Improved Path Exploration in shim6-based Multihoming
|
|
- Rosalyn Hodges
- 5 years ago
- Views:
Transcription
1 Improved Path Exploration in shim6-based Multihoming Université catholique de Louvain Aug. 3st, 2007 SIGCOMM 2007 Workshop IPv6 and the Future of the Internet
2 2 EX : Measuring exploration times EX2 : Finding better paths 3
3 2 EX : Measuring exploration times EX2 : Finding better paths 3
4 Host-centric multihoming (the context) B, ISPX.B Internet Destination ISP ISP2 A ISP.A ISP2.A Source
5 Host-centric multihoming (the context) DATA B, ISPX.B Internet Destination src : ISP.A dest : ISPX.B ISP ISP2 A ISP.A ISP2.A Source
6 Host-centric multihoming (the context) B, ISPX.B Internet Destination DATA src : ISP2.A dest : ISPX.B ISP ISP2 A ISP.A ISP2.A Source
7 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical
8 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical
9 Locators vs Identifiers (ULIDs) Application Transport IP : Endpoint functions ULPs IP address = identifier (ULID) Network SHIM Datalink IP : Routing functions IP address = locator Physical
10 Locators vs Identifiers (ULIDs) ULID : Used as the identifier throughout a transport connection. locator : IPv6 address used for routing (locating the peer). Shim6 performs a mapping between ULIDs and locators, by use of context tags.
11 Shim6 operation Outline DATA B, ISPX.B Internet Destination ISP ISP2 A ISP.A ISP2.A Source
12 Shim6 operation Outline DATA B, ISPX.B Internet Destination ISP Shim6 negotiation ISP2 A ISP.A ISP2.A Source
13 Shim6 operation Outline DATA B, ISPX.B Internet Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A Destination ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B Source
14 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A REAP OK DATA Internet ISP ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK
15 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A*, ISP2.A cur. ULIDs : ISPX.B ISP.A REAP OK DATA Internet REAP probe ISP REAP probe ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP Expl.
16 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A,ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP Inbd OK DATA Internet REAP probe ISP ISP2 DATA A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A*, ISP2.A ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP Expl.
17 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A, ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP Inbd OK DATA Internet DATA REAP probe ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A,ISP2.A* ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK
18 REAP operation Outline B, ISPX.B Shim6 context context tag: B_flow locators : ISPX.B* ISP.A, ISP2.A* cur. ULIDs : ISPX.B ISP.A REAP OK Internet DATA ISP ISP2 A ISP.A ISP2.A Shim6 context context tag: A_flow locators : ISP.A,ISP2.A* ISPX.B* cur. ULIDs : ISP.A ISPX.B REAP OK
19 TCP connection survival REAP failure recovery 60 Throughput (Mbits/sec) Path used Path 2 used time (seconds) Figure: Evolution of throughput for an iperf TCP session
20 EX : Measuring exploration times EX2 : Finding better paths 2 EX : Measuring exploration times EX2 : Finding better paths 3
21 REAP : Failure recovery time EX : Measuring exploration times EX2 : Finding better paths The detection time is defined as the interval between the occurence of a failure and its detection by REAP timeout. The exploration time is the interval between leaving and coming back to the operational state. Probes are sent to various paths by randomly selecting an address pair, thus a path. 4 probes are sent with a 500ms interval, then exponential backoff is performed.
22 EX : Measuring exploration times EX2 : Finding better paths LinShim6 v0.4.3, with Linux kernel Available at Click modular router, to meet the following needs : Simulate broken paths : we are able to stop or restart any path of the testbed on a per-address pair basis. Simulate path delays : We can configure a specific artificial delay for each address pair. Perform source-address based routing : The testbed is configured with one queue for each address pair.
23 Lab configuration Outline EX : Measuring exploration times EX2 : Finding better paths :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A Click modular router. 0ms. 80ms. 0ms 80ms Figure: Testbed for REAP measurements :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B
24 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths n : number of broken queues The current queues for both directions are always broken (bidirectional failure) example for n = 3 : Click modular router :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B
25 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n=
26 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2
27 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3
28 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4
29 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4 n=5
30 EX : Measuring exploration times EX2 : Finding better paths EX : Relation with the number of broken paths CDF (%) exploration time (seconds) n= n=2 n=3 n=4 n=5 n=6
31 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths We have selected a path, is it the best one? Let s compare in terms of delay. Click modular router. 0ms. 80ms :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A. 0ms 80ms :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B
32 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths We break one path for each direction. What are the alternative paths chosen by the protocol? Click modular router. 0ms 80ms :::if_id_A 200:2::if_id_A 200:3::if_id_A Host A. 0ms 80ms :::if_id_B 2002:2::if_id_B 2002:3::if_id_B Host B
33 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths 30 Default REAP 20 % One-way delay (ms)
34 EX2 : Paths with different delays EX : Measuring exploration times EX2 : Finding better paths 30 Default REAP 4 probes sent in burst 20 % One-way delay (ms)
35 2 EX : Measuring exploration times EX2 : Finding better paths 3
36 Our implementation for the Linux kernel shows that multihoming with Shim6 is possible. REAP provides an additional capability, that is, failure detection and recovery by timeouts and probe sending. In most cases the path exploration may be done reasonably fast. We argue that REAP could also be used for finding paths with better/best delays, although we should care not to overload the network with signalling load.
37 Future work Evaluation and optimization of the detection time Use heuristics to find better paths according to some criteria (delay, bandwidth,...) Find an ordering of address pairs for path exploration that would perform better than the current random selection.
38 Thanks! Questions?
Improved Path Exploration in shim6-based Multihoming
Improved Path Exploration in shim6-based Multihoming Sébastien Barré, Olivier Bonaventure Department of Computer Science Université Catholique de Louvain (UCL), Belgium {firstname.lastname}@uclouvain.be
More informationTraditional IPv4 multihoming. IPv6 host-based multihoming. Drawbacks of BGP-based multihoming. How long will IPv4 last?
host-based multihoming raditional IPv4 multihoming 1.0.0.0/8 Provider2 AS2 2.0.0.0/8 Olivier Bonaventure Sébastien Barré IP Networking Lab Department of Computing Science and Engineering Université catholique
More informationShim6 Architecture. Geoff Huston IETF-63 August 2005
Shim6 Architecture Geoff Huston IETF-63 August 2005 Background draft-ietf-multi6-architecture-04.txt (RFC publication queue) general description of multi-homing objectives consideration of major types
More informationPerformance Comparison between MIPv6 and SEMO6
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom proceedings. Performance Comparison between MIPv6 and
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationSeparating identifiers from locators to scale the Internet
Separating identifiers from locators to scale the Internet Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve
More informationMultiPath TCP : Linux Kernel Implementation
MultiPath : Linux Kernel Implementation Presenter: Christoph Paasch IP Networking Lab Université catholique de Louvain February 3, 2012 http://mptcp.info.ucl.ac.be Presenter: Christoph Paasch - IP Networking
More informationShim6: Reference Implementation and Optimization
Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationSEMO6 - A MULTIHOMING-BASED SEAMLESS MOBILITY MANAGEMENT FRAMEWORK
SEMO6 - A MULTIHOMING-BASED SEAMLESS MOBILITY MANAGEMENT FRAMEWORK Md. Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma,
More informationShim6 protocol. Erik Nordmark
Shim6 protocol Erik Nordmark Overview Nothing changed since l3shim Placement of shim, principles of mapping ULID and locators But picked some design decisions (somewhat arbitrarily) In order to work out
More informationNAT Support for Multiple Pools Using Route Maps
NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host
More informationMultipath Transport, Resource Pooling, and implications for Routing
Multipath Transport, Resource Pooling, and implications for Routing Mark Handley, UCL and XORP, Inc Also: Damon Wischik, UCL Marcelo Bagnulo Braun, UC3M The members of Trilogy project: www.trilogy-project.org
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationEvaluating the Benefits of the Locator/Identifier Separation
Evaluating the Benefits of the Locator/Identifier Separation Bruno Quoitin IP Networking Lab Computer Science and Engineering Dept. Université catholique de Louvain, Belgium (bruno.quoitin@uclouvain.be)
More informationLDP Configuration Application
CHAPTER 17 The contains the following tabs and subtabs. Interfaces Tab, page 17-244 General Tab, page 17-245 Neighbors Tab, page 17-248 Operations Tab, page 17-250 The LDP Configuration application allows
More informationTCP so far Computer Networking Outline. How Was TCP Able to Evolve
TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments
More informationBasic NAT Example Security Recitation. Network Address Translation. NAT with Port Translation. Basic NAT. NAT with Port Translation
Basic Example 6.829 Security Recitation Rob Beverly November 17, 2006 Company C 10k machines in 128.61.0.0/16 ISP B 128.61.23.2 21.203.19.201 128.61.19.202 21.203.19.202 Network Address
More informationA multihoming architecture for OneLab
A multihoming architecture for OneLab Antonio de la Oliva Universidad Carlos III de Madrid Madrid Spain aoliva@it.uc3m.es Benoit Donnet Université catholique de Louvain Belgium donnet@info.ucl.ac.be Thierry
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationOn the use of SHIM6 for Mobility Support in IMS Networks
On the use of SHIM6 for Mobility Support in IMS Networks John Ronan, Sasitharan Balasubramaniam Telecommunications Software and Systems Group Waterford Instiute of Technology, Carriganore Waterford, Ireland
More informationFlow and Congestion Control
CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationArchitectural Approaches to Multi-Homing for IPv6
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004 Recap Multi-Homing in IPv4 Either: Or: Obtain a local AS Obtain PI space
More informationRandomization. Randomization used in many protocols We ll study examples:
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationRandomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationShim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI
Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationTCP/IP Protocol Suite 1
TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with
More informationMultiple unconnected networks
TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum
More informationPerformance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment
Master Thesis Electrical Engineering October 2013 Performance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment Charles Mugga and Dong Sun School of Computing Blekinge
More informationIntroduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control
Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes
More informationHow to Configure a Remote Management Tunnel for Barracuda NG Firewalls
How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote
More informationEnhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu
Enhancement of CoAP Packet Delivery Performance for Internet of Things Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact
More informationTowards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani
Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass
More informationmpls ldp atm vc-merge through mpls static binding ipv4
mpls ldp atm vc-merge through mpls static binding ipv4 mpls ldp atm vc-merge, page 3 mpls ldp autoconfig, page 5 mpls ldp backoff, page 7 mpls ldp discovery, page 9 mpls ldp discovery transport-address,
More informationLecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.
Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/
More informationIntroduction to Network Address Translation
Introduction to Network Address Translation Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationEngr. Joseph Ronald Canedo's Notes
1 Open Systems Interconnection Model 2 Outline Overview The OSI Reference Model The OSI Model Layers and Functions Encapsulation and De-capsulation Peer-to-Peer Communication Network Protocols Summary
More informationBandwidth Allocation & TCP
Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative
More informationThe Effects of Asymmetry on TCP Performance
The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry
More informationBGP Policy Lab - Partial Routing
2016/09/08 10:01 1/6 BGP Policy Lab - Partial Routing BGP Policy Lab - Partial Routing Introduction The purpose of this exercise is to: Apply the concepts of BGP policy learned in class to achieve the
More informationThe Shim6 Architecture for IPv6 Multihoming
ACCEPTED FROM OPEN CALL The Shim6 Architecture for IPv6 Multihoming Alberto García-Martínez and Marcelo Bagnulo, Universidad Carlos III de Madrid Iljitsch van Beijnum, IMDEA Networks ABSTRACT The Shim6
More informationAutomated Attack Discovery in TCP Congestion Control using a Modelguided
Automated Attack Discovery in TCP Congestion Control using a Modelguided Approach Samuel Jero 1, Endadul Hoque 2, David Choffnes 3, Alan Mislove 3, and Cristina Nita-Rotaru 3 1 Purdue University, 2 Florida
More informationModular Policy Framework. Class Maps SECTION 4. Advanced Configuration
[ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a
More informationCongestion Control. Tom Anderson
Congestion Control Tom Anderson Bandwidth Allocation How do we efficiently share network resources among billions of hosts? Congestion control Sending too fast causes packet loss inside network -> retransmissions
More information15-744: Computer Networking. L-1 Intro to Computer Networks
15-744: Computer Networking L-1 Intro to Computer Networks Outline Administrivia Layering 2 Who s Who? Professor: Srinivasan Seshan http://www.cs.cmu.edu/~srini srini@cmu.edu Office hours: Friday 4:00-5:00
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationInterdomain Traffic Engineering in a Locator/Identifier Separation Context
1 Interdomain Traffic Engineering in a Locator/Identifier Separation Context Damien Saucez, Benoit Donnet, Luigi Iannone, Olivier Bonaventure Université catholique de Louvain, Belgium Abstract The Routing
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationCSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9
CSE/EE 461: Introduction to Computer Communications Networks Autumn 2010 Module 9 IP Addressing John Zahorjan zahorjan@cs.washington.edu 534 Allen Center Last Time: Addresses Imply Location 142.150.210.12
More informationDoctoral Written Exam in Networking, Fall 2010
Doctoral Written Exam in Networking, Fall 2010 December 14, 2010 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Friday, December 17,
More informationReaping the Benefits of IPv6 Segment Routing
Reaping the Benefits of IPv6 Segment Routing Public PhD thesis defense David Lebrun Université catholique de Louvain October 19, 2017 1/69 Table of Contents Introduction Segment Routing Implementing IPv6
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationHow to Configure IPSec Tunneling in Windows 2000
Home Self Support Assisted Support Custom Support Worldwide Support How to Configure IPSec Tunneling in Windows 2000 The information in this article applies to: Article ID: Q252735 Last Reviewed: February
More informationTransport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti
Transport Protocols for Data Center Communication Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Contents Motivation and Objectives Methodology Data Centers and Data Center Networks
More informationTBGP: A more scalable and functional BGP. Paul Francis Jan. 2004
TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationCS244a: An Introduction to Computer Networks
CS244a: n Introduction to Computer Networks Handout 7: Congestion Control Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University nickm@stanford.edu http://www.stanford.edu/~nickm
More informationRouting in Delay Tolerant Networks (2)
Routing in Delay Tolerant Networks (2) Primary Reference: E. P. C. Jones, L. Li and P. A. S. Ward, Practical Routing in Delay-Tolerant Networks, SIGCOMM 05, Workshop on DTN, August 22-26, 2005, Philadelphia,
More informationTuning RED for Web Traffic
Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)
More informationInteroperability and Security of TraSH: A Transport Layer Seamless Handover
Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman
More informationData and Computer Communications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve
More informationSLIPSTREAM: AUTOMATIC INTERPROCESS COMMUNICATION OPTIMIZATION. Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram Adve
SLIPSTREAM: AUTOMATIC INTERPROCESS COMMUNICATION OPTIMIZATION Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram Adve Introduction 2 Use of TCP is ubiquitous Widely Supported Location Transparency Programmer-friendly
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented
More informationBest Practice - VPN Performance Testing
Follow these instructions to create a standardized VPN performance testing environment. Using standardized settings is required for support to be able to compare performance tests with our in-house testing
More informationKB How to Configure IPSec Tunneling in Windows 2000
Page 1 of 5 Knowledge Base How to Configure IPSec Tunneling in Windows 2000 PSS ID Number: 252735 Article Last Modified on 3/17/2004 The information in this article applies to: Microsoft Windows 2000 Server
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More informationBest Practices for Architecting Embedded Applications in LabVIEW Jacques Cilliers Applications Engineering
Best Practices for Architecting Embedded Applications in LabVIEW Jacques Cilliers Applications Engineering Overview of NI RIO Architecture PC Real Time Controller FPGA 4 Where to Start? 5 Requirements
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes
CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationImplementing and Experimenting with XCP
Implementing and Experimenting with XCP Ted Faber, Aaron Falk, Yuri Pryadkin, Bob Braden, Eric Coe, Aman Kapoor, Amit Yajurvedi, Nirav Jasapara USC/ISI USC Viterbi School of Engineering 28 Sept 2005 Outline
More informationChapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment
More informationBIRD Internet Routing Daemon
BIRD Internet Routing Daemon Ondřej Zajíček CZ.NIC z.s.p.o. 2015-02-16 BIRD overview BIRD Internet Routing Daemon Routing protocols BGP, OSPF, RIP and BFD IPv4 and IPv6 support Linux and BSD kernel support
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationConfiguring Application Visibility and Control for Cisco Flexible Netflow
Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also
More informationInformation Network 1 TCP 1/2. Youki Kadobayashi NAIST
Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport
More informationOutline : Computer Networking. Objectives. Who s Who? Administrivia. Layering. L-1 Intro to Computer Networks
Outline 15-744: Computer Networking Administrivia Layering L-1 Intro to Computer Networks 2 Who s Who? Professor: Srinivasan Seshan http://www.cs.cmu.edu/~srini srini@cmu.edu Office hours: Friday 4:00-5:00
More informationDeveloping ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.
Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP
More informationInternet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011
Internet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011 OUTLINE California Fault Lines: Understanding the Causes and Impact of Network Failures. Feng Wang, Zhuoqing Morley MaoJia Wang3, Lixin Gao and
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationOutline Computer Networking. Functionality Split. Transport Protocols
Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationEXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS
EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,
More informationLow-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang University of Michigan wingying@umich.edu Z. Morley Mao University of Michigan zmao@umich.edu Jia Wang AT&T Labs Research jiawang@research.att.com
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer Dmitri Loguinov Texas A&M University March 29, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Homework #3
More informationTCP and BBR. Geoff Huston APNIC
TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed
More informationConfiguring IP SLAs LSP Health Monitor Operations
Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to
More informationCSC Network Security
CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet
More informationASA Access Control. Section 3
[ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look
More informationTCP Congestion Control
6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new
More informationModelling TCP with Markov chains
Modelling TCP with Markov chains Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2002 June 17 typeset in L A T E X2e on a linux system Modelling TCP p.1/30 Outline Markov chain basics
More informationComparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6 Dr. Sridevi Assistant Professor, Dept. of Computer Science, Karnatak University,Dharwad Abstract: IPv4 is being replaced by IPv6 due to the increased demand
More informationIntroduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.
More informationCS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes
CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationA Flexible Framework for Complete Session Mobility and its Implementation
A Flexible Framework for Complete Session Mobility and its Implementation Marc Barisch, Jochen Kögel, and Sebastian Meier Institute of Communication Networks and Computer Engineering Universität Stuttgart
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationLecture 2. Computer Networks Models. Network Models 1-1
Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -
More informationAdvanced IP Routing. Policy Routing QoS RVSP
Advanced IP Routing Policy Routing QoS RVSP Traditional Routing What is traditional routing? Best effort. All routing is a destination driven process. Router cares only about the destination address when
More informationIPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET
ACCEPTED FROM O PEN C ALL IPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET MARCELO BAGNULO, ALBERTO GARCIA-MARTINEZ, AND ARTURO AZCORRA, UNIVERSIDAD CARLOS III DE MADRID The authors describe an architecture
More information