KUPF: 2-Phase Selection Model of Classification Records
|
|
- Donna Fisher
- 6 years ago
- Views:
Transcription
1 KUPF: 2-Phase Selection Model of Classification Records KAKIUCHI Masatoshi Nara Institute of Science and Technology
2 Background Many Internet services classify the data to be handled according to rules which control the service.» Firewall classifies incoming/outgoing packets.» QoS mechanism classifies data flow. Internet services contain many control rules. Classification mechanism is important.» Every data is classified by its parameter, and controlled by rule. 2 2
3 How to Decide the Action How does a router decide the action?» classify data and decide the action corresponding with its data» examples: router: decision on next hop by destination address firewall: filter rules with parameters on a packet Conventional system:» Each vender has each implementation.» Routing, diff-serv, firewall mechanisms on same node individually proceed classification. 3 3
4 Goal Generalization of packet classification mechanism Parameter Filter» Build a model» Develop a framework Represent filter rule using common style» Save time of network administrator Integration of procedures of parameter filter» Efficient development of a system 4 4
5 Model (1/2) 5 Conventional view of parameter filter:» classify input data by filter rules dst addr port proto input packet 80 TCP 10.2/16 TCP 10.5/16 filter rules TCP 5 80 pass 10/8 80 pass action apply 111 UDP drop
6 Model (2/2) Our view of parameter filter:» classify filter rules by input data classification schema dst addr port proto TCP record parameters action 10.2/ classification 10.5/16 TCP records TCP pass 10/8 111 UDP drop filter rules result record 10.2/16 80 TCP pass 6 input packet apply TCP pass 6
7 Conflict of Rules Some rules compete with other. example:» HTTP requests should pass through proxy server.» User B uses dedicated line. HTTP proxy 7 user A user B dst port = 80 src addr = B dst port = 80 src addr = B src addr * B router control parameters dst port 80 * action to HTTP proxy to dedicated line router? need additional policy router default line dedicated line Internet 7 *: wild card
8 2-Phase Selection Model (1/2) Stage 1:» Selecting records with filter rule which satisfy target from classification records» Stage 1 selection is: independent of services dependent only on parameter matching Stage 2:» Selecting records with action which applies to target from satisfied records» Stage 2 selection is: dependent on services and policy 8 8
9 2-Phase Selection Model (2/2) 2-phase selection model divides parameter filter into two parts:» independent of services» dependent on services We take only Stage 2 into consideration, even in following cases:» investigating and solving conflicts of record selection» investigating and solving inconsistency between multiple routers» implementing schema and policy for a new service 9 9
10 Implementation of KUPF KUMA* s Universal Parameter Filter (KUPF)» framework of parameter filter based on 2-phase selection model» NetBSD» C language» Running on both kernel land and user land record parameters record parameters record parameters Stage 1 matching record parameters record parameters Stage 2 selecting record parameters classification records parameters result record 10 *KUMA Project: 10
11 Parameter Implemented 4 fundamental types» integer port number, protocol number» bit stream IPv4 / IPv6 address» byte stream character string» special: any any matches with to any parameter by all method 11 11
12 Comparison Method Compare with parameter» match port number, protocol number» mask match TOS (Type of Service)» prefix match IPv4 / IPv6 address Users can add other method
13 Stage 1 Stage 1 compares whole classification records with target parameter and output matched classification records. Classification table is managed by linear list. classification schema src addr dst port prefix matchexact match classification records * 80 B * HTTP proxy dedicated line prefix match exact match match x A target parameter 13
14 Stage 2 Stage 2 heavily depends on the service. We provide a sample implementation
15 Example of Implementation Replace parameter filter of ALTQ (queueing and shaping mechanism) with KUPF ALTQ applies a single action for each incoming packet. We implemented a Stage 2 based on best match policy
16 Classification Schema for IPv6 and Record Parameter (extract) attribute fundamental type (length) record parameter (length) compare protocol unsigned integer unsigned integer match traffic class bit stream (8 bits) bit stream (8 bits) bit stream (8 bits) mask match dst address bit stream (128 bits) variable length bit stream prefix match src address bit stream (128 bits) variable length bit stream prefix match dst port unsigned integer unsigned integer match src port unsigned integer unsigned integer match 16 16
17 Experimentation (1/2) We provided 273 users with IPv4 / IPv6 network Users demanded network resource. Reservation parameters» ATM / Satellite» Bandwidth, time» src & dst addresses» protocol» src & dst port numbers with reservation LSR Core ATM 1.5Mbps LSR Core LSR Edge Internet LSR Edge small delay large delay without reservation Router Router LSR Edge Satellite 0.5/1.5Mbps 17 User User User User 17
18 Experimentation (2/2) KUPF and ALTQ was used on Label Switching Router (LSR). KUPF decided label and queueing parameter based on rules. KUPF provided users with stable network
19 Performance Evaluation (1/2) 19 NetBSD 1.6, Pentium III 1GHz 1,000 filters (received interface, protocol, destination address, destination port number) median of 10 averages of 1,000 times filter IPv4 host IPv4 net IPv6 host IPv6 net interface fxp0 fxp0 fxp0 fxp0 protocol UDP UDP UDP UDP dst addr ,.., /28,.., /28 fec0:0:0:4::0,.., fec0:0:0:4::9 fec0:0:0:4000::/64,.., fec0:0:0:4009::/64 dst port 10,000,.., 10,099 10,000,.., 10,099 10,000,.., 10,099 10,000,.., 10,099 19
20 Performance Evaluation (2/2) filter ALTQ KUPF (0% hit) KUPF (50% hit) IPv4 host ms 0.65 ms 0.34 ms IPv4 net ms 0.63 ms 0.34 ms IPv6 host 0.25 ms 0.63 ms 0.33 ms IPv6 net 0.25 ms 0.50 ms 0.26 ms KUPF is slower than ALTQ. Difference of IPv6 is smaller than IPv4 The reason is that:» KUPF uses liner search.» KUPF is implemented based on abstracted model.» Procedure for KUPF is separated into two stages
21 Future Works Performance improvement» Searching records is difficult. multi-parameters, prefix match, wild card» Two stages cooperation may be effective. Other examples» Inspection for conflict of rules Development of expression for filter representation 21 21
22 Conclusion We proposed 2-phase selection model of classification records. We implemented KUPF as a framework of the parameter filter.» adaptable to complicated rules» flexible filter rules» expansible filter rules, independent of service In future works, we need performance improvement and other applied example
23 More Information KUMA Project»
Network Processors. Nevin Heintze Agere Systems
Network Processors Nevin Heintze Agere Systems Network Processors What are the packaging challenges for NPs? Caveat: I know very little about packaging. Network Processors What are the packaging challenges
More informationMultimedia Networking. Network Support for Multimedia Applications
Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationCS 268: Route Lookup and Packet Classification
Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming
More informationMPLS MULTI PROTOCOL LABEL SWITCHING OVERVIEW OF MPLS, A TECHNOLOGY THAT COMBINES LAYER 3 ROUTING WITH LAYER 2 SWITCHING FOR OPTIMIZED NETWORK USAGE
MPLS Multiprotocol MPLS Label Switching MULTI PROTOCOL LABEL SWITCHING OVERVIEW OF MPLS, A TECHNOLOGY THAT COMBINES LAYER 3 ROUTING WITH LAYER 2 SWITCHING FOR OPTIMIZED NETWORK USAGE Peter R. Egli 1/21
More informationNetwork Management & Monitoring
Network Management & Monitoring NfSen These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) What is NfSen
More informationGrandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management
Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Table of Contents INTRODUCTION... 4 DSCP CLASSIFICATION... 5 QUALITY OF SERVICE ON GWN7000... 6 USING QOS TO PRIORITIZE VOIP TRAFFIC...
More informationH3C S9500 QoS Technology White Paper
H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and
More informationLecture 13. Quality of Service II CM0256
Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject
More informationwhile the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter
When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also
More informationQuality of Service (QoS): Managing Bandwidth More Effectively
15 Quality of Service (QoS): Managing Bandwidth More Effectively Contents Introduction................................................. 15-2 Terminology............................................... 15-5
More informationLabel Distribution Protocol and Basic MPLS Configuration. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:
Label Distribution Protocol and Basic MPLS Configuration APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Label Distribution Protocol 2
More informationMPLS Intro. Cosmin Dumitru March 14, University of Amsterdam System and Network Engineering Research Group ...
MPLS Intro Cosmin Dumitru c.dumitru@uva.nl University of Amsterdam System and Network Engineering Research Group March 14, 2011 Disclaimer Information presented in these slides may be slightly biased towards
More information2D1490 p MPLS, RSVP, etc. Olof Hagsand KTHNOC/NADA
2D1490 p4 2007 MPLS, RSVP, etc Olof Hagsand KTHNOC/NADA Literature Handouts: MPLS-Enabled applications (Minei, Lucek). Parts of Section 1. JunOS Cookbook: Chapter 14 Background MPLS - Multiprotocol Label
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More information6 MPLS Model User Guide
6 MPLS Model User Guide Multi-Protocol Label Switching (MPLS) is a multi-layer switching technology that uses labels to determine how packets are forwarded through a network. The first part of this document
More informationLesson 9 OpenFlow. Objectives :
1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.
More informationNSP Network Services Platform Network Functions Manager - Packet (NFM-P) Multi-Vendor Policy Guide. 3HE AAAB-TQZZA Issue 2 September 2017
NSP Network Services Platform Network Functions Manager - Packet (NFM-P) Multi-Vendor Policy Guide 3HE-11236-AAAB-TQZZA Legal notice Nokia is a registered trademark of Nokia Corporation. Other products
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationConfiguring ACLs. ACL overview. ACL categories. ACL numbering and naming
Contents Configuring ACLs 1 ACL overview 1 ACL categories 1 ACL numbering and naming 1 Match order 2 ACL rule numbering 3 Implementing time-based ACL rules 3 IPv4 fragments filtering with ACLs 3 Flow templates
More informationMulti Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015
.. MPLS Multi Protocol Label Switching (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 4.3, 2015/03/09 13:07:57) Thursday, March 12, 2015 Karst Koymans (UvA) MPLS
More informationip rsvp reservation-host
Quality of Service Commands ip rsvp reservation-host ip rsvp reservation-host To enable a router to simulate a host generating Resource Reservation Protocol (RSVP) RESV messages, use the ip rsvp reservation-host
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationTelematics Chapter 7: MPLS
Telematics Chapter 7: MPLS User watching video clip Beispielbild Application Layer Presentation Layer Session Layer Transport Layer Server with video clips Application Layer Presentation Layer Session
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationMetadata Configuration Guide Cisco IOS Release 15M&T
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2014 Cisco Systems, Inc. All rights
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationLecture 24: Scheduling and QoS
Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated
More informationCS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013
CS 5114 Network Programming Languages Data Plane http://www.flickr.com/photos/rofi/2097239111/ Nate Foster Cornell University Spring 2013 Based on lecture notes by Jennifer Rexford and Michael Freedman
More informationQuality of Service. Understanding Quality of Service
The following sections describe support for features on the Cisco ASR 920 Series Router. Understanding, page 1 Configuring, page 2 Global QoS Limitations, page 2 Classification, page 3 Marking, page 6
More informationQuality of Service II
Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated
More informationNAT Support for Multiple Pools Using Route Maps
NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host
More informationA Proposal to add Explicit Congestion Notification (ECN) to IPv6 and to TCP
A Proposal to add Explicit Congestion Notification (ECN) to IPv6 and to TCP K. K. Ramakrishnan, Sally Floyd References: Ramakrishnan, K.K., and Floyd, S., A Proposal to add Explicit Congestion Notification
More informationFlexible NetFlow - Top N Talkers Support
This document contains information about and instructions for using the Flexible NetFlow - Top N Talkers Support feature. The feature helps you analyze the large amount of data that Flexible NetFlow captures
More informationCommitted Access Rate
Committed Access Rate Feature Summary The Committed Access Rate (CAR) feature performs the following functions: Limits the input or output transmission rate on an interface or subinterface based on a flexible
More informationConfiguring Flow Aware QoS
Flow Aware QoS provides packet flow awareness and enhances per-flow action capabilities in the existing QoS functionality. Flow aware QoS suite provides a framework that can support per-flow feature functionality
More informationPoint-to-Point Network Switching. Computer Networks Term B10
Point-to-Point Network Switching Computer Networks Term B10 Network Switching Outline Circuit Switching, Message Switching, Packet Switching, Cell Switching Connection-Oriented versus Connectionless Protocols
More informationMedianet Metadata. Finding Feature Information. Restrictions for Medianet Metadata
This module provides an overview of medianet metadata. It also describes how metadata is used by different components of a network to make policy decisions. Finding Feature Information, page 1 Restrictions
More informationHardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT
Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore
More informationTable of Contents Chapter 1 MPLS Basics Configuration
Table of Contents Table of Contents... 1-1 1.1 MPLS Overview... 1-1 1.1.1 Basic Concepts of MPLS... 1-2 1.1.2 Architecture of MPLS... 1-5 1.1.3 MPLS and Routing Protocols... 1-7 1.1.4 Applications of MPLS...
More informationIntroduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis
Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between
More informationOutline. Circuit Switching. Circuit Switching : Introduction to Telecommunication Networks Lectures 13: Virtual Things
8-5: Introduction to Telecommunication Networks Lectures : Virtual Things Peter Steenkiste Spring 05 www.cs.cmu.edu/~prs/nets-ece Outline Circuit switching refresher Virtual Circuits - general Why virtual
More informationQuality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel
Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks
More informationQuality of Service Monitoring and Delivery Part 01. ICT Technical Update Module
Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional
More informationسوي يچينگ و مسيريابي در شبكه
سوي يچينگ و مسيريابي در شبكه دكتر فرهاد فغاني استاديار دانشكده مهندسي برق قسمت ششم : Multi-Protocol Label Switching (MPLS) 1 One of the many ways of getting from A to B: BROADCAST: Go everywhere, stop
More informationIPv4 Firewall Rule configuration on Cisco SA540 Security Appliance
IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide
More informationQuality of Service Setup Guide (NB14 Series)
Quality of Service Setup Guide (NB14 Series) About This Quality of Service (QoS) Guide Quality of Service refers to the reservation of bandwidth resources on the Nb14 Series router to provide different
More informationCovert channel detection using flow-data
Covert channel detection using flow-data Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam July 3, 2014 Guido Pineda Reyes (UvA) Covert channel detection using flow-data
More informationPresentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module
Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationOn Network Dimensioning Approach for the Internet
On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationOperation Manual MPLS. Table of Contents
Table of Contents Table of Contents Chapter 1 MPLS Architecture... 1-1 1.1 MPLS Overview... 1-1 1.2 MPLS Basic Concepts... 1-1 1.2.1 FEC... 1-1 1.2.2 Label... 1-1 1.2.3 LDP... 1-3 1.3 MPLS Architecture...
More informationRobust Firewalls with OpenBSD and PF
Robust Firewalls with OpenBSD and PF Overview Design Philosophy (and what PF doesn t do) The Basics Normalisation Filtering Translation Advanced Toolkits Denial of Service Mitigation Firewall Redundancy
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationConfiguring RSVP Support for Frame Relay
Configuring RSVP Support for Frame Relay This chapter describes the tasks for configuring the RSVP Support for Frame Relay feature. For complete conceptual information, see the section RSVP Support for
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationProtocols. End-to-end connectivity (host-to-host) Process-to-Process connectivity Reliable communication
Protocols Tasks End-to-end connectivity (host-to-host) Process-to-Process connectivity Reliable communication Error detection Error recovery, e.g. forward error correction or retransmission Resource management
More informationFirewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.
Firews and NAT 1 Firews By conventional definition, a firew is a partition made of fireproof material designed to prevent the spread of fire from one part of a building to another. firew isolates organization
More informationInternet Protocol version 6
Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The
More informationTable of Contents. Cisco MPLS FAQ For Beginners
Table of Contents MPLS FAQ For Beginners...1 Document ID: 4649...1 Questions...1 Introduction...1 Q. What is Multi Protocol Label Switching (MPLS)?...1 Q. What is a label? What is the structure of the
More informationProgress Report No. 3. A Case Study on Simulation Scenario
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report
More informationJuniper Netscreen Security Device. How to Enable IPv6 Page-51
Juniper Netscreen Security Device Page-51 Netscreen Firewall - Interfaces Below is a screen shot for a Netscreen Firewall interface. All interfaces have an IPv6 address except ethernet0/0. We will step
More informationInternet Quality of Service: an Overview
Internet Quality of Service: an Overview W. Zhao and et al, Columbia University presented by 리준걸 2006.10.25 INC Lab, Seoul Nat l University Outline Introduce QoS framework IntServ DiffServ Detailed mechanism
More informationMultiProtocol Label Switching - MPLS ( RFC 3031 )
Outline MultiProtocol Label Switching - MPLS ( RFC 3031 ) 1. What is MPLS and how does it work? 2. What MPLS is used for? 3. Label Distribution Protocols 1 1. What is MPLS and how does it work? MPLS is
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationInternational Workshop NGNT 31. DiffServ and MPLS. Tímea Dreilinger
International Workshop NGNT 31 DiffServ and MPLS Tímea Dreilinger Abstract Multi Protocol Label Switching (MPLS) technology enables Internet Service Providers to scale their current offerings, and exercise
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation IPv4
More informationMapping of Address and Port using Translation (MAP-T) E. Jordan Gottlieb Network Engineering and Architecture
Mapping of Address and Port using Translation (MAP-T) E. Jordan Gottlieb Network Engineering and Architecture jordan.gottlieb@charter.com. What is MAP-T? One of two transport modes of MAP Mapping of Address
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationScalability of Routing Protocols
Scalability of outing Protocols Internet is large... Need to introduce hierarchy -... into something that naturally does not have one - divide and conquer, abandoning hope for optimality - based on ownership
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationQueuing Mechanisms. Overview. Objectives
Queuing Mechanisms Overview Objectives This module describes the queuing mechanisms that can be used on output interfaces. It includes the following topics: Queuing Overview FIFO Queuing Priority Queuing
More informationUsing NAT in Overlapping Networks
Using NAT in Overlapping Networks Document ID: 13774 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Related Information
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationTag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER
CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 17 CMPE 80N Spring'10 1 Announcements Next class: Presentation of fun projects
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More informationFirewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense
FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall
More informationLecture 2: Basic routing, ARP, and basic IP
Internetworking Lecture 2: Basic routing, ARP, and basic IP Literature: Forouzan, TCP/IP Protocol Suite: Ch 6-8 Basic Routing Delivery, Forwarding, and Routing of IP packets Connection-oriented vs Connectionless
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationUsing Flexible NetFlow Top N Talkers to Analyze Network Traffic
Using Flexible NetFlow Top N Talkers to Analyze Network Traffic Last Updated: September 4, 2012 This document contains information about and instructions for using the Flexible NetFlow--Top N Talkers Support
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationConfiguring Policy-Based Routing
25 CHAPTER This chapter describes the tasks for configuring policy-based routing (PBR) on a router and includes these major sections: Overview of Policy-Based Routing, page 25-1 Policy-Based Routing Configuration
More informationIPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories
Table of Contents ACL Configuration 1 ACL Overview 1 IPv4 ACL Classification 1 IPv4 ACL Rule Order 1 Rule Numbering Step with IPv4 ACLs 3 Effective Time Period of an IPv4 ACL 3 IP Fragments Filtering with
More informationCSE 461 Midterm Winter 2018
CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at
More informationSoftware Defined Networking
Software Defined Networking Daniel Zappala CS 460 Computer Networking Brigham Young University Proliferation of Middleboxes 2/16 a router that manipulatees traffic rather than just forwarding it NAT rewrite
More informationCS 465 Networks. Disassembling Datagram Headers
CS 465 Networks Disassembling Datagram Headers School of Computer Science Howard Hughes College of Engineering University of Nevada, Las Vegas (c) Matt Pedersen, 2006 Recall the first 5x4 octets of the
More informationIntroduction to Netflow
Introduction to Netflow Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationPrinciples. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model
Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More information