RFCs Nothing else ever existed Except possibly to make snide comments about other teams 5
6 hings are so confusing Comparing technology A vs B Nobody knows both of them Somebody mumbles some vague marketing thing, and everyone repeats it Both A and B are moving targets 6
7 How I wish we d compare Isolate conceptual pieces Ignore which team 7
8 Orthogonal ways networks can differ What information is in a packet Who computes the forwarding table Whether forwarding table is always complete, or created on demand when a flow starts Whether switch can choose among multiple next hops How to translate from layer 3 to layer 2 address 8
9 What does a switch do? Forward based on: Info in packet Destination address If need to keep things in order, other stuff in packet (e.g., CP ports, flow ID, entropy field) Forwarding table lookup Destination: single port Destination: {ports} Flow : single port 9
10 Different types of Destination Lookup Direct lookup: simple and fast. Only possible if small enough address that table is not too large Hash (like Ethernet) Longest Prefix match (like IP) 10
11 houghts Flow-based vs destination-based Only way to make flow-based not totally explode the forwarding table is to create entry when flow starts (incur latency) Switch in better position to load-split traffic than central fabric manager If switch has to keep packets of a flow in order, switch can look at CP ports, etc., or have entropy field in header Switch can do new hash to adjust traffic 11
12 Exploiting parallel paths R1a R2a R3a R1b R2b R3b S R1c R2c R3c D R1d R2d R3d R1e R2e R3e Intel Confidential 12
13 Completely orthogonal concept 13
14 Where does forwarding table come from? Distributed algorithm Central fabric manager Neither concept new and completely orthogonal to data plane Concept of separation of control plane from data plane not new 14
15 Where does forwarding table come from? Distributed algorithm Central fabric manager Neither concept new and completely orthogonal to data plane I think distributed algorithm is superior, because it can react to topology changes more quickly 15
16 Where does forwarding table come from? Distributed algorithm Central fabric manager Neither concept new and completely orthogonal to data plane Distributed algorithm isn t what makes switches expensive 16
17 Also orthogonal: Fancy extra features 17
18 What kinds of features are in DC switches? Security features (firewalls, intrusion detection/protection, IPsec, SSL session termination) NA (and other stateful features) Multipathing raffic engineering/bandwidth guarantees Multiprotocol ports: layer 2 and layer 3; IPv4, IPv6 IP multicast Dynamic VLAN registration 18
19 When does forwarding table get filled in? Proactively When a flow starts 19
20 Proactively seems better 20
21 How do you manage a network? From a management console, which translates big commands, such as forward based on this metric or traffic engineer this path into individual commands to switches 21
22 How do you manage a network? From a management console, which translates big commands, such as forward based on this metric or traffic engineer this path into individual commands to switches Protocols define parameters that are settable, readable, events that trigger alerts 22
23 Management commands to switches SNMP Netconf YANG OpenFlow 23
24 Now, sorting out a few existing things IP, Ethernet, RILL, etc. 24
25 A bit of layer 3 history ISO s layer 3 (CLNP: ConnectionLess Network Protocol) 20 byte address op 14 bytes an entire cloud Inside cloud No configuration of switches Flat address space (bottom 6 bytes) Endnodes help by announcing to routers where they are Endnodes can move around and keep address 25
26 CLNP addresses 14 bytes: longest prefix match 6 bytes: exact match Endnode Which cloud address 26
27 In contrast: IP Every link has its own prefix Routers need to be configured If node moves, address has to change 27
28 Hierarchy One prefix per link (like IP) One prefix per campus (like CLNP) 22* 293* 28* 292* 25* 2* 2* 28
29 Advantages of CLNP over IP No configuration of routers inside a cloud Flat address within cloud so endnodes can move around within the cloud No need for ARP (since cloud address is carried within the layer 3 address) Other things not enough time to go into 29
30 Worst decision ever 1992 Internet could have adopted CLNP Easier to move to a new layer 3 back then Internet smaller Not so mission critical IP hadn t yet (out of necessity) invented DHCP, NA, so CLNP gave understandable advantages CLNP still has advantages over IPv6 (e.g., large multilink routed bottom layer) 30
31 So that s why we are stuck with both Ethernet and IP Need Ethernet to create a flat cloud at bottom layer for IP Original Ethernet CSMA/CD But now based on spanning tree 31
32 Constraint in 1983 for designing spanning tree ( transparent ) bridge No change to Ethernet frame (including adding to length) No change to endnode behavior 32
33 Spanning ree doesn t give A optimal paths X
34 hen length restriction ended 34
35 So RILL (Ransparent Interconnection of Lots of Links Allows clouds with flat address space, optimal routing, and no configuration of switches Evolutionary: Can replace any subset of spanning tree bridges with RILL switches First published about 10 years ago Been an IEF working group for about 8 years, initial version standardized about 3 years ago 35
36 Basic RILL concept RILL switches find each other (perhaps with bridges in between) Calculate paths to other RILL switches First RILL switch tunnels to last RILL switch 36
37 Basic RILL concept R4 R2 c R7 R9 R11 R5 R3 R8 R6 a R1 37
38 What s in RILL header? RILL switches autoconfigure a 2-byte nickname So header contains Ingress RILL switch (2 bytes) Egress RILL switch (2 bytes) Hop count Flags (e.g., unicast vs multicast) 38
39 RILL-encapsulated Ethernet pkt 6 bytes rill hdr Ethernet packet 39
40 RILL Header 2 bytes 2 bytes 2 bytes Egress nickname Ingress nickname Hop count flags 40
41 Unicast vs multicast use of egress field in RILL header Unicast: egress is last switch Multicast: egress is which tree 41
42 Multiple trees for multicast R1 R1 specifies which tree (yellow, red, or blue) 42
43 RILL switches find each other, creating network of just RILL switches b b b b b b b 43
44 b b b b b b b 44
45 endnodes b b b endnodes endnodes 45
46 endnodes b b endnodes endnodes 46
47 endnodes endnodes endnodes 47
48 Reason for extra header Forwarding table in RILL switches just size of # of RILL switches (not # of endnodes) Layer 3-like header (hop count) Small, easy to look up, addresses (16 bits can be direct lookup rather than prefix match or hash) 48
49 Switches inside cloud don t need to know about endnodes R4 R2 c R7 R9 R11 R5 R3 R8 R6 a R1 49
50 Gluing two clouds together S1 S3 50
51 Gluing two clouds together S1 Any tunnel: IP, IPsec, etc. S3 Only S1 and S3 need to know this RILL link isn t Ethernet 51
52 Advantage of CLNP vs IP+RILL No need for ARP: no layer 2 address. It s all part of layer 3 52
53 Some advantages of IP+RILL vs CLNP Easier forwarding lookup inside cloud (16 bit nicknames allows direct lookup) Smaller forwarding table in switches inside cloud (table size # of switches rather than endnodes) Ability to multipath multicast VLANs 53
54 How does R1 know R2 is last switch? Orthogonal concept to rest of RILL R1 needs table of (destination MAC, egress switch) Various possibilities Edge switch learns when decapsulating data, floods if destination unknown Configuration of edge switches Directory that R1 queries Central fabric manager pushes table 54
55 Orthogonal concept 55
56 Who encapsulates/decapsulates? Could be first switch Or hypervisor Or VM Or application Having endnode do it saves work for switch, easier to eliminate stale entries 56
57 Recently, a bunch of similar things invented NVGRE, VXLAN, 57
58 How to compare Inner packet based on flat address space IP or Ethernet IP header bigger, addresses smaller, well-known how to get unique Ethernet addresses without configuring Outer header location dependent RILL header small, nickname; simple forwarding lookup 58
59 So review some of what I said Proactive forwarding table vs incur latency when flow starts Distributed algorithm vs central fabric manager Load split based on fabric manager placing flows vs switch choosing among a set of next hops RILL evolutionary, efficient outer header, Ethernet for flat cloud, can glue distant clouds together by having RILL link which is a tunnel over IP 59
60 Questions? 60
Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow
Computer Network Protocols: Myths, Missteps, and Mysteries Dr. Radia Perlman, Intel Fellow It s not what you don t know that s the problem. It s what you do know that ain t true.mark Twain (?) 2 Network
More informationMyths and Mysteries in the Network Protocol World. Radia Perlman
Myths and Mysteries in the Network Protocol World Radia Perlman Radia.Perlman@intel.com 1 Pet peeve Networking is often taught as this is how TCP/IP works 2 Pet peeve Networking is often taught as this
More informationRouting without tears: Bridging without danger
Routing without tears: Bridging without danger Radia Perlman Sun Microsystems Laboratories Radia.Perlman@sun.com 1 Before we get to RBridges Let s sort out bridges, routers, switches... 2 What are bridges,
More informationRBRIDGES/TRILL. Donald Eastlake 3 rd Stellar Switches AND IS-IS.
RBRIDGES/TRILL AND IS-IS 1 Donald Eastlake 3 rd donald.eastlake@stellarswitches.com, +1-508-333-2270 Stellar Switches CAVEATS The base protocol specification may change: It is currently in TRILL WG Last
More informationRBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING
1 RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING Donald E. Eastlake 3 rd donald.eastlake@stellarswitches.com CONTENTS Introduction Ethernet and Spanning Tree RBridge Features TRILL Encapsulation
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationHigher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.
This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationTutorial on Network Layers 2 and 3. Radia Perlman Intel Labs
Tutorial on Network Layers 2 and 3 Radia Perlman Intel Labs (radia@alum.mit.edu) 1 Why? Demystify this portion of networking, so people don t drown in the alphabet soup Think about these things critically
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationMulti-site Datacenter Network Infrastructures
Multi-site Datacenter Network Infrastructures Petr Grygárek rek 2009 Petr Grygarek, Advanced Computer Networks Technologies 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity)
More informationIntroduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era
Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching
More informationInternet Engineering Task Force (IETF) Request for Comments: 7067 Category: Informational. Intel I. Gashinsky Yahoo November 2013
Internet Engineering Task Force (IETF) Request for Comments: 7067 Category: Informational ISSN: 2070-1721 L. Dunbar D. Eastlake Huawei R. Perlman Intel I. Gashinsky Yahoo November 2013 Abstract Directory
More informationImplementing VXLAN in DataCenter
Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric
More informationIPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.
IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach
More informationLecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 7 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet
More informationContents. EVPN overview 1
Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationLecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet
More informationHPE FlexFabric 7900 Switch Series
HPE FlexFabric 7900 Switch Series VXLAN Configuration Guide Part number: 5998-8254R Software version: Release 213x Document version: 6W101-20151113 Copyright 2015 Hewlett Packard Enterprise Development
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationHuawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 06 Date 2016-07-28 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationWhite Paper. Huawei Campus Switches VXLAN Technology. White Paper
White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3
More informationRBridges: Transparent Routing
RBridges: Transparent Routing Date: 2005-03-15 Authors: Name Address Company Phone Email Raida Perlman 1 Network Drive, Burlington, MA 01803 USA Sun Microsystems +1-781-422-3252 Radia.Perlman@sun.com Donald
More informationCloud e Datacenter Networking
Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationHPE FlexFabric 5940 Switch Series
HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development
More informationCloud e Datacenter Networking
Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.
More informationHubs, Bridges, and Switches (oh my) Hubs
Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer
More informationTutorial on Network Layers 2 and 3. Radia Perlman Intel Labs
Tutorial on Network Layers 2 and 3 Radia Perlman Intel Labs (radia@alum.mit.edu) 1 Why? Demystify this portion of networking, so people don t drown in the alphabet soup Think about these things critically
More informationImplementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN
This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationCSE 461: Bridging LANs. Last Topic
CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access
More informationIPv6 Neighbor Discovery (ND) Problems with Layer-2 Multicast State
DRAFT IPv6 Neighbor Discovery (ND) Problems with Layer-2 Multicast State Jeff Wheeler jsw@inconcepts.biz The Problem MLD-snooping is much like IGMP-snooping but for IPv6 It keeps unnecessary multicast
More informationSolution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc.
Solution Guide Infrastructure as a Service: EVPN and VXLAN Modified: 2016-10-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationHP Routing Switch Series
HP 12500 Routing Switch Series EVI Configuration Guide Part number: 5998-3419 Software version: 12500-CMW710-R7128 Document version: 6W710-20121130 Legal and notice information Copyright 2012 Hewlett-Packard
More informationEthernet VPN (EVPN) in Data Center
Ethernet VPN (EVPN) in Data Center Description and Design considerations Vasilis Stavropoulos Sparkle GR EVPN in Data Center The necessity for EVPN (what it is, which problems it solves) EVPN with MPLS
More informationLab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3
Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS
More informationAdvanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 7 Qin Yin Spring Semester 2013 1 LAYER 7 SWITCHING 2 Challenge: accessing services Datacenters are designed to be scalable Datacenters are replicated
More informationRBRIDGES AND THE TRILL PROTOCOL
RBRIDGES AND THE TRILL PROTOCOL 1 Donald E. Eastlake 3 rd Co-Chair, IETF TRILL Working Group d3e3e3@gmail.com, +1-508-333-2270 NOTE: This presentation is a high level technical overview. It is not possible
More informationIP Fabric Reference Architecture
IP Fabric Reference Architecture Technical Deep Dive jammon@brocade.com Feng Shui of Data Center Design 1. Follow KISS Principle Keep It Simple 2. Minimal features 3. Minimal configuration 4. Configuration
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationInternet Engineering Task Force (IETF) Request for Comments: N. Bitar Nokia R. Shekhar. Juniper. J. Uttaro AT&T W. Henderickx Nokia March 2018
Internet Engineering Task Force (IETF) Request for Comments: 8365 Category: Standards Track ISSN: 2070-1721 A. Sajassi, Ed. Cisco J. Drake, Ed. Juniper N. Bitar Nokia R. Shekhar Juniper J. Uttaro AT&T
More informationHP 6125XLG Blade Switch
HP 6125XLG Blade Switch TRILL Configuration Guide Part number: 5998-5383a Software version: Release 240x Document version: 6W101-20150515 Legal and notice information Copyright 2015 Hewlett-Packard Development
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight
More informationIP fabrics - reloaded
IP fabrics - reloaded Joerg Ammon Senior Principal Systems Engineer 2017-11-09 2017 Extreme Networks, Inc. All rights reserved Extreme Networks Acquisition update Oct 30, 2017:
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationUnicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1
Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in
More informationVXLAN Design with Cisco Nexus 9300 Platform Switches
Guide VXLAN Design with Cisco Nexus 9300 Platform Switches Guide October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 39 Contents What
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationService Graph Design with Cisco Application Centric Infrastructure
White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...
More informationE : Internet Routing
E6998-02: Internet Routing Lecture 18 Overlay Networks John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-18 are available.
More informationRequest for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview
Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationH3C S7500E-XS Switch Series FAQ
H3C S7500E-XS Switch Series FAQ Copyright 2016 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior
More informationBIG-IP TMOS : Tunneling and IPsec. Version 13.0
BIG-IP TMOS : Tunneling and IPsec Version 13.0 Table of Contents Table of Contents Creating IP Tunnels... 7 About IP tunnels...7 About point-to-point tunnels... 7 Creating a point-to-point IP tunnel...8
More informationInternet Engineering Task Force (IETF) Request for Comments: 8431 Category: Standards Track ISSN:
Internet Engineering Task Force (IETF) Request for Comments: 8431 Category: Standards Track ISSN: 2070-1721 L. Wang Individual M. Chen Huawei A. Dass Ericsson H. Ananthakrishnan Netflix S. Kini Individual
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationDemand-Based Control Planes for Switching Fabrics
Demand-Based Control Planes for Switching Fabrics Modern switching fabrics use virtual network overlays to support mobility, segmentation, and programmability at very large scale. Overlays are a key enabler
More informationIPv6 Next generation IP
Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing
More informationCloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking
Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering
More informationENTERPRISE MPLS. Kireeti Kompella
ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP
More informationCSCI-1680 Network Layer:
CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationInternet Control Message Protocol
Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.
More informationSome portions courtesy Srini Seshan or David Wetherall
CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample
More informationCisco Virtual Networking Solution for OpenStack
Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides
More informationPATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION LAYERING
PATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION OR LAYERING PURPOSE: TO BUILD A NETWORK WITH A LARGER SPAN OUT OF SMALLER, HETEROGENEOUS NETWORKS The Internet has its own name space, protocols,
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationHands-On Network Security: Practical Tools & Methods
Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationCisco IOS LISP Application Note Series: Access Control Lists
Cisco IOS LISP Application Note Series: Access Control Lists Version 1.1 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration and configuration
More informationH3C S7500E-X Switch Series
H3C S7500E-X Switch Series EVPN Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S7500EX-CMW710-R7523P01 Document version: 6W100-20160830 Copyright 2016, Hangzhou
More informationCommunity Connection Service for escience. Ronald van der Pol, SURFnet TNC May 2014
Community Connection Service for escience Ronald van der Pol, SURFnet TNC 2014 20 May 2014 Project Overview! GN3plus Open Call Project (CoCo)! October 2013 March 2015 (18 months)! Partners: SURFnet (NL)
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More information100 GBE AND BEYOND. Diagram courtesy of the CFP MSA Brocade Communications Systems, Inc. v /11/21
100 GBE AND BEYOND 2011 Brocade Communications Systems, Inc. Diagram courtesy of the CFP MSA. v1.4 2011/11/21 Current State of the Industry 10 Electrical Fundamental 1 st generation technology constraints
More informationlecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00
lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,
More informationECE 435 Network Engineering Lecture 21
ECE 435 Network Engineering Lecture 21 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 27 November 2018 Announcements HW#9 was posted Project Status One e-mail per group One-line
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationMANET Autoconfiguration using DHCP.
MANET Autoconfiguration using DHCP fred.l.templin@boeing.com MANET Autoconf Problem Space Provide Network(s) MANET Gateways (MGs) MANETs MANET Routers MANET Routing Alternatives MANET routing as a L2 mechanism
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Link Layer, Multiple access 2. IP addressing, CIDR, NAT 3. IP/L3 routing, OSPF (link state), RIP(DV), Issues 4. L2 routing
More informationFuture Routing and Addressing Models
Future Routing and Addressing Models Rob Evans JANET(UK) The JNT Association 2008 Networkshop 36 1 If it ain't broke... BGP is the inter-domain protocol of choice. Not that there's much choice. Carries
More informationECE 435 Network Engineering Lecture 12
ECE 435 Network Engineering Lecture 12 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 17 October 2016 Announcements HW#5 will be posted soon 1 1. OSI Layers Midterm Review (a)
More informationHP MSR Router Series. EVI Configuration Guide(V7) Part number: b Software version: CMW710-R0304 Document version: 6PW
HP MSR Router Series EVI Configuration Guide(V7) Part number: 5998-7360b Software version: CMW710-R0304 Document version: 6PW104-20150914 Legal and notice information Copyright 2015 Hewlett-Packard Development
More informationBy David Roy
A PER VRF ACCOUNTING SOLUTION http://www.junosandme.net By David Roy What is the aim? Recently I have to find a solution to count input and output traffic in a per VRF basis. Said like that it seems that
More informationContents. Configuring EVI 1
Contents Configuring EVI 1 Overview 1 Layer 2 connectivity extension issues 1 Network topologies 2 Terminology 3 Working mechanism 4 Placement of Layer 3 gateways 6 ARP flood suppression 7 Selective flood
More informationECE 435 Network Engineering Lecture 14
ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationConfiguring BPDU tunneling
Contents Configuring BPDU tunneling 1 Introduction to BPDU tunneling 1 Background 1 BPDU Tunneling implementation 2 Configuring BPDU tunneling 3 Configuration prerequisites 3 Enabling BPDU tunneling for
More informationLecture 11: IPv6. CSE 123: Computer Networks Alex C. Snoeren. HW 2 due NOW
Lecture 11: IPv6 CSE 123: Computer Networks Alex C. Snoeren HW 2 due NOW Longest Matching Prefix Forwarding table contains many prefix/length tuples They need not be disjoint! E.g. 200.23.16.0/20 and 200.23.18.0/23
More information