Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer

Size: px
Start display at page:

Download "Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer"

Transcription

1 Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer science can be solved by adding another level of indirection" -- Butler Lampson 1

2 Multicast: one sender to many receivers Multicast: Act of sending datagram to multiple receivers with single transmit operation Analogy: One teacher to many students Question: How to achieve multicast Multicast routers (red) duplicate and forward multicast datagrams Network multicast Router actively participate in multicast, making copies of packets as needed and forwarding towards multicast receivers 2

3 Internet Multicast Service Model multicast group multicast group concept: use of indirection hosts addresses IP datagram to multicast group routers forward multicast datagrams to hosts that have joined that multicast group 3

4 Multicast groups q Class D Internet addresses reserved for multicast: q Host group semantics: o anyone can join (receive) multicast group o anyone can send to multicast group o no network-layer identification to hosts of members q Needed: Infrastructure to deliver mcast-addressed datagrams to all hosts that have joined that multicast group 4

5 Joining a mcast group: Two-step process Local: Host informs local mcast router of desire to join group: IGMP (Internet Group Management Protocol) Wide area: Local router interacts with other routers to receive mcast datagram flow many protocols (e.g., DVMRP, MOSPF, PIM) IGMP IGMP wide-area multicast routing IGMP 5

6 Multicast via Indirection: Why? Don't need to individually address each member in the group: header savings Looks like unicast; application interface is simple, single group Abstraction, delegating works of implementation to the routers More scalable because, sender doesn't manage the group, as receivers are added, new receivers must do the work to add themselves 6

7 Mobility and Indirection How do you contact a mobile friend? Consider friend frequently changing addresses, how do you find her? Search all phone books? Call her parents? Expect her to let you know where he/she is? I wonder where Alice moved to? 7

8 Mobility and indirection: Mobile node moves from network to network Correspondents want to send packets to mobile node Two approaches: Indirect routing: Communication from correspondent to mobile goes through home agent, then forwarded to remote Direct routing: Correspondent gets foreign address of mobile, sends directly to mobile 8

9 Mobility: Vocabulary Home network: permanent home of mobile (e.g., /24) Home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote Permanent address: address in home network, can always be used to reach mobile e.g., wide area network correspondent 9

10 Mobility: more vocabulary Permanent address: remains constant (e.g., ) Visited network: network in which mobile currently resides (e.g., /24) Care-of-address: address in visited network. (e.g., 79, ) wide area network Correspondent: wants to communicate with mobile Foreign agent: entity in visited network that performs mobility functions on behalf of mobile. 10

11 Mobility: registration home network visited network 2 wide area network foreign agent contacts home agent home: this mobile is resident in my network 1 mobile contacts foreign agent on entering visited network End result: Foreign agent knows about mobile Home agent knows location of mobile 11

12 Mobility via Indirect Routing home network home agent intercepts packets, forwards to foreign agent foreign agent receives packets, forwards to mobile 3 visited network correspondent addresses packets using home address of mobile 1 wide area network 2 4 mobile replies directly to correspondent 12

13 Indirect Routing: comments Mobile uses two addresses: Permanent address: used by correspondent (hence mobile location is transparent to correspondent) Care-of-address: used by home agent to forward datagrams to mobile Foreign agent functions may be done by mobile itself Triangle routing: correspondent-home-network-mobile Inefficient when correspondent, mobile are in same network 13

14 Indirect Routing: moving between networks Suppose mobile user moves to another network Registers with new foreign agent New foreign agent registers with home agent Home agent update care-of-address for mobile Packets continue to be forwarded to mobile (but with new care-of-address) Mobility, changing foreign networks transparent: Ongoing connections can be maintained! 14

15 Mobility via Direct Routing home network correspondent forwards to foreign agent foreign agent receives packets, forwards to mobile 4 visited network correspondent requests, receives foreign address of mobile 2 1 wide area network 3 4 mobile replies directly to correspondent 15

16 Mobility via Direct Routing: comments Overcome triangle routing problem Non-transparent to correspondent: Correspondent must get care-of-address from home agent What happens if mobile changes networks? 16

17 Mobile IP RFC 3220 Has many features we ve seen: home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet) 3 components to standard: agent discovery registration with home agent indirect routing of datagrams 17

18 Mobility via indirection: why indirection? Transparency to correspondent Mostly transparent to mobile (except that mobile must register with foreign agent) transparent to routers, rest of infrastructure potential concerns if egress filtering is in place in origin networks (since source IP address of mobile is its home address): spoofing? 18

19 An Internet Indirection Infrastructure Motivation: Today s Internet is built around point-to-point communication abstraction: Send packet p from host A to host B One sender, one receiver, at fixed and well-known locations not appropriate for applications that require other communications primitives: multicast (one to many) mobility (one to anywhere) anycast (one to any) We ve seen indirection used to provide these services Idea: Make indirection a first-class object 19

20 Internet Indirection Infrastructure (I3) Change communication abstraction: Instead of point-to-point, exchange packets by name each packet has an identifier ID to receive packet with identifier ID, receiver R stores trigger (ID, R) into network triggers stored in network overlay nodes send(id, data) send(r, data) Sender trigger Receiver (R) ID R 20

21 Service Model API sendpacket(p); inserttrigger(t); removetrigger(t); // optional best-effort service model (like IP) triggers periodically refreshed by end-hosts reliability, congestion control, flow-control implemented at end hosts, and trigger-storing overlay nodes 21

22 Discussion Trigger is similar to routing table entry Essentially: Application layer publish-subscribe infrastructure Application-level overlay infrastructure Unlike IP, end hosts control triggers, i.e., end hosts responsible for setting and maintaining routing tables Provide support for mobility multicast anycast composable services 22

23 Mobility Receiver updates its trigger as it moves from one subnet to another mobility transparent to sender location privacy send(id,data) send(r1, data) Sender ID R1 Receiver (R1) 23

24 Mobility Receiver updates its trigger as it moves from one subnet to another mobility transparent to sender location privacy send(id,data) Sender ID R1 send(r2, data) Receiver (R2) 24

25 Multicast Unifies multicast and unicast abstractions multicast: receivers insert triggers with same ID Application naturally moves between multicast and unicast, as needed impossible in current IP model send(id,data) send(r1, data) Sender ID R1 ID R2 send(r2, data) Receiver (R1) Receiver (R2) 25

26 Anycast (cont d) Route to any one in set of receivers Receivers i in anycast group inserts same ID, with anycast qualifications send(r1,data) Sender send(id a,data) ID s 1 R1 ID s 2 R2 ID s 3 R3 Receiver (R1) Receiver (R2) Receiver (R3) 26

27 Composable Services Use stack of IDs to encode successive operations to be performed on data (e.g., transcoding) Don t need to configure path between services S_MPEG/JPEG send((id_mpeg/jpeg,id), data) send(id, data) send(r, data) Sender (MPEG) ID_MPEG/JPEG S_MPEG/JPEG ID R Receiver R (JPEG) 27

28 Composable Services (cont d) Both receivers and senders can specify operations to be performed on data send(id, data) S_MPEG/JPEG send(r, data) Sender (MPEG) ID_MPEG/JPEG S_MPEG/JPEG send((id_mpeg/jpeg, R), data) ID (ID_MPEG/JPEG, R) Receiver R (JPEG) 28

29 Discussion of I3 How would receiver signal ACK to sender? What is needed? Does many-to-one fit well in this paradigm? security, snooping, information gathering: what are the issues? 29

30 Content Delivery Networks: Indirection with DNS 30

31 Internet Content Content is static web pages and documents images and videos, streaming, Content becomes more and more important! 500 exabytes (10 18 ) created in 2008 alone [Jacobson] Estimated inter-domain traffic rate: 39.8 TB/s [Labovitz] Annual growth rate of Internet traffic: ~40%-60% [Labovitz] Much of web growth due to video (Flash, RTSP, RTP, YouTube, etc.) How to deliver content? How to cope with growth of content? Following slides adapted from Wolfgang Mühlbauer 31

32 Application mix Source: Alexandre Gerber and Robert Doverspike. Traffic Types and Growth in Backbone Networks. AT&T Labs Research

33 Application mix in 2009 HTTP dominates Inside HTTP Flash-video dominates Images and RAR files next Source: Gregor Maier et al. On Dominant Characteristics of Residential Broadband Internet Traffic. IMC

34 Prevalence of CDNs 30 (out of ~30000) ASes contribute 30% of inter-domain traffic July 2009: CDNs originate at least 10% of all inter-domain traffic Top ten origin ASes in terms of traffic Source: Craig Labovitz et al. Internet Inter-Domain Traffic. SIGCOMM

35 Why not Serving Content from One s Own Site? Enormous demand for popular content Cannot be served from single server Bad performance Due to large distance: TCP-througput depends on RTT! Bad connectivity? Single point of failure High demand leads to crashes or high response times (e.g., flash crowds) High costs Bandwidth and disk space to serve large volumes (e.g., videos) content AS B AS C Download AS A AS D consumer AS E 35

36 Approaches to Content Delivery Idea: replicate content and serve it locally Replicate Centralized hosting Download content from closest location Content distribution networks (CDN) Offload content delivery to large number of content servers Put content servers near end-users Peer-to-peer networks In theory: infinite scalability Yet: download capacity throttled by uplink capacity of end users 36

37 Akamai A Large CDN Akamai (Hawaiian: intelligent ) Evolved out of MIT research effort: handle flash crowds > Servers located in 72 countries, > 1000 ASs Customers: Yahoo!, Airbus, Audi, BMW, Apple, Microsoft, etc. Why using Akamai? Content consumer: Fast download Content provider: Reduce infrastructure cost, quick and easy deployment of network services Task of CDNs: Serve content Static web content: HTML pages, embedded images, binaries Dynamic content: break page into fragments; assemble on Akamai server, fetch only noncacheable content from origin website: Applications: audio and video streaming 37

38 Akamai: Is the Idea Really That Novel? Local server cluster Bad if data center or upstream ISP fails Mirroring Deploying clusters in a few locations Each mirror must be able to carry all the load Multihoming Using multiple ISPs to connect to the Internet Each connection must be able to carry all the load Akamai vastly increases footprint monitors and controls their worldwide distributed servers directs user requests to appropriate servers handles failures 38

39 Akamai Relies on DNS Redirection Example: Access of Apple webpage ( Pictures are hosted by Akamai: images.apple.com Type: dig images.apple.com into your Linux shell [ ] ;; ANSWER SECTION: images.apple.com IN CNAME images.apple.com.edgesuite.net. [more CNAME redirections] images.apple.com.edgesuite.net.globalredir.akadns.net IN CNAME a199.gi3.akamai.net. a199.gi3.akamai.net. 10 IN A a199.gi3.akamai.net. 10 IN A [ ] DNS redirects request to DNS servers controlled by Akamai! 39

40 Akamai Deployment Edge server organized as content cluster in many Autonomous Systems multiple servers local low-level DNS server Client directed to closest server Content cluster Content cluster Content cluster Content cluster 40

41 How does Akamai Work? (simplified) Root DNS Server Top-Level Domain DNS Server Apple Authoritative DNS Server IP address Local DNS Server Normal web request: First DNS resolval Then HTTP connection IP address Apple Web Server http request/response Web Client Slide adapted from Drafting Behind Akamai, Sigcomm

42 How does Akamai Work? (simplified) Root DNS Server Top-Level Domain DNS Server images.apple.com? DNS request for "Akamized" content: Results in CNAME Apple Authoritative Local DNS Server DNS Server CNAME: images.apple.com.edgesuite.net. images.apple.com? Apple Web Server Web Client Slide adapted from Drafting Behind Akamai, Sigcomm

43 How does Akamai Work? (simplified) Top-Level Domain DNS Server Root DNS Server images.apple.com.edgesuite.net? images.apple.com? Akamai High-Level DNS Server images.apple.com.edgesuite.net? CNAME: a199.gi3.akmai.net Apple Authoritative Local DNS Server DNS Server CNAME: images.apple.com.edgesuite.net. Akamai Low-Level DNS Server Apple Web Server images.apple.com? Web Client Akamai Edge Server Slide adapted from Drafting Behind Akamai, Sigcomm

44 How does Akamai Work? (simplified) Top-Level Domain DNS Server Root DNS Server a199.gi3.akmai.net? Akamai High-Level DNS Server images.apple.com.edgesuite.net? CNAME: a199.gi3.akmai.net images.apple.com? a199.gi3.akamai.net? Apple Authoritative DNS Server Apple Web Server CNAME: images.apple.com.edgesuite.net. images.apple.com? 2 IP addresses of Akamai Low-Level Local DNS Server Akamai edge servers DNS Server Web Client 2 IP addresses of Akamai edge servers fetch image files Akamai Edge Server Slide adapted from Drafting Behind Akamai, Sigcomm

45 Two-level server assignment Akamai top-level DNS server Anycasted Selects location of best content cluster Delegates to content cluster s low-level name server TTL 1 hour Akamai low-level server Return IP addresses of servers that can satisfy the request: consistent hashing TTL 20 seconds: quick adoption to load conditions Most CDNs use similar techniques Some CDNs rely on Anycast to send traffic to closest content server (e.g., Limelight) 45

46 What is the best location? Service requested Server must be able to satisfy the request (e.g., QuickTime stream) Server health Up and running without errors Server load Server s CPU, disk, and network utilization Network condition minimal packet loss to client, sufficient bandwidth to handle requests Client location Server should be close to client, e.g., in terms of RTT 46

47 Continuous measurement effort Number of hops between ASes Live network statistics (e.g., traceroute) Load of data centers/content servers Report load of content servers to local DNS servers Report content cluster load to the top-level DNS resolver to direct traffic away from overloaded content clusters Entire system s health end-to-end Agents that simulate end-user behavior by downloading web objects Measure failure rates and download times Monitor individual customers/services What is the busiest customer, etc.? 47

48 Inverse view: Impact of DNS resolver choice 48

49 Importance of DNS for CDN Redirection CDN cache CDN cache 2. CDN selects closest / best cache CDN cache DNS resolver 1. DNS query host CDN only learns IP address of DNS resolver, not of host 49

50 What Happens if Alternate DNS Resolver is Chosen? CDN cache CDN cache DNS resolver Alternate resolver,e.g. GoogleDNS: OpenDNS: CDN cache 1. DNS query host CDN thinks that host is in Google or OpenDNS network 50

51 What Happens if Alternate DNS Resolver is Chosen? 2. CDN selects closest, best cache CDN cache CDN cache DNS resolver Alternate resolver,e.g. GoogleDNS: OpenDNS: CDN cache 1. DNS query host CDN thinks that host is in Google or OpenDNS network 51

52 Data and Approach Provide custom script to friends of friends Run on 50 commercial ISPs All around the globe Query 10k+ top hostnames from Alexa DNS resolvers: local resolver, Google DNS, OpenDNS Collect DNS response times Returned IP addresses, which provide information about subnet (/24) Autonomous systems (AS) and country from where content is fetched Source: Bernhard Ager et al. DNS in the Wild. IMC

53 DNS response times q 3rd-party resolvers sometimes better performance Source: Bernhard Ager et al. DNS in the Wild. IMC

54 Local DNS vs. Google DNS: Where are we directed? For 2000 out of queries: subnets are different In half of these cases: different AS and country Source: Bernhard Ager et al. DNS in the Wild. IMC

55 Indirection may cause inefficiency Choice of DNS resolver is crucial It is a criteria for determining from where content is retrieved For content locality you have to use the local resolver Google DNS, OpenDNS etc. may lead to suboptimal choice of content server Recent IETF activity Include IP address of original host in DNS request 55

56 How to mitigate? So far we have seen CDNs rely on resolver location only Extensive measurements to find best client-server mappings 3rd-party resolvers mess up the system Provider-aided Distance Information System: PaDIS Knows network topology and conditions Finds better content servers: good for users Reduces network load: good for ISPs Following slides adapted from Georgios Smaragdakis and Anja Feldmann. 56

57 PaDIS External DNS Provider DNS Internet Service Provider (ISP) 5 4 PaDIS Client Host 57

58 PaDIS External DNS Provider DNS Internet Service Full View of the ISP Provider (ISP) Network 5 4 PaDIS Client Host 58

59 PaDIS External DNS Client Provider DNS Internet Service Full View of the ISP Provider (ISP) Network 5 Content can be downloaded from any eligible host! 4 PaDIS Host 59

60 PaDIS External DNS Provider DNS Host1 Host2 Internet Service Full View Host3 of the ISP Provider (ISP) Host4 Network 5 4 PaDIS Client Host 60

61 PaDIS External DNS Provider DNS Host1 Host2 Internet Service Full View Host3 of the ISP Provider (ISP) Host4 Network 5 Host2 4 PaDIS Host4 Host3 Host1 Client Host 61

62 PaDIS 7 External DNS Provider DNS Internet Service Full View of the ISP Provider (ISP) Network 5 4 PaDIS Client 7 Host 62

63 Case 1: Network load balancing Host A Host B Host C Client 63

64 Case 1: Network load balancing Host A Host B Host C Client 64

65 Case 1: Network load balancing Host A Host B Host C Client 65

66 Case 2: ISP-CDN collaboration 7 1 External DNS Provider DNS Internet Service Provider (ISP) 3 4 PaDIS Client 7 Host 66

67 Case 2: ISP-CDN Host1 collaboration 7 1 External DNS Provider DNS Host2 Host3 Host4 Internet Service Provider (ISP) 3 4 PaDIS Host2 Host4 Host3 Host1 Client 7 Host 67

68 Case 2: ISP-CDN Host1 collaboration 7 1 External DNS Provider DNS Host2 Host3 Host4 Internet Service Provider (ISP) 3 4 PaDIS Host2 Host3 Host1 Host4 Host2 Host4 Host3 Host1 Client 7 Host 68

69 Summary Alternative traffic engineering Do not change the routing Change the traffic matrix! Benefits ISPs: Regain control of network traffic User: Performance improvements PADIS à Win-win situation for ISPs and end-users à ISPs can share benefits with content and application providers Simple and easy to implement Prototype running 69

70 Secure Overlay Service SoS: An overlay network, using indirection and randomization to provide legitimate users (only) with denial-of-service free access to a server. Overlay network: Network or distributed infrastructure with common network services (e.g., routing) built on top of other networks Example: Distributed application in which application-layer nodes relay messages among themselves, using underlying IP routing to get from one site to another 70

71 Performing a DoS Attack 1. Select Target to attack 2. Break into accounts around the network 3. Have these accounts send packets toward the target 71

72 Goal of Secure Overlay Service (SoS) Pre-approved legitimate users communicate with target legit users may be mobile (IP addresses change) Un-approved (attackers ) packets don t reach target attackers legit user target 72

73 Step 1 Filtering Routers near target filter packets based on IP addr IP addresses from legitimate user allowed through IP addresses from illegitimate users are not Concerns: Bad users have same IP address as good user? Bad users know good user s IP address: spoofing? Good IP address changes frequently (mobility)? 73

74 Step 2 Indirection via a proxy Use proxy, outside filtered region Proxy, being a computer (rather than router) can perfom heavyweight authentication, access control Only packets from proxy permitted through filter Proxy only forwards verified packets from legitimate sources through filter w.x.y.z 74

75 Problems with a known Proxy Proxies introduce other problems Attacker can breach filter by attacking with spoofed proxy address Attacker can DoS attack proxy, again preventing legitimate user communication I m w.x.y.z w.x.y.z I m w.x.y.z I m w.x.y.z 75

76 Step 3 Multiple proxies with secret forwarding Create many proxies (too many to attack) Target specifies small set of proxies as secret forwarders Only secret-forwarder packets pass through filter Only secret forwarders know they are secret forwarders (other proxies unaware) To get host packet to target Host contacts any proxy (which checks legitimacy) Proxy randomly routes packet to another proxy If destination proxy is secret forwarder, packet forwarded to target, otherwise packet randomly routed to another proxy 76

77 SOS with Random routing? secret forwarder proxy With filters, multiple proxies, and secret forwarder(s), attacker cannot focus attack 77

78 SoS Why indirection? Ultimate destination address is unknown (hackers can not attack target, only attack proxies (?)) Address of target only known to small number of secret forwarders, which rotate and can change Issues: Why can t hacker just try all addresses of all proxies to get through? 78

79 Indirection: Summary We ve seen indirection used in many ways: multicast mobility Internet indirection CDNs SoS The uses of indirection: Sender does not need to know receiver id do not want sender to know intermediary identities Load balancing Beauty, grace, elegance Transparency of indirection is important Performance: is it more efficient? Security: Important issue for I3 79

Indirection. Stefan Schmid - 1

Indirection. Stefan Schmid - 1 Indirection Stefan Schmid - 1 Indirection: Why? - How to find address of the kindergarden girlfriend that moved to the U.S.? - Via old address: indirectly via her parents that are still in Berlin? Later

More information

Internet Indirection Infrastructure (i3)

Internet Indirection Infrastructure (i3) Internet Indirection Infrastructure (i3) Ion Stoica UC Berkeley March 20, 2003 The Problem Indirection: a key technique in implementing many network services, e.g., Mobility Multicast, anycast Web caching,

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002 Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

CS November 2017

CS November 2017 Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Web Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig

Web Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Web Content Cartography Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Cartography Cartography (from Greek Χάρτης, chartes or charax = sheet of papyrus (paper)

More information

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment

More information

Internet Indirection Infrastructure

Internet Indirection Infrastructure Motivations Internet Indirection Infrastructure Modified version of Ion Stoica s talk at ODU Nov 14, 05 Today s Internet is built around a unicast point-to-point communication abstraction: Send packet

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

Topics in P2P Networked Systems

Topics in P2P Networked Systems 600.413 Topics in P2P Networked Systems Week 3 Applications Andreas Terzis Slides from Ion Stoica, Robert Morris 600.413 Spring 2003 1 Outline What we have covered so far First generation file-sharing

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient: Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication

More information

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS : Computer Networks Lecture 6: Apr 5, 2004 Naming and DNS Any problem in computer science can be solved with another layer of indirection David Wheeler Naming is a layer of indirection What problems does

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010 How Akamai delivers your packets - the insight Christian Kaufmann SwiNOG #21 11th Nov 2010 What is a Content Distribution Network? The RFCs and Internet Drafts define a Content Distribution Network, CDN,

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Design principles/protocol functions

Design principles/protocol functions Design principles/protocol functions Goals: Identify, study common architectural components, protocol mechanisms, approaches we find in network architectures Synthesis: big picture Principles / protocol

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017 CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

ASM. Engineering Workshops

ASM. Engineering Workshops 1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

End-user mapping: Next-Generation Request Routing for Content Delivery

End-user mapping: Next-Generation Request Routing for Content Delivery Introduction End-user mapping: Next-Generation Request Routing for Content Delivery Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres ACM SIGCOMM Computer Communication Review. Vol. 45. No. 4. ACM, 2015

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-18 Naming Overview i3 Layered naming DOA SFR 2 Multicast S 1 S 2 R RP R R R R RP: Rendezvous Point C 1 C 2 3 Mobility Sender HA FA Home Network Network 5 5.0.0.1 12.0.0.4

More information

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005 IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually

More information

Rendezvous Point Engineering

Rendezvous Point Engineering Rendezvous Point Engineering Last updated: November 2008 Introduction A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Exam - Final. CSCI 1680 Computer Networks Fonseca. Closed Book. Maximum points: 100 NAME: 1. TCP Congestion Control [15 pts]

Exam - Final. CSCI 1680 Computer Networks Fonseca. Closed Book. Maximum points: 100 NAME: 1. TCP Congestion Control [15 pts] CSCI 1680 Computer Networks Fonseca Exam - Final Due: 11:00am, May 10th, 2012 Closed Book. Maximum points: 100 NAME: 1. TCP Congestion Control [15 pts] a. TCP Tahoe and Reno have two congestion-window

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

MULTICAST EXTENSIONS TO OSPF (MOSPF)

MULTICAST EXTENSIONS TO OSPF (MOSPF) MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

CONTENT-DISTRIBUTION NETWORKS

CONTENT-DISTRIBUTION NETWORKS CONTENT-DISTRIBUTION NETWORKS George Porter June 1, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license These

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree.

Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree. CSE 123A Computer Networks Fall 2009 Lecture 10 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters

More information

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis Internet Protocols Fall 2006 Lectures 11-12 Inter-domain routing, mobility support, multicast routing Andreas Terzis Outline Inter-domain Internet Routing BGP Routing for mobile nodes Multicast routing

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Denial of Service (DoS)

Denial of Service (DoS) Flood Denial of Service (DoS) Comp Sci 3600 Security Outline Flood 1 2 3 4 5 Flood 6 7 8 Denial-of-Service (DoS) Attack Flood The NIST Computer Security Incident Handling Guide defines a DoS attack as:

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 7 Qin Yin Spring Semester 2013 1 LAYER 7 SWITCHING 2 Challenge: accessing services Datacenters are designed to be scalable Datacenters are replicated

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Network Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2

Network Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2 Network Layer II Still chapter 4 in the textbook C compiler You writing assignment 2 Getting IP addresses ARP is the simplest way, which we will barely discuss (now) It s a mapping between Ethernet MAC

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

This chapter describes how to configure the Cisco ASA to use the multicast routing protocol.

This chapter describes how to configure the Cisco ASA to use the multicast routing protocol. This chapter describes how to configure the Cisco ASA to use the multicast routing protocol. About, page 1 Guidelines for, page 4 Enable, page 4 Customize, page 5 Monitoring for PIM, page 16 Example for,

More information

Multicast Quick Start Configuration Guide

Multicast Quick Start Configuration Guide Multicast Quick Start Configuration Guide Document ID: 9356 Contents Introduction Prerequisites Requirements Components Used Conventions Dense Mode Sparse Mode with one RP Sparse Mode with Multiple RPs

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

A content delivery perspective on mobility in the Internet

A content delivery perspective on mobility in the Internet A content delivery perspective on mobility in the Internet Prof. Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk Credit to collaborators: Bernhard Ager, Anja Feldmann, Benjamin Frank,

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information