ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology

Size: px
Start display at page:

Download "ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology"

Transcription

1 High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research Center The University of Kansas rev James P.G. Sterbenz

2 Network Architecture and Topology Outline AT.1 Topology and geography AT.2 Scale AT.3 Resource tradeoffs HSN-AT-2

3 Network Architecture and Topology Outline application application session session transport transport network network network network link link link link end system node network node end system link node network AT.1. Topology and geography AT.2. Scale AT.3. Resource Tradeoffs HSN-AT-3

4 Network Architecture and Topology Topology and Geography AT.1 Topology and geography AT.1.1 Scalability AT.1.2 Latency AT.1.3 Bandwidth AT.1.4 Virtual overlays and lightpaths AT.1.5 Practical constraints AT.2 Scale AT.3 Resource tradeoffs HSN-AT-4

5 infinite bandwidth CPU Ideal Network Model Network Path Principle R = network CPU M app end system M app end system D = 0 zero latency Network Path Principle The network must provide high-bandwidth low-latency paths between end systems. N-II HSN-AT-5

6 Link Topologies Shared Medium Shared medium (e.g. bus topology) problems? HSN-AT-6

7 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay HSN-AT-7

8 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Network scalability? HSN-AT-8

9 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus HSN-AT-9

10 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium HSN-AT-10

11 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium collisions in shared medium need MAC (medium access control) HSN-AT-11

12 Link Topologies Shared Medium Shared medium (e.g. bus topology) topology constrained by medium longest path limited to LAN lengths due to delay Limited scalability all hosts share capacity of bus contention for shared medium Example collisions in shared medium need MAC (medium access control) original DIX Ethernet HSN-AT-12

13 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh HSN-AT-13

14 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Network scalability? HSN-AT-14

15 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Scalable: add links and expand switches HSN-AT-15

16 Link Topologies Point-to-Point Mesh Point-to-point links between switches space division mesh Scalable: add links and expand switches add switches HSN-AT-16

17 Scalable Topologies Mesh vs. Shared Medium Scalability of Mesh Topologies Mesh network technologies scale better then shared medium. Use power control and directional antennæ to increase spatial reuse in shared medium wireless networks. N-II.4 HSN-AT-17

18 Latency Network Path d i short path long path D = d i Network Latency Principle N-1Al The latency along a path is the sum of all its components. The benefit of optimising an individual link is directly proportional to its relative contribution to the end-to-end latency. HSN-AT-18

19 Latency Topology and Geography Constituents of network latency D = (h 1)d s + h d i Geography: speed of light delay d i SAN LAN MAN WAN GEO Mars Dia 100 m 1 km 100 km km km km RTT 1 μs 10 μs 1 ms 200 ms 480 ms 6 45 min Topology: number of hops h; switching delay d s Network Diameter Principle N-1Ah The number of per hop latencies along a path is bounded by the diameter of the network. The network topology should keep the diameter low. HSN-AT-19

20 Bandwidth Network Path bottleneck r i long path R = min(r i ) Network Bandwidth Principle The maximum bandwidth along a path is limited by the minimum bandwidth link or node, which is the bottleneck. There is no point in optimising a link that is not a bottleneck. N-1Ab HSN-AT-20

21 Overlay Networks Abstract and Hide Underlying Network Overlay networks hide underlying topology VPNs (virtual private networks) secure overlay sessions datagram overlay meshes lightpaths Network Overlay Principle N-IIo Overlay networks must provides the same high-performance paths as he physical networks. The number of overlay layers should be kept as small as possible, and overlays must be adaptable based on end-to-end path requirements and topology information form the lower layers. HSN-AT-21

22 Overlay Networks Lightpath Assignment Lightpath assignment problem preserve high-performance along overlay such that no link carries more than one light path of given wavelength HSN-AT-22

23 Network Architecture and Topology Network Scale AT.1 Topology and geography AT.2 Scale AT.2.1 Network engineering AT.2.2 Hierarchy AT.2.3 Bandwidth aggregation and isolation AT.2.4 Latency optimisation AT.2.5 Wireless network density AT.2.5 Practical constraints AT.3 Resource tradeoffs HSN-AT-23

24 Network Scale Network Engineering Parameters sparse dense topology degree # nodes diameter aggregation sparsely connected low high high low densely connected high low low high Network Scaling Principle N-5Ct Networks should be able to scale in size while balancing switch cost against hop count. HSN-AT-24

25 Network Scale Hierarchy Hierarchy important technique to control latency and aggregation A 1 B C bound state maintained divide network into clusters 4 4 state aggregated per cluster examples: Nimrod, P-NNI Network Hierarchy Principle Use hierarchy and clustering to manage network scale and complexity, and reduce the overhead of routing algorithms. N-5C HSN-AT-25

26 Network Scale Aggregation, Isolation, Latency Backbone WAN regional net MAN LAN neighborhood personal net home DAN Physical hierarchy to limit number of hops and control aggregation example: Internet (NSFNET) prior to 1994 HSN-AT-26

27 Network Scale Aggregation, Isolation, Latency Hierarchy: bandwidth isolation isolate bandwidth in different subnet layers exploit locality at network edge e.g. within campus or enterprise network aggregate bandwidth in network core Hierarchy to Aggregate and Isolate Bandwidth Use hierarchy to manage bandwidth aggregation in the core of the network, and to isolate clusters of traffic locality from one another. N-5B HSN-AT-27

28 Network Scale Aggregation, Isolation, Latency Hierarchy: latency engineering control network diameter and latency engineer low diameter at each level shallow hierarchy 3 5 levels home network or LAN access or campus network MAN WAN backbone Hierarchy to Minimise Latency Use hierarchy and cluster size to minimise network diameter and resultant latency. N-5Cl HSN-AT-28

29 Network Scale Wireless Network Density no control power control overlay Transmission power gives tradeoff between transmission range degree of connectivity Wireless Density Control to Optimise Degree and Diameter N-5Cw Use density control and long link overlays to optimise the tradeoff between dense low-diameter and sparse high-diameter wireless networks. HSN-AT-29

30 Policy-based routing Network Scale Practical Constraints Network provider deployment complex topologies peering not high-performance many hops/pop Administrative Constraints Increase the Importance of Good Design Backbone A Backbone W Backbone S MAN B MAN V 2 1 N-III.2 Policy and administrative constraints distort the criteria that govern the application of many high-performance network design principles. The importance of good (principled) design is elevated when these constraints are present. HSN-AT-30

31 Network Architecture and Topology Resource Tradeoffs AT.1 Topology and geography AT.2 Scale AT.3 Resource tradeoffs AT.3.1 Bandwidth, processing, and memory AT.3.2 Latency as a constraint AT.3.3 Relative scaling with high speed AT.2.4 Active networking HSN-AT-31

32 Resource Tradeoffs Resources and Constraints Network is a collection of resources and constraints: P processing M memory B bandwidth E energy or power L latency $ monetary cost Relative composition must be balanced to optimise cost and performance determine topology, engineering, and functional placement Network Resource Tradeoff & Engineering Principle N-2 Networks are collections of resources. The relative composition of these resources must be balanced to optimise cost and performance, and to determine network topology, engineering, and functional placement. HSN-AT-32

33 Resource Tradeoffs Resources and Constraints Network is a collection of resources and constraints: P processing M memory B bandwidth E energy or power L latency $ monetary cost Relative composition must be balanced to optimise cost and performance determine topology, engineering, and functional placement Objective function to determine optimal mix ( (P), (B), (M), (E), (L)) HSN-AT-33

34 Example 3.5 Example: content cache location Resource Tradeoffs $(B) =, $(M) = 0 where goes the content? Content Cache Location HSN-AT-34

35 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = where goes the content? HSN-AT-35

36 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded HSN-AT-36

37 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded is this realistic? HSN-AT-37

38 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location $(B) =, $(M) = 0 everyone has local copy of everything $(B) = 0, $(M) = single copy on server: stream every time demanded M and B both have finite (and bounded cost): solution? HSN-AT-38

39 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth vs. depth in network distribution tree cost bandwidth root normalized depth leaves HSN-AT-39

40 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth vs. depth in network distribution tree plot cost of memory cost memory bandwidth root normalized depth leaves HSN-AT-40

41 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory what next? cost memory bandwidth root normalized depth leaves HSN-AT-41

42 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory l opt = min[ (B) + (M)] optimal level l cost memory bandwidth root normalized depth l opt leaves HSN-AT-42

43 Example 3.5 Resource Tradeoffs Content Cache Location Example: content cache location plot cost of bandwidth plot cost of memory l opt = min[ (B) + (M)] optimal level l latency constrains level maximum distance from client cost memory l opt = max(l Lmax, l opt ) bandwidth root normalized depth l opt l lat leaves HSN-AT-43

44 Resource Tradeoffs Relative Scaling Relative scaling of resources is important if all resources/constraints scale uniformly, no change speed of light remains constant latency becomes relatively more important bandwidth- -delay product requires increasing M technology scales non-uniformly example: Moore s law increase in P enables IP lookup/classification in hardware, active networking Resource Tradeoffs Change and Enable New Paradigms N-2A The relative cost of resources and constraints changes over time due to non-uniform advances in different aspects of technology. This should motivate constant rethinking about the way in which networks are structured and used. HSN-AT-44

45 Resource Tradeoffs Active Networking Decreasing cost of processing and memory enables more computation in the network nodes Active networking strong AN users inject capsules of code executed on nodes moderate AN network service providers provisions protocols and services may be dynamically provisioned with active packets HSN-AT-45

46 High-Performance Networking Acknowledgements The material in these foils comes from the textbook supplementary materials: Sterbenz & Touch, High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication HSN-AT-46

High-Speed Networking: A Systematic Approach to High-Bandwidh Low-Latency Communication

High-Speed Networking: A Systematic Approach to High-Bandwidh Low-Latency Communication High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication James P.G. Sterbenz University of Kansas EECS/ITTC Lancaster University Computing Dept. jpgs@sterbenz.org http://hsn-book.sterbenz.org

More information

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication James P.G. Sterbenz The University of Kansas EECS/ITTC Lancaster University Computing Dept. / InfoLab21 jpgs@sterbenz.org

More information

ITTC Science of Communication Networks The University of Kansas EECS 784 Identifiers, Names, and Addressing

ITTC Science of Communication Networks The University of Kansas EECS 784 Identifiers, Names, and Addressing Science of Communication Networks The University of Kansas EECS 784 Identifiers, Names, and Addressing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology

More information

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

ITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark

ITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department

More information

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Mobile Wireless Networking Energy Management

Mobile Wireless Networking Energy Management Mobile Wireless Networking The University of Kansas EECS 882 Energy Management James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Control and Signalling

ITTC High-Performance Networking The University of Kansas EECS 881 Control and Signalling High-Performance Networking The University of Kansas EEC 881 Control and ignalling James P.G. terbenz Department of Electrical Engineering & Computer cience Information Technology & Telecommunications

More information

LAN design. Chapter 1

LAN design. Chapter 1 LAN design Chapter 1 1 Topics Networks and business needs The 3-level hierarchical network design model Including voice and video over IP in the design Devices at each layer of the hierarchy Cisco switches

More information

WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK 1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

TOC: Switching & Forwarding

TOC: Switching & Forwarding TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary TOC Switching Why? Direct vs. Switched Networks: n links Single link Direct Network

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved. Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

ITTC Introduction to Communication Networks The University of Kansas EECS 563 End-to-End Transport

ITTC Introduction to Communication Networks The University of Kansas EECS 563 End-to-End Transport Introduction to Communication Networks The University of Kansas EECS 563 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

ITTC High-Performance Networking The University of Kansas EECS 881 End-to-End Transport

ITTC High-Performance Networking The University of Kansas EECS 881 End-to-End Transport High-Performance Networking The University of Kansas EECS 881 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Network Processors Outline

Network Processors Outline High-Performance Networking The University of Kansas EECS 881 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research Center The

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

CS61C : Machine Structures

CS61C : Machine Structures inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks TA Sameer The Yellow Dart Iyengar inst.eecs/~cs61c-ti Next year: Forget Elmo Get a Robot buddy New human-like robots that

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38 Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with

More information

TDT Appendix E Interconnection Networks

TDT Appendix E Interconnection Networks TDT 4260 Appendix E Interconnection Networks Review Advantages of a snooping coherency protocol? Disadvantages of a snooping coherency protocol? Advantages of a directory coherency protocol? Disadvantages

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Data Communications. Connecting Devices

Data Communications. Connecting Devices Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use

More information

Communication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems.

Communication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems. Cluster Networks Introduction Communication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems. As usual, the driver is performance

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet datacenters Introduction Internet datacenters:

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

TOC: Switching & Forwarding

TOC: Switching & Forwarding TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary Why? Direct vs. Switched Networks: Single link Switches Direct Network Limitations:

More information

Introduction. Computer Networks Term B10

Introduction. Computer Networks Term B10 Introduction Computer Networks Term B10 Introduction Outline Preliminary Definitions Internet Components Network Application Paradigms Classifying networks by transmission technology by size/scale by topology

More information

Hands-On VPLS: Virtual Private LAN Service

Hands-On VPLS: Virtual Private LAN Service Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of

More information

ITTC Introduction to Communication Networks The University of Kansas EECS 563 Network Routing

ITTC Introduction to Communication Networks The University of Kansas EECS 563 Network Routing Introduction to Communication Networks The University of Kansas EECS 563 Network Routing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

End-to-End Transport Outline

End-to-End Transport Outline KU EECS 88 High-Performance Networking End-to-End Transport High-Performance Networking The University of Kansas EECS 88 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering &

More information

HY436: Network Virtualization

HY436: Network Virtualization HY436: Network Virtualization 20/10/2014 Xenofontas Dimitropoulos Credits: Bing Wang, Rob Sherwood, Ben Pfaff, Nick Feamster Agenda Network virtualization basics Early Forms of Vnets Overlay networks VPNs

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview Internetwork Expert s CCNP Bootcamp Hierarchical Campus Network Design Overview http:// Hierarchical Campus Network Design Overview Per Cisco, a three layer hierarchical model to design a modular topology

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Introduction to Networks Network Types. BTEC Nat IT Computer Networks

Introduction to Networks Network Types. BTEC Nat IT Computer Networks Introduction to Networks Network Types 1 BTEC Nat IT Computer Networks Different types of Networks Understand the purpose of a computer network Create network drawings Understand Packet Switching BTEC

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

ITTC Communication Networks The University of Kansas EECS 780 End-to-End Transport

ITTC Communication Networks The University of Kansas EECS 780 End-to-End Transport Communication Networks The University of Kansas EECS 780 End-to-End Transport James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research

More information

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale Computer Network??? A computer network is an interconnection of a group of computers and the world of computers Introduction to Computer Networks Budditha Hettige Why Computer Networks? Resource Sharing

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Silberschatz and Galvin Chapter 15

Silberschatz and Galvin Chapter 15 Silberschatz and Galvin Chapter 15 Network Structures CPSC 410--Richard Furuta 3/30/99 1 Chapter Topics Background and motivation Network topologies Network types Communication issues Network design strategies

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

Introduction to Computer Networks. Budditha Hettige

Introduction to Computer Networks. Budditha Hettige Introduction to Computer Networks Budditha Hettige Computer Network??? A computer network is an interconnection of a group of computers and the world of computers Why Computer Networks? Resource Sharing

More information

CS61C : Machine Structures

CS61C : Machine Structures CS61C L36 I/O : Networks (1) inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks TA Sameer The Yellow Dart Iyengar inst.eecs/~cs61c-ti Next year: Forget Elmo Get a Robot

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Internet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002

Internet, Education, and Collaboration of USP. Kazunori Sugiura Sept 9 th 2002 Internet, Education, and Collaboration of USP Kazunori Sugiura uhyo@sfc.wide.ad.jp Sept 9 th 2002 Last lecture in USP Importance of better internet connectivity What kind of problem do we have Discuss

More information

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009 Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

CS61C : Machine Structures

CS61C : Machine Structures inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture 36 I/O : Networks 2008-04-25 TA Brian Zimmer CS61C L36 I/O : Networks (1) inst.eecs/~cs61c-th NASA To Develop Small Satellites NASA has

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Review of the 5 Criteria

Review of the 5 Criteria Review of the 5 Criteria Howard Frazier Broadcom Corporation September, 2006 IEEE 802.3 HSSG 1 Outline Audience Purpose 5 Criteria Guidelines for responses Summary Successful examples IEEE 802.3 HSSG 2

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Brocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz

Brocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz Brocade: Landmark Routing on Peer to Peer Networks Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz State of the Art Routing High dimensionality and coordinate-based P2P routing Decentralized

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Introduction. Computer Networks: Introduction 1

Introduction. Computer Networks: Introduction 1 Introduction Computer Networks: Introduction 1 Network Definitions and Classification Preliminary definitions and network terminology Sample application paradigms Classifying networks by transmission technology

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure

More information

Lecture 16: Architectural Considerations

Lecture 16: Architectural Considerations Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships

More information

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico February 29, 2016 CPD

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Cisco Virtualized Workload Mobility Introduction

Cisco Virtualized Workload Mobility Introduction CHAPTER 1 The ability to move workloads between physical locations within the virtualized Data Center (one or more physical Data Centers used to share IT assets and resources) has been a goal of progressive

More information

Functional Requirements for Grid Oriented Optical Networks

Functional Requirements for Grid Oriented Optical Networks Functional Requirements for Grid Oriented Optical s Luca Valcarenghi Internal Workshop 4 on Photonic s and Technologies Scuola Superiore Sant Anna Pisa June 3-4, 2003 1 Motivations Grid networking connection

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico September 26, 2011 CPD

More information