Virtualization. Stefan Schmid - 1

Size: px
Start display at page:

Download "Virtualization. Stefan Schmid - 1"

Transcription

1 Virtualization Stefan Schmid - 1

2 Virtualization and Benefits What is virtualization? An abstraction Used where and (dis)advantages? Java virtual machine, virtual memory, VPN, abstraction = simpler and less details? (but less efficient?) more flexible and efficient use of resources? isolation Stefan Schmid - 2

3 Virtualization of Networks Virtualization of resources: more efficient use of hardware memory, hiding fragmentation, no relative addressing, isolation of processes... powerful abstraction in systems engineering Computing examples: virtual memory, virtual devices e.g., /dev/null OS abstracting hardware (Intel vs AMD vs GPU, etc.) Virtual machines: e.g., Java IBM VM OS from 1960 s/70 s virtual machine executes platform independent bytecode, secure executions,... Layering of abstractions: don t sweat the details of the lower layer, only deal with lower layers abstractly Mainframes; hypervisor runs on hardware and creates the virtual environment Stefan Schmid - 3

4 The Internet: Virtualizing Local Networks The entire Internet is based on the idea of abstraction! Abstracting different networks : multiple unconnected networks ARPAnet (MIT & US Dept. Defense) data-over-cable networks packet satellite network (Aloha) packet radio network.. differing in: addressing conventions packet formats error recovery routing protocols How to unite?? Gateways... Introduces gateways, a TCP with flow-control, ports and multiplexing, etc. Stefan Schmid - 4

5 Cerf & Kahn: Interconnecting two networks ARPAnet satellite net interconnection must preserve intact the internal operation of each network...the interface between networks must play a central role in the development of any network interconnection strategy. We give a special name to this interface that performs these functions and call it a GATEWAY... prefer that the interface be as simple and reliable as possible, and deal primarily with passing data between networks that use different packetswitching strategies address formats is a problem between networks because the local network addresses of TCP's may vary substantially in format and size. A uniform internetwork TCP address space, understood by each GATEWAY and TCP, is essential to routing and delivery of internetwork packets. Stefan Schmid - 5

6 Cerf & Kahn: Interconnecting two networks Internetwork layer: addressing: internetwork appears as a single, uniform entity, despite underlying local network heterogeneity network of networks Gateway: talks both languages embed internetwork packets in local packet format or extract them route (at internetwork level) to next gateway fragmentation (but not reassembly), etc. gateway TCP enabled... ARPAnet satellite net Stefan Schmid - 6

7 Historical Aside: Proposed Internetwork packet in 1974: 2-level addressing local header source address dest. address seq. # byte count flag field text checksum network TCP identifier 8 16 translated into local address at final gateway encapsulation: header (and maybe tail) are proprietary 256 networks sufficient for forseeable future (used to find next gateway) Stefan Schmid - 7

8 Cerf & Kahn s Internetwork Architecture What is virtualized? two layers of addressing: internetwork and local network new layer makes everything homogeneous underlying local network technology (cable, satellite, 56K modem) is invisible at internetwork layer Stefan Schmid - 8

9 Overlay Networks Abstracting networks even more, on higher layers: Nodes, links? Examples and purpose? Nodes: applications, running at various sites as nodes on an application-level network Links: create logical links (e.g., TCP or UDP connections) pairwise between each other each logical link: multiple physical links, routing defined by native Internet routing Examples of overlay networks? E.g., peer-to-peer networks such as BitTorrent, Gnutella, etc., or typically CDNs, Internet itself was overlay over telephone system... Use of overlay networks? E.g., robust routing Stefan Schmid - 9

10 Overlay Network Connect applications directly via virtual links! abstraction Stefan Schmid - 10

11 Overlay Network Focus at the application level Stefan Schmid - 11

12 What s new/what s old here? Old: we re doing routing, but at application layer (e.g., can be contentspecific) New names/addresses: internet uses IP addresses (reflecting only network physical structure), overlay can use content-specific or application-specific names/addresses Virtualizing the Internet: another layer of abstraction tradeoffs possible: can improve routing performance not just delay/throughput but application-specific measures (e.g., content that I *want* - efficient publish/subscribe) content matters too; but maybe overhead Security and anonymity: easier to add at application layer? Can be used to get around congestion/bad routing in the underlay (can route differently from underlay). Can do more complex routing but lose access to underlying measures like topology, delay, QoS: lose performance (???) but gain flexibility/functionality Overlay is a single entity that combines heterogeneous underlays to provide the homogeneous overlay new data transmission functions: broadcast and multicast can be done in overlay (unlike IP multicast, easy also across multiple providers) Stefan Schmid - 12

13 Use of Overlays: Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho.net E.g., Noho has BGP routes to UMass and Berkeley! Stefan Schmid - 13

14 Use of Overlays: Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho-to-UMass Noho.net Stefan Schmid - 14

15 Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho-to-Berkeley Noho.net Stefan Schmid - 15

16 Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) UCLA Internet 2 Noho-to-Berkeley UMass.net C&W Mediaone Noho.net Stefan Schmid - 16

17 Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) Internet 2 Noho to UMass to Berkeley route not visible or available via BGP! Mediaone can t route to Berkeley via Internet2 C&W Mediaone UMass.net UCLA Noho-to-Berkeley Noho.net Stefan Schmid - 17

18 RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance, reliability of routing application-layer router Two-hop (application-level) noho-to-berkeley route Stefan Schmid - 18

19 RON: Resilient Overlay Networks Why RON, and why does it work? The Internet offers a high redundancy of paths! BGP must focus on scalability Much aggregation, damps route changes,...: makes things slow In BGP, only /19 block or larger updates accepted! How to make access to my company robust otherwise? E.g., multihoming (small company behind many ISPs), or even use multiple addresses?! Application can choose its metric! (latency vs bandwidth, etc.) Stefan Schmid - 19

20 RON Experiments Measure loss, latency, and throughput with and without RON 13 hosts in the US and Europe 3 days of measurements from data collected in March minute average loss rates A 30 minute outage is very serious! Note: Experiments done with No-Internet2-forcommercial-use policy (Internet2 routes are often more stable, but not always visible) Stefan Schmid - 20

21 An order-of-magnitude fewer failures Table: for how many samples of duration 30min was the loss rate larger than p%? RON win = loss in Internet was >p and RON lower no change = the same; RON worse = Internet better for this example. Loss Rate 10% 20% 30% 50% 80% 100% RON was below 50% in all the 32 samples when Internet was above. RON Better No Change 57 6,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON Worse Stefan Schmid - 21

22 An order-of-magnitude fewer failures Difficult to define outage : TCP only 2-10 minutes; here larger scale... Loss Rate 10% 20% 30% 50% 80% 100% This implies that outage was never on edge! The higher the loss rate, the fewer samples for which Internet bad; RON loss never above 30%. 30-minute average loss rates RON Better No Change RON Worse ,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON routed around all of these! (Implication?) One indirection hop provides almost all the benefit! Stefan Schmid - 22

23 RON Research Issues How to design overlay networks? Measurement (active) and self-configuration Understanding performance of underlying net ( reality matters ) Fast fail-over Sophisticated metrics (latency vs bandwidth: what is needed?) application-sensitive (e.g., delay versus throughput) path selection Effect of RON on underlying network If everyone does RON, are we better off? Experiments were small-scale Stability?... Stefan Schmid - 23

24 IP-over-ATM IP-over-ATM virtualization: give the illusion of a different network (why? IP services...) ATM = Asynchronous Transfer Mode: Properties? Goal, e.g., real-time audio and video transmission Virtual circuit-switched Explicit set up of virtual channel (VC) needed Several layers Application layer: ATM Adaption Layer Different services... IP vs ATM? ATM connection oriented, has QoS concepts,... How to offer IP services over ATM? IP-over-ATM! Make it look like an IP network... (Alternative: peer-to-peer, like internet, less popular...) Idea overlay approach : view ATM as link layer protocol... Stefan Schmid - 24

25 IP-Over-ATM Classic IP only 3 networks (e.g., LAN segments) MAC (802.3) and IP addresses IP-over-ATM replace network (e.g., LAN segment) with ATM network ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs Stefan Schmid - 25

26 IP-Over-ATM app transport IP Eth phy IP AAL Eth ATM phy phy ATM adaption layer: transport layer (only at end systems): e.g., error detection, segmentation,... ATM phy ATM phy app transport IP AAL ATM phy Stefan Schmid - 26

27 IP View of the world ATM is encapsulated... IP network ATM network Stefan Schmid - 27

28 Classical IP-over-ATM [RFC 1577] IP-over-ATM network can support usual IP subnetting... divide ATM net in IP prefix subnets: A B C D LIS 1 LIS 2 LIS 3 R1 R2 Why subnets? - Given address space, divide into different domains (e.g. users on site vs other department) s.t. communication goes via router, security,... - Efficiency: smaller broadcast domains E LIS: logical IP subnet End systems in same LIS have same IP network prefix LIS looks like a LAN ATM net divided into multiple LIS Intra-LIS communication via direct ATM connections How to go from IP addr to ATM addr: ATMARP resolves IP addr to ATM addr (similar to ARP) Stefan Schmid - 28

29 Classical IP-over-ATM [RFC 1577] A B C D E Inter-LIS communication: source, dest. in different LIS each LIS looks like a LAN LIS 1 LIS 2 LIS 3 hop-by hop forwarding via routers: R1 R2 A-R1-R2-B Traffic between different logical subnets goes via routers, although it s the same ATM network! This is quite an overhead (latency, bw bottleneck etc.), and there are sometimes short-cut approaches! How could they look like?? Stefan Schmid - 29

30 NHRP (next hop resolution protocol) [RFC 2332] A NHRP server, S 1 B C D LIS 1 LIS 2 LIS 3 NHRP server, S 2 E NHRP server, S 3 source/dest. not in same LIS: ATMARP can not provide ATM dest. address NHRP: resolve IP-to-ATM address of remote dest. client queries local NHRP server NHRP server routes NHRP request to next NHRP server destination NHRP returns dest ATM address back through NHRP server chain (like routed DNS) source can send directly to dest. using provided ATM address Stefan Schmid - 30

31 Virtual Private Networks (VPN) VPNs Networks perceived as being private networks by customers using them, but built over shared infrastructure owned by service provider (SP) Why virtualization here? private over shared infrastructure yields efficient resource sharing: looks like private but cheaper, no own line has to be built! (shared backbone) How does the VPN architecture look like? SP infrastructure: backbone provider edge devices Customer: customer edge devices (communicating over shared backbone) Stefan Schmid - 31

32 VPN: logical view virtual private network Two customer historical types: provider edge - device leased lines edge device - customer-premises-based Stefan Schmid - 32

33 VPNs: benefits? Privacy & security CE-CE encryption vs PE-PE encryption? Or both? (E.g., IPsec) Support for mobility: looks like you are always at home Cost: many forms of newer VPNs are cheaper than leased line VPN s ability to share at lower layers exploit multiple paths, redundancy, fault-recovery (lower layers), that do not exist in leased line VPN s need isolation mechanisms to ensure appropriate resources sharing abstraction and manageability: all machines with addresses that are in are trusted no matter where they are Stefan Schmid - 33

34 VPN reference architecture customer edge device provider edge device customer sites of VPN2 Stefan Schmid - 34

35 Leased-line VPN customer sites interconnected via static virtual channels (e.g., ATM VCs on layer 2), leased lines Expensive: connection-oriented, dedicated channels, etc. customer site connects to provider edge Stefan Schmid - 35

36 Customer premise VPN All VPN functions (e.g., over IP!) implemented by customer customer sites interconnected via tunnels tunnels typically encrypted SP treats VPN packets like all other packets! But configuration of expensive VPN gateways at customer Stefan Schmid - 36

37 Customer premise VPN IP-based: IP over IP Stefan Schmid - 37

38 Drawbacks? Leased-line VPN: configuration costs, maintainence by SP: long time, much manpower CPE-based VPN: expertise by customer to acquire, configure, manage VPN, IPSec tunnel for each CE pair of same VPN The new wave : Network-based VPN IP-based VPNs offered by SP (often together with other services such as firewalls, QoS,...) over its shared IP backbone Customer s routers connect to SP routers Less burden at customer: no need to implement VPN functions such as tunneling SP routers maintain separate (independent) IP contexts for each VPN sites can use private addressing (e.g., different VPNs with same IP addresses) traffic from one VPN can not be injected into another Stefan Schmid - 38

39 Network-based Layer 3 VPNs PE s are IP routers that maintain separate IP contexts (routing and forwarding tables) for every supported VPN, and ensure IP reachability between distant sites of same VPN How to realize? Concept of virtual routers (VR) IP-encapsulation and backbone tunnels between PE routers Stefan Schmid - 39

40 Network-based Layer 3 VPNs multiple virtual routers in single provider edge device tunnels (over IP network) only between PEs (and not CEs); backbone routers do not need to be aware of different contexts (inner IP headers) Stefan Schmid - 40

41 Network-based Layer 3 VPNs Realization: Virtual Router (VR) per VPN in each PE E.g., each VR has different IP address Backbone tunnels between PEs (backbone routers need not process inner IP headers of VPN, etc.!) Tunnels = concept that logic/support only needed at edges! Each PE pair sharing a VPN context need one tunnel Techniques: IP-in-IP, MPLS multiplexing (with good automation, traffic enigneering, etc.), GRE, etc. Stefan Schmid - 41

42 Tunneling Tunneling is a mechanism to concentrate logic on the edges of the core network! Stefan Schmid - 42

43 Tunneling Tunneling is a mechanism to concentrate logic on the edges of the core network! Stefan Schmid - 43

44 VPNs: Further Reading Stefan Schmid - 44

45 Excursion: Beyond VPNs CloudNet Architecture and Prototype at INET Stefan Schmid - 45

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Virtualization and Benefits

Virtualization and Benefits Virtualization Virtualization and Benefits Virtualization a central design principle in CS in general! What is virtualization? Where is it used and for what? Virtualization is an abstraction E.g., Java

More information

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 10/18/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. Virtualization. Jasleen Kaur.

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 10/18/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. Virtualization. Jasleen Kaur. COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Virtualization Jasleen Kaur Fall 2016 1 Virtualization in Networks Virtualization of resources: Ø Powerful abstraction in systems engineering Ø Computing examples:

More information

HY436: Network Virtualization

HY436: Network Virtualization HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Design principles/protocol functions

Design principles/protocol functions Design principles/protocol functions Goals: Identify, study common architectural components, protocol mechanisms, approaches we find in network architectures Synthesis: big picture Principles / protocol

More information

Internet Design: Big Picture

Internet Design: Big Picture Internet Design: Big Picture Internet architectural, design and implementation principles not scriptures, but guidelines understand pros and cons, trade-offs involves Original Internet Design Goals what

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Design Principles / Protocol Functions. 1: Separation of Control and Data

Design Principles / Protocol Functions. 1: Separation of Control and Data Design Principles / Protocol Functions Goals: Identify, study common architectural components, protocol mechanisms, approaches do we find in network architectures? Synthesis: Big picture Principles / protocol

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

CS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs

CS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs : Computer Networks Lecture 8: Apr 21, 2004 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

Virtual Private Networks Advanced Technologies

Virtual Private Networks Advanced Technologies Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

MPLS VPN. 5 ian 2010

MPLS VPN. 5 ian 2010 MPLS VPN 5 ian 2010 What this lecture is about: IP CEF MPLS architecture What is MPLS? MPLS labels Packet forwarding in MPLS MPLS VPNs 3 IP CEF & MPLS Overview How does a router forward packets? Process

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Cisco Group Encrypted Transport VPN

Cisco Group Encrypted Transport VPN Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems S 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2004 Lecture 19: Networks and Distributed Systems 19.0 Main Points Motivation for distributed vs. centralized systems

More information

Virtual Private Networks Advanced Technologies

Virtual Private Networks Advanced Technologies Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)

More information

Where we are in the Course

Where we are in the Course Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 20: Networks and Distributed Systems

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 20: Networks and Distributed Systems S 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 20: Networks and Distributed Systems 20.0 Main Points Motivation for distributed vs. centralized systems

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

PART IV. Internetworking Using TCP/IP

PART IV. Internetworking Using TCP/IP PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Lecture 14 Summary - flashback

Lecture 14 Summary - flashback Course on Computer Communication and Networks Lecture 14 Summary - flashback EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Marina

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Chapter 4 DataLink Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. DataLink Layer Link Layer 4.1 Link-Layer Addressing 4.2 Ethernet

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

Network Layer Protocols

Network Layer Protocols internetwork n. &v. Network Layer Protocols CSCI 363 Computer Networks Department of Computer Science 1 logical network built out of a collection of physical networks. 2 tr. to interconnect physical networks

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

LAN Emulation, IP Over ATM and MPOA

LAN Emulation, IP Over ATM and MPOA LAN Emulation, IP Over ATM and MPOA Professor of Computer and Information Sciences Columbus, OH 43210 These slides are available at http://www.cis.ohio-state.edu/~jain/cis777-00/ 1 Overview LAN Emulation

More information

Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015

Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Principles Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Last time Course introduction Principles

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

Internet Protocol (IP)

Internet Protocol (IP) CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Layering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.

Layering and Addressing CS551.  Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers. Protocols CS551 Layering and Addressing Bill Cheng Set of rules governing communication between network elements (applications, hosts, routers) Protocols define: Format and order of messages Actions taken

More information

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018 416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources

More information

PATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION LAYERING

PATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION LAYERING PATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION OR LAYERING PURPOSE: TO BUILD A NETWORK WITH A LARGER SPAN OUT OF SMALLER, HETEROGENEOUS NETWORKS The Internet has its own name space, protocols,

More information

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 2: Internet architecture and Internetworking Stefan Savage Welcome (day 2) Me: Stefan Savage Office Hours: Tuesdays 3-4pm or by appt TA s (times TBA)

More information

CS519: Computer Networks. Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) : Computer Networks Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) More ICMP messages These were added over time RFC1191: Path MTU Discovery Added the size of the limiting MTU to the ICMP Packet

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

ATM in TCP/IP environment: Adaptations and Effectiveness

ATM in TCP/IP environment: Adaptations and Effectiveness Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Network Architecture. TOC Architecture

Network Architecture. TOC Architecture Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability

More information

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 IP-over over-atm: Migrations, Adaptation Problems and Solutions MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 Content Introduction of the European ACTS project EIES

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

CMSC 332 Computer Networks Network Layer

CMSC 332 Computer Networks Network Layer CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where

More information

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CSCI-1680 Network Layer: IP & Forwarding John Jannotti CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24 EE 586 Communication and Switching Networks (Fall 2010) Lecture 24 October 25, 2010 1-1 Announcements Midterm 1: Mean = 92.2 Stdev = 8 Still grading your programs (sorry about the delay) Network Layer

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 16/08/2018 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Http://www.passcert.com Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services Version : DEMO 1 / 6 1.Which type of VPN requires a full mesh of virtual circuits

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information