Virtualization. Stefan Schmid - 1
|
|
- Lesley Parrish
- 6 years ago
- Views:
Transcription
1 Virtualization Stefan Schmid - 1
2 Virtualization and Benefits What is virtualization? An abstraction Used where and (dis)advantages? Java virtual machine, virtual memory, VPN, abstraction = simpler and less details? (but less efficient?) more flexible and efficient use of resources? isolation Stefan Schmid - 2
3 Virtualization of Networks Virtualization of resources: more efficient use of hardware memory, hiding fragmentation, no relative addressing, isolation of processes... powerful abstraction in systems engineering Computing examples: virtual memory, virtual devices e.g., /dev/null OS abstracting hardware (Intel vs AMD vs GPU, etc.) Virtual machines: e.g., Java IBM VM OS from 1960 s/70 s virtual machine executes platform independent bytecode, secure executions,... Layering of abstractions: don t sweat the details of the lower layer, only deal with lower layers abstractly Mainframes; hypervisor runs on hardware and creates the virtual environment Stefan Schmid - 3
4 The Internet: Virtualizing Local Networks The entire Internet is based on the idea of abstraction! Abstracting different networks : multiple unconnected networks ARPAnet (MIT & US Dept. Defense) data-over-cable networks packet satellite network (Aloha) packet radio network.. differing in: addressing conventions packet formats error recovery routing protocols How to unite?? Gateways... Introduces gateways, a TCP with flow-control, ports and multiplexing, etc. Stefan Schmid - 4
5 Cerf & Kahn: Interconnecting two networks ARPAnet satellite net interconnection must preserve intact the internal operation of each network...the interface between networks must play a central role in the development of any network interconnection strategy. We give a special name to this interface that performs these functions and call it a GATEWAY... prefer that the interface be as simple and reliable as possible, and deal primarily with passing data between networks that use different packetswitching strategies address formats is a problem between networks because the local network addresses of TCP's may vary substantially in format and size. A uniform internetwork TCP address space, understood by each GATEWAY and TCP, is essential to routing and delivery of internetwork packets. Stefan Schmid - 5
6 Cerf & Kahn: Interconnecting two networks Internetwork layer: addressing: internetwork appears as a single, uniform entity, despite underlying local network heterogeneity network of networks Gateway: talks both languages embed internetwork packets in local packet format or extract them route (at internetwork level) to next gateway fragmentation (but not reassembly), etc. gateway TCP enabled... ARPAnet satellite net Stefan Schmid - 6
7 Historical Aside: Proposed Internetwork packet in 1974: 2-level addressing local header source address dest. address seq. # byte count flag field text checksum network TCP identifier 8 16 translated into local address at final gateway encapsulation: header (and maybe tail) are proprietary 256 networks sufficient for forseeable future (used to find next gateway) Stefan Schmid - 7
8 Cerf & Kahn s Internetwork Architecture What is virtualized? two layers of addressing: internetwork and local network new layer makes everything homogeneous underlying local network technology (cable, satellite, 56K modem) is invisible at internetwork layer Stefan Schmid - 8
9 Overlay Networks Abstracting networks even more, on higher layers: Nodes, links? Examples and purpose? Nodes: applications, running at various sites as nodes on an application-level network Links: create logical links (e.g., TCP or UDP connections) pairwise between each other each logical link: multiple physical links, routing defined by native Internet routing Examples of overlay networks? E.g., peer-to-peer networks such as BitTorrent, Gnutella, etc., or typically CDNs, Internet itself was overlay over telephone system... Use of overlay networks? E.g., robust routing Stefan Schmid - 9
10 Overlay Network Connect applications directly via virtual links! abstraction Stefan Schmid - 10
11 Overlay Network Focus at the application level Stefan Schmid - 11
12 What s new/what s old here? Old: we re doing routing, but at application layer (e.g., can be contentspecific) New names/addresses: internet uses IP addresses (reflecting only network physical structure), overlay can use content-specific or application-specific names/addresses Virtualizing the Internet: another layer of abstraction tradeoffs possible: can improve routing performance not just delay/throughput but application-specific measures (e.g., content that I *want* - efficient publish/subscribe) content matters too; but maybe overhead Security and anonymity: easier to add at application layer? Can be used to get around congestion/bad routing in the underlay (can route differently from underlay). Can do more complex routing but lose access to underlying measures like topology, delay, QoS: lose performance (???) but gain flexibility/functionality Overlay is a single entity that combines heterogeneous underlays to provide the homogeneous overlay new data transmission functions: broadcast and multicast can be done in overlay (unlike IP multicast, easy also across multiple providers) Stefan Schmid - 12
13 Use of Overlays: Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho.net E.g., Noho has BGP routes to UMass and Berkeley! Stefan Schmid - 13
14 Use of Overlays: Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho-to-UMass Noho.net Stefan Schmid - 14
15 Internet Routing BGP defines routes between stub networks Internet 2 Berkeley.net UMass.net C&W Mediaone UCLA Noho-to-Berkeley Noho.net Stefan Schmid - 15
16 Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) UCLA Internet 2 Noho-to-Berkeley UMass.net C&W Mediaone Noho.net Stefan Schmid - 16
17 Internet Routing Berkeley.net Congestion or failure: Noho to Berkely BGP-determined route may not change (or will change slowly) Internet 2 Noho to UMass to Berkeley route not visible or available via BGP! Mediaone can t route to Berkeley via Internet2 C&W Mediaone UMass.net UCLA Noho-to-Berkeley Noho.net Stefan Schmid - 17
18 RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance, reliability of routing application-layer router Two-hop (application-level) noho-to-berkeley route Stefan Schmid - 18
19 RON: Resilient Overlay Networks Why RON, and why does it work? The Internet offers a high redundancy of paths! BGP must focus on scalability Much aggregation, damps route changes,...: makes things slow In BGP, only /19 block or larger updates accepted! How to make access to my company robust otherwise? E.g., multihoming (small company behind many ISPs), or even use multiple addresses?! Application can choose its metric! (latency vs bandwidth, etc.) Stefan Schmid - 19
20 RON Experiments Measure loss, latency, and throughput with and without RON 13 hosts in the US and Europe 3 days of measurements from data collected in March minute average loss rates A 30 minute outage is very serious! Note: Experiments done with No-Internet2-forcommercial-use policy (Internet2 routes are often more stable, but not always visible) Stefan Schmid - 20
21 An order-of-magnitude fewer failures Table: for how many samples of duration 30min was the loss rate larger than p%? RON win = loss in Internet was >p and RON lower no change = the same; RON worse = Internet better for this example. Loss Rate 10% 20% 30% 50% 80% 100% RON was below 50% in all the 32 samples when Internet was above. RON Better No Change 57 6,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON Worse Stefan Schmid - 21
22 An order-of-magnitude fewer failures Difficult to define outage : TCP only 2-10 minutes; here larger scale... Loss Rate 10% 20% 30% 50% 80% 100% This implies that outage was never on edge! The higher the loss rate, the fewer samples for which Internet bad; RON loss never above 30%. 30-minute average loss rates RON Better No Change RON Worse ,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON routed around all of these! (Implication?) One indirection hop provides almost all the benefit! Stefan Schmid - 22
23 RON Research Issues How to design overlay networks? Measurement (active) and self-configuration Understanding performance of underlying net ( reality matters ) Fast fail-over Sophisticated metrics (latency vs bandwidth: what is needed?) application-sensitive (e.g., delay versus throughput) path selection Effect of RON on underlying network If everyone does RON, are we better off? Experiments were small-scale Stability?... Stefan Schmid - 23
24 IP-over-ATM IP-over-ATM virtualization: give the illusion of a different network (why? IP services...) ATM = Asynchronous Transfer Mode: Properties? Goal, e.g., real-time audio and video transmission Virtual circuit-switched Explicit set up of virtual channel (VC) needed Several layers Application layer: ATM Adaption Layer Different services... IP vs ATM? ATM connection oriented, has QoS concepts,... How to offer IP services over ATM? IP-over-ATM! Make it look like an IP network... (Alternative: peer-to-peer, like internet, less popular...) Idea overlay approach : view ATM as link layer protocol... Stefan Schmid - 24
25 IP-Over-ATM Classic IP only 3 networks (e.g., LAN segments) MAC (802.3) and IP addresses IP-over-ATM replace network (e.g., LAN segment) with ATM network ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs Stefan Schmid - 25
26 IP-Over-ATM app transport IP Eth phy IP AAL Eth ATM phy phy ATM adaption layer: transport layer (only at end systems): e.g., error detection, segmentation,... ATM phy ATM phy app transport IP AAL ATM phy Stefan Schmid - 26
27 IP View of the world ATM is encapsulated... IP network ATM network Stefan Schmid - 27
28 Classical IP-over-ATM [RFC 1577] IP-over-ATM network can support usual IP subnetting... divide ATM net in IP prefix subnets: A B C D LIS 1 LIS 2 LIS 3 R1 R2 Why subnets? - Given address space, divide into different domains (e.g. users on site vs other department) s.t. communication goes via router, security,... - Efficiency: smaller broadcast domains E LIS: logical IP subnet End systems in same LIS have same IP network prefix LIS looks like a LAN ATM net divided into multiple LIS Intra-LIS communication via direct ATM connections How to go from IP addr to ATM addr: ATMARP resolves IP addr to ATM addr (similar to ARP) Stefan Schmid - 28
29 Classical IP-over-ATM [RFC 1577] A B C D E Inter-LIS communication: source, dest. in different LIS each LIS looks like a LAN LIS 1 LIS 2 LIS 3 hop-by hop forwarding via routers: R1 R2 A-R1-R2-B Traffic between different logical subnets goes via routers, although it s the same ATM network! This is quite an overhead (latency, bw bottleneck etc.), and there are sometimes short-cut approaches! How could they look like?? Stefan Schmid - 29
30 NHRP (next hop resolution protocol) [RFC 2332] A NHRP server, S 1 B C D LIS 1 LIS 2 LIS 3 NHRP server, S 2 E NHRP server, S 3 source/dest. not in same LIS: ATMARP can not provide ATM dest. address NHRP: resolve IP-to-ATM address of remote dest. client queries local NHRP server NHRP server routes NHRP request to next NHRP server destination NHRP returns dest ATM address back through NHRP server chain (like routed DNS) source can send directly to dest. using provided ATM address Stefan Schmid - 30
31 Virtual Private Networks (VPN) VPNs Networks perceived as being private networks by customers using them, but built over shared infrastructure owned by service provider (SP) Why virtualization here? private over shared infrastructure yields efficient resource sharing: looks like private but cheaper, no own line has to be built! (shared backbone) How does the VPN architecture look like? SP infrastructure: backbone provider edge devices Customer: customer edge devices (communicating over shared backbone) Stefan Schmid - 31
32 VPN: logical view virtual private network Two customer historical types: provider edge - device leased lines edge device - customer-premises-based Stefan Schmid - 32
33 VPNs: benefits? Privacy & security CE-CE encryption vs PE-PE encryption? Or both? (E.g., IPsec) Support for mobility: looks like you are always at home Cost: many forms of newer VPNs are cheaper than leased line VPN s ability to share at lower layers exploit multiple paths, redundancy, fault-recovery (lower layers), that do not exist in leased line VPN s need isolation mechanisms to ensure appropriate resources sharing abstraction and manageability: all machines with addresses that are in are trusted no matter where they are Stefan Schmid - 33
34 VPN reference architecture customer edge device provider edge device customer sites of VPN2 Stefan Schmid - 34
35 Leased-line VPN customer sites interconnected via static virtual channels (e.g., ATM VCs on layer 2), leased lines Expensive: connection-oriented, dedicated channels, etc. customer site connects to provider edge Stefan Schmid - 35
36 Customer premise VPN All VPN functions (e.g., over IP!) implemented by customer customer sites interconnected via tunnels tunnels typically encrypted SP treats VPN packets like all other packets! But configuration of expensive VPN gateways at customer Stefan Schmid - 36
37 Customer premise VPN IP-based: IP over IP Stefan Schmid - 37
38 Drawbacks? Leased-line VPN: configuration costs, maintainence by SP: long time, much manpower CPE-based VPN: expertise by customer to acquire, configure, manage VPN, IPSec tunnel for each CE pair of same VPN The new wave : Network-based VPN IP-based VPNs offered by SP (often together with other services such as firewalls, QoS,...) over its shared IP backbone Customer s routers connect to SP routers Less burden at customer: no need to implement VPN functions such as tunneling SP routers maintain separate (independent) IP contexts for each VPN sites can use private addressing (e.g., different VPNs with same IP addresses) traffic from one VPN can not be injected into another Stefan Schmid - 38
39 Network-based Layer 3 VPNs PE s are IP routers that maintain separate IP contexts (routing and forwarding tables) for every supported VPN, and ensure IP reachability between distant sites of same VPN How to realize? Concept of virtual routers (VR) IP-encapsulation and backbone tunnels between PE routers Stefan Schmid - 39
40 Network-based Layer 3 VPNs multiple virtual routers in single provider edge device tunnels (over IP network) only between PEs (and not CEs); backbone routers do not need to be aware of different contexts (inner IP headers) Stefan Schmid - 40
41 Network-based Layer 3 VPNs Realization: Virtual Router (VR) per VPN in each PE E.g., each VR has different IP address Backbone tunnels between PEs (backbone routers need not process inner IP headers of VPN, etc.!) Tunnels = concept that logic/support only needed at edges! Each PE pair sharing a VPN context need one tunnel Techniques: IP-in-IP, MPLS multiplexing (with good automation, traffic enigneering, etc.), GRE, etc. Stefan Schmid - 41
42 Tunneling Tunneling is a mechanism to concentrate logic on the edges of the core network! Stefan Schmid - 42
43 Tunneling Tunneling is a mechanism to concentrate logic on the edges of the core network! Stefan Schmid - 43
44 VPNs: Further Reading Stefan Schmid - 44
45 Excursion: Beyond VPNs CloudNet Architecture and Prototype at INET Stefan Schmid - 45
Virtualization of networks
Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960
More informationVirtualization of networks
Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960
More informationVirtualization and Benefits
Virtualization Virtualization and Benefits Virtualization a central design principle in CS in general! What is virtualization? Where is it used and for what? Virtualization is an abstraction E.g., Java
More informationCOMP 631: NETWORKED & DISTRIBUTED SYSTEMS 10/18/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. Virtualization. Jasleen Kaur.
COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Virtualization Jasleen Kaur Fall 2016 1 Virtualization in Networks Virtualization of resources: Ø Powerful abstraction in systems engineering Ø Computing examples:
More informationHY436: Network Virtualization
HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationDesign principles/protocol functions
Design principles/protocol functions Goals: Identify, study common architectural components, protocol mechanisms, approaches we find in network architectures Synthesis: big picture Principles / protocol
More informationInternet Design: Big Picture
Internet Design: Big Picture Internet architectural, design and implementation principles not scriptures, but guidelines understand pros and cons, trade-offs involves Original Internet Design Goals what
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationDesign Principles / Protocol Functions. 1: Separation of Control and Data
Design Principles / Protocol Functions Goals: Identify, study common architectural components, protocol mechanisms, approaches do we find in network architectures? Synthesis: Big picture Principles / protocol
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create
More informationNetwork Layer (1) Networked Systems 3 Lecture 8
Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationCS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs
: Computer Networks Lecture 8: Apr 21, 2004 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay
More informationVirtual Private Networks Advanced Technologies
Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationMPLS VPN. 5 ian 2010
MPLS VPN 5 ian 2010 What this lecture is about: IP CEF MPLS architecture What is MPLS? MPLS labels Packet forwarding in MPLS MPLS VPNs 3 IP CEF & MPLS Overview How does a router forward packets? Process
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationNetwork management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:
Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationSecurizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN
Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems
S 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2004 Lecture 19: Networks and Distributed Systems 19.0 Main Points Motivation for distributed vs. centralized systems
More informationVirtual Private Networks Advanced Technologies
Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 20: Networks and Distributed Systems
S 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 20: Networks and Distributed Systems 20.0 Main Points Motivation for distributed vs. centralized systems
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationCSEP 561 Internetworking. David Wetherall
CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationLecture 14 Summary - flashback
Course on Computer Communication and Networks Lecture 14 Summary - flashback EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Marina
More informationInter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley
Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationQuiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting
Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationChapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Chapter 4 DataLink Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. DataLink Layer Link Layer 4.1 Link-Layer Addressing 4.2 Ethernet
More informationARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address
ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted
More informationNetwork Layer Protocols
internetwork n. &v. Network Layer Protocols CSCI 363 Computer Networks Department of Computer Science 1 logical network built out of a collection of physical networks. 2 tr. to interconnect physical networks
More informationEnd-to-End Communication
End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How
More informationPassTorrent. Pass your actual test with our latest and valid practice torrent at once
PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version
More informationLAN Emulation, IP Over ATM and MPOA
LAN Emulation, IP Over ATM and MPOA Professor of Computer and Information Sciences Columbus, OH 43210 These slides are available at http://www.cis.ohio-state.edu/~jain/cis777-00/ 1 Overview LAN Emulation
More informationPatrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015
Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Principles Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Last time Course introduction Principles
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationInternet Protocol (IP)
CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationLecture 3: Packet Forwarding
Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationLayering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.
Protocols CS551 Layering and Addressing Bill Cheng Set of rules governing communication between network elements (applications, hosts, routers) Protocols define: Format and order of messages Actions taken
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More informationPATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION LAYERING
PATTERNS IN NETWORK ARCHITECTURE: VERTICAL COMPOSITION OR LAYERING PURPOSE: TO BUILD A NETWORK WITH A LARGER SPAN OUT OF SMALLER, HETEROGENEOUS NETWORKS The Internet has its own name space, protocols,
More informationFlexible Dynamic Mesh VPN draft-detienne-dmvpn-00
Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 2: Internet architecture and Internetworking Stefan Savage Welcome (day 2) Me: Stefan Savage Office Hours: Tuesdays 3-4pm or by appt TA s (times TBA)
More informationCS519: Computer Networks. Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) More ICMP messages These were added over time RFC1191: Path MTU Discovery Added the size of the limiting MTU to the ICMP Packet
More informationMPLS in the DCN. Introduction CHAPTER
CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information
More informationNetworking and Internetworking 1
Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote
More informationInternetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms
Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationThe Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly
The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:
More informationATM in TCP/IP environment: Adaptations and Effectiveness
Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationNetwork Architecture. TOC Architecture
Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability
More informationAdaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997
IP-over over-atm: Migrations, Adaptation Problems and Solutions MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 Content Introduction of the European ACTS project EIES
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationNetwork.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components
Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationCMSC 332 Computer Networks Network Layer
CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where
More informationCSCI-1680 Network Layer: IP & Forwarding John Jannotti
CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24
EE 586 Communication and Switching Networks (Fall 2010) Lecture 24 October 25, 2010 1-1 Announcements Midterm 1: Mean = 92.2 Stdev = 8 Still grading your programs (sorry about the delay) Network Layer
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationCS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang
CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 16/08/2018 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationHttp://www.passcert.com Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services Version : DEMO 1 / 6 1.Which type of VPN requires a full mesh of virtual circuits
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More information