Improved Path Exploration in shim6-based Multihoming

Size: px
Start display at page:

Download "Improved Path Exploration in shim6-based Multihoming"

Transcription

1 Improved Path Exploration in shim6-based Multihoming Université catholique de Louvain Aug. 3st, 2007 SIGCOMM 2007 Workshop IPv6 and the Future of the Internet

2 2 EX : Measuring exploration times EX2 : Finding better paths 3

3 2 EX : Measuring exploration times EX2 : Finding better paths 3

4 Host-centric multihoming (the context) B, ISPX.B Internet Destination ISP ISP2 A ISP.A ISP2.A Source

5 Host-centric multihoming (the context) DATA B, ISPX.B Internet Destination src : ISP.A dest : ISPX.B ISP ISP2 A ISP.A ISP2.A Source

6 Host-centric multihoming (the context) B, ISPX.B Internet Destination DATA src : ISP2.A dest : ISPX.B ISP ISP2 A ISP.A ISP2.A Source

7 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical

8 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical

9 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical

10 Locators vs Identifiers (ULIDs) ULID : Used as the identifier throughout a transport connection. locator : IPv6 address used for routing (locating the peer). Shim6 performs a mapping between ULIDs and locators, by use of context tags.

11 Shim6 operation Outline DATA B, ISPX.B Internet Destination ISP ISP2 A ISP.A ISP2.A Source

12 Shim6 operation Outline DATA B, ISPX.B Internet Destination ISP Shim6 negotiation ISP2 A ISP.A ISP2.A Source

13 Shim6 operation Outline DATA B, ISPX.B Internet Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A Destination ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B Source

14 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A REAP OK DATA Internet ISP ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK

15 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A REAP OK DATA Internet REAP probe ISP REAP probe ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP Expl.

16 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A,ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP Inbd OK DATA Internet REAP probe ISP ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP Expl.

17 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A, ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP Inbd OK DATA Internet DATA REAP probe ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A,ISP2.A* ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK

18 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A, ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP OK Internet DATA ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A,ISP2.A* ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK

19 TCP connection survival REAP failure recovery 60 Throughput (Mbits/sec) Path used Path 2 used time (seconds) Figure: Evolution of throughput for an iperf TCP session

20 EX : Measuring exploration times EX2 : Finding better paths 2 EX : Measuring exploration times EX2 : Finding better paths 3

21 REAP : Failure recovery time EX : Measuring exploration times EX2 : Finding better paths The detection time is defined as the interval between the occurence of a failure and its detection by REAP timeout. The exploration time is the interval between leaving and coming back to the operational state. Probes are sent to various paths by randomly selecting an address pair, thus a path. 4 probes are sent with a 500ms interval, then exponential backoff is performed.

22 EX : Measuring exploration times EX2 : Finding better paths LinShim6 v0.4.3, with Linux kernel Available at Click modular router, to meet the following needs : Simulate broken paths : we are able to stop or restart any path of the testbed on a per-address pair basis. Simulate path delays : We can configure a specific artificial delay for each address pair. Perform source-address based routing : The testbed is configured with one queue for each address pair.

23 Lab configuration Outline EX : Measuring exploration times EX2 : Finding better paths :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A Click modular router. 0ms. 80ms. 0ms 80ms Figure: Testbed for REAP measurements :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B

24 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths n : number of broken queues The current queues for both directions are always broken (bidirectional failure) example for n = 3 : Click modular router :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B

25 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n=

26 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2

27 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3

28 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4

29 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4 n=5

30 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4 n=5 n=6

31 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths We have selected a path, is it the best one? Let s compare in terms of delay. Click modular router. 0ms. 80ms :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A. 0ms 80ms :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B

32 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths We break one path for each direction. What are the alternative paths chosen by the protocol? Click modular router. 0ms 80ms :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A. 0ms 80ms :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B

33 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths 30 Default REAP 20 % One-way delay (ms)

34 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths 30 Default REAP 4 probes sent in burst 20 % One-way delay (ms)

35 2 EX : Measuring exploration times EX2 : Finding better paths 3

36 Our implementation for the Linux kernel shows that multihoming with Shim6 is possible. REAP provides an additional capability, that is, failure detection and recovery by timeouts and probe sending. In most cases the path exploration may be done reasonably fast. We argue that REAP could also be used for finding paths with better/best delays, although we should care not to overload the network with signalling load.

37 Future work Evaluation and optimization of the detection time Use heuristics to find better paths according to some criteria (delay, bandwidth,...) Find an ordering of address pairs for path exploration that would perform better than the current random selection.

38 Thanks! Questions?

Improved Path Exploration in shim6-based Multihoming

Improved Path Exploration in shim6-based Multihoming Improved Path Exploration in shim6-based Multihoming Sébastien Barré, Olivier Bonaventure Department of Computer Science Université Catholique de Louvain (UCL), Belgium {firstname.lastname}@uclouvain.be

More information

Traditional IPv4 multihoming. IPv6 host-based multihoming. Drawbacks of BGP-based multihoming. How long will IPv4 last?

Traditional IPv4 multihoming. IPv6 host-based multihoming. Drawbacks of BGP-based multihoming. How long will IPv4 last? host-based multihoming raditional IPv4 multihoming 1.0.0.0/8 Provider2 AS2 2.0.0.0/8 Olivier Bonaventure Sébastien Barré IP Networking Lab Department of Computing Science and Engineering Université catholique

More information

Shim6 Architecture. Geoff Huston IETF-63 August 2005

Shim6 Architecture. Geoff Huston IETF-63 August 2005 Shim6 Architecture Geoff Huston IETF-63 August 2005 Background draft-ietf-multi6-architecture-04.txt (RFC publication queue) general description of multi-homing objectives consideration of major types

More information

Performance Comparison between MIPv6 and SEMO6

Performance Comparison between MIPv6 and SEMO6 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom proceedings. Performance Comparison between MIPv6 and

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Separating identifiers from locators to scale the Internet

Separating identifiers from locators to scale the Internet Separating identifiers from locators to scale the Internet Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve

More information

MultiPath TCP : Linux Kernel Implementation

MultiPath TCP : Linux Kernel Implementation MultiPath : Linux Kernel Implementation Presenter: Christoph Paasch IP Networking Lab Université catholique de Louvain February 3, 2012 http://mptcp.info.ucl.ac.be Presenter: Christoph Paasch - IP Networking

More information

Shim6: Reference Implementation and Optimization

Shim6: Reference Implementation and Optimization Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

SEMO6 - A MULTIHOMING-BASED SEAMLESS MOBILITY MANAGEMENT FRAMEWORK

SEMO6 - A MULTIHOMING-BASED SEAMLESS MOBILITY MANAGEMENT FRAMEWORK SEMO6 - A MULTIHOMING-BASED SEAMLESS MOBILITY MANAGEMENT FRAMEWORK Md. Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma,

More information

Shim6 protocol. Erik Nordmark

Shim6 protocol. Erik Nordmark Shim6 protocol Erik Nordmark Overview Nothing changed since l3shim Placement of shim, principles of mapping ULID and locators But picked some design decisions (somewhat arbitrarily) In order to work out

More information

NAT Support for Multiple Pools Using Route Maps

NAT Support for Multiple Pools Using Route Maps NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host

More information

Multipath Transport, Resource Pooling, and implications for Routing

Multipath Transport, Resource Pooling, and implications for Routing Multipath Transport, Resource Pooling, and implications for Routing Mark Handley, UCL and XORP, Inc Also: Damon Wischik, UCL Marcelo Bagnulo Braun, UC3M The members of Trilogy project: www.trilogy-project.org

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Evaluating the Benefits of the Locator/Identifier Separation

Evaluating the Benefits of the Locator/Identifier Separation Evaluating the Benefits of the Locator/Identifier Separation Bruno Quoitin IP Networking Lab Computer Science and Engineering Dept. Université catholique de Louvain, Belgium (bruno.quoitin@uclouvain.be)

More information

LDP Configuration Application

LDP Configuration Application CHAPTER 17 The contains the following tabs and subtabs. Interfaces Tab, page 17-244 General Tab, page 17-245 Neighbors Tab, page 17-248 Operations Tab, page 17-250 The LDP Configuration application allows

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

Basic NAT Example Security Recitation. Network Address Translation. NAT with Port Translation. Basic NAT. NAT with Port Translation

Basic NAT Example Security Recitation. Network Address Translation. NAT with Port Translation. Basic NAT. NAT with Port Translation Basic Example 6.829 Security Recitation Rob Beverly November 17, 2006 Company C 10k machines in 128.61.0.0/16 ISP B 128.61.23.2 21.203.19.201 128.61.19.202 21.203.19.202 Network Address

More information

A multihoming architecture for OneLab

A multihoming architecture for OneLab A multihoming architecture for OneLab Antonio de la Oliva Universidad Carlos III de Madrid Madrid Spain aoliva@it.uc3m.es Benoit Donnet Université catholique de Louvain Belgium donnet@info.ucl.ac.be Thierry

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

On the use of SHIM6 for Mobility Support in IMS Networks

On the use of SHIM6 for Mobility Support in IMS Networks On the use of SHIM6 for Mobility Support in IMS Networks John Ronan, Sasitharan Balasubramaniam Telecommunications Software and Systems Group Waterford Instiute of Technology, Carriganore Waterford, Ireland

More information

Flow and Congestion Control

Flow and Congestion Control CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Architectural Approaches to Multi-Homing for IPv6

Architectural Approaches to Multi-Homing for IPv6 Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004 Recap Multi-Homing in IPv4 Either: Or: Obtain a local AS Obtain PI space

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

How to Configure a Remote Management Tunnel for an F-Series Firewall

How to Configure a Remote Management Tunnel for an F-Series Firewall How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Performance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment

Performance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment Master Thesis Electrical Engineering October 2013 Performance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment Charles Mugga and Dong Sun School of Computing Blekinge

More information

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes

More information

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote

More information

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu Enhancement of CoAP Packet Delivery Performance for Internet of Things Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact

More information

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass

More information

mpls ldp atm vc-merge through mpls static binding ipv4

mpls ldp atm vc-merge through mpls static binding ipv4 mpls ldp atm vc-merge through mpls static binding ipv4 mpls ldp atm vc-merge, page 3 mpls ldp autoconfig, page 5 mpls ldp backoff, page 7 mpls ldp discovery, page 9 mpls ldp discovery transport-address,

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

Introduction to Network Address Translation

Introduction to Network Address Translation Introduction to Network Address Translation Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Engr. Joseph Ronald Canedo's Notes

Engr. Joseph Ronald Canedo's Notes 1 Open Systems Interconnection Model 2 Outline Overview The OSI Reference Model The OSI Model Layers and Functions Encapsulation and De-capsulation Peer-to-Peer Communication Network Protocols Summary

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

BGP Policy Lab - Partial Routing

BGP Policy Lab - Partial Routing 2016/09/08 10:01 1/6 BGP Policy Lab - Partial Routing BGP Policy Lab - Partial Routing Introduction The purpose of this exercise is to: Apply the concepts of BGP policy learned in class to achieve the

More information

The Shim6 Architecture for IPv6 Multihoming

The Shim6 Architecture for IPv6 Multihoming ACCEPTED FROM OPEN CALL The Shim6 Architecture for IPv6 Multihoming Alberto García-Martínez and Marcelo Bagnulo, Universidad Carlos III de Madrid Iljitsch van Beijnum, IMDEA Networks ABSTRACT The Shim6

More information

Automated Attack Discovery in TCP Congestion Control using a Modelguided

Automated Attack Discovery in TCP Congestion Control using a Modelguided Automated Attack Discovery in TCP Congestion Control using a Modelguided Approach Samuel Jero 1, Endadul Hoque 2, David Choffnes 3, Alan Mislove 3, and Cristina Nita-Rotaru 3 1 Purdue University, 2 Florida

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Congestion Control. Tom Anderson

Congestion Control. Tom Anderson Congestion Control Tom Anderson Bandwidth Allocation How do we efficiently share network resources among billions of hosts? Congestion control Sending too fast causes packet loss inside network -> retransmissions

More information

15-744: Computer Networking. L-1 Intro to Computer Networks

15-744: Computer Networking. L-1 Intro to Computer Networks 15-744: Computer Networking L-1 Intro to Computer Networks Outline Administrivia Layering 2 Who s Who? Professor: Srinivasan Seshan http://www.cs.cmu.edu/~srini srini@cmu.edu Office hours: Friday 4:00-5:00

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Interdomain Traffic Engineering in a Locator/Identifier Separation Context

Interdomain Traffic Engineering in a Locator/Identifier Separation Context 1 Interdomain Traffic Engineering in a Locator/Identifier Separation Context Damien Saucez, Benoit Donnet, Luigi Iannone, Olivier Bonaventure Université catholique de Louvain, Belgium Abstract The Routing

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

CSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9

CSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9 CSE/EE 461: Introduction to Computer Communications Networks Autumn 2010 Module 9 IP Addressing John Zahorjan zahorjan@cs.washington.edu 534 Allen Center Last Time: Addresses Imply Location 142.150.210.12

More information

Doctoral Written Exam in Networking, Fall 2010

Doctoral Written Exam in Networking, Fall 2010 Doctoral Written Exam in Networking, Fall 2010 December 14, 2010 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Friday, December 17,

More information

Reaping the Benefits of IPv6 Segment Routing

Reaping the Benefits of IPv6 Segment Routing Reaping the Benefits of IPv6 Segment Routing Public PhD thesis defense David Lebrun Université catholique de Louvain October 19, 2017 1/69 Table of Contents Introduction Segment Routing Implementing IPv6

More information

ETSF10 Internet Protocols Network Layer Protocols

ETSF10 Internet Protocols Network Layer Protocols ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4

More information

How to Configure IPSec Tunneling in Windows 2000

How to Configure IPSec Tunneling in Windows 2000 Home Self Support Assisted Support Custom Support Worldwide Support How to Configure IPSec Tunneling in Windows 2000 The information in this article applies to: Article ID: Q252735 Last Reviewed: February

More information

Transport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti

Transport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Transport Protocols for Data Center Communication Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Contents Motivation and Objectives Methodology Data Centers and Data Center Networks

More information

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004 TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks CS244a: n Introduction to Computer Networks Handout 7: Congestion Control Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University nickm@stanford.edu http://www.stanford.edu/~nickm

More information

Routing in Delay Tolerant Networks (2)

Routing in Delay Tolerant Networks (2) Routing in Delay Tolerant Networks (2) Primary Reference: E. P. C. Jones, L. Li and P. A. S. Ward, Practical Routing in Delay-Tolerant Networks, SIGCOMM 05, Workshop on DTN, August 22-26, 2005, Philadelphia,

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

Interoperability and Security of TraSH: A Transport Layer Seamless Handover

Interoperability and Security of TraSH: A Transport Layer Seamless Handover Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve

More information

SLIPSTREAM: AUTOMATIC INTERPROCESS COMMUNICATION OPTIMIZATION. Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram Adve

SLIPSTREAM: AUTOMATIC INTERPROCESS COMMUNICATION OPTIMIZATION. Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram Adve SLIPSTREAM: AUTOMATIC INTERPROCESS COMMUNICATION OPTIMIZATION Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram Adve Introduction 2 Use of TCP is ubiquitous Widely Supported Location Transparency Programmer-friendly

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented

More information

Best Practice - VPN Performance Testing

Best Practice - VPN Performance Testing Follow these instructions to create a standardized VPN performance testing environment. Using standardized settings is required for support to be able to compare performance tests with our in-house testing

More information

KB How to Configure IPSec Tunneling in Windows 2000

KB How to Configure IPSec Tunneling in Windows 2000 Page 1 of 5 Knowledge Base How to Configure IPSec Tunneling in Windows 2000 PSS ID Number: 252735 Article Last Modified on 3/17/2004 The information in this article applies to: Microsoft Windows 2000 Server

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Best Practices for Architecting Embedded Applications in LabVIEW Jacques Cilliers Applications Engineering

Best Practices for Architecting Embedded Applications in LabVIEW Jacques Cilliers Applications Engineering Best Practices for Architecting Embedded Applications in LabVIEW Jacques Cilliers Applications Engineering Overview of NI RIO Architecture PC Real Time Controller FPGA 4 Where to Start? 5 Requirements

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Implementing and Experimenting with XCP

Implementing and Experimenting with XCP Implementing and Experimenting with XCP Ted Faber, Aaron Falk, Yuri Pryadkin, Bob Braden, Eric Coe, Aman Kapoor, Amit Yajurvedi, Nirav Jasapara USC/ISI USC Viterbi School of Engineering 28 Sept 2005 Outline

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

BIRD Internet Routing Daemon

BIRD Internet Routing Daemon BIRD Internet Routing Daemon Ondřej Zajíček CZ.NIC z.s.p.o. 2015-02-16 BIRD overview BIRD Internet Routing Daemon Routing protocols BGP, OSPF, RIP and BFD IPv4 and IPv6 support Linux and BSD kernel support

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Configuring Application Visibility and Control for Cisco Flexible Netflow

Configuring Application Visibility and Control for Cisco Flexible Netflow Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also

More information

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport

More information

Outline : Computer Networking. Objectives. Who s Who? Administrivia. Layering. L-1 Intro to Computer Networks

Outline : Computer Networking. Objectives. Who s Who? Administrivia. Layering. L-1 Intro to Computer Networks Outline 15-744: Computer Networking Administrivia Layering L-1 Intro to Computer Networks 2 Who s Who? Professor: Srinivasan Seshan http://www.cs.cmu.edu/~srini srini@cmu.edu Office hours: Friday 4:00-5:00

More information

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti. Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP

More information

Internet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011

Internet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011 Internet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011 OUTLINE California Fault Lines: Understanding the Causes and Impact of Network Failures. Feng Wang, Zhuoqing Morley MaoJia Wang3, Lixin Gao and

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Outline Computer Networking. Functionality Split. Transport Protocols

Outline Computer Networking. Functionality Split. Transport Protocols Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang University of Michigan wingying@umich.edu Z. Morley Mao University of Michigan zmao@umich.edu Jia Wang AT&T Labs Research jiawang@research.att.com

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer Dmitri Loguinov Texas A&M University March 29, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Homework #3

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Configuring IP SLAs LSP Health Monitor Operations

Configuring IP SLAs LSP Health Monitor Operations Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

TCP Congestion Control

TCP Congestion Control 6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

Modelling TCP with Markov chains

Modelling TCP with Markov chains Modelling TCP with Markov chains Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2002 June 17 typeset in L A T E X2e on a linux system Modelling TCP p.1/30 Outline Markov chain basics

More information

Comparision study of MobileIPv4 and MobileIPv6

Comparision study of MobileIPv4 and MobileIPv6 Comparision study of MobileIPv4 and MobileIPv6 Dr. Sridevi Assistant Professor, Dept. of Computer Science, Karnatak University,Dharwad Abstract: IPv4 is being replaced by IPv6 due to the increased demand

More information

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

A Flexible Framework for Complete Session Mobility and its Implementation

A Flexible Framework for Complete Session Mobility and its Implementation A Flexible Framework for Complete Session Mobility and its Implementation Marc Barisch, Jochen Kögel, and Sebastian Meier Institute of Communication Networks and Computer Engineering Universität Stuttgart

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

Advanced IP Routing. Policy Routing QoS RVSP

Advanced IP Routing. Policy Routing QoS RVSP Advanced IP Routing Policy Routing QoS RVSP Traditional Routing What is traditional routing? Best effort. All routing is a destination driven process. Router cares only about the destination address when

More information

IPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET

IPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET ACCEPTED FROM O PEN C ALL IPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET MARCELO BAGNULO, ALBERTO GARCIA-MARTINEZ, AND ARTURO AZCORRA, UNIVERSIDAD CARLOS III DE MADRID The authors describe an architecture

More information